SlideShare une entreprise Scribd logo
1  sur  99
 
FBW 01-03-2012 Wim Van Criekinge RELOADED 2
Inhoud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Les 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4 3 2 1 0 A brief history of time (BYA) Origin of life Origin of eukaryotes insects Fungi/animal Plant/animal Earliest fossils BYA
Rat versus  mouse RBP Rat versus  bacterial lipocalin
 
Sander-Schneider ,[object Object]
 
[object Object],[object Object]
 
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Les 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FEATURES  Location/Qualifiers source  1..756 /organism="Listeria ivanovii" /strain="ATCC 19119" /db_xref="taxon:1638" RBS  95..100 /gene="sod" gene  95..746 /gene="sod" CDS  109..717 /gene="sod" /EC_number="1.15.1.1" /codon_start=1 /product="superoxide dismutase" /db_xref="PID:g44011" /db_xref="SWISS-PROT:P28763" /transl_table=11 /translation="MTYELPKLPYTYDALEPNFDKETMEIHYTKHHNIYVTKL NEAVSGHAELASKPGEELVANLDSVPEEIRGAVRNHGGGHANHTLFWSSLSPN GGGAPTGNLKAAIESEFGTFDEFKEKFNAAAAARFGSGWAWLVVNNGKLEIVS TANQDSPLSEGKTPVLGLDVWEHAYYLKFQNRRPEYIDTFWNVINWDERNKRF DAAK" terminator  723..746 /gene="sod"
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BASE COUNT  247 a  136 c  151 g  222 t ORIGIN  1  cgttatttaa ggtgttacat agttctatgg aaatagggtc tatacctttc gccttacaat  61  gtaatttctt ttcacataaa taataaacaa tccgaggagg aatttttaat gacttacgaa  121 ttaccaaaat taccttatac ttatgatgct ttggagccga attttgataa agaaacaatg  181 gaaattcact atacaaagca ccacaatatt tatgtaacaa aactaaatga agcagtctca  241 ggacacgcag aacttgcaag taaacctggg gaagaattag ttgctaatct agatagcgtt  301 cctgaagaaa ttcgtggcgc agtacgtaac cacggtggtg gacatgctaa ccatacttta  361 ttctggtcta gtcttagccc aaatggtggt ggtgctccaa ctggtaactt aaaagcagca  421 atcgaaagcg aattcggcac atttgatgaa ttcaaagaaa aattcaatgc ggcagctgcg  481 gctcgttttg gttcaggatg ggcatggcta gtagtgaaca atggtaaact agaaattgtt  541 tccactgcta accaagattc tccacttagc gaaggtaaaa ctccagttct tggcttagat  601 gtttgggaac atgcttatta tcttaaattc caaaaccgtc gtcctgaata cattgacaca  661 ttttggaatg taattaactg ggatgaacga aataaacgct ttgacgcagc aaaataatta  721 tcgaaaggct cacttaggtg ggtcttttta tttcta //
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CC  -!- FUNCTION: CYTOKINE WITH A WIDE VARIETY OF FUNCTIONS: IT CAN CC  CAUSE CYTOLYSIS OF CERTAIN TUMOR CELL LINES, IT IS IMPLICATED CC  IN THE INDUCTION OF CACHEXIA, IT IS A POTENT PYROGEN CAUSING CC  FEVER BY DIRECT ACTION OR BY STIMULATION OF IL-1 SECRETION, IT CC  CAN STIMULATE CELL PROLIFERATION & INDUCE CELL DIFFERENTIATION CC  UNDER CERTAIN CONDITIONS.   Comments CC  -!- SUBUNIT: HOMOTRIMER. CC  -!- SUBCELLULAR LOCATION: TYPE II MEMBRANE PROTEIN. ALSO EXISTS AS CC  AN EXTRACELLULAR SOLUBLE FORM. CC  -!- PTM: THE SOLUBLE FORM DERIVES FROM THE MEMBRANE FORM BY CC  PROTEOLYTIC PROCESSING. CC  -!- DISEASE: CACHEXIA ACCOMPANIES A VARIETY OF DISEASES, INCLUDING CC  CANCER AND INFECTION, AND IS CHARACTERIZED BY GENERAL ILL CC  HEALTH AND MALNUTRITION. CC  -!- SIMILARITY: BELONGS TO THE TUMOR NECROSIS FACTOR FAMILY. DR  EMBL; X02910; G37210; -.  Database Cross-references DR  EMBL; M16441; G339741; -. DR  EMBL; X01394; G37220; -. DR  EMBL; M10988; G339738; -. DR  EMBL; M26331; G339764; -. DR  EMBL; Z15026; G37212; -. DR  PIR; B23784; QWHUN. DR  PIR; A44189; A44189. DR  PDB; 1TNF; 15-JAN-91. DR  PDB; 2TUN; 31-JAN-94.
KW  CYTOKINE; CYTOTOXIN; TRANSMEMBRANE; GLYCOPROTEIN; SIGNAL-ANCHOR; KW  MYRISTYLATION; 3D-STRUCTURE.  KeyWord FT  PROPEP  1  76  Feature Table FT  CHAIN  77  233  TUMOR NECROSIS FACTOR. FT  TRANSMEM  36  56  SIGNAL-ANCHOR (TYPE-II PROTEIN). FT  LIPID  19  19  MYRISTATE. FT  LIPID  20  20  MYRISTATE. FT  DISULFID  145  177 FT  MUTAGEN  105  105  L->S: LOW ACTIVITY. FT  MUTAGEN  108  108  R->W: BIOLOGICALLY INACTIVE. FT  MUTAGEN  112  112  L->F: BIOLOGICALLY INACTIVE. FT  MUTAGEN  162  162  S->F: BIOLOGICALLY INACTIVE. FT  MUTAGEN  167  167  V->A,D: BIOLOGICALLY INACTIVE. FT  MUTAGEN  222  222  E->K: BIOLOGICALLY INACTIVE. FT  CONFLICT  63  63  F -> S (IN REF. 5). FT  STRAND  89  93 FT  TURN  99  100 FT  TURN  109  110 FT  STRAND  112  113 FT  TURN  115  116 FT  STRAND  118  119 FT  STRAND  124  125
FT  STRAND  130  143 FT  STRAND  152  159 FT  STRAND  166  170 FT  STRAND  173  174 FT  TURN  183  184 FT  STRAND  189  202 FT  TURN  204  205 FT  STRAND  207  212 FT  HELIX  215  217 FT  STRAND  218  218 FT  STRAND  227  232 SQ  SEQUENCE  233 AA;  25644 MW;  666D7069 CRC32; MSTESMIRDV ELAEEALPKK TGGPQGSRRC LFLSLFSFLI VAGATTLFCL LHFGVIGPQR EEFPRDLSLI SPLAQAVRSS SRTPSDKPVA HVVANPQAEG QLQWLNRRAN ALLANGVELR DNQLVVPSEG LYLIYSQVLF KGQGCPSTHV LLTHTISRIA VSYQTKVNLL SAIKSPCQRE TPEGAEAKPW YEPIYLGGVF QLEKGDRLSA EINRPDYLDF AESGQVYFGI IAL //
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PDB
PDB
PDB
PDB
Visualizing Structures Cn3D versie 4.0 (NCBI)
Les 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems with Flat files … ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],name......................... surname.................... phone........................ address...................... name......................... surname.................... phone........................ address...................... name......................... surname.................... phone........................ address...................... name......................... surname.................... phone........................ address...................... name......................... surname.................... phone........................ address...................... name......................... surname.................... phone........................ address...................... name......................... surname.................... phone........................ address...................... name......................... surname.................... phone........................ address......................
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction to Database Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relational ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Benefits of Databases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relational Terminology ID NAME PHONE EMP_ID 201 Unisports 55-2066101  12 202 Simms Atheletics 81-20101  14 203 Delhi Sports 91-10351  14 204 Womansport 1-206-104-0103  11 Row  (Tuple) Column  (Attribute) CUSTOMER Table (Relation)
Relational Database Terminology ,[object Object],[object Object],ID LAST_NAME FIRST_NAME 10 Havel Marta 11 Magee Colin 12 Giljum Henry 14 Nguyen Mai ID NAME PHONE EMP_ID 201 Unisports 55-2066101  12 202 Simms Atheletics 81-20101  14 203 Delhi Sports 91-10351  14 204 Womansport 1-206-104-0103 11 Table Name:  CUSTOMER Table Name:  EMP Primary Key Foreign Key Primary Key
Relational Database Terminology Relational operators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disadvantages  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example 3-tier model in biological database http://www.bioinformatics.be Example of  different interface to the same back-end database (MySQL)
What is the Internet? ,[object Object],[object Object],[object Object],[object Object]
What is the World Wide Web? ,[object Object],[object Object],[object Object]
What is HTTP? In   Summary : HTTP is an acronym for Hypertext Transfer Protocol. HTTP is the set of rules, or protocol, that enables hypertext data to be transferred from one computer to another, and is based on the client/server principle. Hypertext is text that is coded using the Hypertext Markup Language. These codes and HTTP work together to link resources to each other. HTTP enables users to retrieve a wide variety of resources such as text, graphics, sound, animation and other hypertext documents, and allows hypertext access to other Internet protocols.
