Review Special Issues

Chromatin—a global buffer for eukaryotic gene control

  • Received: 26 August 2015 Accepted: 20 September 2015 Published: 22 September 2015
  • Most of eukaryotic DNA is embedded into nucleosome arrays formed by DNA wrapped around a core histone octamer. Nucleosome is a fundamental repeating unit of chromatin guarding access to the genetic information. Here, I will discuss two facets of nucleosome in eukaryotic gene control. On the one hand, nucleosome acts as a regulatory unit, which controls gene switches through a set of post-translational modifications occurring on histone tails. On the other hand, global configuration of nucleosome arrays with respect to nucleosome positioning, spacing and turnover acts as a tuning parameter for all genomic functions. A “histone code” hypothesis extents the Jacob-Monod model for eukaryotic gene control; however, when considering factors capable of reconfiguring entire nucleosome array, such as ATP-dependent chromatin remodelers, this model becomes limited. Global changes in nucleosome arrays will be sensed by every gene, yet the transcriptional responses might be specific and appear as gene targeted events. What determines such specificity is unclear, but it’s likely to depend on initial gene settings, such as availability of transcription factors, and on configuration of new nucleosome array state.

    Citation: Yuri M. Moshkin. Chromatin—a global buffer for eukaryotic gene control[J]. AIMS Biophysics, 2015, 2(4): 531-554. doi: 10.3934/biophy.2015.4.531

    Related Papers:

    [1] Raghvendra P Singh, Guillaume Brysbaert, Marc F Lensink, Fabrizio Cleri, Ralf Blossey . Kinetic proofreading of chromatin remodeling: from gene activation to gene repression and back. AIMS Biophysics, 2015, 2(4): 398-411. doi: 10.3934/biophy.2015.4.398
    [2] Larisa I. Fedoreyeva, Boris F. Vanyushin, Ekaterina N. Baranova . Peptide AEDL alters chromatin conformation via histone binding. AIMS Biophysics, 2020, 7(1): 1-16. doi: 10.3934/biophy.2020001
    [3] Michael-Christian Mörl, Tilo Zülske, Robert Schöpflin, Gero Wedemann . Data formats for modelling the spatial structure of chromatin based on experimental positions of nucleosomes. AIMS Biophysics, 2019, 6(3): 83-98. doi: 10.3934/biophy.2019.3.83
    [4] Edward N Trifonov . Columnar structure of SV40 minichromosome. AIMS Biophysics, 2015, 2(3): 274-283. doi: 10.3934/biophy.2015.3.274
    [5] Davood Norouzi, Ataur Katebi, Feng Cui, Victor B. Zhurkin . Topological diversity of chromatin fibers: Interplay between nucleosome repeat length, DNA linking number and the level of transcription. AIMS Biophysics, 2015, 2(4): 613-629. doi: 10.3934/biophy.2015.4.613
    [6] Andrea Bianchi, Chiara Lanzuolo . Into the chromatin world: Role of nuclear architecture in epigenome regulation. AIMS Biophysics, 2015, 2(4): 585-612. doi: 10.3934/biophy.2015.4.585
    [7] Audrey Lejart, Gilles Salbert, Sébastien Huet . Cytosine hydroxymethylation by TET enzymes: From the control of gene expression to the regulation of DNA repair mechanisms, and back. AIMS Biophysics, 2018, 5(3): 182-193. doi: 10.3934/biophy.2018.3.182
    [8] Missag Hagop Parseghian . What is the role of histone H1 heterogeneity? A functional model emerges from a 50 year mystery. AIMS Biophysics, 2015, 2(4): 724-772. doi: 10.3934/biophy.2015.4.724
    [9] Bertrand R. Caré, Pierre-Emmanuel Emeriau, Ruggero Cortini, Jean-Marc Victor . Chromatin epigenomic domain folding: size matters. AIMS Biophysics, 2015, 2(4): 517-530. doi: 10.3934/biophy.2015.4.517
    [10] Vladimir B. Teif, Andrey G. Cherstvy . Chromatin and epigenetics: current biophysical views. AIMS Biophysics, 2016, 3(1): 88-98. doi: 10.3934/biophy.2016.1.88
  • Most of eukaryotic DNA is embedded into nucleosome arrays formed by DNA wrapped around a core histone octamer. Nucleosome is a fundamental repeating unit of chromatin guarding access to the genetic information. Here, I will discuss two facets of nucleosome in eukaryotic gene control. On the one hand, nucleosome acts as a regulatory unit, which controls gene switches through a set of post-translational modifications occurring on histone tails. On the other hand, global configuration of nucleosome arrays with respect to nucleosome positioning, spacing and turnover acts as a tuning parameter for all genomic functions. A “histone code” hypothesis extents the Jacob-Monod model for eukaryotic gene control; however, when considering factors capable of reconfiguring entire nucleosome array, such as ATP-dependent chromatin remodelers, this model becomes limited. Global changes in nucleosome arrays will be sensed by every gene, yet the transcriptional responses might be specific and appear as gene targeted events. What determines such specificity is unclear, but it’s likely to depend on initial gene settings, such as availability of transcription factors, and on configuration of new nucleosome array state.


    English is a common international language. Thus, most of the countries, including Taiwan, have English courses in their formal educational institutions, such as elementary school, junior high school, senior high school and university. However, most of the students in Taiwan do not have a good environment to learn English, especially, for the students whose school is not located in the city. They do not have enough qualified teachers and financial aids to afford the tutorial classes. For that reason, we have built a tutoring system that provides a convenient environment to learn English without any real teaching aids. So, teachers and students do not need to spend much money on making the teaching aids. The important thing is the students' perspective. Some students think that English is not important because they will not use it any more in the future. However, English is required by students to pass the school or university entrance examination. It is the proof that English is really important.

    Currently, in many tutoring systems, some distinguished platforms, such as Moodle, Sakai and D2L, are categorized as the ones of open source. According to SCORM (Sharable Content Object Reference Model) [1], teaching materials can be input and output on these platforms. However, these platforms are too complicated to be operated by school children.

    Verification is an important issue in the tutoring system development. This paper aims to propose a novel method to verify the tutoring system using Petri nets. A novel environment, to change the traditional English learning method, based on Augmented Reality (AR), Text-to-Speech (TTS), and Speech Recognition (SR) was also developed. We change the traditional flash cards to AR. Since AR has been applied to different research areas and proven to be effective, more and more researchers use AR technology as an innovative tutoring method [2,3,4,5]. When using TTS and SR, students can know the correct pronunciation and present much courage to speak. It will enhance the students' interests in learning English. Furthermore, WoPeD (Workflow Petri net Designer) was applied to prove whether this tutoring system was working well or not.

    We perform the system verification because it is susceptible to errors. This is also the important case with any engineering activity. The studies in human reliability have shown that people were trained to perform a specific operation making around 1–3 errors per hour in the best case of scenarios. In any activity, or the resulting outcome of an activity, the search for potential errors should not be neglected, regardless of whether they will happen or not. The consequences of errors could cause extremely significant failures or threats for teaching and learning [6].

    The rest of the paper is organized as follows: The literature review of this tutoring system is discussed in Section 2. Section 3 describes the verification method of a tutoring system by using Petri nets. The simulation results, the real operation of a tutoring system, the comparison with other existing systems, learning results, and students' feedback are presented in Section 4. Finally, conclusion and future work are remarked in Section 5.

    In this section, we first introduce the concepts of Petri net theory. Then the Text-to-Speech (TTS) is presented to let the tutoring system speak. The Speech Recognition (SR) is presented to let the tutoring system understand users' saying. And the Augmented Reality (AR) is introduced to let users see the virtual objects superimposed upon or composited with the real world.

    Petri net theory was proposed by Dr. Carl Adam Petri in 1962. Petri net is defined as a five-tuple PN = (P, T, F, W, M0).

    P = {p1, p2, …, pn}, n > 0, a finite set of places.

    T = {t1, t2, …, tm}, m > 0, a finite set of transitions.

    F⊆(P×T)∪(T×P), a finite set of arcs (i.e. flow relation).

    W: F→{1, 2, 3, …}, a weight function.

    M0: P→{0, 1, 2, …}, an initial marking (or state).

    P∩T = Ø, P∪T≠Ø.

    An ordinary Petri net is a four-variable network, PN = (P, T, F, M0). F denotes an arc that connects the transition to the place or the place to the transition. Petri net is a directed, weighted, and bipartite graph, denoted as G = (V, E). The place and the transition are denoted as the nodes (V). A transition is enabled to fire if it meets the conditions such as weights, where a token transits from its input place i (pi) to its output place j (pj). It implies that the state of a system has been changed [7,8].

    An arc is denoted as E, where G = (V, E) denotes places, transitions and arcs. An arc is used to describe the correlations between places and transitions. It runs in a uni-direction and shows the direction of the token's transition. Weight functions, denoted as w(pi, tj) and w(tj, pj), can be added to the arcs, representing the condition it needs to transit from place i (pi) to place j (pj).

    Marking (M) is an m-vector (k0, k1, …, km), where m denotes the number of places, and ki > = 0 denotes the number of tokens in place pi. Initial marking, M0 denotes a set of tokens in the system. When a set of tokens change, it indicates that the transition is fired. It means that the action of an event, i.e. the dynamic behavior, is described in the Petri net.

    A fundamental Petri net is used to describe the change of the state in a discrete event dynamic system, while a complete Petri net model includes places, transitions, and arcs. The flow of tokens is denoted as the state change of the dynamic system [9,10,11,12].

    In summary, the interpretation of places, transitions, and arcs are shown in Table 1.

    Table 1.  Interpretation of places, transitions, and arcs.
    Places (V) Input/output data
    Transitions (V) Computation
    Arcs (E) Place→Transition: consumes input data Transition→place: produces output data

     | Show Table
    DownLoad: CSV

    The properties of standard Petri net models can be divided into behavioral and structural properties [13]. The former refer to the initial marking functions of Petri nets, whereas the latter describe the structures of Petri nets. Furthermore, a Petri net model can be described using the following properties.