What is HTML? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is HTML? HTML stands for Hypertext Markup Language. HTML consists of standardized codes, or "tags", that are used to define the structure of information on a web page. HTML is used to prepare documents for the World Wide Web. A web page is single a unit of information, often called a document, that is available on the World Wide Web.  HTML defines several aspects of a web page including heading levels, bold, italics, images, paragraph breaks and hypertext links to other resources.
What is HTML? HTML is a sub-language of SGML, or Standard Generalized Markup Language. SGML is a system that defines and standardizes the structure of documents.  Both SGML and HTML utilize descriptive markup to define the structure of an area of text. In general terms, descriptive markup does not specify a particular font or point size for an area of text. Instead, it describes an area of text as a heading or a caption, for example.  Therefore, in HTML, text is marked as a heading, subheading, numbered list, bold, italic, etc.
What is a URL? URLs consist of letters, numbers, and punctuation. The basic structure of a URL is hierarchical, and  the hierarchy moves from left to right: Examples: http://www.healthyway.com:8080/exercise/mtbike.html gopher://gopher.state.edu/ ftp://ftp.company.com/ protocol://server-name.domain-name.top-level domain:port/directory/filename
What is an IP Address? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is an IP Address? If you want to connect to another computer, transfer files to or from another computer, or send an e-mail message, you first need to know where the other computer is - you need the computer's "address." An IP (Internet Protocol) address is an identifier for a particular machine on a particular network; it is part of a scheme to identify computers on the Internet. IP addresses are also referred to as IP numbers and Internet addresses. An IP address consists of four sections separated by periods. Each section contains a number ranging from 0 to 255. Example = 198.41.0.52
What is an IP Address? The diagram below compares Class A, Class B and Class C IP addresses. The blue numbers represent the network and the red numbers represent hosts on the network. Therefore, a Class A network can support many more hosts than a Class C network.
What is Internet Addressing? Most computers on the Internet have a unique domain name.  Special computers, called domain name servers, look up the domain name and match it to the corresponding IP address so that data can be properly routed to its destination on the Internet.  An example domain name is: healthyway.com Domain names are easier for most people to relate to than a numeric IP address.
What is Internet Addressing? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is TCP/IP? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is TCP/IP? TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is actually a collection of protocols, or rules, that govern the way data travels from one machine to another across networks. The Internet is based on TCP/IP.
What is TCP/IP? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is TCP/IP? The relationship between data, IP, and networks is often compared to the relationship between a letter, its addressed envelope, and the postal system.
What is TCP/IP? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is a packet? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is a packet? ,[object Object],[object Object],[object Object],[object Object]
What is a packet? In addition to the actual data, packets also contain header information.  The header of a packet contains both the originating and destination IP (Internet Protocol) address. The header also contains coding to handle transmission errors and keep packets flowing.  Header information can be compared to addressing an envelope. Like the header of a packet, an envelope contains the addresses of both the sender and the recipient, in order to keep track of who the envelope is from and who it is going to.
What is a packet? Header information is used by routers to send packets across a network. Routers are computers that are dedicated to "reading" header information and determining which router to send the packet to next. Packets move from router to router until they reach their final destination, in much the same way that an envelope travels between postal substations before reaching the recipient.  The packets that make up data, such as an e-mail message or a web page, will not necessarily all follow the same route to the final destination. The route that a packet travels depends on many variables, including network traffic at that particular moment and the size of the packet being sent.
What is a packet? Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of rules that govern how data is transmitted across networks and the Internet.  TCP/IP utilizes packets to send information across the Internet. TCP and IP have different functions related to packets.
What is a packet? ,[object Object],[object Object],[object Object]
What is a packet? ,[object Object],[object Object],[object Object],[object Object]
What is a packet? The following diagram illustrates an e-mail message being sent across a network.  1.  Data that makes up an e-mail message is split into packets by the IP portion of TCP/IP. IP also adds header information to each packet. 2.  Using header information in the packets, routers determine the best path for each packet to take to its final destination. 3.  The TCP portion of TCP/IP reassembles the packets in the correct order and ensures that all packets have arrived undamaged. Message is sent
What is Telnet? Telnet is a protocol, or set of rules, that enables one computer to connect to another computer.  This process is also referred to as remote login. The user's computer, which initiates the connection,  is referred to as the local computer, and the machine being connected to, which accepts the connection, is referred to as the remote, or host, computer.  The remote computer can be physically located in the next room, the next town, or in another country.
What is Telnet? Once connected, the user's computer emulates the remote computer.  When the user types in commands, they are executed on the remote computer.  The user's monitor displays what is taking place on the remote computer during the telnet session. The procedure for connecting to a remote computer will depend on how your Internet access is set-up.
What is Telnet? Once a connection to a remote computer is made, instructions or menus may appear.  Some remote machines may require a user to have an account on the machine, and may prompt users for a username and password. Many resources, such as library catalogs, are available via telnet without an account and password. Here is an example taken from a telnet session to Washington University in St. Louis, MO:
SSH Features ,[object Object],[object Object],[object Object],[object Object],[object Object]
Brief History ,[object Object],[object Object],[object Object]
SSH key background ,[object Object],[object Object]
What is FTP? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is FTP? ,[object Object],[object Object]
What is FTP? ,[object Object],[object Object]
What is FTP? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is FTP? Anonymous FTP Anonymous FTP allows a user to access a wealth of publicly available information. No special account or password is needed. However, an anonymous FTP site will sometimes ask that users login with the name “anonymous” and use their e-mail address as the password.
What is FTP? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is FTP? Files on FTP servers are often compressed. Compression decreases file size. This enables more files to be stored on the server and makes file transfer times shorter. In order to use a compressed file it needs to be decompressed using appropriate software.  It is a good idea to have current virus checking software on the computer before files are downloaded to it.
 
 
 
 
BioSQL
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Bioinformatics Final Report
Bioinformatics Final ReportBioinformatics Final Report
Bioinformatics Final ReportShruthi Choudary
 
Thesis def
Thesis defThesis def
Thesis defJay Vyas
 
NCBI Boot Camp for Beginners Slides
NCBI Boot Camp for Beginners SlidesNCBI Boot Camp for Beginners Slides
NCBI Boot Camp for Beginners SlidesJackie Wirz, PhD
 
WikiPathways: how open source and open data can make omics technology more us...
WikiPathways: how open source and open data can make omics technology more us...WikiPathways: how open source and open data can make omics technology more us...
WikiPathways: how open source and open data can make omics technology more us...Chris Evelo
 
02.databases slides
02.databases slides02.databases slides
02.databases slidesItsme148
 
BITs: Genome browsers and interpretation of gene lists.
BITs: Genome browsers and interpretation of gene lists.BITs: Genome browsers and interpretation of gene lists.
BITs: Genome browsers and interpretation of gene lists.BITS
 
Using biological network approaches for dynamic extension of micronutrient re...
Using biological network approaches for dynamic extension of micronutrient re...Using biological network approaches for dynamic extension of micronutrient re...
Using biological network approaches for dynamic extension of micronutrient re...Chris Evelo
 
Tools of bioinforformatics by kk
Tools of bioinforformatics by kkTools of bioinforformatics by kk
Tools of bioinforformatics by kkKAUSHAL SAHU
 
The UCSC genome browser: A Neuroscience focused overview
The UCSC genome browser: A Neuroscience focused overviewThe UCSC genome browser: A Neuroscience focused overview
The UCSC genome browser: A Neuroscience focused overviewVictoria Perreau
 
BITS training - UCSC Genome Browser - Part 2
BITS training - UCSC Genome Browser - Part 2BITS training - UCSC Genome Browser - Part 2
BITS training - UCSC Genome Browser - Part 2BITS
 
Introduction to Bioinformatics.
 Introduction to Bioinformatics. Introduction to Bioinformatics.
Introduction to Bioinformatics.Elena Sügis
 

Tendances (20)

Bioinformatics Final Report
Bioinformatics Final ReportBioinformatics Final Report
Bioinformatics Final Report
 
RML NCBI Resources
RML NCBI ResourcesRML NCBI Resources
RML NCBI Resources
 
Ncbi
NcbiNcbi
Ncbi
 
Thesis def
Thesis defThesis def
Thesis def
 
NCBI Boot Camp for Beginners Slides
NCBI Boot Camp for Beginners SlidesNCBI Boot Camp for Beginners Slides
NCBI Boot Camp for Beginners Slides
 
T1 2018 bioinformatics
T1 2018 bioinformaticsT1 2018 bioinformatics
T1 2018 bioinformatics
 
Article
ArticleArticle
Article
 
Use of data
Use of dataUse of data
Use of data
 
Data retrieval
Data retrievalData retrieval
Data retrieval
 
WikiPathways: how open source and open data can make omics technology more us...
WikiPathways: how open source and open data can make omics technology more us...WikiPathways: how open source and open data can make omics technology more us...
WikiPathways: how open source and open data can make omics technology more us...
 