    The behavioral properties include content reachability, boundedness, liveness, reversibility, coverability, persistence, synchronic distance, and fairness. The structural properties include structurally liveness, controllability, structural boundedness, conservativeness, repetitiveness, and consistency. Safeness, boundedness, deadlock and liveness are the common system behaviors which can be analyzed by using Petri net theory. The safeness means a place in a Petri net is safe if the number of tokens in that place never exceeds one. The boundedness in the Petri net means the number of tokens in a place is limited. The Petri net is K-bounded, which means the number of tokens never exceeds K. Liveness means the situations are without deadlocks.

    In this paper, applying two major methods in behavioral properties and a novel method are used to analyze the tutoring system, which contains reachability tree, state equations, and WoPeD.

    The reachability tree represents the reachability set in a Petri net. The reachability tree is constructed from an initial state M0. The algorithm begins with the initial state and enters an iterative procedure for a state expansion.

    The procedure includes the following:

    (1) Generate the next state.

    (2) Confirm that the next state is new. If the next state equal to the present state is discarded, it can avoid duplication of the state.

    (3) In case of a new state, insert a new state into the reachability tree. By using the reachability tree, we can confirm no deadlocks occurring in this system. An example of reachability tree is shown in Figure 1.

    Figure 1.  An example of reachability tree.

    The firing sequence is denoted as t1, t2, t3.

    A state equation is based on a matrix in a Petri net. An alternative way to the (P, T, I, O) definition of Petri net is to define two matrices D- and D+, which denote the input and output functions, respectively. Each matrix contains m rows (one for each transition) by n columns (one for each place). We define D-[j, i] = #(pi, I(tj)) and D+[j, i] = #(pi, O(tj)). D- denotes the inputs to the transition and D+ denotes the outputs from the transition [14].

    The matrix form of a Petri net (P, T, D-, D+) is equivalent to the standard form we have used but allows the definitions to be recast in vector and matrix terms. D = D+ - D- denotes the composite change matrix. Also, by using mathematical formula to calculate the state after a conversion, the formula is denoted as μ' = μ + χ*D.

    μ' denotes the next state (reachable from μ).

    μ denotes the present state (in the beginning, it means initial marking).

    χ denotes a transition vector.

    An example of State Equations is shown in Figure 2.

    Figure 2.  An example of the state equations.
    $ D^{+} = \left[ 001100000011
    \right] \quad D^{-} = \left[ 100000021100
    \right] $
    $ D = D^{+}-D^{-} = \left[ 101100021111
    \right] $
    $ μ=μ+χDχ=tI
    $
    $ \mu^{\prime} = \left[ 100000
    \right]+\left[ 10
    \right] * \left[ 101100021111
    \right] $
    $ = \left[ 1000000
    \right]+\left[ 101100
    \right] $
    $ = \left[ 001100
    \right] $
    $ \chi = \mathrm{t}_{2} $
    $ \mu^{\prime} = \left[ 001100
    \right]+\left[ 01
    \right] * \left[ 101100021111
    \right] $
    $ = \left[ 001100
    \right]+\left[ 02111
    \right] $
    $ = \left[ 020011
    \right] $

    WoPeD is used to perform the simulation. WoPeD is an open-source software system developed by the Cooperative State University Karlsruhe under the GNU Lesser General Public License (LGPL). WoPeD is used as a simulation tool. The main goal is to provide an easy-to-use software system for modeling, simulating and analyzing processes described by workflow nets [15].The WoPeD interface is shown in Figure 3.

    Figure 3.  WoPeD interface.

    In WoPed, the semantical analysis is separated into two parts: one is Wizard and the other is Expert. Wizard part needs to check Workflow net property and Soundness. Expert part is separated into two sub-parts: one is Structural analysis and the other is Soundness. Structural analysis is divided into five parts: Net Statistics, Wrongly used operators, Free-choice violations, S-Components and Wellstructuredness. Soundness is divided into four parts: Workflow net property, Initial marking, Boundedness and Liveness.

    The functions of WoPeD include the following:

    (1) Process and Resource Editor

    (2) PNML Compliance and Import/Export Formats

    (3) Soundness Checker

    (4) Interactive Simulator and Coverability Graph Visualization

    (5) Quantitative Simulation and Capacity Planning

    (6) Research Support Tool

    (7) AProMoRe Repository Front-End

    TTS is a computerized system, in which written texts are synthetically transformed into speech. This technology is often called "Speech Synthesis" [16]. The TTS system converts a normal language text into speech. However, other systems render symbolic linguistic representations like phonetic transcriptions into speech [17]. The users do not need to pre-record the voice, just key-in the words a computer system.

    Recently, the TTS technology is more and more popular, used in daily life, like public broadcasting, automatically reported to the radio message of daily life, automatic earthquake alarm, emergency alert, and language listening tests or exercises, etc. Especially, the foreign language educational applications, in order to improve students' listening comprehension, by using TTS students can learn any language whenever they want and also have the standard pronunciation.

    The main purpose of SR in a computer is to realize the human voice. Some SR systems use "training" (also called "enrollment") where an individual speaker reads text or isolated vocabulary into the system. The system analyzes the person's specific voice and uses it to fine-tune the recognition of that person's speech, resulting in the accuracy increased. Systems that do not use training are called "speaker independent" [18]. Systems that use training are called "speaker dependent".

    Using SR allows the users to control the computer via voice commands. The SR program can also dictate texts, so that the user can enter a text by voice. It contains a simple instruction to guide the user, and provides training functions, improving the accuracy of identification.

    For now, speech recognition applications include voice dialing, voice navigation, indoor device control, voice document retrieval, simple dictation data entry, and so on. In the future, speech recognition, combined with other natural language processing technologies, such as machine translation and speech synthesis, can build more complex applications, such as voice-to-speech translation.

    AR allows users to see the real world, with virtual objects superimposed upon or composited with the real world. Therefore, AR supplements reality, rather than completely replaces it. Ideally, it would appear to the user that the virtual and real objects coexisted in the same space.

    AR was divided into two definitions: one was defined by Ronald Azuma in 1997. AR is viewed as a system that has the following three characteristics: 1) Combining real objects and virtual objects, 2) Interactive in real time, 3) Registered in 3-D [19]; and the other was defined by Paul Milgram and Fumio Kishino in 1994. The concept of a "virtuality continuum" relates to the mixture of classes of objects presented in any particular display situation, as illustrated in Figure 4. The real environments are shown at the end of the continuum; and virtual environments are shown at the opposite end of the extremum. The former case, at the left, defines the environment solely consisting of real objects and includes for example what is observed via a conventional video display of a real-world scene. The latter case, at the right, defines the environment solely consisting of virtual objects [20].

    Figure 4.  Simplified representation of a "virtuality continuum".

    This Section describes the flowcharts of the tutoring system and uses WoPeD to draw the Petri net models for verification.

    The tutoring system contains two parts: one part for teachers and the other for students. Figures 5 and 6 represent the flowcharts of the teacher system and the student system, respectively. The teacher system and the student system can communicate with each other.

    Figure 5.  Flowchart of teacher system.
    Figure 6.  Flowchart of student system.

    In Figure 5, teachers can choose a picture from the file. The picture is shown at the center of the interface. The teacher can adjust the position where the picture appears, input the vocabulary or the short sentence in the text box, and save it into the system. Follow these steps until no more pictures are added.

    In Figure 6, students can use the document that is provided by teachers. Click the Start button, the Listen button and listen to the vocabulary or the short sentences. If students cannot listen clearly, they can repeat it until they understand and speak out the vocabulary or the short sentences. Then, if the speech recognition detects that the vocabulary or the short sentence is correct, the vocabulary or the short sentence is displayed in the message box and the picture is displayed on the screen. Repeat these steps until all vocabularies or sentences are pronounced by the system.

    In this Sub-section, WoPeD is used to verify the workflow of the tutoring system.

    We divide the tutoring system into two parts, including the WoPeD architectures of the teacher system and the student system.

    The architecture of teacher system is clearly illustrated in Figure 7. p7 denotes the end-of-system, where the teacher can choose whether to exit the system or not.

    Figure 7.  WoPeD for teacher system.

    The teacher system with interpretation of places and transitions is shown in Tables 2 and 3, respectively.

    Table 2.  Interpretation of places in teacher system.
    Place Interpretation
    p1Main
    p2Tutoring System Available
    p3Picture Available
    p4Picture Position Adjusted
    p5Vocabulary or Short Sentence Available
    p6File Saved
    p7End-of-System
    p8Check Already
    p9Stop

     | Show Table
    DownLoad: CSV
    Table 3.  Interpretation of transitions in teacher system.
    Transition Interpretation
    t1Start
    t2Open Picture File
    t3Adjust Picture Position
    t4Key-in the Vocabulary or Short Sentence
    t5Save the Position, Picture and Vocabulary
    t6Check End-of- System
    t7End
    t8No End
    t9Choose the System

     | Show Table
    DownLoad: CSV

    The student can choose to listen to the vocabulary or short sentences repeatedly. If it is not this case, the student has to pronounce the vocabulary or short sentences through speech recognition process. Figure 8 illustrates the tutoring system architecture for students.

    Figure 8.  WoPeD for student system.

    Tables 4 and 5 describe the interpretation of places and transitions in the student system, respectively.

    Table 4.  Interpretation of places in student system.
    Place Interpretation
    p1Main
    p2Student System Available
    p3Listening
    p4 Listen Button Clicked
    p5 Speech Recognition Button Clicked
    p6Speech Recognition
    p7The Message Box Shown
    p8AR Available
    p9End-of- System
    p10Check Already
    p11Stop

     | Show Table
    DownLoad: CSV
    Table 5.  Interpretation of transitions in student system.
    Transition Interpretation
    t1Start
    t2Click Listen Button
    t3Choose Listen Button Again
    t4Repeat Listening
    t5Do not Choose Listen Button Again
    t6Speak
    t7Check Speech Recognition False
    t8Check Speech Recognition True
    t9Show the Picture
    t10Check End-of-System
    t11No End
    t12End
    t13Close the System

     | Show Table
    DownLoad: CSV

    Applying reachability tree for verification, we need to find the initial marking. By firing transitions t1, t2, t3, …, tn, the reachability tree is generated accordingly.

    The initial marking is denoted as M0.

    The firing sequence is denoted as t1, t2, t3, t4, t5, t6, t7, t8, t9.

    The marking changed sequence is shown as follows:

    $ M0=[100000000]M1=[010000000]M2=[001000000]M3=[000100000]M4=[000010000]M5=[000001000]M6=[000000100]M7=[000000010]M8=[000000001]M0=[100000000]
    $

    The initial marking is denoted as M0.