NCBI
NCBINCBI
NCBI
 
02.databases slides
02.databases slides02.databases slides
02.databases slides
 
BLAST
BLASTBLAST
BLAST
 
BITs: Genome browsers and interpretation of gene lists.
BITs: Genome browsers and interpretation of gene lists.BITs: Genome browsers and interpretation of gene lists.
BITs: Genome browsers and interpretation of gene lists.
 
Using biological network approaches for dynamic extension of micronutrient re...
Using biological network approaches for dynamic extension of micronutrient re...Using biological network approaches for dynamic extension of micronutrient re...
Using biological network approaches for dynamic extension of micronutrient re...
 
Tools of bioinforformatics by kk
Tools of bioinforformatics by kkTools of bioinforformatics by kk
Tools of bioinforformatics by kk
 
The UCSC genome browser: A Neuroscience focused overview
The UCSC genome browser: A Neuroscience focused overviewThe UCSC genome browser: A Neuroscience focused overview
The UCSC genome browser: A Neuroscience focused overview
 
BITS training - UCSC Genome Browser - Part 2
BITS training - UCSC Genome Browser - Part 2BITS training - UCSC Genome Browser - Part 2
BITS training - UCSC Genome Browser - Part 2
 
Introduction to Bioinformatics.
 Introduction to Bioinformatics. Introduction to Bioinformatics.
Introduction to Bioinformatics.
 
PROTEIN DATABASE
PROTEIN DATABASEPROTEIN DATABASE
PROTEIN DATABASE
 

En vedette

E-Business - Gruppo Beta (Esercitazione)
E-Business - Gruppo Beta (Esercitazione)E-Business - Gruppo Beta (Esercitazione)
E-Business - Gruppo Beta (Esercitazione)Enrico Ganzerla
 
Lead Management
Lead ManagementLead Management
Lead Managementgaurav_11
 
Marriott reward travel style game promo
Marriott reward travel style game promoMarriott reward travel style game promo
Marriott reward travel style game promoLizzi Pix
 
Hotelcom by channel mobile
Hotelcom by channel mobileHotelcom by channel mobile
Hotelcom by channel mobileChannelMobile
 
Presentation mithila saraf
Presentation mithila sarafPresentation mithila saraf
Presentation mithila sarafmds535
 
Bioinformatica 10-11-2011-t5-database searching
Bioinformatica 10-11-2011-t5-database searchingBioinformatica 10-11-2011-t5-database searching
Bioinformatica 10-11-2011-t5-database searchingProf. Wim Van Criekinge
 

En vedette (9)

Bioinformatica t7-protein structure
Bioinformatica t7-protein structureBioinformatica t7-protein structure
Bioinformatica t7-protein structure
 
E-Business - Gruppo Beta (Esercitazione)
E-Business - Gruppo Beta (Esercitazione)E-Business - Gruppo Beta (Esercitazione)
E-Business - Gruppo Beta (Esercitazione)
 
Anuj saxena
Anuj saxenaAnuj saxena
Anuj saxena
 
Lead Management
Lead ManagementLead Management
Lead Management
 
Marriott reward travel style game promo
Marriott reward travel style game promoMarriott reward travel style game promo
Marriott reward travel style game promo
 
Hotelcom by channel mobile
Hotelcom by channel mobileHotelcom by channel mobile
Hotelcom by channel mobile
 
Presentation mithila saraf
Presentation mithila sarafPresentation mithila saraf
Presentation mithila saraf
 
Bioinformatica 10-11-2011-t5-database searching
Bioinformatica 10-11-2011-t5-database searchingBioinformatica 10-11-2011-t5-database searching
Bioinformatica 10-11-2011-t5-database searching
 
Bioinformatica 08-12-2011-t8-go-hmm
Bioinformatica 08-12-2011-t8-go-hmmBioinformatica 08-12-2011-t8-go-hmm
Bioinformatica 08-12-2011-t8-go-hmm
 

Similaire à 2012 03 01_bioinformatics_ii_les1

2018 02 20_biological_databases_part1_v_upload
2018 02 20_biological_databases_part1_v_upload2018 02 20_biological_databases_part1_v_upload
2018 02 20_biological_databases_part1_v_uploadProf. Wim Van Criekinge
 
Bioinformatics MiRON
Bioinformatics MiRONBioinformatics MiRON
Bioinformatics MiRONPrabin Shakya
 
Bioinformatics data mining
Bioinformatics data miningBioinformatics data mining
Bioinformatics data miningSangeeta Das
 
Role of bioinformatics in life sciences research
Role of bioinformatics in life sciences researchRole of bioinformatics in life sciences research
Role of bioinformatics in life sciences researchAnshika Bansal
 
Informal presentation on bioinformatics
Informal presentation on bioinformaticsInformal presentation on bioinformatics
Informal presentation on bioinformaticsAtai Rabby
 
Bioinformatic, and tools by kk sahu
Bioinformatic, and tools by kk sahuBioinformatic, and tools by kk sahu
Bioinformatic, and tools by kk sahuKAUSHAL SAHU
 
Data analysis & integration challenges in genomics
Data analysis & integration challenges in genomicsData analysis & integration challenges in genomics
Data analysis & integration challenges in genomicsmikaelhuss
 
Data retriveal ,srg and dbget
Data retriveal ,srg and dbgetData retriveal ,srg and dbget
Data retriveal ,srg and dbgetSurendraKumar338
 
Sequencedatabases
SequencedatabasesSequencedatabases
SequencedatabasesAbhik Seal
 
SooryaKiran Bioinformatics
SooryaKiran BioinformaticsSooryaKiran Bioinformatics
SooryaKiran Bioinformaticscontactsoorya
 
Session i overview bioinfo dm and app mmc
Session i overview bioinfo dm and app mmcSession i overview bioinfo dm and app mmc
Session i overview bioinfo dm and app mmcUSD Bioinformatics
 
Free software and bioinformatics
Free software and bioinformaticsFree software and bioinformatics
Free software and bioinformaticsAlberto Labarga
 
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...journal ijrtem
 
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...IJRTEMJOURNAL
 
Talk by J. Eisen for NZ Computational Genomics meeting
Talk by J. Eisen for NZ Computational Genomics meetingTalk by J. Eisen for NZ Computational Genomics meeting
Talk by J. Eisen for NZ Computational Genomics meetingJonathan Eisen
 

Similaire à 2012 03 01_bioinformatics_ii_les1 (20)

2016 02 23_biological_databases_part1
2016 02 23_biological_databases_part12016 02 23_biological_databases_part1
2016 02 23_biological_databases_part1
 
2018 02 20_biological_databases_part1_v_upload
2018 02 20_biological_databases_part1_v_upload2018 02 20_biological_databases_part1_v_upload
2018 02 20_biological_databases_part1_v_upload
 
Bioinformatics MiRON
Bioinformatics MiRONBioinformatics MiRON
Bioinformatics MiRON
 
Bioinformatics data mining
Bioinformatics data miningBioinformatics data mining
Bioinformatics data mining
 
Role of bioinformatics in life sciences research
Role of bioinformatics in life sciences researchRole of bioinformatics in life sciences research
Role of bioinformatics in life sciences research
 
Biological databases
Biological databasesBiological databases
Biological databases
 
Informal presentation on bioinformatics
Informal presentation on bioinformaticsInformal presentation on bioinformatics
Informal presentation on bioinformatics
 
2017 biological databases_part1_vupload
2017 biological databases_part1_vupload2017 biological databases_part1_vupload
2017 biological databases_part1_vupload
 
Bioinformatic, and tools by kk sahu
Bioinformatic, and tools by kk sahuBioinformatic, and tools by kk sahu
Bioinformatic, and tools by kk sahu
 
2020 02 11_biological_databases_part1
2020 02 11_biological_databases_part12020 02 11_biological_databases_part1
2020 02 11_biological_databases_part1
 
Data analysis & integration challenges in genomics
Data analysis & integration challenges in genomicsData analysis & integration challenges in genomics
Data analysis & integration challenges in genomics
 
Data retriveal ,srg and dbget
Data retriveal ,srg and dbgetData retriveal ,srg and dbget
Data retriveal ,srg and dbget
 
Sequencedatabases
SequencedatabasesSequencedatabases
Sequencedatabases
 
SooryaKiran Bioinformatics
SooryaKiran BioinformaticsSooryaKiran Bioinformatics
SooryaKiran Bioinformatics
 
Session i overview bioinfo dm and app mmc
Session i overview bioinfo dm and app mmcSession i overview bioinfo dm and app mmc
Session i overview bioinfo dm and app mmc
 
Free software and bioinformatics
Free software and bioinformaticsFree software and bioinformatics
Free software and bioinformatics
 
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...
 
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...
Performance Improvement of BLAST with Use of MSA Techniques to Search Ancesto...
 
Bioinformatics
BioinformaticsBioinformatics
Bioinformatics
 
Talk by J. Eisen for NZ Computational Genomics meeting
Talk by J. Eisen for NZ Computational Genomics meetingTalk by J. Eisen for NZ Computational Genomics meeting
Talk by J. Eisen for NZ Computational Genomics meeting
 

Plus de Prof. Wim Van Criekinge

2019 03 05_biological_databases_part5_v_upload
2019 03 05_biological_databases_part5_v_upload2019 03 05_biological_databases_part5_v_upload
2019 03 05_biological_databases_part5_v_uploadProf. Wim Van Criekinge
 
2019 03 05_biological_databases_part3_v_upload
2019 03 05_biological_databases_part3_v_upload2019 03 05_biological_databases_part3_v_upload
2019 03 05_biological_databases_part3_v_uploadProf. Wim Van Criekinge
 
2019 02 21_biological_databases_part2_v_upload
2019 02 21_biological_databases_part2_v_upload2019 02 21_biological_databases_part2_v_upload
2019 02 21_biological_databases_part2_v_uploadProf. Wim Van Criekinge
 
2019 02 12_biological_databases_part1_v_upload
2019 02 12_biological_databases_part1_v_upload2019 02 12_biological_databases_part1_v_upload
2019 02 12_biological_databases_part1_v_uploadProf. Wim Van Criekinge
 
Bio ontologies and semantic technologies[2]
Bio ontologies and semantic technologies[2]Bio ontologies and semantic technologies[2]
Bio ontologies and semantic technologies[2]Prof. Wim Van Criekinge
 
2018 03 27_biological_databases_part4_v_upload
2018 03 27_biological_databases_part4_v_upload2018 03 27_biological_databases_part4_v_upload
2018 03 27_biological_databases_part4_v_uploadProf. Wim Van Criekinge
 
2018 02 20_biological_databases_part2_v_upload
2018 02 20_biological_databases_part2_v_upload2018 02 20_biological_databases_part2_v_upload
2018 02 20_biological_databases_part2_v_uploadProf. Wim Van Criekinge
 

Plus de Prof. Wim Van Criekinge (20)

2019 03 05_biological_databases_part5_v_upload
2019 03 05_biological_databases_part5_v_upload2019 03 05_biological_databases_part5_v_upload
2019 03 05_biological_databases_part5_v_upload
 
2019 03 05_biological_databases_part3_v_upload
2019 03 05_biological_databases_part3_v_upload2019 03 05_biological_databases_part3_v_upload
2019 03 05_biological_databases_part3_v_upload
 
2019 02 21_biological_databases_part2_v_upload
2019 02 21_biological_databases_part2_v_upload2019 02 21_biological_databases_part2_v_upload
2019 02 21_biological_databases_part2_v_upload
 
2019 02 12_biological_databases_part1_v_upload
2019 02 12_biological_databases_part1_v_upload2019 02 12_biological_databases_part1_v_upload
2019 02 12_biological_databases_part1_v_upload
 