    The firing sequence is denoted as t1, t2, t3//t4, t5, t6, t7, t8, t9, t10, t11, t12, t13.

    The marking changed sequence is shown as follows:

    $ M0=[10000000000]M1=[01000000000]M2=[00100000000]M3=[0010000000]M4=[0000000]M5=[00000100000]M6=[00000010000]M7=[00000001000]M8=[00000000100]M9=[00000000010]M10=[00000000001]
    $

    By using formula μ' = μ + χ*D and D = D+-D- to verify the system, we check whether this tutoring system has a deadlock or not.

    In the first step, we calculate the D+ and D-, and get the result of D.

    $ {D^ + } = \left[ {010000000001000000000100000000010000000001000000000100000000010010000000000000001
    } \right]\;\;\;\;\;\;{D^ - } = \left[ {100000000010000000001000000000100000000010000000001000000000100000000100000000010
    } \right] $
    $ D=D+D:D=[010000000001000000000100000000010000000001000000000100000000010010000000000000001][100000000010000000001000000000100000000010000000001000000000100000000100000000010]=[110000000011000000001100000000110000000011000000001100000000110010000100000000011]
    $

    By following the D = D+-D-, we get the result of D, and proceed to the next step by using formula μ' = μ + χ*D. We need to calculate the next state μ', so we denote the χ as t1 = $\left[100000000

    \right]$.

    Firing t1, we get

    $ [100000000]+[100000000][110000000011000000001100000000110000000011000000001100000000110010000100000000011]=[010000000]
    $

    Firing t1, the next state is μ' = $\left[010000000

    \right]$. It represents that the next state is available to p2. When firing t2, t3, t4, t5, t6, t7, t8, t9 sequentially, it is verified to be deadlock free.

    Similarly, by following the operating procedure of the teacher system, we can find the D+ and D- immediately and find the D.

    $ {D^ + } = \left[ {01000000000001000000000001000000000100000000000010000000000010000000100000000000000100000000000100000000000100001000000000000000001000000000001
    } \right]\;\;\;\;\;\;{D^ - } = \left[ {10000000000010000000000010000000000010000000001000000000000100000000000100000000001000000000001000000000001000000000001000000000010000000000010
    } \right] $
    $ D=D+D:D=[01000000000001000000000001000000000100000000000010000000000010000000100000000000000100000000000100000000000100001000000000000000001000000000001][10000000000010000000000010000000000010000000001000000000000100000000000100000000001000000000001000000000001000000000001000000000010000000000010]=[11000000000011000000000011000000000110000000001010000000000110000000100100000000001100000000001100000000001100001000001000000000011000000000011]
    $

    By following the D = D+-D-, we get the result of D. We proceed to the second step by using formula μ' = μ + χ*D. Since we need to calculate the next state μ', we denote χ as $\left[1000000000000

    \right]$.

    Firing t1, we get

    $ [10000000000]+[1000000000000][11000000000011000000000011000000000110000000001010000000000110000000100100000000001100000000001100000000001100001000001000000000011000000000011]=[01000000000]
    $

    Firing t1, the next state is μ' = $\left[01000000000

    \right]$. It represents that the next state is available to p2. When firing t2, t3, t4, t5, t6, t7, t8, t9, t10, t11, t12, t13 sequentially, it is also verified to be deadlock free.

    In this Section, we focus on the WoPeD simulation results. Also, we propose a deadlock example, introduce the tutoring system operating procedure, compare with other existing systems, and obtain the learning results and students' feedback.

    In this sub-section, the simulation results of the proposed model are discussed. This system uses WoPeD based on the Petri net model. The simulation results of the teacher and the student systems are shown in Figures 9 and 10, respectively. Figure 9 shows the experimental results of the teacher system. This system contains 9 places (with one source place and one sink place), 9 transitions, and 18 arcs. The experimental results of the student system are shown in Figure 10. The student system contains 11 places (with one source place and one sink place), 13 transitions, and 26 arcs. The simulation results indicate that the proposed model can prevent the deadlock from occurring in the tutoring system.

    Figure 9.  Teacher semantical analysis.
    Figure 10.  Student semantical analysis.

    The semantical analysis contains two parts, namely, Structural analysis and Soundness analysis.

    The first part is to perform the Structural analysis, which includes the Net statistics, Wrongly used operators, Free-choice violations, S-Components and Wellstructuredness. In Figure 11, Net statistics show 9 places (p1, p2, p3, , …, p9.), 9 transitions (t1, t2, t3, …, t9.), 0 operator, 0 subprocess, and 18 arcs.

    Figure 11.  Teacher semantical analysis for Net statistics.

    The second step of checking procedure is Wrongly used operators. Following the analysis, there are no errors in this analysis. The third step is to check Free-choice violations. We do not find the violations in it, either. The fourth step shown in Figure 12 is to check S-Components. Following the analysis procedure, we have 1 set of S-Components and the S-Components shows 18, including p1, p2, p3…, p9, t1, t2, t3, …, t9. It means that all P and T are in S-Components, and also means that no other Places are covered by S-Components.

    Figure 12.  Teacher semantical analysis for S-Component.

    The fifth step shown in Figure 13 is to check Wellstructuredness, which includes PT-Handles and TP-Handles. Following the analysis, there are no any other errors in it.

    Figure 13.  Teacher semantical analysis for Wellstructuredness.

    The second part is to perform the Soundness analysis which includes the Workflow net property, Initial marking, Boundedness, and Liveness. In the Workflow net property, the first step is to check the Source place, p1; and in the second step the sink place is p9, as shown in Figure 14. The third and four steps are transitions with empty preset and transitions with empty postset, which have no any errors, either. The fifth step is to check the Connected components. The Connected components contain the whole P and T, places (p1, p2, p3, …, p9) and transitions (t1, t2, t3, …, t9); totally, 18 Connected components. The sixth step is to check the Strongly connected components, and the result is the same as Connected components, as shown in Figures 15 and 16.

    Figure 14.  Teacher semantical analysis for Source places and Sink places.
    Figure 15.  Teacher semantical analysis for Connected components.
    Figure 16.  Teacher semantical analysis for Strongly connected components.

    In the initial marking, there are no other Wrongly marked places. In the Boundedness, there are no other Unbounded places. In Liveness, there is no any dead transition in it. Therefore, following this step to check the system, the proof without deadlocks in it is completed. The total results are shown in Figure 17.

    Figure 17.  Teacher system semantical analysis.

    In Figure 8, based on the semantical results, the Net statistics have 11 Places, 13 Transitions and 26 Arcs, and have one S-Component. There are p1, p2, p3, …, p11 and t1, t2, t3, …, t13, totally, 24 S-Components. In the Workflow net property, Source place is p1, and Sink place is p11. The connected components and strongly connected components are all ones. The Strongly connected components have 24 nodes, including p1, p2, p3, …, p11 and t1, t2, t3, …, t13. The initial marking, boundedness and liveness show that there are no wrongly marked places, unbounded places, dead transitions and non-live transitions.

    Thus, based on the same checking steps on the Teacher system, we can get the experimental results of the student system, which does not have deadlocks inside the system, either. The resulting semantical analysis is shown in Figure 18.

    Figure 18.  Semantical analysis of student system.

    By following the procedure of Petri net verification, users can know how to operate this tutoring system correctly.

    Figure 19 shows our teacher system with initial visual screen. Then, we click Open File to choose which one is the picture we need to show on the screen, as shown in Figure 20.

    Figure 19.  Initial teacher system.
    Figure 20.  Teacher system-choose the picture.

    Setting the position of the picture shown on the screen is to follow the center of a face, as shown in Figure 21. This function is completed by face recognition in an AR mark. The next step is to adjust the position we want. Let the Cloud on the top right-hand side of a face, as shown in Figure 22.

    Figure 21.  Teacher system-initial picture.
    Figure 22.  Teacher system-picture position adjusted.

    Key-in the corresponding vocabulary in the Text box. For example, we key-in the Cloud inside, and click the Save button, as shown in Figure 23.

    Figure 23.  Teacher system-key-in vocabulary and Save.

    By following this procedure, we can add more vocabularies and pictures in the teacher system, as shown in Figure 24. If users finish the operating procedure, then the system is closed.

    Figure 24.  Teacher system-follow the procedure to key-in.

    In the student system, we can just click the Start button. Figure 25 shows the student system with initial visual screen.

    Figure 25.  Initial student system.

    After clicking the Start button in the student system, we can just click the Listen button to listen to the vocabulary based on the teacher system setting, as shown in Figure 26.

    Figure 26.  Student system - Listen clicked and listen.

    Users can listen repeatedly if they are not sure what the system is talking about until they can understand clearly, as shown in Figure 27. When users know what the vocabulary is, they can click the Speech Recognition button to speak. When the Speak Now button is clicked, users can speak out the vocabulary they heard, as shown in Figure 28.

    Figure 27.  Student system-Listen.
    Figure 28.  Student system-Speech recognition.

    If users speak a correct vocabulary, the student system will show the message box, as shown in Figure 29. After clicking the Sure button, the picture is shown on the screen and the position and the big or small size is set in the teacher system, which is not changed in the student system, as shown in Figure 30. The total number of questions and those questions which users have already answered correctly are also shown on the underneath screen.

    Figure 29.  Student system-correct speech recognition.
    Figure 30.  Student system-showing the picture.

    In other cases, if the system can't recognize users' speaking, the system will not show anything on it, as shown in Figure 31.

    Figure 31.  Student system-speech recognition error.

    By following the operating procedure, we can do more and more exercises, as shown in Figure 32.

    Figure 32.  Student system-following the procedure.

    We can use the student system to give tests after the teacher taught in class. Let students practice English at home, or let the students with insufficient English ability have a good tutor at home. By using AR, TTS and speech recognition technology in this system will increase the student's interests in learning English and not shy to speak out English.

    Comparing with other existing systems in [21,22,23], we can find they did not provide convenient usage for teachers and students because most of the systems have already set the vocabularies and made the QR code for the augmented reality of 3D shapes. This tutoring system is aimed to build a convenient environment for the users. Especially, the students' families cannot afford the high cost of Internet system. When teachers teach whenever they can key-in the vocabularies or short sentences immediately without making any 3D shapes first. When students want to learn the new vocabularies or the short sentences by using teacher system at home, they do not need to create the QR code and just need to download the picture they want and use the student system to practice. The most important difference is that other existing systems cannot use the short sentences to further practice but we can, as shown in Figure 33.