P7 2018 biopython3
P7 2018 biopython3P7 2018 biopython3
P7 2018 biopython3
 
P6 2018 biopython2b
P6 2018 biopython2bP6 2018 biopython2b
P6 2018 biopython2b
 
P4 2018 io_functions
P4 2018 io_functionsP4 2018 io_functions
P4 2018 io_functions
 
P3 2018 python_regexes
P3 2018 python_regexesP3 2018 python_regexes
P3 2018 python_regexes
 
P1 2018 python
P1 2018 pythonP1 2018 python
P1 2018 python
 
Bio ontologies and semantic technologies[2]
Bio ontologies and semantic technologies[2]Bio ontologies and semantic technologies[2]
Bio ontologies and semantic technologies[2]
 
2018 05 08_biological_databases_no_sql
2018 05 08_biological_databases_no_sql2018 05 08_biological_databases_no_sql
2018 05 08_biological_databases_no_sql
 
2018 03 27_biological_databases_part4_v_upload
2018 03 27_biological_databases_part4_v_upload2018 03 27_biological_databases_part4_v_upload
2018 03 27_biological_databases_part4_v_upload
 
2018 03 20_biological_databases_part3
2018 03 20_biological_databases_part32018 03 20_biological_databases_part3
2018 03 20_biological_databases_part3
 
2018 02 20_biological_databases_part2_v_upload
2018 02 20_biological_databases_part2_v_upload2018 02 20_biological_databases_part2_v_upload
2018 02 20_biological_databases_part2_v_upload
 
P7 2017 biopython3
P7 2017 biopython3P7 2017 biopython3
P7 2017 biopython3
 
P6 2017 biopython2
P6 2017 biopython2P6 2017 biopython2
P6 2017 biopython2
 
Van criekinge 2017_11_13_rodebiotech
Van criekinge 2017_11_13_rodebiotechVan criekinge 2017_11_13_rodebiotech
Van criekinge 2017_11_13_rodebiotech
 
P4 2017 io
P4 2017 ioP4 2017 io
P4 2017 io
 
T5 2017 database_searching_v_upload
T5 2017 database_searching_v_uploadT5 2017 database_searching_v_upload
T5 2017 database_searching_v_upload
 
P1 3 2017_python_exercises
P1 3 2017_python_exercisesP1 3 2017_python_exercises
P1 3 2017_python_exercises
 

Dernier

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 

Dernier (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

2012 03 01_bioinformatics_ii_les1

  • 1.  
  • 2. FBW 01-03-2012 Wim Van Criekinge RELOADED 2
  • 3.
  • 4.
  • 5. 4 3 2 1 0 A brief history of time (BYA) Origin of life Origin of eukaryotes insects Fungi/animal Plant/animal Earliest fossils BYA
  • 6. Rat versus mouse RBP Rat versus bacterial lipocalin
  • 7.  
  • 8.
  • 9.  
  • 10.
  • 11.  
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. FEATURES Location/Qualifiers source 1..756 /organism="Listeria ivanovii" /strain="ATCC 19119" /db_xref="taxon:1638" RBS 95..100 /gene="sod" gene 95..746 /gene="sod" CDS 109..717 /gene="sod" /EC_number="1.15.1.1" /codon_start=1 /product="superoxide dismutase" /db_xref="PID:g44011" /db_xref="SWISS-PROT:P28763" /transl_table=11 /translation="MTYELPKLPYTYDALEPNFDKETMEIHYTKHHNIYVTKL NEAVSGHAELASKPGEELVANLDSVPEEIRGAVRNHGGGHANHTLFWSSLSPN GGGAPTGNLKAAIESEFGTFDEFKEKFNAAAAARFGSGWAWLVVNNGKLEIVS TANQDSPLSEGKTPVLGLDVWEHAYYLKFQNRRPEYIDTFWNVINWDERNKRF DAAK" terminator 723..746 /gene="sod"
  • 29.
  • 30. BASE COUNT 247 a 136 c 151 g 222 t ORIGIN 1 cgttatttaa ggtgttacat agttctatgg aaatagggtc tatacctttc gccttacaat 61 gtaatttctt ttcacataaa taataaacaa tccgaggagg aatttttaat gacttacgaa 121 ttaccaaaat taccttatac ttatgatgct ttggagccga attttgataa agaaacaatg 181 gaaattcact atacaaagca ccacaatatt tatgtaacaa aactaaatga agcagtctca 241 ggacacgcag aacttgcaag taaacctggg gaagaattag ttgctaatct agatagcgtt 301 cctgaagaaa ttcgtggcgc agtacgtaac cacggtggtg gacatgctaa ccatacttta 361 ttctggtcta gtcttagccc aaatggtggt ggtgctccaa ctggtaactt aaaagcagca 421 atcgaaagcg aattcggcac atttgatgaa ttcaaagaaa aattcaatgc ggcagctgcg 481 gctcgttttg gttcaggatg ggcatggcta gtagtgaaca atggtaaact agaaattgtt 541 tccactgcta accaagattc tccacttagc gaaggtaaaa ctccagttct tggcttagat 601 gtttgggaac atgcttatta tcttaaattc caaaaccgtc gtcctgaata cattgacaca 661 ttttggaatg taattaactg ggatgaacga aataaacgct ttgacgcagc aaaataatta 721 tcgaaaggct cacttaggtg ggtcttttta tttcta //
  • 31.
  • 32.
  • 33. CC -!- FUNCTION: CYTOKINE WITH A WIDE VARIETY OF FUNCTIONS: IT CAN CC CAUSE CYTOLYSIS OF CERTAIN TUMOR CELL LINES, IT IS IMPLICATED CC IN THE INDUCTION OF CACHEXIA, IT IS A POTENT PYROGEN CAUSING CC FEVER BY DIRECT ACTION OR BY STIMULATION OF IL-1 SECRETION, IT CC CAN STIMULATE CELL PROLIFERATION & INDUCE CELL DIFFERENTIATION CC UNDER CERTAIN CONDITIONS. Comments CC -!- SUBUNIT: HOMOTRIMER. CC -!- SUBCELLULAR LOCATION: TYPE II MEMBRANE PROTEIN. ALSO EXISTS AS CC AN EXTRACELLULAR SOLUBLE FORM. CC -!- PTM: THE SOLUBLE FORM DERIVES FROM THE MEMBRANE FORM BY CC PROTEOLYTIC PROCESSING. CC -!- DISEASE: CACHEXIA ACCOMPANIES A VARIETY OF DISEASES, INCLUDING CC CANCER AND INFECTION, AND IS CHARACTERIZED BY GENERAL ILL CC HEALTH AND MALNUTRITION. CC -!- SIMILARITY: BELONGS TO THE TUMOR NECROSIS FACTOR FAMILY. DR EMBL; X02910; G37210; -. Database Cross-references DR EMBL; M16441; G339741; -. DR EMBL; X01394; G37220; -. DR EMBL; M10988; G339738; -. DR EMBL; M26331; G339764; -. DR EMBL; Z15026; G37212; -. DR PIR; B23784; QWHUN. DR PIR; A44189; A44189. DR PDB; 1TNF; 15-JAN-91. DR PDB; 2TUN; 31-JAN-94.
  • 34. KW CYTOKINE; CYTOTOXIN; TRANSMEMBRANE; GLYCOPROTEIN; SIGNAL-ANCHOR; KW MYRISTYLATION; 3D-STRUCTURE. KeyWord FT PROPEP 1 76 Feature Table FT CHAIN 77 233 TUMOR NECROSIS FACTOR. FT TRANSMEM 36 56 SIGNAL-ANCHOR (TYPE-II PROTEIN). FT LIPID 19 19 MYRISTATE. FT LIPID 20 20 MYRISTATE. FT DISULFID 145 177 FT MUTAGEN 105 105 L->S: LOW ACTIVITY. FT MUTAGEN 108 108 R->W: BIOLOGICALLY INACTIVE. FT MUTAGEN 112 112 L->F: BIOLOGICALLY INACTIVE. FT MUTAGEN 162 162 S->F: BIOLOGICALLY INACTIVE. FT MUTAGEN 167 167 V->A,D: BIOLOGICALLY INACTIVE. FT MUTAGEN 222 222 E->K: BIOLOGICALLY INACTIVE. FT CONFLICT 63 63 F -> S (IN REF. 5). FT STRAND 89 93 FT TURN 99 100 FT TURN 109 110 FT STRAND 112 113 FT TURN 115 116 FT STRAND 118 119 FT STRAND 124 125
  • 35. FT STRAND 130 143 FT STRAND 152 159 FT STRAND 166 170 FT STRAND 173 174 FT TURN 183 184 FT STRAND 189 202 FT TURN 204 205 FT STRAND 207 212 FT HELIX 215 217 FT STRAND 218 218 FT STRAND 227 232 SQ SEQUENCE 233 AA; 25644 MW; 666D7069 CRC32; MSTESMIRDV ELAEEALPKK TGGPQGSRRC LFLSLFSFLI VAGATTLFCL LHFGVIGPQR EEFPRDLSLI SPLAQAVRSS SRTPSDKPVA HVVANPQAEG QLQWLNRRAN ALLANGVELR DNQLVVPSEG LYLIYSQVLF KGQGCPSTHV LLTHTISRIA VSYQTKVNLL SAIKSPCQRE TPEGAEAKPW YEPIYLGGVF QLEKGDRLSA EINRPDYLDF AESGQVYFGI IAL //
  • 36.
  • 37. PDB
  • 38. PDB
  • 39. PDB
  • 40. PDB
  • 41. Visualizing Structures Cn3D versie 4.0 (NCBI)
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50. Relational Terminology ID NAME PHONE EMP_ID 201 Unisports 55-2066101 12 202 Simms Atheletics 81-20101 14 203 Delhi Sports 91-10351 14 204 Womansport 1-206-104-0103 11 Row (Tuple) Column (Attribute) CUSTOMER Table (Relation)
  • 51.
  • 52.
  • 53.
  • 54.
  • 55. Example 3-tier model in biological database http://www.bioinformatics.be Example of different interface to the same back-end database (MySQL)
  • 56.
  • 57.
  • 58. What is HTTP? In Summary : HTTP is an acronym for Hypertext Transfer Protocol. HTTP is the set of rules, or protocol, that enables hypertext data to be transferred from one computer to another, and is based on the client/server principle. Hypertext is text that is coded using the Hypertext Markup Language. These codes and HTTP work together to link resources to each other. HTTP enables users to retrieve a wide variety of resources such as text, graphics, sound, animation and other hypertext documents, and allows hypertext access to other Internet protocols.
  • 59.
  • 60. What is HTML? HTML stands for Hypertext Markup Language. HTML consists of standardized codes, or "tags", that are used to define the structure of information on a web page. HTML is used to prepare documents for the World Wide Web. A web page is single a unit of information, often called a document, that is available on the World Wide Web. HTML defines several aspects of a web page including heading levels, bold, italics, images, paragraph breaks and hypertext links to other resources.
  • 61. What is HTML? HTML is a sub-language of SGML, or Standard Generalized Markup Language. SGML is a system that defines and standardizes the structure of documents. Both SGML and HTML utilize descriptive markup to define the structure of an area of text. In general terms, descriptive markup does not specify a particular font or point size for an area of text. Instead, it describes an area of text as a heading or a caption, for example. Therefore, in HTML, text is marked as a heading, subheading, numbered list, bold, italic, etc.
  • 62. What is a URL? URLs consist of letters, numbers, and punctuation. The basic structure of a URL is hierarchical, and the hierarchy moves from left to right: Examples: http://www.healthyway.com:8080/exercise/mtbike.html gopher://gopher.state.edu/ ftp://ftp.company.com/ protocol://server-name.domain-name.top-level domain:port/directory/filename
  • 63.
  • 64. What is an IP Address? If you want to connect to another computer, transfer files to or from another computer, or send an e-mail message, you first need to know where the other computer is - you need the computer's "address." An IP (Internet Protocol) address is an identifier for a particular machine on a particular network; it is part of a scheme to identify computers on the Internet. IP addresses are also referred to as IP numbers and Internet addresses. An IP address consists of four sections separated by periods. Each section contains a number ranging from 0 to 255. Example = 198.41.0.52
  • 65. What is an IP Address? The diagram below compares Class A, Class B and Class C IP addresses. The blue numbers represent the network and the red numbers represent hosts on the network. Therefore, a Class A network can support many more hosts than a Class C network.
  • 66. What is Internet Addressing? Most computers on the Internet have a unique domain name. Special computers, called domain name servers, look up the domain name and match it to the corresponding IP address so that data can be properly routed to its destination on the Internet. An example domain name is: healthyway.com Domain names are easier for most people to relate to than a numeric IP address.
  • 67.
  • 68.
  • 69. What is TCP/IP? TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is actually a collection of protocols, or rules, that govern the way data travels from one machine to another across networks. The Internet is based on TCP/IP.
  • 70.
  • 71. What is TCP/IP? The relationship between data, IP, and networks is often compared to the relationship between a letter, its addressed envelope, and the postal system.
  • 72.
  • 73.
  • 74.
  • 75. What is a packet? In addition to the actual data, packets also contain header information. The header of a packet contains both the originating and destination IP (Internet Protocol) address. The header also contains coding to handle transmission errors and keep packets flowing. Header information can be compared to addressing an envelope. Like the header of a packet, an envelope contains the addresses of both the sender and the recipient, in order to keep track of who the envelope is from and who it is going to.
  • 76. What is a packet? Header information is used by routers to send packets across a network. Routers are computers that are dedicated to "reading" header information and determining which router to send the packet to next. Packets move from router to router until they reach their final destination, in much the same way that an envelope travels between postal substations before reaching the recipient. The packets that make up data, such as an e-mail message or a web page, will not necessarily all follow the same route to the final destination. The route that a packet travels depends on many variables, including network traffic at that particular moment and the size of the packet being sent.
  • 77. What is a packet? Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of rules that govern how data is transmitted across networks and the Internet. TCP/IP utilizes packets to send information across the Internet. TCP and IP have different functions related to packets.
  • 78.
  • 79.
  • 80. What is a packet? The following diagram illustrates an e-mail message being sent across a network. 1. Data that makes up an e-mail message is split into packets by the IP portion of TCP/IP. IP also adds header information to each packet. 2. Using header information in the packets, routers determine the best path for each packet to take to its final destination. 3. The TCP portion of TCP/IP reassembles the packets in the correct order and ensures that all packets have arrived undamaged. Message is sent
  • 81. What is Telnet? Telnet is a protocol, or set of rules, that enables one computer to connect to another computer. This process is also referred to as remote login. The user's computer, which initiates the connection, is referred to as the local computer, and the machine being connected to, which accepts the connection, is referred to as the remote, or host, computer. The remote computer can be physically located in the next room, the next town, or in another country.
  • 82. What is Telnet? Once connected, the user's computer emulates the remote computer. When the user types in commands, they are executed on the remote computer. The user's monitor displays what is taking place on the remote computer during the telnet session. The procedure for connecting to a remote computer will depend on how your Internet access is set-up.
  • 83. What is Telnet? Once a connection to a remote computer is made, instructions or menus may appear. Some remote machines may require a user to have an account on the machine, and may prompt users for a username and password. Many resources, such as library catalogs, are available via telnet without an account and password. Here is an example taken from a telnet session to Washington University in St. Louis, MO:
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91. What is FTP? Anonymous FTP Anonymous FTP allows a user to access a wealth of publicly available information. No special account or password is needed. However, an anonymous FTP site will sometimes ask that users login with the name “anonymous” and use their e-mail address as the password.
  • 92.
  • 93. What is FTP? Files on FTP servers are often compressed. Compression decreases file size. This enables more files to be stored on the server and makes file transfer times shorter. In order to use a compressed file it needs to be decompressed using appropriate software. It is a good idea to have current virus checking software on the computer before files are downloaded to it.
  • 94.  
  • 95.  
  • 96.  
  • 97.  
  • 99.