    Figure 33.  Student system-use the short sentences to practice.
    Table 6.  The advantages and disadvantages of the systems compared.
    Advantages Disadvantages
    System 1 [21] 1. Has 3-D graphic function. 2. Has the tutor by using 3-D Avatar onto the AR marker. 3. Has the demo of playing multimedia in the AR classroom. 1. Needs to prepare the teaching aids (QR Code, AR Classroom). 2. Users cannot create the questions by themselves. 3. Does not provide a convenient environment for learning English whenever and wherever.
    System 2 [22] 1. TeachAR platform has two ways: AR version and non-AR version. 2. Using speech recognition helps users speak louder to practice English. 3. Has interactive function in non-AR version. 1. Needs to prepare the teaching aids (QR Code, Marker groups). 2. Users cannot create the questions by themselves.
    System 3 [23] 1. Has two languages in the Speaky Notes. 2. Users can create the questions by themselves. 3. Combines the eBook that contains all the information about a single word and its marker image. 1. Needs to use the Internet. 2. Users need to print out and make the cards with QR code by themselves. 3. Does not have the speech recognition to check.
    Proposed System 1. Provides a convenient environment for users. 2. Not only building vocabulary but also practicing short sentences. 3. Without any teaching aids. 4. Users can create the questions by themselves. 5. Using speech recognition helps users to speak out. 1. Does not have 3-D graphic function. 2. Does not have multimedia playing in the AR. 3. Does not have the explanation for the vocabulary.

     | Show Table
    DownLoad: CSV
    Table 7.  Functional comparisons.
    Function System 1 [21] System 2 [22] System 3 [23] Proposed System
    AR technology
    Speech recognition
    3-D graphic function
    Convenient environment without using any teaching aids
    Building the vocabulary
    Explanation for the vocabulary
    Has the tutor

     | Show Table
    DownLoad: CSV

    Feedbacks on the satisfaction degree of this tutoring system are achieved by asking the students to fill in a questionnaire on the Google Form. Each student may complete the questionnaire once. Each question has ten options that score from one to ten, and there are 21 junior high school students invited to answer the questions below.

    Q1-"What overall grade would you give to this tutoring system?" (80.95%)

    Q2-"The tutoring system has improved my understanding of English."(82.85%)

    Q3-"The tutoring system has helped my understanding of the correctly pronouncing English."(83.80%)

    Q4-"The tutoring system has helped me increase the interest in learning English."(78.09%)

    Q5-"The tutoring system has helped me learn English whenever I want."(81.42%)

    Q6-"The tutoring system has provided me with a convenient environment without any teaching aids." (82.85%)

    Q7-"The tutoring system has helped me learn English by myself without teachers." (87.38%)

    Q8-"By using this tutoring system, I won't be shy to speak out English." (84.04%)

    Q9-"By using this tutoring system, I can control the speed when I am learning English." (85.95%)

    Q10-"By using this tutoring system, I love this novel way to learn English than the traditional way. " (80.47%)

    Q11-"I will use this tutoring system to practice my English in the future." (78.09%)

    Q12-"I will invite my friends to use this tutoring system." (81%)

    According to the above results, if the satisfaction level 79% is set to be a successful criterion, then those items except Q4, Q11 have achieved the successful criteria.

    This paper has proposed a novel method to verify the intelligent tutoring system by applying Petri nets. We first build a workflow using WoPeD, and apply two major Petri net analysis methods to verify the intelligent tutoring system. The first method is reachability trees and the second method is state equations, which are used in WoPeD to get the simulation results. We also build a tutoring system for teachers and students based on Augmented Reality (AR), Text-to-Speech (TTS), and Speech Recognition (SR). The contributions of this paper are presented as follows:

    (1) Using reachability trees of Petri net can verify the tutoring system immediately.

    (2) The tutoring system can be proved to have no deadlocks by using the state equations.

    (3) The Petri net model built by a simulation tool, WoPeD, is analyzed to ensure that there is no overflow and deadlock problems caused in the tutoring system.

    (4) By using WoPeD, we can build the tutoring system easier.

    By following the students' feedback, this tutoring system has shown to provide a convenient environment where students can practice English at home.

    In the future, we will achieve the goal with a more powerful tutoring system in order to help students learn other languages.

    The authors are very grateful to the anonymous reviewers for their constructive comments which have improved the quality of this paper. Also, this work was supported by the Ministry of Science and Technology, Taiwan, under grant MOST 107- 2221- E-845- 002-MY3.

    The authors have declared that no conflict of interest in this paper.