Notes de l'éditeur

  1. The new curve saturated around 20% for alignments over more than 250 residues --- and for alignments shorter than 11 residues the new equation yielded values above 100%. However, this was acceptable as 100% identity for gragments of 10-11 residues does not imply structural similarity.
  2. 5
  3. 3
  4. 1
  5. 2
  6. 6
  7. 4
  8. 7
  9. SSH’s first use was as a replacement for rsh, the Unix r emote sh ell application. This tool allowed one to connect to a shell on a remote machine. The tool suffered from two major shortcomings. First, like telnet it sent all traffic in cleartext, meaning that a sniffer tool at any point between the two machines could read all commands sent and replies received. Secondly, the /etc/hosts.equiv and ~/.rhosts files listed trusted machines and users; these could make rsh connections without any further authentication. If an attacker compromised any of these trusted hosts, they would immediately get access to the rsh server with no more effort. Also, if the attacker was successfully able to spoof the IP address of a trusted host, they’d get the same access. SSH encrypts all traffic, including the password or key authentication. It also uses host keys to definitively identify both hosts involved in the communication, getting around man-in-the-middle attacks and IP spoofing.
  10. The licensing issue is rather complex; depending on which release of the ssh1 and ssh2 applications you choose: Source code may or may not be available Use may be free or for cost for educational institutions Use may be free or for cost for companies The O’Reilly SSH book covers this in good detail. The SSH1 protocol has some shortcomings that aren’t easily fixed except by using the newer, but incompatible SSH2 protocol. If possible, you should use SSH clients and servers that support SSH2 and prefer it over SSH1 protocol connections.
  11. The serious problem with the password approach, whether used with telnet or with ssh, is that the password you need to enter at the client end is stored on the server. Even though it’s stored in an encoded form in /etc/passwd or /etc/shadow, this password can be cracked with brute force once one has access to that file. The difference with the public/private key split is that if an attacker gets the public key stored on the server, that public key cannot be used to get back into the server! Only the private key, kept on the client only, can be used to get into a server with the public key.