    [1] Lynch M (2006) Streamlining and simplification of microbial genome architecture. Annu Rev Microbiol 60: 327–349. doi: 10.1146/annurev.micro.60.080805.142300
    [2] Wade JT, Struhl K, Busby SJ, et al. (2007) Genomic analysis of protein-DNA interactions in bacteria: insights into transcription and chromosome organization. Mol Microbiol 65: 21–26. doi: 10.1111/j.1365-2958.2007.05781.x
    [3] Wade JT, Reppas NB, Church GM, et al. (2005) Genomic analysis of LexA binding reveals the permissive nature of the Escherichia coli genome and identifies unconventional target sites. Genes Dev 19: 2619–2630. doi: 10.1101/gad.1355605
    [4] Ptashne M (2011) Principles of a switch. Nat Chem Biol 7: 484–487. doi: 10.1038/nchembio.611
    [5] Jacob F, Monod J (1961) Genetic regulatory mechanisms in the synthesis of proteins. J Mol Biol 3: 318–356. doi: 10.1016/S0022-2836(61)80072-7
    [6] Wall ME, Hlavacek WS, Savageau MA (2004) Design of gene circuits: lessons from bacteria. Nat Rev Genet 5: 34–42. doi: 10.1038/nrg1244
    [7] Ronen M, Rosenberg R, Shraiman BI, et al. (2002) Assigning numbers to the arrows: parameterizing a gene regulation network by using accurate expression kinetics. Proc Natl Acad Sci U S A 99: 10555–10560. doi: 10.1073/pnas.152046799
    [8] Saiz L (2012) The physics of protein-DNA interaction networks in the control of gene expression. J Phys Condens Matter 24: 193102. doi: 10.1088/0953-8984/24/19/193102
    [9] Lewis M (2005) The lac repressor. C R Biol 328: 521–548. doi: 10.1016/j.crvi.2005.04.004
    [10] Yaniv M (2011) The 50th anniversary of the publication of the operon theory in the Journal of Molecular Biology: past, present and future. J Mol Biol 409: 1–6. doi: 10.1016/j.jmb.2011.03.041
    [11] Hill RJ, Billas IM, Bonneton F, et al. (2013) Ecdysone receptors: from the Ashburner model to structural biology. Annu Rev Entomol 58: 251–271. doi: 10.1146/annurev-ento-120811-153610
    [12] Ashburner M, Chihara C, Meltzer P, et al. (1974) Temporal control of puffing activity in polytene chromosomes. Cold Spring Harb Symp Quant Biol 38: 655–662. doi: 10.1101/SQB.1974.038.01.070
    [13] Vologodskiĭ AV (2015) Biophysics of DNA. New York: Cambridge University Press. 272 p.
    [14] Vologodskaia M, Vologodskii A (2002) Contribution of the intrinsic curvature to measured DNA persistence length. J Mol Biol 317: 205–213. doi: 10.1006/jmbi.2001.5366
    [15] Hagerman PJ (1988) Flexibility of DNA. Annu Rev Biophys Biophys Chem 17: 265–286. doi: 10.1146/annurev.bb.17.060188.001405
    [16] Chereji RV, Morozov AV (2015) Functional roles of nucleosome stability and dynamics. Brief Funct Genomics 14: 50–60. doi: 10.1093/bfgp/elu038
    [17] Mirny LA (2011) The fractal globule as a model of chromatin architecture in the cell. Chromosome Res 19: 37–51.
    [18] Oudet P, Gross-Bellard M, Chambon P (1975) Electron microscopic and biochemical evidence that chromatin structure is a repeating unit. Cell 4: 281–300. doi: 10.1016/0092-8674(75)90149-X
    [19] Luger K, Mader AW, Richmond RK, et al. (1997) Crystal structure of the nucleosome core particle at 2. 8 A resolution. Nature 389: 251-260. doi: 10.1038/38444
    [20] McGinty RK, Tan S (2015) Nucleosome structure and function. Chem Rev 115: 2255–2273. doi: 10.1021/cr500373h
    [21] Cutter AR, Hayes JJ (2015) A brief review of nucleosome structure. FEBS Lett pii: S0014-5793(15)00392-0.
    [22] Kornberg RD (1974) Chromatin structure: a repeating unit of histones and DNA. Science 184: 868–871. doi: 10.1126/science.184.4139.868
    [23] Olins AL, Olins DE (1974) Spheroid chromatin units (v bodies). Science 183: 330–332. doi: 10.1126/science.183.4122.330
    [24] Woodcock CL, Safer JP, Stanchfield JE (1976) Structural repeating units in chromatin. I. Evidence for their general occurrence. Exp Cell Res 97: 101-110. doi: 10.1016/0014-4827(76)90659-5
    [25] Van Holde KE (1989) Chromatin. New York: Springer-Verlag. xii, 497 p.
    [26] Song F, Chen P, Sun D, et al. (2014) Cryo-EM study of the chromatin fiber reveals a double helix twisted by tetranucleosomal units. Science 344: 376–380. doi: 10.1126/science.1251413
    [27] Balhorn R (2007) The protamine family of sperm nuclear proteins. Genome Biol 8: 227. doi: 10.1186/gb-2007-8-9-227
    [28] Ward WS (2010) Function of sperm chromatin structural elements in fertilization and development. Mol Hum Reprod 16: 30–36. doi: 10.1093/molehr/gap080
    [29] Hud NV, Allen MJ, Downing KH, et al. (1993) Identification of the elemental packing unit of DNA in mammalian sperm cells by atomic force microscopy. Biochem Biophys Res Commun 193: 1347–1354. doi: 10.1006/bbrc.1993.1773
    [30] Brewer LR (2011) Deciphering the structure of DNA toroids. Integr Biol (Camb) 3: 540–547. doi: 10.1039/c0ib00128g
    [31] Hammoud SS, Nix DA, Zhang H, et al. (2009) Distinctive chromatin in human sperm packages genes for embryo development. Nature 460: 473–478.
    [32] Ward MA, Ward WS (2004) A model for the function of sperm DNA degradation. Reprod Fertil Dev 16: 547–554. doi: 10.1071/RD03072
    [33] Furlong D, Swift H, Roizman B (1972) Arrangement of herpesvirus deoxyribonucleic acid in the core. J Virol 10: 1071–1074.
    [34] Cerritelli ME, Cheng N, Rosenberg AH, et al. (1997) Encapsidated conformation of bacteriophage T7 DNA. Cell 91: 271–280. doi: 10.1016/S0092-8674(00)80409-2
    [35] Agirrezabala X, Martin-Benito J, Caston JR, et al. (2005) Maturation of phage T7 involves structural modification of both shell and inner core components. EMBO J 24: 3820–3829. doi: 10.1038/sj.emboj.7600840
    [36] Hud NV, Downing KH (2001) Cryoelectron microscopy of lambda phage DNA condensates in vitreous ice: the fine structure of DNA toroids. Proc Natl Acad Sci U S A 98: 14925–14930. doi: 10.1073/pnas.261560398
    [37] Sun S, Wong JT, Liu M, et al. (2012) Counterion-mediated decompaction of liquid crystalline chromosomes. DNA Cell Biol 31: 1657–1664. doi: 10.1089/dna.2012.1708
    [38] Levi-Setti R, Gavrilov KL, Rizzo PJ (2008) Divalent cation distribution in dinoflagellate chromosomes imaged by high-resolution ion probe mass spectrometry. Eur J Cell Biol 87: 963–976. doi: 10.1016/j.ejcb.2008.06.002
    [39] Livolant F, Maestre MF (1988) Circular dichroism microscopy of compact forms of DNA and chromatin in vivo and in vitro: cholesteric liquid-crystalline phases of DNA and single dinoflagellate nuclei. Biochemistry 27: 3056–3068. doi: 10.1021/bi00408a058
    [40] Rill RL, Livolant F, Aldrich HC, et al. (1989) Electron microscopy of liquid crystalline DNA: direct evidence for cholesteric-like organization of DNA in dinoflagellate chromosomes. Chromosoma 98: 280–286. doi: 10.1007/BF00327314
    [41] Chow MH, Yan KT, Bennett MJ, et al. (2010) Birefringence and DNA condensation of liquid crystalline chromosomes. Eukaryot Cell 9: 1577–1587. doi: 10.1128/EC.00026-10
    [42] Wisecaver JH, Hackett JD (2011) Dinoflagellate genome evolution. Annu Rev Microbiol 65: 369–387. doi: 10.1146/annurev-micro-090110-102841
    [43] Kellenberger E, Arnold-Schulz-Gahmen B (1992) Chromatins of low-protein content: special features of their compaction and condensation. FEMS Microbiol Lett 100: 361–370. doi: 10.1111/j.1574-6968.1992.tb05727.x
    [44] Kellenberger E (1988) About the organisation of condensed and decondensed non-eukaryotic DNA and the concept of vegetative DNA (a critical review). Biophys Chem 29: 51–62. doi: 10.1016/0301-4622(88)87024-8
    [45] Strzelecka TE, Davidson MW, Rill RL (1988) Multiple liquid crystal phases of DNA at high concentrations. Nature 331: 457–460. doi: 10.1038/331457a0
    [46] Olesiak-Banska J, Mojzisova H, Chauvat D, et al. (2011) Liquid crystal phases of DNA: evaluation of DNA organization by two-photon fluorescence microscopy and polarization analysis. Biopolymers 95: 365–375. doi: 10.1002/bip.21583
    [47] Finch JT, Klug A (1976) Solenoidal model for superstructure in chromatin. Proc Natl Acad Sci U S A 73: 1897–1901. doi: 10.1073/pnas.73.6.1897
    [48] Woodcock CL, Frado LL, Rattner JB (1984) The higher-order structure of chromatin: evidence for a helical ribbon arrangement. J Cell Biol 99: 42–52. doi: 10.1083/jcb.99.1.42
    [49] Robinson PJ, Fairall L, Huynh VA, et al. (2006) EM measurements define the dimensions of the "30-nm" chromatin fiber: evidence for a compact, interdigitated structure. Proc Natl Acad Sci U S A 103: 6506–6511. doi: 10.1073/pnas.0601212103
    [50] Dorigo B, Schalch T, Kulangara A, et al. (2004) Nucleosome arrays reveal the two-start organization of the chromatin fiber. Science 306: 1571–1573. doi: 10.1126/science.1103124
    [51] Schalch T, Duda S, Sargent DF, et al. (2005) X-ray structure of a tetranucleosome and its implications for the chromatin fibre. Nature 436: 138–141. doi: 10.1038/nature03686
    [52] Maeshima K, Imai R, Tamura S, et al. (2014) Chromatin as dynamic 10-nm fibers. Chromosoma 123: 225–237. doi: 10.1007/s00412-014-0460-2
    [53] van Holde K, Zlatanova J (2007) Chromatin fiber structure: Where is the problem now? Semin Cell Dev Biol 18: 651–658. doi: 10.1016/j.semcdb.2007.08.005
    [54] Razin SV, Gavrilov AA (2014) Chromatin without the 30-nm fiber: constrained disorder instead of hierarchical folding. Epigenetics 9: 653–657. doi: 10.4161/epi.28297
    [55] Eltsov M, Maclellan KM, Maeshima K, et al. (2008) Analysis of cryo-electron microscopy images does not support the existence of 30-nm chromatin fibers in mitotic chromosomes in situ. Proc Natl Acad Sci U S A 105: 19732–19737. doi: 10.1073/pnas.0810057105
    [56] Eltsov M, Sosnovski S, Olins AL, et al. (2014) ELCS in ice: cryo-electron microscopy of nuclear envelope-limited chromatin sheets. Chromosoma 123: 303–312. doi: 10.1007/s00412-014-0454-0
    [57] Fussner E, Strauss M, Djuric U, et al. (2012) Open and closed domains in the mouse genome are configured as 10-nm chromatin fibres. EMBO Rep 13: 992–996. doi: 10.1038/embor.2012.139
    [58] Li G, Zhu P (2015) Structure and organization of chromatin fiber in the nucleus. FEBS Lett.
    [59] Felsenfeld G, Groudine M (2003) Controlling the double helix. Nature 421: 448–453. doi: 10.1038/nature01411
    [60] Rosa A, Everaers R (2008) Structure and dynamics of interphase chromosomes. PLoS Comput Biol 4: e1000153. doi: 10.1371/journal.pcbi.1000153
    [61] Dekker J, Rippe K, Dekker M, et al. (2002) Capturing chromosome conformation. Science 295: 1306–1311. doi: 10.1126/science.1067799
    [62] Simonis M, Klous P, Splinter E, et al. (2006) Nuclear organization of active and inactive chromatin domains uncovered by chromosome conformation capture-on-chip (4C). Nat Genet 38: 1348–1354. doi: 10.1038/ng1896
    [63] Dostie J, Richmond TA, Arnaout RA, et al. (2006) Chromosome Conformation Capture Carbon Copy (5C): a massively parallel solution for mapping interactions between genomic elements. Genome Res 16: 1299–1309. doi: 10.1101/gr.5571506
    [64] Lieberman-Aiden E, van Berkum NL, Williams L, et al. (2009) Comprehensive mapping of long-range interactions reveals folding principles of the human genome. Science 326: 289–293. doi: 10.1126/science.1181369
    [65] Zhang Y, McCord RP, Ho YJ, et al. (2012) Spatial organization of the mouse genome and its role in recurrent chromosomal translocations. Cell 148: 908–921. doi: 10.1016/j.cell.2012.02.002
    [66] Mizuguchi T, Fudenberg G, Mehta S, et al. (2014) Cohesin-dependent globules and heterochromatin shape 3D genome architecture in S. pombe. Nature 516: 432–435. doi: 10.1038/nature13833
    [67] Tamm MV, Nazarov LI, Gavrilov AA, et al. (2015) Anomalous diffusion in fractal globules. Phys Rev Lett 114: 178102. doi: 10.1103/PhysRevLett.114.178102
    [68] Fudenberg G, Getz G, Meyerson M, et al. (2011) High order chromatin architecture shapes the landscape of chromosomal alterations in cancer. Nat Biotechnol 29: 1109–1113. doi: 10.1038/nbt.2049
    [69] Schram RD, Barkema GT, Schiessel H (2013) On the stability of fractal globules. J Chem Phys 138: 224901. doi: 10.1063/1.4807723
    [70] Bohn M, Heermann DW (2010) Diffusion-driven looping provides a consistent framework for chromatin organization. PLoS One 5: e12218. doi: 10.1371/journal.pone.0012218
    [71] Tark-Dame M, Jerabek H, Manders EM, et al. (2014) Depletion of the chromatin looping proteins CTCF and cohesin causes chromatin compaction: insight into chromatin folding by polymer modelling. PLoS Comput Biol 10: e1003877. doi: 10.1371/journal.pcbi.1003877
    [72] Barbieri M, Chotalia M, Fraser J, et al. (2012) Complexity of chromatin folding is captured by the strings and binders switch model. Proc Natl Acad Sci U S A 109: 16173–16178. doi: 10.1073/pnas.1204799109
    [73] Nicodemi M, Pombo A (2014) Models of chromosome structure. Curr Opin Cell Biol 28: 90–95. doi: 10.1016/j.ceb.2014.04.004
    [74] Moscalets AP, Nazarov LI, Tamm MV (2015) Towards a robust algorithm to determine topological domains from colocalization data. AIMS Biophysics 2: 503–516.
    [75] Caré BR, Emeriau PE, Cortini R, et al. (2015) Chromatin epigenomic domain folding: size matters. AIMS Biophysics 2: 517–530.
    [76] Turner BM, Birley AJ, Lavender J (1992) Histone H4 isoforms acetylated at specific lysine residues define individual chromosomes and chromatin domains in Drosophila polytene nuclei. Cell 69: 375–384. doi: 10.1016/0092-8674(92)90417-B
    [77] Strahl BD, Allis CD (2000) The language of covalent histone modifications. Nature 403: 41–45. doi: 10.1038/47412
    [78] Jenuwein T, Allis CD (2001) Translating the histone code. Science 293: 1074–1080. doi: 10.1126/science.1063127
    [79] Kouzarides T (2007) SnapShot: Histone-modifying enzymes. Cell 131: 822. doi: 10.1016/j.cell.2007.11.005
    [80] Kutateladze TG (2011) SnapShot: Histone readers. Cell 146: 842-842 e841. doi: 10.1016/j.cell.2011.08.022
    [81] Huang H, Sabari BR, Garcia BA, et al. (2014) SnapShot: histone modifications. Cell 159: 458–458 e451. doi: 10.1016/j.cell.2014.09.037
    [82] Ptashne M (2013) Epigenetics: core misconcept. Proc Natl Acad Sci U S A 110: 7101–7103. doi: 10.1073/pnas.1305399110
    [83] Iwafuchi-Doi M, Zaret KS (2014) Pioneer transcription factors in cell reprogramming. Genes Dev 28: 2679–2692. doi: 10.1101/gad.253443.114
    [84] Lidor Nili E, Field Y, Lubling Y, et al. (2010) p53 binds preferentially to genomic regions with high DNA-encoded nucleosome occupancy. Genome Res 20: 1361-1368. doi: 10.1101/gr.103945.109
    [85] Ballare C, Castellano G, Gaveglia L, et al. (2013) Nucleosome-driven transcription factor binding and gene regulation. Mol Cell 49: 67–79. doi: 10.1016/j.molcel.2012.10.019
    [86] Barozzi I, Simonatto M, Bonifacio S, et al. (2014) Coregulation of transcription factor binding and nucleosome occupancy through DNA features of mammalian enhancers. Mol Cell 54: 844–857. doi: 10.1016/j.molcel.2014.04.006
    [87] Cui F, Zhurkin VB (2014) Rotational positioning of nucleosomes facilitates selective binding of p53 to response elements associated with cell cycle arrest. Nucleic Acids Res 42: 836–847. doi: 10.1093/nar/gkt943
    [88] Kal AJ, Mahmoudi T, Zak NB, et al. (2000) The Drosophila brahma complex is an essential coactivator for the trithorax group protein zeste. Genes Dev 14: 1058–1071.
    [89] Cirillo LA, Lin FR, Cuesta I, et al. (2002) Opening of compacted chromatin by early developmental transcription factors HNF3 (FoxA) and GATA-4. Mol Cell 9: 279–289. doi: 10.1016/S1097-2765(02)00459-8
    [90] Hsu HT, Chen HM, Yang Z, et al. (2015) TRANSCRIPTION. Recruitment of RNA polymerase II by the pioneer transcription factor PHA-4. Science 348: 1372-1376. doi: 10.1126/science.aab1223
    [91] Soufi A, Garcia MF, Jaroszewicz A, et al. (2015) Pioneer transcription factors target partial DNA motifs on nucleosomes to initiate reprogramming. Cell 161: 555–568. doi: 10.1016/j.cell.2015.03.017
    [92] Adam RC, Yang H, Rockowitz S, et al. (2015) Pioneer factors govern super-enhancer dynamics in stem cell plasticity and lineage choice. Nature 521: 366–370. doi: 10.1038/nature14289
    [93] Oldfield AJ, Yang P, Conway AE, et al. (2014) Histone-fold domain protein NF-Y promotes chromatin accessibility for cell type-specific master transcription factors. Mol Cell 55: 708–722. doi: 10.1016/j.molcel.2014.07.005
    [94] Takahashi K, Yamanaka S (2006) Induction of pluripotent stem cells from mouse embryonic and adult fibroblast cultures by defined factors. Cell 126: 663–676. doi: 10.1016/j.cell.2006.07.024
    [95] Okita K, Ichisaka T, Yamanaka S (2007) Generation of germline-competent induced pluripotent stem cells. Nature 448: 313–317. doi: 10.1038/nature05934
    [96] Takahashi K, Tanabe K, Ohnuki M, et al. (2007) Induction of pluripotent stem cells from adult human fibroblasts by defined factors. Cell 131: 861–872. doi: 10.1016/j.cell.2007.11.019
    [97] Gardner KE, Allis CD, Strahl BD (2011) Operating on chromatin, a colorful language where context matters. J Mol Biol 409: 36–46. doi: 10.1016/j.jmb.2011.01.040
    [98] Ruthenburg AJ, Allis CD, Wysocka J (2007) Methylation of lysine 4 on histone H3: intricacy of writing and reading a single epigenetic mark. Mol Cell 25: 15–30. doi: 10.1016/j.molcel.2006.12.014
    [99] Ruiz-Carrillo A, Wangh LJ, Allfrey VG (1975) Processing of newly synthesized histone molecules. Science 190: 117–128. doi: 10.1126/science.1166303
    [100] Brownell JE, Zhou J, Ranalli T, et al. (1996) Tetrahymena histone acetyltransferase A: a homolog to yeast Gcn5p linking histone acetylation to gene activation. Cell 84: 843–851. doi: 10.1016/S0092-8674(00)81063-6
    [101] Allfrey VG, Faulkner R, Mirsky AE (1964) Acetylation and Methylation of Histones and Their Possible Role in the Regulation of Rna Synthesis. Proc Natl Acad Sci U S A 51: 786–794. doi: 10.1073/pnas.51.5.786
    [102] Taunton J, Hassig CA, Schreiber SL (1996) A mammalian histone deacetylase related to the yeast transcriptional regulator Rpd3p. Science 272: 408–411. doi: 10.1126/science.272.5260.408
    [103] De Rubertis F, Kadosh D, Henchoz S, et al. (1996) The histone deacetylase RPD3 counteracts genomic silencing in Drosophila and yeast. Nature 384: 589–591. doi: 10.1038/384589a0
    [104] Turner BM (2014) Nucleosome signalling; an evolving concept. Biochim Biophys Acta 1839: 623–626. doi: 10.1016/j.bbagrm.2014.01.001
    [105] Vermeulen M, Eberl HC, Matarese F, et al. (2010) Quantitative interaction proteomics and genome-wide profiling of epigenetic histone marks and their readers. Cell 142: 967–980. doi: 10.1016/j.cell.2010.08.020
    [106] Koche RP, Smith ZD, Adli M, et al. (2011) Reprogramming factor expression initiates widespread targeted chromatin remodeling. Cell Stem Cell 8: 96–105. doi: 10.1016/j.stem.2010.12.001
    [107] Hatfield GW, Benham CJ (2002) DNA topology-mediated control of global gene expression in Escherichia coli. Annu Rev Genet 36: 175–203. doi: 10.1146/annurev.genet.36.032902.111815
    [108] Hsieh LS, Rouviere-Yaniv J, Drlica K (1991) Bacterial DNA supercoiling and [ATP]/[ADP] ratio: changes associated with salt shock. J Bacteriol 173: 3914–3917.
    [109] Kusano S, Ding Q, Fujita N, et al. (1996) Promoter selectivity of Escherichia coli RNA polymerase E sigma 70 and E sigma 38 holoenzymes. Effect of DNA supercoiling. J Biol Chem 271: 1998-2004. doi: 10.1074/jbc.271.4.1998
    [110] Higgins CF, Dorman CJ, Stirling DA, et al. (1988) A physiological role for DNA supercoiling in the osmotic regulation of gene expression in S. typhimurium and E. coli. Cell 52: 569-584. doi: 10.1016/0092-8674(88)90470-9
    [111] Sugino A, Cozzarelli NR (1980) The intrinsic ATPase of DNA gyrase. J Biol Chem 255: 6299–6306.
    [112] Sinden RR, Carlson JO, Pettijohn DE (1980) Torsional tension in the DNA double helix measured with trimethylpsoralen in living E. coli cells: analogous measurements in insect and human cells. Cell 21: 773-783. doi: 10.1016/0092-8674(80)90440-7
    [113] Travers A, Muskhelishvili G (2005) DNA supercoiling - a global transcriptional regulator for enterobacterial growth? Nat Rev Microbiol 3: 157–169. doi: 10.1038/nrmicro1088
    [114] Sobetzko P, Travers A, Muskhelishvili G (2012) Gene order and chromosome dynamics coordinate spatiotemporal gene expression during the bacterial growth cycle. Proc Natl Acad Sci U S A 109: E42–50. doi: 10.1073/pnas.1108229109
    [115] Marr C, Geertz M, Hutt MT, et al. (2008) Dissecting the logical types of network control in gene expression profiles. BMC Syst Biol 2: 18. doi: 10.1186/1752-0509-2-18
    [116] Blot N, Mavathur R, Geertz M, et al. (2006) Homeostatic regulation of supercoiling sensitivity coordinates transcription of the bacterial genome. EMBO Rep 7: 710–715. doi: 10.1038/sj.embor.7400729
    [117] Dorman CJ (2013) Genome architecture and global gene regulation in bacteria: making progress towards a unified model? Nat Rev Microbiol 11: 349–355. doi: 10.1038/nrmicro3007
    [118] Naughton C, Avlonitis N, Corless S, et al. (2013) Transcription forms and remodels supercoiling domains unfolding large-scale chromatin structures. Nat Struct Mol Biol 20: 387–395. doi: 10.1038/nsmb.2509
    [119] Kouzine F, Gupta A, Baranello L, et al. (2013) Transcription-dependent dynamic supercoiling is a short-range genomic force. Nat Struct Mol Biol 20: 396–403. doi: 10.1038/nsmb.2517
    [120] Noll M (1974) Subunit structure of chromatin. Nature 251: 249–251. doi: 10.1038/251249a0
    [121] Travers AA, Muskhelishvili G, Thompson JM (2012) DNA information: from digital code to analogue structure. Philos Trans A Math Phys Eng Sci 370: 2960–2986. doi: 10.1098/rsta.2011.0231
    [122] Cui F, Chen L, LoVerso PR, et al. (2014) Prediction of nucleosome rotational positioning in yeast and human genomes based on sequence-dependent DNA anisotropy. BMC Bioinformatics 15: 313. doi: 10.1186/1471-2105-15-313
    [123] Rosanio G, Widom J, Uhlenbeck OC (2015) In vitro selection of DNAs with an increased propensity to form small circles. Biopolymers 103: 303–320. doi: 10.1002/bip.22608
    [124] Zhurkin VB, Lysov YP, Ivanov VI (1979) Anisotropic flexibility of DNA and the nucleosomal structure. Nucleic Acids Res 6: 1081–1096. doi: 10.1093/nar/6.3.1081
    [125] Yakovchuk P, Protozanova E, Frank-Kamenetskii MD (2006) Base-stacking and base-pairing contributions into thermal stability of the DNA double helix. Nucleic Acids Res 34: 564–574. doi: 10.1093/nar/gkj454
    [126] Locke G, Haberman D, Johnson SM, et al. (2013) Global remodeling of nucleosome positions in C. elegans. BMC Genomics 14: 284-. doi: 10.1186/1471-2164-14-284
    [127] Locke G, Tolkunov D, Moqtaderi Z, et al. (2010) High-throughput sequencing reveals a simple model of nucleosome energetics. Proc Natl Acad Sci U S A 107: 20998–21003. doi: 10.1073/pnas.1003838107
    [128] Kaplan N, Moore IK, Fondufe-Mittendorf Y, et al. (2009) The DNA-encoded nucleosome organization of a eukaryotic genome. Nature 458: 362–366. doi: 10.1038/nature07667
    [129] Segal E, Fondufe-Mittendorf Y, Chen L, et al. (2006) A genomic code for nucleosome positioning. Nature 442: 772–778. doi: 10.1038/nature04979
    [130] Satchwell SC, Drew HR, Travers AA (1986) Sequence periodicities in chicken nucleosome core DNA. J Mol Biol 191: 659–675. doi: 10.1016/0022-2836(86)90452-3
    [131] Lowary PT, Widom J (1998) New DNA sequence rules for high affinity binding to histone octamer and sequence-directed nucleosome positioning. J Mol Biol 276: 19–42. doi: 10.1006/jmbi.1997.1494
    [132] Chua EY, Vasudevan D, Davey GE, et al. (2012) The mechanics behind DNA sequence-dependent properties of the nucleosome. Nucleic Acids Res 40: 6338–6352. doi: 10.1093/nar/gks261
    [133] Vasudevan D, Chua EY, Davey CA (2010) Crystal structures of nucleosome core particles containing the '601' strong positioning sequence. J Mol Biol 403: 1–10. doi: 10.1016/j.jmb.2010.08.039
    [134] Drew HR, Travers AA (1985) DNA bending and its relation to nucleosome positioning. J Mol Biol 186: 773–790. doi: 10.1016/0022-2836(85)90396-1
    [135] Teif VB, Beshnova DA, Vainshtein Y, et al. (2014) Nucleosome repositioning links DNA (de)methylation and differential CTCF binding during stem cell development. Genome Res 24: 1285–1295. doi: 10.1101/gr.164418.113
    [136] Xi Y, Yao J, Chen R, et al. (2011) Nucleosome fragility reveals novel functional states of chromatin and poises genes for activation. Genome Res 21: 718–724. doi: 10.1101/gr.117101.110
    [137] Knight B, Kubik S, Ghosh B, et al. (2014) Two distinct promoter architectures centered on dynamic nucleosomes control ribosomal protein gene transcription. Genes Dev 28: 1695–1709. doi: 10.1101/gad.244434.114
    [138] Wu C, Travers A (2005) Relative affinities of DNA sequences for the histone octamer depend strongly upon both the temperature and octamer concentration. Biochemistry 44: 14329–14334. doi: 10.1021/bi050915w
    [139] Kornberg R (1981) The location of nucleosomes in chromatin: specific or statistical. Nature 292: 579–580. doi: 10.1038/292579a0
    [140] Kornberg RD, Stryer L (1988) Statistical distributions of nucleosomes: nonrandom locations by a stochastic mechanism. Nucleic Acids Res 16: 6677–6690. doi: 10.1093/nar/16.14.6677
    [141] Chereji RV, Tolkunov D, Locke G, et al. (2011) Statistical mechanics of nucleosome ordering by chromatin-structure-induced two-body interactions. Phys Rev E Stat Nonlin Soft Matter Phys 83: 050903. doi: 10.1103/PhysRevE.83.050903
    [142] Chereji RV, Morozov AV (2011) Statistical Mechanics of Nucleosomes Constrained by Higher-Order Chromatin Structure. J Stat Phys 144: 379–404. doi: 10.1007/s10955-011-0214-y
    [143] Mobius W, Gerland U (2010) Quantitative test of the barrier nucleosome model for statistical positioning of nucleosomes up- and downstream of transcription start sites. PLoS Comput Biol 6.
    [144] Eaton ML, Galani K, Kang S, et al. (2010) Conserved nucleosome positioning defines replication origins. Genes Dev 24: 748–753. doi: 10.1101/gad.1913210
    [145] Beshnova DA, Cherstvy AG, Vainshtein Y, et al. (2014) Regulation of the nucleosome repeat length in vivo by the DNA sequence, protein concentrations and long-range interactions. PLoS Comput Biol 10: e1003698. doi: 10.1371/journal.pcbi.1003698
    [146] Cuddapah S, Jothi R, Schones DE, et al. (2009) Global analysis of the insulator binding protein CTCF in chromatin barrier regions reveals demarcation of active and repressive domains. Genome Res 19: 24–32.
    [147] Hu G, Schones DE, Cui K, et al. (2011) Regulation of nucleosome landscape and transcription factor targeting at tissue-specific enhancers by BRG1. Genome Res 21: 1650–1658. doi: 10.1101/gr.121145.111
    [148] Teif VB, Vainshtein Y, Caudron-Herger M, et al. (2012) Genome-wide nucleosome positioning during embryonic stem cell development. Nat Struct Mol Biol 19: 1185–1192. doi: 10.1038/nsmb.2419
    [149] Hu Z, Chen K, Xia Z, et al. (2014) Nucleosome loss leads to global transcriptional up-regulation and genomic instability during yeast aging. Genes Dev 28: 396–408. doi: 10.1101/gad.233221.113
    [150] Ricci MA, Manzo C, Garcia-Parajo MF, et al. (2015) Chromatin fibers are formed by heterogeneous groups of nucleosomes in vivo. Cell 160: 1145–1158. doi: 10.1016/j.cell.2015.01.054
    [151] Valouev A, Johnson SM, Boyd SD, et al. (2011) Determinants of nucleosome organization in primary human cells. Nature 474: 516–520. doi: 10.1038/nature10002
    [152] Cherstvy AG, Teif VB (2014) Electrostatic effect of H1-histone protein binding on nucleosome repeat length. Phys Biol 11: 044001. doi: 10.1088/1478-3975/11/4/044001
    [153] Bartholomew B (2014) Regulating the chromatin landscape: structural and mechanistic perspectives. Annu Rev Biochem 83: 671–696. doi: 10.1146/annurev-biochem-051810-093157
    [154] Mueller-Planitz F, Klinker H, Becker PB (2013) Nucleosome sliding mechanisms: new twists in a looped history. Nat Struct Mol Biol 20: 1026–1032. doi: 10.1038/nsmb.2648
    [155] Gerhold CB, Gasser SM (2014) INO80 and SWR complexes: relating structure to function in chromatin remodeling. Trends Cell Biol 24: 619–631. doi: 10.1016/j.tcb.2014.06.004
    [156] Narlikar GJ, Sundaramoorthy R, Owen-Hughes T (2013) Mechanisms and functions of ATP-dependent chromatin-remodeling enzymes. Cell 154: 490–503. doi: 10.1016/j.cell.2013.07.011
    [157] Zofall M, Persinger J, Kassabov SR, et al. (2006) Chromatin remodeling by ISW2 and SWI/SNF requires DNA translocation inside the nucleosome. Nat Struct Mol Biol 13: 339–346. doi: 10.1038/nsmb1071
    [158] Saha A, Wittmeyer J, Cairns BR (2005) Chromatin remodeling through directional DNA translocation from an internal nucleosomal site. Nat Struct Mol Biol 12: 747–755. doi: 10.1038/nsmb973
    [159] Schwanbeck R, Xiao H, Wu C (2004) Spatial contacts and nucleosome step movements induced by the NURF chromatin remodeling complex. J Biol Chem 279: 39933–39941. doi: 10.1074/jbc.M406060200
    [160] Moshkin YM, Chalkley GE, Kan TW, et al. (2012) Remodelers organize cellular chromatin by counteracting intrinsic histone-DNA sequence preferences in a class-specific manner. Mol Cell Biol 32: 675–688. doi: 10.1128/MCB.06365-11
    [161] Moshkin YM, Mohrmann L, van Ijcken WF, et al. (2007) Functional differentiation of SWI/SNF remodelers in transcription and cell cycle control. Mol Cell Biol 27: 651–661. doi: 10.1128/MCB.01257-06
    [162] Ho L, Crabtree GR (2010) Chromatin remodelling during development. Nature 463: 474–484. doi: 10.1038/nature08911
    [163] Ito T, Bulger M, Pazin MJ, et al. (1997) ACF, an ISWI-containing and ATP-utilizing chromatin assembly and remodeling factor. Cell 90: 145–155. doi: 10.1016/S0092-8674(00)80321-9
    [164] Varga-Weisz PD, Wilm M, Bonte E, et al. (1997) Chromatin-remodelling factor CHRAC contains the ATPases ISWI and topoisomerase II. Nature 388: 598–602. doi: 10.1038/41587
    [165] Poot RA, Dellaire G, Hulsmann BB, et al. (2000) HuCHRAC, a human ISWI chromatin remodelling complex contains hACF1 and two novel histone-fold proteins. EMBO J 19: 3377–3387. doi: 10.1093/emboj/19.13.3377
    [166] LeRoy G, Orphanides G, Lane WS, et al. (1998) Requirement of RSF and FACT for transcription of chromatin templates in vitro. Science 282: 1900–1904.
    [167] LeRoy G, Loyola A, Lane WS, et al. (2000) Purification and characterization of a human factor that assembles and remodels chromatin. J Biol Chem 275: 14787–14790. doi: 10.1074/jbc.C000093200
    [168] Emelyanov AV, Vershilova E, Ignatyeva MA, et al. (2012) Identification and characterization of ToRC, a novel ISWI-containing ATP-dependent chromatin assembly complex. Genes Dev 26: 603–614. doi: 10.1101/gad.180604.111
    [169] Tsukiyama T, Wu C (1995) Purification and properties of an ATP-dependent nucleosome remodeling factor. Cell 83: 1011–1020. doi: 10.1016/0092-8674(95)90216-3
    [170] Hamiche A, Sandaltzopoulos R, Gdula DA, et al. (1999) ATP-dependent histone octamer sliding mediated by the chromatin remodeling complex NURF. Cell 97: 833–842. doi: 10.1016/S0092-8674(00)80796-5
    [171] Racki LR, Yang JG, Naber N, et al. (2009) The chromatin remodeller ACF acts as a dimeric motor to space nucleosomes. Nature 462: 1016–1021. doi: 10.1038/nature08621
    [172] Gangaraju VK, Prasad P, Srour A, et al. (2009) Conformational changes associated with template commitment in ATP-dependent chromatin remodeling by ISW2. Mol Cell 35: 58–69. doi: 10.1016/j.molcel.2009.05.013
    [173] Yamada K, Frouws TD, Angst B, et al. (2011) Structure and mechanism of the chromatin remodelling factor ISW1a. Nature 472: 448–453. doi: 10.1038/nature09947
    [174] Ferreira H, Flaus A, Owen-Hughes T (2007) Histone modifications influence the action of Snf2 family remodelling enzymes by different mechanisms. J Mol Biol 374: 563–579. doi: 10.1016/j.jmb.2007.09.059
    [175] Singh RP, Brysbaert G, Lensink MF, et al. (2015) Kinetic proofreading of chromatin remodeling: from gene activation to gene repression and back. AIMS Biophysics 2: 398–411. doi: 10.3934/biophy.2015.4.398
    [176] Blossey R, Schiessel H (2008) Kinetic proofreading of gene activation by chromatin remodeling. HFSP J 2: 167–170. doi: 10.2976/1.2909080
    [177] Blossey R, Schiessel H (2011) Kinetic proofreading in chromatin remodeling: the case of ISWI/ACF. Biophys J 101: L30–32. doi: 10.1016/j.bpj.2011.07.001
    [178] Florescu AM, Schiessel H, Blossey R (2012) Kinetic control of nucleosome displacement by ISWI/ACF chromatin remodelers. Phys Rev Lett 109: 118103. doi: 10.1103/PhysRevLett.109.118103
    [179] Narlikar GJ (2010) A proposal for kinetic proof reading by ISWI family chromatin remodeling motors. Curr Opin Chem Biol 14: 660–665. doi: 10.1016/j.cbpa.2010.08.001
    [180] Erdel F, Schubert T, Marth C, et al. (2010) Human ISWI chromatin-remodeling complexes sample nucleosomes via transient binding reactions and become immobilized at active sites. Proc Natl Acad Sci U S A 107: 19873–19878. doi: 10.1073/pnas.1003438107
    [181] Cochet-Meilhac M, Nuret P, Courvalin JC, et al. (1974) Animal DNA-dependent RNA polymerases. 12. Determination of the cellular number of RNA polymerase B molecules. Biochim Biophys Acta 353: 185-192. doi: 10.1016/0005-2787(74)90183-X
    [182] Kimura H, Tao Y, Roeder RG, et al. (1999) Quantitation of RNA polymerase II and its transcription factors in an HeLa cell: little soluble holoenzyme but significant amounts of polymerases attached to the nuclear substructure. Mol Cell Biol 19: 5383–5392.
    [183] Jain D, Baldi S, Zabel A, et al. (2015) Active promoters give rise to false positive 'Phantom Peaks' in ChIP-seq experiments. Nucleic Acids Res 43: 6959–6968. doi: 10.1093/nar/gkv637
    [184] Gkikopoulos T, Schofield P, Singh V, et al. (2011) A role for Snf2-related nucleosome-spacing enzymes in genome-wide nucleosome organization. Science 333: 1758–1760. doi: 10.1126/science.1206097
    [185] Yen K, Vinayachandran V, Batta K, et al. (2012) Genome-wide nucleosome specificity and directionality of chromatin remodelers. Cell 149: 1461–1473. doi: 10.1016/j.cell.2012.04.036
    [186] Zentner GE, Tsukiyama T, Henikoff S (2013) ISWI and CHD chromatin remodelers bind promoters but act in gene bodies. PLoS Genet 9: e1003317. doi: 10.1371/journal.pgen.1003317
    [187] van Bakel H, Tsui K, Gebbia M, et al. (2013) A compendium of nucleosome and transcript profiles reveals determinants of chromatin architecture and transcription. PLoS Genet 9: e1003479. doi: 10.1371/journal.pgen.1003479
    [188] Zhang Z, Wippo CJ, Wal M, et al. (2011) A packing mechanism for nucleosome organization reconstituted across a eukaryotic genome. Science 332: 977–980. doi: 10.1126/science.1200508
    [189] Hartley PD, Madhani HD (2009) Mechanisms that specify promoter nucleosome location and identity. Cell 137: 445–458. doi: 10.1016/j.cell.2009.02.043
    [190] Ganguli D, Chereji RV, Iben JR, et al. (2014) RSC-dependent constructive and destructive interference between opposing arrays of phased nucleosomes in yeast. Genome Res 24: 1637–1649. doi: 10.1101/gr.177014.114
    [191] Whitehouse I, Rando OJ, Delrow J, et al. (2007) Chromatin remodelling at promoters suppresses antisense transcription. Nature 450: 1031–1035. doi: 10.1038/nature06391
    [192] Sala A, Toto M, Pinello L, et al. (2011) Genome-wide characterization of chromatin binding and nucleosome spacing activity of the nucleosome remodelling ATPase ISWI. EMBO J 30: 1766–1777. doi: 10.1038/emboj.2011.98
    [193] Bugga L, McDaniel IE, Engie L, et al. (2013) The Drosophila melanogaster CHD1 chromatin remodeling factor modulates global chromosome structure and counteracts HP1a and H3K9me2. PLoS One 8: e59496. doi: 10.1371/journal.pone.0059496
    [194] Corona DF, Siriaco G, Armstrong JA, et al. (2007) ISWI regulates higher-order chromatin structure and histone H1 assembly in vivo. PLoS Biol 5: e232. doi: 10.1371/journal.pbio.0050232
    [195] Fasulo B, Deuring R, Murawska M, et al. (2012) The Drosophila MI-2 chromatin-remodeling factor regulates higher-order chromatin structure and cohesin dynamics in vivo. PLoS Genet 8: e1002878. doi: 10.1371/journal.pgen.1002878
    [196] Clapier CR, Cairns BR (2009) The biology of chromatin remodeling complexes. Annu Rev Biochem 78: 273–304. doi: 10.1146/annurev.biochem.77.062706.153223
    [197] Brown E, Malakar S, Krebs JE (2007) How many remodelers does it take to make a brain. Diverse and cooperative roles of ATP-dependent chromatin-remodeling complexes in development. Biochem Cell Biol 85: 444-462. doi: 10.1139/O07-059
    [198] Bouazoune K, Brehm A (2006) ATP-dependent chromatin remodeling complexes in Drosophila. Chromosome Res 14: 433–449. doi: 10.1007/s10577-006-1067-0
    [199] Singhal N, Graumann J, Wu G, et al. (2010) Chromatin-Remodeling Components of the BAF Complex Facilitate Reprogramming. Cell 141: 943–955. doi: 10.1016/j.cell.2010.04.037
    [200] Hansis C, Barreto G, Maltry N, et al. (2004) Nuclear reprogramming of human somatic cells by xenopus egg extract requires BRG1. Curr Biol 14: 1475–1480. doi: 10.1016/j.cub.2004.08.031
  • This article has been cited by:

    1. Yi-Nan Lin, Tsang-Yen Hsieh, Cheng-Ying Yang, Victor R.L. Shen, Tony Tong-Ying Juang, Ting-Jui Huang, Alessandra Caggiano, Review on Petri Net Modeling and Analysis of a Smartphone Manufacturing System, 2020, 7, 2331-1916, 1851630, 10.1080/23311916.2020.1851630
    2. Vasyl Andrunyk, Tetiana Shestakevych , Information Technology Support of Education of Students With Autism: Aspects of Virtual Assistant Modeling, 2021, 9, 2524065X, 122, 10.23939/sisn2021.09.122
    3. Firna Muninggar Kistianti, Muharman Lubis, Asti Amalian Nur Fajrillah, 2021, Chapter 1, 978-3-030-77245-1, 3, 10.1007/978-3-030-77246-8_1
    4. Georgios Tsalmpouris, George Tsinarakis, Nikolaos Gertsakis, Savvas A. Chatzichristofis, Lefteris Doitsidis, HYDRA: Introducing a Low-Cost Framework for STEM Education Using Open Tools, 2021, 10, 2079-9292, 3056, 10.3390/electronics10243056
    5. Xin Bai, Qianguo Chen, Lijun Sun, Qingfang Teng, 2022, Modeling and Simulation of Dedicated Railway Transportation Dispatching System Based on Petri Net, 979-8-3503-2000-8, 617, 10.1109/IAECST57965.2022.10062287
    6. Cheng-Ying Yang, Yi-Nan Lin, Victor R. L. Shen, Frank H. C. Shen, Chien-Chi Wang, A Novel IoT-Enabled System for Real-Time Face Mask Recognition Based on Petri Nets, 2024, 11, 2327-4662, 6992, 10.1109/JIOT.2023.3313583
    7. Pengwendé Zongo, Tounwendyam Frédéric Ouedraogo, 2023, Chapter 21, 978-3-031-34895-2, 358, 10.1007/978-3-031-34896-9_21
    8. Pengwendé Zongo, Yamba Dabone, Tounwendyam Frédéric Ouedraogo, 2024, Chapter 6, 978-981-97-7548-4, 67, 10.1007/978-981-97-7571-2_6
    9. Wenjing Lv, Research on Optimizing Teaching Resource Allocation Strategies with Machine Learning Models for Intelligent English Teaching Systems, 2025, 10, 2444-8656, 10.2478/amns-2025-0706
    10. Georgios Lampropoulos, Augmented Reality, Virtual Reality, and Intelligent Tutoring Systems in Education and Training: A Systematic Literature Review, 2025, 15, 2076-3417, 3223, 10.3390/app15063223
  • Reader Comments
  • © 2015 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(10685) PDF downloads(1629) Cited by(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog