
Several biometric privacy-enhancing techniques have been appraised to protect face image privacy. However, a face privacy protection algorithm is usually designed for a specific face recognition algorithm. When the structure or threshold of the face recognition algorithm is fine-tuned, the protection algorithm may be invalid. It will cause the network bloated and make the image distortion target multiple FRAs through the existing technology simultaneously. To address this problem, a fusion technology is developed to cope with the changeable face recognition algorithms via an image perturbation method. The image perturbation is performed by using a GAN-improved algorithm including generator, nozzles and validator, referred to as the Adversarial Fusion algorithm. A nozzle structure is proposed to replace the discriminator. Paralleling multiple face recognition algorithms on the nozzle can improve the compatibility of the generated image. Next, a validator is added to the training network, which takes part in the inverse back coupling of the generator. This component can make the generated graphics have no impact on human vision. Furthermore, the group hunting theory is quoted to make the network stable and up to 4.8 times faster than other models in training. The experimental results show that the Adversarial Fusion algorithm can not only change the image feature distribution by over 42% but also deal with at least 5 commercial face recognition algorithms at the same time.
Citation: Hao Wang, Guangmin Sun, Kun Zheng, Hui Li, Jie Liu, Yu Bai. Privacy protection generalization with adversarial fusion[J]. Mathematical Biosciences and Engineering, 2022, 19(7): 7314-7336. doi: 10.3934/mbe.2022345
[1] | Wenjun Xia, Jinzhi Lei . Formulation of the protein synthesis rate with sequence information. Mathematical Biosciences and Engineering, 2018, 15(2): 507-522. doi: 10.3934/mbe.2018023 |
[2] | Chaudry Masood Khalique, Kentse Maefo . A study on the (2+1)–dimensional first extended Calogero-Bogoyavlenskii- Schiff equation. Mathematical Biosciences and Engineering, 2021, 18(5): 5816-5835. doi: 10.3934/mbe.2021293 |
[3] | Sixing Tao . Lie symmetry analysis, particular solutions and conservation laws of a (2+1)-dimensional KdV4 equation. Mathematical Biosciences and Engineering, 2023, 20(7): 11978-11997. doi: 10.3934/mbe.2023532 |
[4] | Alexander N. Gorban, Annick Harel-Bellan, Nadya Morozova, Andrei Zinovyev . Basic, simple and extendable kinetic model of protein synthesis. Mathematical Biosciences and Engineering, 2019, 16(6): 6602-6622. doi: 10.3934/mbe.2019329 |
[5] | Mahmoud El-Morshedy, Zubair Ahmad, Elsayed tag-Eldin, Zahra Almaspoor, Mohamed S. Eliwa, Zahoor Iqbal . A new statistical approach for modeling the bladder cancer and leukemia patients data sets: Case studies in the medical sector. Mathematical Biosciences and Engineering, 2022, 19(10): 10474-10492. doi: 10.3934/mbe.2022490 |
[6] | Lan Huang, Shuyu Guo, Ye Wang, Shang Wang, Qiubo Chu, Lu Li, Tian Bai . Attention based residual network for medicinal fungi near infrared spectroscopy analysis. Mathematical Biosciences and Engineering, 2019, 16(4): 3003-3017. doi: 10.3934/mbe.2019149 |
[7] | Luis L. Bonilla, Vincenzo Capasso, Mariano Alvaro, Manuel Carretero, Filippo Terragni . On the mathematical modelling of tumor-induced angiogenesis. Mathematical Biosciences and Engineering, 2017, 14(1): 45-66. doi: 10.3934/mbe.2017004 |
[8] | J. A. Méndez-Bermúdez, José M. Rodríguez, José L. Sánchez, José M. Sigarreta . Analytical and computational properties of the variable symmetric division deg index. Mathematical Biosciences and Engineering, 2022, 19(9): 8908-8922. doi: 10.3934/mbe.2022413 |
[9] | Pu Yang, Zhenbo Li, Yaguang Yu, Jiahui Shi, Ming Sun . Studies on fault diagnosis of dissolved oxygen sensor based on GA-SVM. Mathematical Biosciences and Engineering, 2021, 18(1): 386-399. doi: 10.3934/mbe.2021021 |
[10] | Micaela Morettini, Christian Göbl, Alexandra Kautzky-Willer, Giovanni Pacini, Andrea Tura, Laura Burattini . Former gestational diabetes: Mathematical modeling of intravenous glucose tolerance test for the assessment of insulin clearance and its determinants. Mathematical Biosciences and Engineering, 2020, 17(2): 1604-1615. doi: 10.3934/mbe.2020084 |
Several biometric privacy-enhancing techniques have been appraised to protect face image privacy. However, a face privacy protection algorithm is usually designed for a specific face recognition algorithm. When the structure or threshold of the face recognition algorithm is fine-tuned, the protection algorithm may be invalid. It will cause the network bloated and make the image distortion target multiple FRAs through the existing technology simultaneously. To address this problem, a fusion technology is developed to cope with the changeable face recognition algorithms via an image perturbation method. The image perturbation is performed by using a GAN-improved algorithm including generator, nozzles and validator, referred to as the Adversarial Fusion algorithm. A nozzle structure is proposed to replace the discriminator. Paralleling multiple face recognition algorithms on the nozzle can improve the compatibility of the generated image. Next, a validator is added to the training network, which takes part in the inverse back coupling of the generator. This component can make the generated graphics have no impact on human vision. Furthermore, the group hunting theory is quoted to make the network stable and up to 4.8 times faster than other models in training. The experimental results show that the Adversarial Fusion algorithm can not only change the image feature distribution by over 42% but also deal with at least 5 commercial face recognition algorithms at the same time.
G-quadruplex or G-tetrad (G4), is a thermodynamically stable structural element that is formed between clusters/stretches/tracts of Guanine (G) residues (|x|≥3) and is intra- or inter-molecular [1,2,3]. The intervening loops whence applicable are composed of one or more nucleotide(s) (N∈{A, U, T, G, C}) (Figure 1). G4 is found in DNA (telomeres, double-strand break sites, transcription start sites) and in the untranslated region(s) (5'-, 3'-UTR, introns) of mRNA [4,5]. In vivo, G4 may function to preserve the telomeric ends of chromosomes, repress or promote transcription and regulate translation [4,5]. The generic representation of an intra-strand G4 may be described as follows:
(((Gt,k)t≥3(Nh,k)h≥1)k=3((Gt,k)t≥3)k=1)m=1 | (Def. 1) |
𝑡 ≔ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐺𝑢𝑎𝑛𝑖𝑛𝑒𝑠 𝑝𝑒𝑟 𝐺 − 𝑟𝑖𝑐ℎ 𝑐𝑙𝑢𝑠𝑡𝑒𝑟
ℎ ≔ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑙𝑜𝑜𝑝 − 𝑓𝑜𝑟𝑚𝑖𝑛𝑔 𝑔𝑒𝑛𝑒𝑟𝑖𝑐 𝑖𝑛𝑡𝑒𝑟𝑣𝑒𝑛𝑖𝑛𝑔 𝑛𝑢𝑐𝑙𝑒𝑜𝑡𝑖𝑑𝑒𝑠
𝑘 ≔ 𝐶𝑙𝑢𝑠𝑡𝑒𝑟 𝑖𝑛𝑑𝑒𝑥
𝑚 ≔ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑠𝑡𝑟𝑎𝑛𝑑𝑠
𝐺 ≔ 𝐺𝑢𝑎𝑛𝑖𝑛𝑒
𝐴 ≔ 𝐴𝑑𝑒𝑛𝑖𝑛𝑒
𝑇 ≔ 𝑇ℎ𝑦𝑚𝑖𝑛𝑒
𝐶 ≔ 𝐶𝑦𝑡𝑜𝑠𝑖𝑛𝑒
𝑁 ≔ 𝐴𝑛𝑦 𝑛𝑢𝑐𝑙𝑒𝑜𝑡𝑖𝑑𝑒
The high melting temperature (Tm~600C) of G4 implies that the mature quadruplex is stable and refractory to unfolding. This is partly due to stabilizing Hoogsteen (N7gu1-N2gu2; O6gu1-N1gu2) and reverse Hoogsteen (N7gu1-N1gu2; O6gu1-N2gu2) hydrogen bonding as well as π-orbital stacking between the purine rings of non-contiguous guanine pairs (gu1, gu2) (Figure 1) [6,7]. Additionally, the presence of Adenine residues in the intervening loops, variable loop length (h~1-30 Mer) and permutation have all been shown to contribute to the stability and thence persistence of the mature quadruplex [8,9,10,11].
Tm∝(#Adenine/h)=τ.(#Adenine/h)Tm:=Melting temperatureτ:=constant of proportionalityh:=Length of intervening loops | (1) |
Despite the wide range of methods available that can predict G4 formation in DNA/RNA, there is poor agreement between sequence-based motif locators and empirically derived biophysical data [12,13,14,15]. Motif-independent methods such as those that directly measure the GC-content or the GC-/AT-skew of a query sequence and utilize this data to train machine learning algorithms may address some of these discrepancies [16,17,18].
Investigations into transcribed RNA suggests that secondary and tertiary forms (5'- and 3'-UTRs) may not only coexist with stretches of unfolded ribonucleotides, but can also be read by the ribosomal machinery. Non-canonical translation is described as: a) translation from atypical start sites AUG→{CUG, GUG} or b) peptides (≤100 aa) of short open reading frames (sORF)-encoded polypeptides (SEPs) and upstream open reading frames (uORFs) [19,20,21,22]. The latter are rarely silent and can function as modulators of metabolism (S-Adenosylmethionine decarboxylase, AMD1) or transcription (activating transcription factor, ATF4, H19; yeast AP-1 like, YAP1) and as generic transcription factors (general control protein, GCN4) [19]. G4 has also been observed in one or more exons of the prion protein (PRNP, exon 2), zinc finger protein (ZNF669, exon 1), β-amyloid secretase (BACE1, exon 3) and the estrogen receptor 1 (ESR1, exon 4) among several others [16,23,24,25,26,27,28,29].
Whilst the presence of segments of folded mRNA may have a significant influence on the yield of the protein product(s), the effect on sequence whence part of the protein coding segment (PCS) is largely unknown [4,5,30,31,32,33]. Proteopathies are diseases that result directly from agammaegates of truncated and misfolded proteins. These may occur secondary to a faulty translation machinery such as a ribosome that has stalled on encountering a secondary or tertiay folded mRNA sub segment. Recent data suggests ~45% of the human genome may code for proteins that are either intrinsically disordered (IDPs) or comprise one or more sub-segments that are disordered (IDRs) [34]. The absence of delineable structural features notwithstanding, disordered regions are characterized by short linear motifs (SLiMS) and/or molecular recognition features (MoRFs) [34,35]. The improper folding and heightened degradation rates could lead to perturbed proteostasis and thence contribute to the pathogenesis of proteopathies [34,35]. Primary proteopathies are likely to result directly from mutations (point, chromosomal translocations) in the PCS of a gene. These include sickle cell disease (βE6→V6-mediated defective polymerization), amylin-based type Ⅱ Diabetes Mellitus, Cystic Fibrosis (cystic fibrosis transmembrane conductance regulator), Alzheimer's disease (Amyloid β-peptide) and Parkinson's disease (α-synuclein) [36,37]. Secondary proteopathies, in contrast, result from motif or molecular mimicry of a host protein(s) by a pathogen. These are further classified into acute and chronic variants depending on the onset, genesis and/or resolution of the resultant infection or infestation [34,35].
G4 is known to stall the ribosome during translation and the resultant protein is truncated and/or degraded at an accelerated rate. The manuscript subsumes ribosomal read-through of mRNA with a G-quadruplex and assesses influence of the translated product to proteostasis. Here, I present a mathematical model of a short G4 (20–60 Mer) in the PCS, i.e., translatable G-quadruplex (TG4), in the mRNA of a hypothetical gene. The mapping uses several novel indices to annotate, classify and select suitable Guanine-containing codons (α) and amino acids (β). A generic algorithm then computes and validates, as proof-of-principle, possible peptides (pTG4ij) that correspond to the modeled TG4 (pTG4ij∈PTG4~TG4). Co-occurrence, homology and the distribution of overlapping/shared amino acids between PTG4 and the disorder promoting SLiMS are used to infer probable mechanisms of TG4~PTG4 facilitated misfolding. Standard bioinformatics indices (accuracy, precision, recall, p-value) are used to arrive at these conclusions.
The objective of this investigation is to model a short G4 in an arbitrary PCS (TG4) which when translated will result in a set of peptides (PTG4) with an average length that is less than 100 amino acids. The hypothesis explored in this manuscript is that in the event of a ribosomal read-through, the translated mRNA, with its G4 will result in a modified protein product. This protein will then exhibit considerable propensity to misfold on account of the presence of one or more members of the PTG4.
2.1.1 Model of a translatable G-quadruplex (TG4)
SEPs-derived peptides with the lowest molecular weight (~2.5 KDa) and with lengths varying from ~7–20 aa were identified and used to define the boundaries of the peptides that comprise PTG4 [20,21]. The TG4 (m = 1) is therefore, modeled as an intra-strand sub sequence of the mRNA of a hypothetical gene and has a length of ~20–60 Mer. This is represented (with symbols and variable names as explained in Def. 1) as follows:
TG4:=(((Gt,k)3≤t≤9(Nh,k)2≤h≤7)k=3((Gt,k)3≤t≤9)k=1)m=1 | (Def. 2) |
Since the Guanine-rich clusters and loops are contiguous, the aforementioned model (Def.2) of the TG4 may be approximated with a sequence of codons and is as under:
TG4:=(CODq)Lq∈N|COD∈COD | (Def. 3) |
The algorithm to compute L, which is the number of codons needed to model TG4 is presented and is as follows:
1:N←{u∈[20,60)}2:r←N mod 33:e←N−((N mod 3)/3)4:If e<(⌊e⌋+⌈e⌉)/2 then5:L=⌈e/3⌉6:else If e≥(⌊e⌋+⌈e⌉)/2 then7:L=⌊e/3⌋8:end If |
𝑁 ≔ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑟𝑖𝑏𝑜𝑛𝑢𝑐𝑙𝑒𝑜𝑡𝑖𝑑𝑒𝑠 𝑟𝑒𝑞𝑢𝑖𝑟𝑒𝑑 𝑡𝑜 𝑚𝑜𝑑𝑒𝑙 𝑇𝐺4
𝐿 : = 𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑐𝑜𝑑𝑜𝑛𝑠 𝑛𝑒𝑒𝑑𝑒𝑑 𝑡𝑜 𝑚𝑜𝑑𝑒𝑙 𝑇𝐺4 (7 ≤ 𝐿 < 21)
𝑞 ≔ 𝑞𝑡ℎ 𝑐𝑜𝑑𝑜𝑛
𝑟 ≔ 𝑅𝑒𝑚𝑎𝑖𝑛𝑑𝑒𝑟 = {0, 1, 2}
𝑒, 𝑢 : = 𝐺𝑒𝑛𝑒𝑟𝑖𝑐 𝑣𝑎𝑟𝑖𝑎𝑏𝑙𝑒𝑠
𝑪𝑶𝑫 ≔ 𝑆𝑒𝑡 𝑜𝑓 𝑣𝑒𝑟𝑡𝑒𝑏𝑟𝑎𝑡𝑒 𝑐𝑜𝑑𝑜𝑛𝑠
The codons selected for modelling TG4 (Def. 3) comprised suitably scored Guanine-containing vertebrate codons (gCOD+n⊂COD) for the Guanine-rich clusters/stretches/tracks (3≤t≤9;Defs. 1 and 2) and generic/no-stop codons for the intervening loops (Figures 2 and 3). Briefly, a Guanine-containing codon (gCODn) is scored by considering its association with two similar flanking codons, i.e., gCODn-1, gCODn, gCODn+1 such that there is at least one occurrence of 'GGGG' (δ≥1.0) (Figures 2 and 3). This non-trivial case (4≤t≤9) is chosen since its trivial equivalent t = 3, is already subsumed (Defs. 1 and 2). Numerically,
αaminocodon=γ.θ.δ+Ω | (2) |
𝛾 : = 𝑃𝑟𝑜𝑏𝑎𝑏𝑖𝑙𝑖𝑡𝑦 𝑜𝑓 𝑐𝑜𝑑𝑜𝑛 𝑜𝑐𝑐𝑢𝑟𝑟𝑒𝑛𝑐𝑒 (𝛾 = 1/64 ≈ 0.02)
𝜃 ≔ 𝑃𝑟𝑜𝑏𝑎𝑏𝑖𝑙𝑖𝑡𝑦 𝑜𝑓 𝑐𝑜𝑑𝑜𝑛 𝑜𝑐𝑐𝑢𝑟𝑟𝑒𝑛𝑐𝑒 𝑤𝑖𝑡ℎ𝑖𝑛 𝑎 𝑔𝑟𝑜𝑢𝑝 (𝜃 = {0.04, 0.11, 0.33, 1})
𝛿 ≔ 𝐷𝑖𝑠𝑡𝑖𝑛𝑐𝑡 𝑜𝑐𝑐𝑢𝑟𝑟𝑒𝑛𝑐𝑒𝑠 𝑜𝑓 ′𝐺𝐺𝐺𝐺′(𝛿 = {0, 1, 2, 6})
Ω ≔ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑎𝑑𝑗𝑎𝑐𝑒𝑛𝑡 𝑐𝑜𝑑𝑜𝑛𝑠 𝑤𝑖𝑡ℎ 𝛿 (Ω = {0, 1, 2})
Since the genetic code is degenerate, amino acids mapped from the selected codons are further scored and grouped (g1, g2, g3) (Figures 3 and 4).
βamino=|gCOD+amino|/|CODamino| | (6) |
gCOD+amino:= set of optimal codons for each amino acid (αaminocodon>0.0000)
CODamino:= Set of codons for each amino acid
Whilst amino acids from groups 1 and 2 (β > 0.00) (3) can represent the modeled G-rich clusters (y∈g1∪g2 = Y), no constraint was imposed on the amino acids (z) used to model the loops (z∈g1∪g2∪g3 = Z) (Figures 3 and 4). The peptidome (PTG4) evaluated by this study is a combinatorial association of peptides such that the molecular weight is ~0.8–2.3 KDa and length of any arbitrary member is ~7–20 aa (Figure 4). This may be represented as follows:
pTG4ij=((((yi,k)1≤i≤3(zi,k)1≤i≤2)k=3(yi)1≤i≤3)(zi)1≤i≤2)j | (Def. 4) |
PTG4=⋃i=20i=7⋃j=Jj=1|pTG4ij| | (Def. 5) |
𝑷𝑻𝑮𝟒 : = 𝑃𝑒𝑝𝑡𝑖𝑑𝑜𝑚𝑒 𝑐𝑜𝑟𝑟𝑒𝑠𝑝𝑜𝑛𝑑𝑖𝑛𝑔 𝑡𝑜 𝑇𝐺4
𝑝𝑇𝐺4𝑖𝑗 : = 𝑗𝑡ℎ 𝑐𝑎𝑛𝑜𝑛𝑖𝑐𝑎𝑙 𝑎𝑚𝑖𝑛𝑜 𝑎𝑐𝑖𝑑 𝑓𝑜𝑟𝑚 𝑜𝑓 𝑃𝑇𝐺4 𝑤𝑖𝑡ℎ "i" 𝑎𝑚𝑖𝑛𝑜 𝑎𝑐𝑖𝑑𝑠
𝑖 : = 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑎𝑚𝑖𝑛𝑜 𝑎𝑐𝑖𝑑𝑠 𝑡ℎ𝑎𝑡 𝑐𝑜𝑚𝑝𝑟𝑖𝑠𝑒 𝑡ℎ𝑒 𝑚𝑜𝑑𝑒𝑙𝑙𝑒𝑑 𝑷𝑻𝑮𝟒
𝐽 : = 𝑀𝑎𝑥𝑖𝑚𝑢𝑚 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑐𝑎𝑛𝑜𝑛𝑖𝑐𝑎𝑙 𝑝𝑇𝐺4 𝑓𝑜𝑟 "𝑖" 𝑎𝑚𝑖𝑛𝑜 𝑎𝑐𝑖𝑑𝑠
A dataset that comprises experimentally validated G4-forming mRNA segments of several genes (n = 99) was downloaded (http://scottgroup.med.usherbrooke.ca/G4RNA/) and used to investigate the distribution of G4 [16]. Genes which possess non-redundant RNA (R) sub sequences in the PCS are translated in 6 reading frames using an online tool (http://web.expasy.org/translate). The peptides generated are classified as those: ⅰ) with one or more uninterrupted stretch of N-terminal amino acids of length ≥7 aa (~A), ⅱ) with an in-frame termination signal designated as 'STOP' (~B) and ⅲ) without any termination signal, i.e., absence of a 'STOP' in their sequence (~C). The translated peptides are classified as "VALID" ((B∩A)∪(C∩A)) and then queried for matches with pTG4ij(7≤i≤20,j∈N). The PERL scripts that are required to parse and process the resulting data files have been developed in house and the pseudocode for the same is presented as additional information (Pseudocode, PS1: Supplementary Text 1).
This is done by examining the occurrence of PTG4 in amino acid/protein sequences of disordered regions (IDRs) and full-length proteins with disordered regions (IDPs). DisProt 7.0 (http://disprot.org), is a database of experimentally validated and non-redundant sequences of IDRs and IDPs [38]. The sequences (|IDR| = 1445;|IDP| = 800) that comprise these are queried for occurrences of pTG4ij(7≤i≤20,j∈N) (Supplementary Texts 2 and 3). A preliminary partitioning schema divides these datasets into two distinct subsets, i.e., #pTG4ij≥1 (PT+≡PPOS⊂{IDR, IDP}; (Def.6)) and #pTG4ij = 0 (PT-≡PNEG⊂{IDR, IDP}; (Def. 7)). The extent of co-occurrence of one or more SLiMSw≡SL (w = {1, 2, 3}) with pTG4ij (SL±∈{PPOS, PNEG}) (Defs.8 and 9) is then evaluated to infer relevance of PTG4 to misfolding induced proteostasis. The distribution of overlapping/shared sequences of amino acids ((zn)n≥2∈(pTG4ij∩SLiMSw); zn∈Z; ) (Def.10), is examined in protein sequences from taxonomically diverse organisms with ScanProsite (https://prosite.expasy.org/scanprosite). The proof behind this rationale is presented:
(zn)n≥2 ∈(pTG4ij∩SLiMSw)=((zn)n≥2∈pTG4ij)∩((zn)n≥2∈SLiMSw)Let zn=z′n and zn=z′′n.Rewriting =((z′n)n≥2∈pTG4ij)∩((z′′n)n≥2∈SLiMSw)=((z′n)n≥2,(z′′n)n≥2)=pTG4ij×SLiMSw |
𝒁 : = 𝑆𝑒𝑡 𝑜𝑓 𝑎𝑚𝑖𝑛𝑜 𝑎𝑐𝑖𝑑𝑠 (𝑧𝑛 ∈ 𝒁)
𝑝𝑇𝐺4𝑖𝑗 : = 𝐶𝑎𝑛𝑜𝑛𝑖𝑐𝑎𝑙 𝑎𝑚𝑖𝑛𝑜 𝑎𝑐𝑖𝑑 𝑓𝑜𝑟𝑚 𝑜𝑓 𝑷𝑻𝑮𝟒
𝑺𝑳𝒊𝑴𝑺 : = 𝑆𝑒𝑡 𝑜𝑓 𝑠ℎ𝑜𝑟𝑡 𝑙𝑖𝑛𝑒𝑎𝑟 𝑚𝑜𝑡𝑖𝑓𝑠 (𝑆𝐿𝑖𝑀𝑆𝑤 ∈ 𝑺𝑳𝒊𝑴𝑺)
𝑖, 𝑗, 𝑛, 𝑤 : = 𝐼𝑛𝑑𝑖𝑐𝑒𝑠 𝑜𝑓 𝑚𝑒𝑚𝑏𝑒𝑟𝑠 𝑜𝑓 𝒁, 𝑷𝑻𝑮𝟒, 𝑺𝑳𝒊𝑴𝑺
The indices utilized by this study to establish relevance of matched instances of various motifs/co-motifs in the peptide/protein sequences of interest include the accuracy (A), precision (P), recall (R) and the p-value. A 2X2 table which represents the categorized data (2.1.4) is constructed and used to compute various bioinformatics indices. This is outlined as under:
![]() |
𝑇𝑁 ≔ 𝑇𝑟𝑢𝑒 𝑛𝑒𝑔𝑎𝑡𝑖𝑣𝑒 (|𝒔𝑵𝑬𝑮 ∩ 𝑷𝑵𝑬𝑮| = |𝒔𝑵𝑬𝑮|) ≡ 𝑆𝐿−𝑃𝑇− (𝐷𝑒𝑓. 11)
𝐹𝑃 ≔ 𝐹𝑎𝑙𝑠𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒 (|𝑺𝑵𝑬𝑮 ∩ 𝑷𝑷𝑶𝑺| = |𝑺𝑵𝑬𝑮|) ≡ 𝑆𝐿−𝑃𝑇+ (𝐷𝑒𝑓. 12)
𝐹𝑁 ≔ 𝐹𝑎𝑙𝑠𝑒 𝑛𝑒𝑔𝑎𝑡𝑖𝑣𝑒 (|𝒔𝑷𝑶𝑺 ∩ 𝑷𝑵𝑬𝑮| = |𝒔𝑷𝑶𝑺|) ≡ 𝑆𝐿+𝑃𝑇− (𝐷𝑒𝑓. 13)
𝑇𝑃 ≔ 𝑇𝑟𝑢𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒 (|𝑺𝑷𝑶𝑺 ∩ 𝑷𝑷𝑶𝑺| = |𝑺𝑷𝑶𝑺|) ≡ 𝑆𝐿+𝑃𝑇+ (𝐷𝑒𝑓. 14)
The equations may then be written as:
(A)=(TN+TP/TN+FP+FN+TP)X100 | (4) |
(P)=(TP/FP+TP)X100 | (5) |
(R)=(TP/FN+TP)X100 | (6) |
The p-values for these analyses are computed by comparing the frequency of occurrence of all pTG4ij in a test sequence (ϕpTG4ij) with the same in randomly-generated (v∈V) sequences of similar lengths (ϕpTG4vij), i.e., 7-50 aa (1≤v≤10000) and > 50 aa (1≤v≤100000) (Pseudocode, PS2: Supplementary Text 1):
p−value=ϕpTG4vij/ϕpTG4ij=(v=|V|∑v=1i=21∑i=7j=J∑j=1pTG4vij)/(i=21∑i=7j=J∑j=1pTG4ij)=(v=|V|∑v=1i=21∑i=7j=J∑j=1pTG4vij/i=21∑i=7j=J∑j=1pTG4ij) | (7) |
The frequency of occurrence of overlapping sequences of amino acids ((zn)n≥2∈(pTG4ij∩SLiMSw); zn∈Z) in pre-compiled and curated protein sequences (ϕ(zn)) across taxa is compared with randomly chosen sequences of comparable lengths (ϕ(vzn); n = 5000). These are used to estimate statistical significance, i.e., p-value = ϕ(vzn)/ϕ(zn) (8).
The data presented discusses implementation of a model of short intra-strand TG4 for various values of α and β, populates PTG4 and establishes the equivalence TG4~PTG4. Co-occurrence and homology studies between PTG4 and the SLiMS in IDRs/IDPs and generic protein sequences across taxa are used to infer probable mechanisms of TG4~PTG4 facilitated misfolding-induced proteostasis.
An association-competent codon not only takes into account the presence of a Guanine residue, but also gives weightage to its position (Figures 1–3, Table 1). This schema partitions standard vertebrate codons into those with a high- (Ranks 1-4;α > 0.0000) or low- (Rank 5;α = 0.0000) propensity to form a contiguous cluster of Guanine residues (Figures 3 and 4, Table 1). Whilst, 'GGG' (Rank 1;α = 2.12) can associate with ({GGG, GxG, xGG, GGx, Gxx, xxG}) bilaterally (δ = 6;Ω = 2), 'GxG' (Rank 2; α = 2.0066) can do so only with 'GGG' (δ = 1;Ω = 2). On the other hand, the codon subsets 'GGx' and 'xGG' (Rank 3;α = 1.0132) can form two clusters of contiguous Guanine residues with 'GGG' and 'xGG'/ 'GGx' unilaterally (δ = 2;Ω = 1). Similarly, the subsets 'xxG' or 'Gxx' (Rank 4;α = 1.0022), can form contiguous Guanines with a single occurrence of 'GGG' (δ = 1;Ω = 1) (Figures 3 and 4, Table 1). Conversely, codons with either a single occurrence of a central Guanine residue 'xGx' or no Guanine residues 'xxx' (Rank 5;α = 0.0000) are unable to form the 'GGGG' and are excluded from this study (Figures 3 and 4, Table 1).
Rank | Codon set, Cardinality | Codon | γ | θ | δ | Ω | α=γ.θ.δ+Ω | aa |
1 | GGG, 1 | GGG | 0.02 | 1.00 | 6 | 2 | 2.1200 | Gly |
2 | GxG, 3 | GUG | 0.02 | 0.33 | 1 | 2 | 2.0066 | Val |
GCG | 0.02 | 0.33 | 1 | 2 | 2.0066 | Ala | ||
GAG | 0.02 | 0.33 | 1 | 2 | 2.0066 | Glu | ||
3 | xGG, 3 | UGG | 0.02 | 0.33 | 2 | 1 | 1.0132 | Trp |
CGG | 0.02 | 0.33 | 2 | 1 | 1.0132 | Arg | ||
AGG | 0.02 | 0.33 | 2 | 1 | 1.0132 | Arg | ||
3 | GGx, 3 | GGU | 0.02 | 0.33 | 2 | 1 | 1.0132 | Gly |
GGC | 0.02 | 0.33 | 2 | 1 | 1.0132 | Gly | ||
GGA | 0.02 | 0.33 | 2 | 1 | 1.0132 | Gly | ||
4 | xxG, 9 | UUG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Leu |
UCG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ser | ||
UAG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ter | ||
CUG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Leu | ||
CCG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Pro | ||
CAG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Gln | ||
AUG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Met | ||
ACG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Thr | ||
AAG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Lys | ||
4 | Gxx, 9 | GUU | 0.02 | 0.11 | 1 | 1 | 1.0022 | Val |
GCU | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ala | ||
GAU | 0.02 | 0.11 | 1 | 1 | 1.0022 | Asp | ||
GUC | 0.02 | 0.11 | 1 | 1 | 1.0022 | Val | ||
GCC | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ala | ||
GAC | 0.02 | 0.11 | 1 | 1 | 1.0022 | Asp | ||
GUA | 0.02 | 0.11 | 1 | 1 | 1.0022 | Val | ||
GCA | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ala | ||
GAA | 0.02 | 0.11 | 1 | 1 | 1.0022 | Glu | ||
5 | xGx, 9 | UGU | 0.02 | 0.11 | 0 | 0 | 0.0000 | Cys |
UGC | 0.02 | 0.11 | 0 | 0 | 0.0000 | Cys | ||
UGA | 0.02 | 0.11 | 0 | 0 | 0.0000 | Ter | ||
CGU | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
CGC | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
CGA | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
AGU | 0.02 | 0.11 | 0 | 0 | 0.0000 | Ser | ||
AGC | 0.02 | 0.11 | 0 | 0 | 0.0000 | Ser | ||
AGA | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
5 | xxx, 27 | UUU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Phe |
UCU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ser | ||
UAU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Tyr | ||
UUC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Phe | ||
UCC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ser | ||
UUA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
UCA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ser | ||
UAA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ter | ||
CUU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
CCU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Pro | ||
CAU | 0.02 | 0.04 | 0 | 0 | 0.0000 | His | ||
CUC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
CCC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Pro | ||
CAC | 0.02 | 0.04 | 0 | 0 | 0.0000 | His | ||
CUA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
CCA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Pro | ||
CAA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Gln | ||
AUU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ile | ||
ACU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Thr | ||
AAU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Asn | ||
AUC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ile | ||
ACC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Thr | ||
AAC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Asn | ||
AUA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ile | ||
ACA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Thr | ||
AAA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Lys |
Abbreviations
𝛾: General probability of a codon (𝛾 = 1/64 ≅ 0.02)
𝜃: Probability of codon within a group (𝜃 = {0.04, 0.33, 0.11, 1.00})
𝛿: Number of distinct codon sets that could complete 'GGGG' (𝛿 = {0, 1, 2, 6})
Ω: Number of adjacent positions that contain 𝛿 (Ω = {0, 1, 2})
𝛼: Threshold for selecting codons that may favour G-quadruplex formation
x: Codon specific generic ribonucleotide {𝐴, 𝐺, 𝑈, 𝐶}
aa: Amino acid
Ter: Stop codons {𝑈𝐴𝐺, 𝑈𝐺𝐴, 𝑈𝐴𝐴}
An estimate of the possible combinations of the simplest peptide (∑i=7∑j=Jj=1pTG4ij = 8.00E+03;GlyzGlyzGlyzGly; J = (20)3; i = lengthp(TG4ij) = 7 aa; z∈Z) (Figures 3 and 4, Table 2). This justifies usage of PTG4 (pTG4ij∈PTG4) as a generic representation of the putative peptidome encoded by the TG4 (PTG4). Approximately ~12% (n = 11) of in silico translated amino acid sequences from exon-derived TG4 possesses one of more "STOP" signals and include ESR1, longer RNA variants of PRNP (85 nt) and BCL2 (29 n t, 33 nt, 34 nt) (Table 3; Table 1, Supplementary Text 2). With the exceptions of KCNH2/ZNF669 and the shorter variants of PRNP (14 nt, 15 nt, 20 nt, 24 nt), "VALID" sub sequences are found for BACE1, BCL2, ESR1, PRNP (long) and TERF2 (Table 3; Tables 1A and 1C). Interestingly, all the genes considered possessed at least one occurrence of PTG4 (P = 100%, n = 6) (Table 3; Table 1B). This finding, despite the small sample size is proof-of-principal that the TG4 can be mapped to definite peptide sequences, i.e., TG4~PTG4. Since this can occur only after a ribosomal read through of the G4 containing mRNA, it raises the intriguing possibility that PTG4 whence part of a larger protein may increase its propensity to undergo misfolding. This notion is investigated in non-redundant sequences of IDRs (PTG4~10%, n = 145;0.00≤p-value≤0.20) and IDPs (PTG4~34%, n = 269;0.00≤p-value < 0.5) (Table 4; Tables 2 and 3).
aa | CODamino | gCOD+amino | β | |
Group 1 (n=7) | Ala | 4 | 4 | 1.00 |
Val | 4 | 4 | 1.00 | |
Asp | 2 | 2 | 1.00 | |
Glu | 2 | 2 | 1.00 | |
Trp | 1 | 1 | 1.00 | |
Met | 1 | 1 | 1.00 | |
Gly | 4 | 4 | 1.00 | |
Group 2 (n=7) | Leu | 6 | 2 | 0.3333 |
Gln | 2 | 1 | 0.5 | |
Arg | 6 | 2 | 0.3333 | |
Lys | 2 | 1 | 0.5 | |
Ser | 6 | 1 | 0.1667 | |
Thr | 4 | 1 | 0.25 | |
Pro | 4 | 1 | 0.25 | |
Group 3 (n=6) | Cys | 2 | 0 | 0.00 |
Asn | 2 | 0 | 0.00 | |
Ile | 3 | 0 | 0.00 | |
His | 2 | 0 | 0.00 | |
Phe | 2 | 0 | 0.00 | |
Tyr | 2 | 0 | 0.00 |
Abbreviations
gCOD+amino : Guanine-containing optimal codons excluding STOP (UAG) (𝛼 > 0.000)
COD−amino : Non-optimal codon excluding STOP (UGA, UAA) (𝛼 = 0.000)
𝑪𝑶𝑫𝒂𝒎𝒊𝒏𝒐 = gCOD+amino + COD−amino : All codons for an amino acid
GENE | NAME | G4 (nt) | Ex | STOP(n=11) | VALID(n=59) | |PTG4| |
BACE1 | Beta-secretase 1 | 33 | 3 | n=0 | n=6 | n=2 |
BCL2 | B-cell lymphoma 2 | 33 | 2 | n=1 | n=6 | n=1 |
23 | n=0 | n=6 | ||||
28 | n=0 | n=6 | ||||
29 | n=1 | n=5 | ||||
34 | n=1 | n=5 | ||||
33 | 3 | n=2 | n=5 | |||
ESR1 | Estrogen receptor alpha (ERα) | 36 | 4 | n=1 | n=5 | n=2 |
KCNH2 | Potassium Voltage-Gated Channel sub family H | 18 | 12 | n=0 | n=0 | NA |
ZNF669 | Member 2 Zinc Finger Protein 669 |
1 | ||||
PRNP | Prion protein | 14 | 2 | n=0 | n=0 | n=1 |
15 | n=0 | n=0 | ||||
20 | n=0 | n=0 | ||||
24 | n=0 | n=6 | ||||
85 | n=6 | n=3 | ||||
TERF2 | Telomeric repeat-binding factor 2 | 55 | 1 | n=0 | n=6 | n=1 |
Disordered regions (IDRs; n=1445;0.00≤p-value < 0.05) | |||||||||||||||||
SL-PT- | SL-PT+ | SL+PT- | SL+PT+ | R1T | R2T | C1T | C2T | A (%) | P (%) | R (%) | |||||||
SLiMS1 | 1078 | 64 | 58 | 9 | 1142 | 67 | 1136 | 73 | 89.90 | 12.32 | 13.43 | ||||||
SLiMS2 | 749 | 18 | 121 | 29 | 767 | 150 | 870 | 47 | 84.84 | 61.70 | 19.33 | ||||||
SLiMS3 | 1212 | 108 | 34 | 9 | 1320 | 43 | 1246 | 117 | 89.58 | 7.69 | 20.93 | ||||||
Proteins with disordered segments (IDPs; n=800;0.00≤p-value < 0.05) | |||||||||||||||||
SL-PT- | SL-PT+ | SL+PT- | SL+PT+ | R1T | R2T | C1T | C2T | A (%) | P (%) | R (%) | |||||||
SLiMS1 | 86 | 12 | 28 | 18 | 98 | 46 | 114 | 30 | 72.22 | 60.00 | 39.10 | ||||||
SLiMS2 | 1 | 1 | 96 | 66 | 2 | 162 | 97 | 67 | 40.85 | 98.50 | 40.74 | ||||||
SLiMS3 | 250 | 57 | 26 | 25 | 307 | 51 | 276 | 82 | 76.81 | 30.48 | 49.01 |
Abbreviations
𝐼𝐷𝑅𝑠: Intrinsically disordered regions
𝐼𝐷𝑃s: Intrinsically disordered proteins
𝑧: Any amino acid
𝑆𝐿𝑖𝑀𝑆1: [𝑆𝑇]𝑃𝑧𝑅
𝑆𝐿𝑖𝑀𝑆2: [𝐸𝐷]𝑧𝑧[𝐷𝐸][𝐴𝐺𝑆]
𝑆𝐿𝑖𝑀𝑆3: [𝐾𝑅]𝑧𝑃𝑧𝑧𝑃
𝑆𝐿−𝑃𝑇−: |𝑺𝑵𝑬𝑮 ∩ 𝑷𝑵𝑬𝑮|
𝑆𝐿−𝑃𝑇+: |𝑺𝑵𝑬𝑮 ∩ 𝑷𝑷𝑶𝑺|
𝑆𝐿+𝑃𝑇−: |𝑺𝑷𝑶𝑺 ∩ 𝑷𝑵𝑬𝑮|
𝑆𝐿+𝑃𝑇+: |𝑺𝑷𝑶𝑺 ∩ 𝑷𝑷𝑶𝑺|
𝑅1𝑇: 𝑆𝐿−𝑃𝑇− + 𝑆𝐿−𝑃𝑇+
𝑅2𝑇: 𝑆𝐿+𝑃𝑇− + 𝑆𝐿+𝑃𝑇+
𝐶1𝑇: 𝑆𝐿−𝑃𝑇−+ 𝑆𝐿+𝑃𝑇−
𝐶2𝑇: 𝑆𝐿−𝑃𝑇+ + 𝑆𝐿+𝑃𝑇+
𝐴: Accuracy
𝑃: Precision
𝑅: Recall
The amino acids that comprise the peptide members of PTG4 and the short linear motifs (g1, g2 vs SLiMS) are well conserved. The co-occurrence of PTG4 with SLiMS in the IDRs (A~85-89%;0.00 < p-value≤0.05) suggests that this association is non-trivial and may favor all purported mechanisms of misfolding (hyperphosphorylation, proteolytic cleavage, complex formation) (Table 4; Tables 2 and 3). However, the higher precision of PTG4 with the proteolytic-SLiMS suggests that this may predominate (Table 4; Tables 2 and 3). The data with the IDPs suggests a similar predilection for proteolytic cleavage (A~40-77%;P~99%;0.00 < p-value < 0.05, although hyperphosphorylation (P~60%;0.00 < p-value < 0.05) and complex-promotion (P~30%;0.00 < p-value < 0.05) may constitute viable alternatives to the genesis of misfolding (Table 4; Tables 2 and 3). The presence of overlapping sequences of amino acids between PTG4 and the SLiMS when examined in protein sequences from taxonomically diverse organisms is degenerate for SLiMS1 (number of matches = 6251) and SLiMS3 (number of matches = 1480) (Table 5; Table 4). In contrast, the corresponding data for SLiMS2 (number ofmatches = 3759;0.00 < p-value < 0.05) is statistically significant (Table 5). The taxonomic spread includes archaea (n = 150), bacteria (n = 1735), viruses (n = 84), green land plants (n = 199), fungi (n = 182), eukaryotic invertebrates (n = 43) and vertebrates (n = 700) (Table 4).
SLiMS | Sample | (zn)n≥2∈pTG4ij∩SLiMSw (p-value) | |
SLiMS1=[ST]PzR | Pz | PG (n=1) | PG (Degenerate) |
SLiMS2=[ED]zzD[AGS] | z[DE] | G[DE] (n=2) | [WGRVAELMKQSTP][AG][DE]z2EG[VADE](p-value=0.00069) |
[DE]z | [DE]G (n=1) | ||
zz[DE] | [LMKQSTP]G[DE] (n=14) [VAE]G[DE] (n=6) [WGR][AG][DE] (n=6) |
||
[DE]zz[DE] | [VAE]G[DE]zzEG[VADE] (n=28) [WGR][AG][DE]zzEG[VADE] (n=24) [WGR][AG][DE]zzEG (n=6) GEzzEG[VADE] (n=4) GEzzEG (n=1) |
||
SLiMS3=[KR]zPzzP | Pzz | PG[VADE] (n=4) | PGV (Degenerate) PGA (Degenerate) PGD (Degenerate) PGE (Degenerate) |
Abbreviations
𝑝𝑇𝐺4𝑖𝑗: Members of putative peptidome (𝑝𝑇𝐺4𝑖𝑗 ∈ 𝑷𝑻𝑮𝟒)
𝑆𝐿𝑖𝑀𝑆𝑤: Short linear motifs (𝑆𝐿𝑖𝑀𝑆𝑤 ∈ 𝑺𝑳𝒊𝑴𝑺)
𝑧𝑛: Shared sequence(s) of amino acids between 𝑷𝑻𝑮𝟒 and 𝑺𝑳𝒊𝑴𝑺
𝑖, 𝑗, 𝑤, 𝑛: Indices to characterize members of 𝑷𝑻𝑮𝟒, 𝑺𝑳𝒊𝑴𝑺, 𝒁
The significant association and homology between PTG4 and the SLiMS along with the equivalence data (PTG4~TG4) suggest that TG4 may influence proteostasis in a multitude of ways (Tables 1–5; Tables 1–4, Supplementary Text 2–4).
The short TG4 modeled in this study has an average loop length (h~2 Mer) which may contribute to thermodynamic stability by restricting the mobility of the participating strands (1) [8,9,10,11]. The physical presence of TG4 will result in a stalled ribosome and translation which is prolonged, inefficient and incomplete [31,32,33]. Interestingly, this analysis also includes UAG (Amber; α > 0.0000), which when present in-frame will prematurely terminate translation and result in a truncated protein (Table 1) [39]. Whilst nonsense-mediated mRNA decay may be triggered if the stop codon is within ±50 Mer of the exon-junction complex (EJC), a read-through may occur nonetheless. The resulting protein sequences may be modified which in tandem with one or more occurrences of PTG4 and/or SLiMS would predispose the same to agammaegate and result in a proteopathy [39,40].
Whilst the preponderance of Glycine (Gly) might impart heightened flexibility and limit the formation of stabilizing secondary structural elements in the hypothetical protein, Proline (Pro) confers rigidity and may retard proper folding. There is also remarkable conservation between the amino acids that comprise PTG4 and the SLiMS. These include the complex-promoting hydrophobic (Ala, Val, Met, Trp) and ionic (Asp, Glu, Lys, Arg) residues, along with nucleophile-favoring Serine and Threonine (Figures 3 and 4, Tables 2–5). Whilst, the former may favor agammaegation by non-covalent interactions, the latter may promote phosphorylation-mediated charge imbalance and thence misfolding. Interestingly, the loops of G4 whence modeled by Adenine-containing codons (Axx) are translated to Lysine (K), Arginine (R), Serine (S), Threonine (T) and Isoleucine (I); all of which may also promote misfolding (Figures 3 and 4, Tables 2-5) [8,9,10,11,34,35]. The distribution of PTG4 amongst physiologically relevant proteins further suggests that the peptide-mediated misfolding may influence/regulate signal transduction, cytoskeleton organization, metabolism, synaptic transmission and transcription/translation (Table 6; Table 5).
Cellular function | Disordered regions of proteins | |
1. | Signal transduction | DP00274, DP00224, DP00141, DP00332, DP01063, DP00506, DP00418, DP00341, DP00435, DP00613, DP00463, DP00954, DP00959, DP01104, DP00611, DP00519, DP00086, DP00707, DP00712 |
2. | Endocytosis | DP01073, DP01065, DP01066, DP00225 |
3. | Calcium-calmodulin | DP00092, DP00132, DP00561, DP00118, DP00253 |
4. | Myofibril assembly | DP01090 |
5. | Cytoskeleton | DP01056 DP00240, DP01022, DP00169, DP00716, DP00717, DP01100, DP00122 |
6. | Nuclear pore | DP01075, DP01077, DP01079 |
7. | Phototransduction | DP00768, DP00347 |
8. | Targeting | DP00893, DP00609, DP00610, DP01058 |
9. | Transcription | DP00062, DP00177, DP00633, DP00348, DP00786, DP00049, DP00231, DP00873, DP00720, DP00217, DP00081 |
10. | Translation | DP00082, DP00164, DP00229 DP00949, DP00134 |
11. | Synaptic transmission | DP00943 |
12. | Supercoiling | DP00076 |
13. | Binding | DP00539, DP00854, DP01052, DP00659, DP00656 |
14. | Peptide bond formation | DP00944 |
15. | Enzymes | DP00557, DP00032, DP00095, DP00337, DP00379, DP00787, DP00427, DP00429 |
16. | Bacterial/parasitic virulence | |
Secreted toxins | DP00345, DP00591 | |
Cytoadherence | DP00025, DP00065, DP01096 | |
17. | Viral infectivity | |
Cyclophilin interaction | DP00615, DP01031 | |
Chaperones | DP00699, DP00700, DP00674 | |
Capsid assembly | DP00133, DP00876 | |
Membrane fusion | DP01043 | |
Latency | DP01060 | |
18. | Unknown | DP00119 |
Note: DP≔DisProt ID
The distribution of overlapping/shared amino acids in protein sequences of non-vertebrates suggests that PTG4 is either completely degenerate with the SLiMS or present in proportions that is statistically significant (Tables 5 and 6; Tables 4 and 5). These data imply that motif-mimicry too, might constitute a probable cause (tropism, oncogenic potential, virulence) of infection/infestation-mediated acute/chronic proteopathies [34,35,41,42]. The contribution(s) of misfolding to the pathogenesis of secondary proteopathies is however, debatable. Whilst, there is evidence that mislocalization of proteins can precipitate misfolding, mimicry itself may result in exonuclease-mediated proteolytic cleavage and thence trigger an infective proteopathy [43,44]. Additionally, the presence of sequences of amino acids such as Proline and Threonine in viral or fungal proteins may be responsible for creating and/or maintaining a milieu conducive to the genesis of infective/transmissible proteopathies, viz., a high charge density and imbalance of electrostatic interactions [43,44].
The coexistence of potentially translatable G-quadruplexes (TG4) with unfolded ribonucleotides in the PCS of an mRNA transcript may have important consequences for protein homeostasis. Here, I have investigated the contribution of a short intra-strand translatable G-quadruplex and its associated peptidome (TG4~PTG4) to the genesis of misfolding-induced proteostasis. The co-occurrence, homology and distribution of overlapping/shared amino acids of PTG4 with the SLiMS suggests that this may occur by truncation, complex formation, increased charge density and/or accelerated degradation. An additional mechanism that is also supported is motif-mimicry by pathogens which may trigger the development of infective proteopathies. The putative peptidome (~7–20 aa) that corresponds to the short translatable G-quadruplex delineated by this investigation may be utilized as novel markers of both the primary and secondary proteopathies.
SK outlined and designed the study, designed and conceptualized the algorithm(s) and formulae for prediction, wrote mathematical proofs to establish rigor, collated the data, constructed the models, formulated the filters, carried out the computational analysis, wrote all necessary code and the manuscript.
The author declares no conflict of interest.
[1] |
R. M. Mizanur, M. A. Hossain, H. Mouftah, A. EI Saddik, E. Okamoto, Chaos-cryptography based privacy preservation technique for video surveillance, Multimedia Syst., 18 (2012), 145-155. https://doi.org/10.1007/s00530-011-0246-9 doi: 10.1007/s00530-011-0246-9
![]() |
[2] |
G. Sun, H. Wang, Image encryption and decryption technology based on rubik's cube and dynamic password, J. Beijing Univ. Technol., 47 (2021), 833-841. https://doi.org/10.11936/bjutxb2020120003 doi: 10.11936/bjutxb2020120003
![]() |
[3] | S. Shan, E. Wenger, J. Zhang, H. Li, H. Zheng, B. Y. Zhao, Fawkes: protecting privacy against unauthorized deep learning models, in 29th USENIX Security Symposium (USENIX Security 20), (2020), 1589-1604. Available from: https://www.usenix.org/conference/usenixsecurity20/presentation/shan. |
[4] |
J. Yang, J. Liu, R. Han, J. Wu, Transferable face image privacy protection based on federated learning and ensemble models, Complex Intell. Syst., 7 (2021), 2299-2315. https://doi.org/10.1007/s40747-021-00399-6 doi: 10.1007/s40747-021-00399-6
![]() |
[5] | 2021 White Paper of Innovation in Face recognition industry. Available from: https://www.vzkoo.com/read/11206bd95038173b5831540e5982e1b2.html. |
[6] |
R. A. Fisher, The use of multiple measurements in taxonomic problems, Ann. Eugen., 7 (1936), 179-188. https://doi.org/10.1111/j.1469-1809.1936.tb02137.x doi: 10.1111/j.1469-1809.1936.tb02137.x
![]() |
[7] |
G. Cheng, Z. Song, Robust face recognition based on sparse representation in 2D fisherface space, Optik, 125 (2014), 2804-2808. https://doi.org/10.1016/j.ijleo.2013.11.042 doi: 10.1016/j.ijleo.2013.11.042
![]() |
[8] |
L. Sirovich, M. Kirby, Low-dimensional procedure for the characterization of human faces, J. Opt. Soc. Am. A, 4 (1987), 519-524. https://doi.org/10.1364/JOSAA.4.000519 doi: 10.1364/JOSAA.4.000519
![]() |
[9] |
M. Turk, A. Pentland, Eigenfaces for recognition, J. Cognit. Neurosci., 3 (1991), 71-86. https://doi.org/10.1162/jocn.1991.3.1.71 doi: 10.1162/jocn.1991.3.1.71
![]() |
[10] |
T. Ojala, M. Pietikainen, D. Harwood, A comparative study of texture measures with classification based on fea-tured distributions, Pattern Recognit., 29 (1996), 51-59. https://doi.org/10.1016/0031-3203(95)00067-4 doi: 10.1016/0031-3203(95)00067-4
![]() |
[11] |
Q. Zhang, H. Li, M. Li, L. Ding, Feature extraction of face image based on LBP and 2-D Gabor wavelet transform, Math. Biosci. Eng., 17 (2020), 1578-1592. https://doi.org/10.3934/mbe.2020082 doi: 10.3934/mbe.2020082
![]() |
[12] |
Z. Peng, L. Tao, G. Xu, H. Zhang, Detecting facial features based on color segmentation and KL transform, J. Tsinghua Univ. (Sci. Technol.), 41 (2001), 218-221. https://doi.org/10.16511/j.cnki.qhdxxb.2001.z1.052 doi: 10.16511/j.cnki.qhdxxb.2001.z1.052
![]() |
[13] | Y. Taigman, M. Yang, M. A. Ranzato, L. Wolf, Deepface: closing the gap to human-level performance in face verification, in 2014 IEEE Conference on Computer Vision and Pattern Recognition, (2014), 1701-1708. https://doi.org/10.1109/CVPR.2014.220 |
[14] | Y. Sun, X. Wang, X. Tang, Deep learning face representation from predicting 10,000 classes, in 2014 IEEE Conference on Computer Vision and Pattern Recognition, (2014), 1891-1898. https://doi.org/10.1109/CVPR.2014.244 |
[15] | Y. Sun, Y. Chen, X. Wang, X. Tang, Deep learning face representation by joint identification-verification, in Advances in Neural Information Processing Systems, 27 (2014). Available from: https://proceedings.neurips.cc/paper/2014/file/e5e63da79fcd2bebbd7cb8bf1c1d0274-Paper.pdf. |
[16] | Y. Sun, X. Wang, X. Tang, Deeply learned face representations are sparse, selective, and robust, in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), (2015), 2892-2900. https://doi.org/10.1109/CVPR.2015.7298907 |
[17] | F. Schroff, D. Kalenichenko, J. Philbin, FaceNet: a unified embedding for face recognition and clustering, in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), (2015), 815-823. https://doi.org/10.1109/CVPR.2015.7298682 |
[18] | J. Liu, Y. Deng, T. Bai, Z. Wei, C. Huang, Targeting ultimate accuracy: face recognition via deep embedding, preprint, arXiv: 1506.07310. |
[19] |
H. Fan, E. Zhou, Approaching human level facial landmark localization by deep learning, Image Vision Comput., 47 (2016), 27-35. https://doi.org/10.1016/j.imavis.2015.11.004 doi: 10.1016/j.imavis.2015.11.004
![]() |
[20] | W. Liu, Y. Wen, Z. Yu, M. Li, B. Raj, L. Song, Sphereface: deep hypersphere embedding for face recognition, in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), (2017), 6738-6746. https://doi.org/10.1109/CVPR.2017.713 |
[21] | H. Wang, Y. Wang, Z. Zhou, X. Ji, D. Gong, J. Zhou, et al., Cosface: large margin cosine loss for deep face recognition, in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, (2018), 5265-5274. https://doi.org/10.1109/CVPR.2018.00552 |
[22] | J. Deng, J. Guo, N. Xue, S. Zafeiriou, ArcFace: additive angular margin loss for deep face recognition, in 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), (2019), 4685-4694. https://doi.org/10.1109/CVPR.2019.00482 |
[23] | X. Tang, D. K. Du, Z. He, J. Liu, PyramidBox: a context-assisted single shot face detector, in Computer Vision - ECCV 2018, (2018), 812-828. https://doi.org/10.1007/978-3-030-01240-3_49 |
[24] | F. Boutros, N. Damer, F. Kirchbuchner, A. Kuijper, ElasticFace: elastic margin loss for deep face recognition, preprint, arXiv: 2109.09416. |
[25] | Q. Meng, S. Zhao, Z. Huang, F. Zhou, MagFace: a universal representation for face recognition and quality assessment, in 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), (2021), 14220-14229. https://doi.org/10.1109/CVPR46437.2021.01400 |
[26] | F. Boutros, N. Damer, M. Fang, F. Kirchbuchner, A. Kuijper, MixFaceNets: extremely efficient face recognition networks, in 2021 IEEE International Joint Conference on Biometrics (IJCB), (2021), 1-8. https://doi.org/10.1109/IJCB52358.2021.9484374 |
[27] |
F. Boutros, P. Siebke, M. Klemt, N. Damer, F. Kirchbuchner, A. Luijper, PocketNet: extreme lightweight face recognition network using neural architecture search and multistep knowledge distillation, IEEE Access, 10 (2022), 46823-46833. https://doi.org/10.1109/ACCESS.2022.3170561 doi: 10.1109/ACCESS.2022.3170561
![]() |
[28] |
B. Meden, P. Rot, P. Terhorst, N. Damer, A. Luijper, W. J. Scheirer, Privacy-enhancing face biometrics: a comprehensive survey, IEEE Trans. Inf. Forensics Secur., 16 (2021), 4147-4183. https://doi.org/10.1109/TIFS.2021.3096024 doi: 10.1109/TIFS.2021.3096024
![]() |
[29] | A. Chattopadhyay, T. E. Boult, PrivacyCam: a privacy preserving camera using uCLinux on the blackfin DSP, in 2007 IEEE Conference on Computer Vision and Pattern Recognition, (2007), 1-8. https://doi.org/10.1109/CVPR.2007.383413 |
[30] | P. Terhorst, D. Fahrmann, N. Damer, F. Kirchbuchner, A. Luijper, Beyond identity: what information is stored in biometric face templates, in 2020 IEEE International Joint Conference on Biometrics (IJCB), (2020), 1-10, https://doi.org/10.1109/IJCB48548.2020.9304874 |
[31] |
Z. Zhang, Y. Xu, L. Shao, J. Yang, Discriminative block-diagonal representation learning for image recognition, IEEE Trans. Neural Networks Learn. Syst., 29 (2018), 3111-3125. https://doi.org/10.1109/TNNLS.2017.2712801 doi: 10.1109/TNNLS.2017.2712801
![]() |
[32] |
P. Terhorst, K. Riehl, N. Damer, P. Rot, B. Bortolato, F. Kirchbuchner, et al., PE-MIU: a training-free privacy-enhancing face recognition approach based on minimum information units, IEEE Access, 8 (2020), 93635-93647. https://doi.org/10.1109/ACCESS.2020.2994960 doi: 10.1109/ACCESS.2020.2994960
![]() |
[33] |
V. Mirjalili, S. Raschka, A. Ross, FlowSAN: privacy-enhancing semi-adversarial networks to confound arbitrary face-based gender classifiers, IEEE Access, 7 (2019), 99735-99745. https://doi.org/10.1109/ACCESS.2019.2924619 doi: 10.1109/ACCESS.2019.2924619
![]() |
[34] |
E. M. Newton, L. Sweeney, B. Malin, Preserving privacy by de-identifying face images, IEEE Trans. Knowl. Data Eng., 17 (2005), 232-243. https://doi.org/10.1109/TKDE.2005.32 doi: 10.1109/TKDE.2005.32
![]() |
[35] |
C. Xiang, C. Tang, Y. Cai, Q. Xu, Privacy-preserving face recognition with outsourced computation, Soft Comput., 20 (2016), 3735-3744. https://doi.org/10.1007/s00500-015-1759-5 doi: 10.1007/s00500-015-1759-5
![]() |
[36] | F. Tramer, A. Kurakin, N. Papernot, I. Goodfellow, D. Boneh, P. McDaniel, Ensemble adversarial training: attacks and defenses, preprint, arXiv: 1705.07204. |
[37] |
P. Terhorst, N. Damer, F. Kirchbuchner, A. Luijper, Unsupervised privacy-enhancement of face representations using similarity-sensitive noise transformations, Appl. Intell., 49 (2019), 3043-3060. https://doi.org/10.1007/s10489-019-01432-5 doi: 10.1007/s10489-019-01432-5
![]() |
[38] |
Y. Li, Y. Wang, D. Li, Privacy-preserving lightweight face recognition, Neurocomputing, 363 (2019), 212-222. https://doi.org/10.1016/j.neucom.2019.07.039 doi: 10.1016/j.neucom.2019.07.039
![]() |
[39] |
M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe, Privacy preserving face recognition utilizing differential privacy, Comput. Secur., 97 (2020), 101951. https://doi.org/10.1016/j.cose.2020.101951 doi: 10.1016/j.cose.2020.101951
![]() |
[40] |
Z. Kuang, Z. Guo, J. Fang, J. Yu, N. Babaguchi, J. Fan, Unnoticeable synthetic face replacement for image privacy protection, Neurocomputing, 457 (2021), 322-333. https://doi.org/10.1016/j.neucom.2021.06.061 doi: 10.1016/j.neucom.2021.06.061
![]() |
[41] | J. C. LIN, P. Fournier-Viger, L. Wu, W. Gan, Y. Djenouri, J. Zhang, PPSF: an open-source privacy-preserving and security mining framework, in 2018 IEEE International Conference on Data Mining Workshops (ICDMW), (2018), 1459-1463. https://doi.org/10.1109/ICDMW.2018.00208 |
[42] |
K. Zheng, J. Shen, G. Sun, H. Li, Y. Li, Shielding facial physiological information in video, Math. Biosci. Eng., 19 (2022), 5153-5168. https://doi.org/10.3934/mbe.2022241 doi: 10.3934/mbe.2022241
![]() |
[43] |
J. Lin, G. Srivastava, Y. Zhang, Y. Djenouri, M. Aloqaily, Privacy-preserving multiobjective sanitization model in 6G IoT environments, IEEE Internet Things J., 8 (2021), 5340-5349. https://doi.org/10.1109/JIOT.2020.3032896 doi: 10.1109/JIOT.2020.3032896
![]() |
[44] |
X. Wang, H. Xue, X. Liu, Q. Pei, A privacy-preserving edge computation-based face verification system for user authentication, IEEE Access, 7 (2019), 14186-14197. https://doi.org/10.1109/ACCESS.2019.2894535 doi: 10.1109/ACCESS.2019.2894535
![]() |
[45] | W. Shen, Z. Wu, J. Zhang, A face privacy protection algorithm based on block scrambling and deep learning, in Cloud Computing and Security, (2018), 359-369. https://doi.org/10.1007/978-3-030-00012-7_33 |
[46] | N. Damer, A. Opel, A. Shahverdyan, An overview on multi-biometric score-level fusion, in Proceedings of the 2nd International Conference on Pattern Recognition Applications and Methods (BTSA-2013), (2013), 647-653. https://doi.org/10.5220/0004358306470653 |
[47] | N. Damer, A. Opel, A. Nouak, Biometric source weighting in multi-biometric fusion: towards a generalized and robust solution, in 2014 22nd European Signal Processing Conference (EUSIPCO), (2014), 1382-1386. Available from: https://ieeexplore.ieee.org/abstract/document/6952496. |
[48] | N. Damer, F. Maul, C. Busch, Multi-biometric continuous authentication: a trust model for an asynchronous system, in 2016 19th International Conference on Information Fusion (FUSION), (2016), 2192-2199. Available from: https://ieeexplore.ieee.org/abstract/document/7528154. |
[49] | N. Damer, S. Zienert, Y. Wainakh, A. M. Saladié, F. Kirchbuchner, A. Kuijper, A multi-detector solution towards an accurate and generalized detection of face morphing attacks, in 2019 22th International Conference on Information Fusion (FUSION), (2019), 1-8. Available from: https://ieeexplore.ieee.org/abstract/document/9011378. |
[50] |
X. Zhang, C. Shi, X. Wang, X. Wu, X. Li, J. Lv, et al., Face inpainting based on GAN by facial prediction and fusion as guidance information, Appl. Soft Comput., 111 (2016), 107626. https://doi.org/10.1016/j.asoc.2021.107626 doi: 10.1016/j.asoc.2021.107626
![]() |
[51] | K. Simonyan, A. Zisserman, Very deep convolutional networks for large-scale image recognition, preprint, arXiv: 1409.1556. |
[52] | C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, et al., Intriguing properties of neural networks, preprint, arXiv: 1312.6199. |
[53] | R. Mutegeki, D. S. Han, Feature-representation transfer learning for human activity recognition, in 2019 International Conference on Information and Communication Technology Convergence (ICTC), (2019), 18-20. https://doi.org/10.1109/ICTC46691.2019.8939979 |
[54] |
Y. Li, M. Zhu, G. Sun, J. Chen, X. Zhu, J. Yang, Weakly supervised training for eye fundus lesion segmentation in patients with diabetic retinopathy, Math. Biosci. Eng., 19 (2022), 5293-5311. https://doi.org/10.3934/mbe.2022248 doi: 10.3934/mbe.2022248
![]() |
[55] |
M. Khishe, M. R. Mosavi, Chimp optimization algorithm, Expert Syst. Appl., 149 (2020), 113338. https://doi.org/10.1016/j.eswa.2020.113338 doi: 10.1016/j.eswa.2020.113338
![]() |
[56] |
C. Boesch, Cooperative hunting roles among taï chimpanzees, Hum. Nat., 13 (2002), 27-46. https://doi.org/10.1007/s12110-002-1013-6 doi: 10.1007/s12110-002-1013-6
![]() |
[57] |
J. M. Wu, J. C. Lin, P. Fournier-Viger, Y. Djenouri, C. Chen, Z. Li, The density-based clustering method for privacy-preserving data mining, Math. Biosci. Eng., 16 (2019), 1718-1728. https://doi.org/10.3934/mbe.2019082 doi: 10.3934/mbe.2019082
![]() |
[58] |
I. Aljarah, H. Faris, S. Mirjalili, Optimizing connection weights in neural networks using the whale optimization algorithm, Soft Comput., 22 (2018), 1-15. https://doi.org/10.1007/s00500-016-2442-1 doi: 10.1007/s00500-016-2442-1
![]() |
[59] | M. Pautov, G. Melnikov, E. Kaziakhmedov, K. Kireev, A. Petiushko, On adversarial patches: real-world attack on ArcFace-100 face recognition system, in 2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON), (2019), 0391-0396. https://doi.org/10.1109/SIBIRCON48586.2019.8958134 |
[60] | A. Radford, L. Metz, S. Chintala, Unsupervised representation learning with deep convolutional generative adversarial networks, preprint, arXiv: 1511.06434. |
[61] |
C. Sharma, A. Bagga, R. Sobti, M. Shabaz, R. Amin, A robust image encrypted watermarking technique for neurodegenerative disorder diagnosis and its applications, Comput. Math. Methods Med., 2021 (2021), 8081276. https://doi.org/10.1155/2021/8081276 doi: 10.1155/2021/8081276
![]() |
[62] |
Z. Liu, J. Li, J. Liu, Encrypted face recognition algorithm based on Ridgelet-DCT transform and THM chaos, Math. Biosci. Eng., 19 (2022), 1373-1387. https://doi.org/10.3934/mbe.2022063 doi: 10.3934/mbe.2022063
![]() |
[63] |
C. Wang, X. Wang, Z. Xia, C. Zhang, Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm, Inf. Sci., 470 (2019), 109-120. https://doi.org/10.1016/j.ins.2018.08.028 doi: 10.1016/j.ins.2018.08.028
![]() |
[64] | S. Komkov, A. Petiushko, AdvHat: Real-world adversarial attack on arcface face ID system, in 2020 25th International Conference on Pattern Recognition (ICPR), (2021), 819-826. https://doi.org/10.1109/ICPR48806.2021.9412236 |
[65] | B. Bortolato, M. Ivanovska, P. Rot, J. Križaj, P. Terhörst, N. Damer, et al., Learning privacy-enhancing face representations through feature disentanglement, in 2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020), (2020), 495-502. https://doi.org/10.1109/FG47880.2020.00007 |
[66] |
S. Li, F. Liu, J. Liang, Z. Cai, Z. Liang, Optimization of face recognition system based on azure IoT edge, Comput. Mater. Continua, 61 (2019), 1377-1389. https://doi.org/10.32604/cmc.2019.06402 doi: 10.32604/cmc.2019.06402
![]() |
[67] | G. Gamage, I. Sudasingha, I. Perera, D. Meedeniya, Reinstating Dlib correlation human trackers under occlusions in human detection based tracking, in 2018 18th International Conference on Advances in ICT for Emerging Regions (ICTer), (2018), 92-98. https://doi.org/10.1109/ICTER.2018.8615551 |
[68] |
P. Baldi, K. Hornik, Neural networks and principal component analysis: learning from examples without local minima, Neural Networks, 2 (1989), 53-58. https://doi.org/10.1016/0893-6080(89)90014-2 doi: 10.1016/0893-6080(89)90014-2
![]() |
[69] | P. Terhörst, M. Huber, N. Damer, P. Rot, F. Kirchbuchner, V. Struc, et al., Privacy evaluation protocols for the evaluation of soft-biometric privacy-enhancing technologies, in BIOSIG 2020 - Proceedings of the 19th International Conference of the Biometrics Special Interest Group, (2020), 215-222. http://dl.gi.de/handle/20.500.12116/34330 |
[70] |
K. Owusu-Agyemang, Z. Qin, A. Benjamin, H. Xiong, Z. Qin, Guaranteed distributed machine learning: privacy-preserving empirical risk minimization, Math. Biosci. Eng., 18 (2021), 4772-4796. https://doi.org/10.3934/mbe.2021243 doi: 10.3934/mbe.2021243
![]() |
[71] |
R. N. Abiram, P. Vincent, Identity preserving multi-pose facial expression recognition using fine tuned VGG on the latent space vector of generative adversarial network, Math. Biosci. Eng., 18 (2021), 3699-3717. https://doi.org/10.3934/mbe.2021186 doi: 10.3934/mbe.2021186
![]() |
1. | Siddhartha Kundu, Modeling ligand-macromolecular interactions as eigenvalue-based transition-state dissociation constants may offer insights into biochemical function of the resulting complexes, 2022, 19, 1551-0018, 13252, 10.3934/mbe.2022620 | |
2. | Siddhartha Kundu, ProTG4: A Web Server to Approximate the Sequence of a Generic Protein From an in Silico Library of Translatable G-Quadruplex (TG4)-Mapped Peptides, 2021, 15, 1177-9322, 117793222110458, 10.1177/11779322211045878 |
Rank | Codon set, Cardinality | Codon | γ | θ | δ | Ω | α=γ.θ.δ+Ω | aa |
1 | GGG, 1 | GGG | 0.02 | 1.00 | 6 | 2 | 2.1200 | Gly |
2 | GxG, 3 | GUG | 0.02 | 0.33 | 1 | 2 | 2.0066 | Val |
GCG | 0.02 | 0.33 | 1 | 2 | 2.0066 | Ala | ||
GAG | 0.02 | 0.33 | 1 | 2 | 2.0066 | Glu | ||
3 | xGG, 3 | UGG | 0.02 | 0.33 | 2 | 1 | 1.0132 | Trp |
CGG | 0.02 | 0.33 | 2 | 1 | 1.0132 | Arg | ||
AGG | 0.02 | 0.33 | 2 | 1 | 1.0132 | Arg | ||
3 | GGx, 3 | GGU | 0.02 | 0.33 | 2 | 1 | 1.0132 | Gly |
GGC | 0.02 | 0.33 | 2 | 1 | 1.0132 | Gly | ||
GGA | 0.02 | 0.33 | 2 | 1 | 1.0132 | Gly | ||
4 | xxG, 9 | UUG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Leu |
UCG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ser | ||
UAG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ter | ||
CUG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Leu | ||
CCG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Pro | ||
CAG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Gln | ||
AUG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Met | ||
ACG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Thr | ||
AAG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Lys | ||
4 | Gxx, 9 | GUU | 0.02 | 0.11 | 1 | 1 | 1.0022 | Val |
GCU | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ala | ||
GAU | 0.02 | 0.11 | 1 | 1 | 1.0022 | Asp | ||
GUC | 0.02 | 0.11 | 1 | 1 | 1.0022 | Val | ||
GCC | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ala | ||
GAC | 0.02 | 0.11 | 1 | 1 | 1.0022 | Asp | ||
GUA | 0.02 | 0.11 | 1 | 1 | 1.0022 | Val | ||
GCA | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ala | ||
GAA | 0.02 | 0.11 | 1 | 1 | 1.0022 | Glu | ||
5 | xGx, 9 | UGU | 0.02 | 0.11 | 0 | 0 | 0.0000 | Cys |
UGC | 0.02 | 0.11 | 0 | 0 | 0.0000 | Cys | ||
UGA | 0.02 | 0.11 | 0 | 0 | 0.0000 | Ter | ||
CGU | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
CGC | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
CGA | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
AGU | 0.02 | 0.11 | 0 | 0 | 0.0000 | Ser | ||
AGC | 0.02 | 0.11 | 0 | 0 | 0.0000 | Ser | ||
AGA | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
5 | xxx, 27 | UUU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Phe |
UCU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ser | ||
UAU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Tyr | ||
UUC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Phe | ||
UCC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ser | ||
UUA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
UCA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ser | ||
UAA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ter | ||
CUU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
CCU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Pro | ||
CAU | 0.02 | 0.04 | 0 | 0 | 0.0000 | His | ||
CUC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
CCC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Pro | ||
CAC | 0.02 | 0.04 | 0 | 0 | 0.0000 | His | ||
CUA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
CCA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Pro | ||
CAA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Gln | ||
AUU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ile | ||
ACU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Thr | ||
AAU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Asn | ||
AUC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ile | ||
ACC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Thr | ||
AAC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Asn | ||
AUA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ile | ||
ACA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Thr | ||
AAA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Lys |
aa | CODamino | gCOD+amino | β | |
Group 1 (n=7) | Ala | 4 | 4 | 1.00 |
Val | 4 | 4 | 1.00 | |
Asp | 2 | 2 | 1.00 | |
Glu | 2 | 2 | 1.00 | |
Trp | 1 | 1 | 1.00 | |
Met | 1 | 1 | 1.00 | |
Gly | 4 | 4 | 1.00 | |
Group 2 (n=7) | Leu | 6 | 2 | 0.3333 |
Gln | 2 | 1 | 0.5 | |
Arg | 6 | 2 | 0.3333 | |
Lys | 2 | 1 | 0.5 | |
Ser | 6 | 1 | 0.1667 | |
Thr | 4 | 1 | 0.25 | |
Pro | 4 | 1 | 0.25 | |
Group 3 (n=6) | Cys | 2 | 0 | 0.00 |
Asn | 2 | 0 | 0.00 | |
Ile | 3 | 0 | 0.00 | |
His | 2 | 0 | 0.00 | |
Phe | 2 | 0 | 0.00 | |
Tyr | 2 | 0 | 0.00 |
GENE | NAME | G4 (nt) | Ex | STOP(n=11) | VALID(n=59) | |PTG4| |
BACE1 | Beta-secretase 1 | 33 | 3 | n=0 | n=6 | n=2 |
BCL2 | B-cell lymphoma 2 | 33 | 2 | n=1 | n=6 | n=1 |
23 | n=0 | n=6 | ||||
28 | n=0 | n=6 | ||||
29 | n=1 | n=5 | ||||
34 | n=1 | n=5 | ||||
33 | 3 | n=2 | n=5 | |||
ESR1 | Estrogen receptor alpha (ERα) | 36 | 4 | n=1 | n=5 | n=2 |
KCNH2 | Potassium Voltage-Gated Channel sub family H | 18 | 12 | n=0 | n=0 | NA |
ZNF669 | Member 2 Zinc Finger Protein 669 |
1 | ||||
PRNP | Prion protein | 14 | 2 | n=0 | n=0 | n=1 |
15 | n=0 | n=0 | ||||
20 | n=0 | n=0 | ||||
24 | n=0 | n=6 | ||||
85 | n=6 | n=3 | ||||
TERF2 | Telomeric repeat-binding factor 2 | 55 | 1 | n=0 | n=6 | n=1 |
Disordered regions (IDRs; n=1445;0.00≤p-value < 0.05) | |||||||||||||||||
SL-PT- | SL-PT+ | SL+PT- | SL+PT+ | R1T | R2T | C1T | C2T | A (%) | P (%) | R (%) | |||||||
SLiMS1 | 1078 | 64 | 58 | 9 | 1142 | 67 | 1136 | 73 | 89.90 | 12.32 | 13.43 | ||||||
SLiMS2 | 749 | 18 | 121 | 29 | 767 | 150 | 870 | 47 | 84.84 | 61.70 | 19.33 | ||||||
SLiMS3 | 1212 | 108 | 34 | 9 | 1320 | 43 | 1246 | 117 | 89.58 | 7.69 | 20.93 | ||||||
Proteins with disordered segments (IDPs; n=800;0.00≤p-value < 0.05) | |||||||||||||||||
SL-PT- | SL-PT+ | SL+PT- | SL+PT+ | R1T | R2T | C1T | C2T | A (%) | P (%) | R (%) | |||||||
SLiMS1 | 86 | 12 | 28 | 18 | 98 | 46 | 114 | 30 | 72.22 | 60.00 | 39.10 | ||||||
SLiMS2 | 1 | 1 | 96 | 66 | 2 | 162 | 97 | 67 | 40.85 | 98.50 | 40.74 | ||||||
SLiMS3 | 250 | 57 | 26 | 25 | 307 | 51 | 276 | 82 | 76.81 | 30.48 | 49.01 |
SLiMS | Sample | (zn)n≥2∈pTG4ij∩SLiMSw (p-value) | |
SLiMS1=[ST]PzR | Pz | PG (n=1) | PG (Degenerate) |
SLiMS2=[ED]zzD[AGS] | z[DE] | G[DE] (n=2) | [WGRVAELMKQSTP][AG][DE]z2EG[VADE](p-value=0.00069) |
[DE]z | [DE]G (n=1) | ||
zz[DE] | [LMKQSTP]G[DE] (n=14) [VAE]G[DE] (n=6) [WGR][AG][DE] (n=6) |
||
[DE]zz[DE] | [VAE]G[DE]zzEG[VADE] (n=28) [WGR][AG][DE]zzEG[VADE] (n=24) [WGR][AG][DE]zzEG (n=6) GEzzEG[VADE] (n=4) GEzzEG (n=1) |
||
SLiMS3=[KR]zPzzP | Pzz | PG[VADE] (n=4) | PGV (Degenerate) PGA (Degenerate) PGD (Degenerate) PGE (Degenerate) |
Cellular function | Disordered regions of proteins | |
1. | Signal transduction | DP00274, DP00224, DP00141, DP00332, DP01063, DP00506, DP00418, DP00341, DP00435, DP00613, DP00463, DP00954, DP00959, DP01104, DP00611, DP00519, DP00086, DP00707, DP00712 |
2. | Endocytosis | DP01073, DP01065, DP01066, DP00225 |
3. | Calcium-calmodulin | DP00092, DP00132, DP00561, DP00118, DP00253 |
4. | Myofibril assembly | DP01090 |
5. | Cytoskeleton | DP01056 DP00240, DP01022, DP00169, DP00716, DP00717, DP01100, DP00122 |
6. | Nuclear pore | DP01075, DP01077, DP01079 |
7. | Phototransduction | DP00768, DP00347 |
8. | Targeting | DP00893, DP00609, DP00610, DP01058 |
9. | Transcription | DP00062, DP00177, DP00633, DP00348, DP00786, DP00049, DP00231, DP00873, DP00720, DP00217, DP00081 |
10. | Translation | DP00082, DP00164, DP00229 DP00949, DP00134 |
11. | Synaptic transmission | DP00943 |
12. | Supercoiling | DP00076 |
13. | Binding | DP00539, DP00854, DP01052, DP00659, DP00656 |
14. | Peptide bond formation | DP00944 |
15. | Enzymes | DP00557, DP00032, DP00095, DP00337, DP00379, DP00787, DP00427, DP00429 |
16. | Bacterial/parasitic virulence | |
Secreted toxins | DP00345, DP00591 | |
Cytoadherence | DP00025, DP00065, DP01096 | |
17. | Viral infectivity | |
Cyclophilin interaction | DP00615, DP01031 | |
Chaperones | DP00699, DP00700, DP00674 | |
Capsid assembly | DP00133, DP00876 | |
Membrane fusion | DP01043 | |
Latency | DP01060 | |
18. | Unknown | DP00119 |
Rank | Codon set, Cardinality | Codon | γ | θ | δ | Ω | α=γ.θ.δ+Ω | aa |
1 | GGG, 1 | GGG | 0.02 | 1.00 | 6 | 2 | 2.1200 | Gly |
2 | GxG, 3 | GUG | 0.02 | 0.33 | 1 | 2 | 2.0066 | Val |
GCG | 0.02 | 0.33 | 1 | 2 | 2.0066 | Ala | ||
GAG | 0.02 | 0.33 | 1 | 2 | 2.0066 | Glu | ||
3 | xGG, 3 | UGG | 0.02 | 0.33 | 2 | 1 | 1.0132 | Trp |
CGG | 0.02 | 0.33 | 2 | 1 | 1.0132 | Arg | ||
AGG | 0.02 | 0.33 | 2 | 1 | 1.0132 | Arg | ||
3 | GGx, 3 | GGU | 0.02 | 0.33 | 2 | 1 | 1.0132 | Gly |
GGC | 0.02 | 0.33 | 2 | 1 | 1.0132 | Gly | ||
GGA | 0.02 | 0.33 | 2 | 1 | 1.0132 | Gly | ||
4 | xxG, 9 | UUG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Leu |
UCG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ser | ||
UAG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ter | ||
CUG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Leu | ||
CCG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Pro | ||
CAG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Gln | ||
AUG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Met | ||
ACG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Thr | ||
AAG | 0.02 | 0.11 | 1 | 1 | 1.0022 | Lys | ||
4 | Gxx, 9 | GUU | 0.02 | 0.11 | 1 | 1 | 1.0022 | Val |
GCU | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ala | ||
GAU | 0.02 | 0.11 | 1 | 1 | 1.0022 | Asp | ||
GUC | 0.02 | 0.11 | 1 | 1 | 1.0022 | Val | ||
GCC | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ala | ||
GAC | 0.02 | 0.11 | 1 | 1 | 1.0022 | Asp | ||
GUA | 0.02 | 0.11 | 1 | 1 | 1.0022 | Val | ||
GCA | 0.02 | 0.11 | 1 | 1 | 1.0022 | Ala | ||
GAA | 0.02 | 0.11 | 1 | 1 | 1.0022 | Glu | ||
5 | xGx, 9 | UGU | 0.02 | 0.11 | 0 | 0 | 0.0000 | Cys |
UGC | 0.02 | 0.11 | 0 | 0 | 0.0000 | Cys | ||
UGA | 0.02 | 0.11 | 0 | 0 | 0.0000 | Ter | ||
CGU | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
CGC | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
CGA | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
AGU | 0.02 | 0.11 | 0 | 0 | 0.0000 | Ser | ||
AGC | 0.02 | 0.11 | 0 | 0 | 0.0000 | Ser | ||
AGA | 0.02 | 0.11 | 0 | 0 | 0.0000 | Arg | ||
5 | xxx, 27 | UUU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Phe |
UCU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ser | ||
UAU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Tyr | ||
UUC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Phe | ||
UCC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ser | ||
UUA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
UCA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ser | ||
UAA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ter | ||
CUU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
CCU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Pro | ||
CAU | 0.02 | 0.04 | 0 | 0 | 0.0000 | His | ||
CUC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
CCC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Pro | ||
CAC | 0.02 | 0.04 | 0 | 0 | 0.0000 | His | ||
CUA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Leu | ||
CCA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Pro | ||
CAA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Gln | ||
AUU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ile | ||
ACU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Thr | ||
AAU | 0.02 | 0.04 | 0 | 0 | 0.0000 | Asn | ||
AUC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ile | ||
ACC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Thr | ||
AAC | 0.02 | 0.04 | 0 | 0 | 0.0000 | Asn | ||
AUA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Ile | ||
ACA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Thr | ||
AAA | 0.02 | 0.04 | 0 | 0 | 0.0000 | Lys |
aa | CODamino | gCOD+amino | β | |
Group 1 (n=7) | Ala | 4 | 4 | 1.00 |
Val | 4 | 4 | 1.00 | |
Asp | 2 | 2 | 1.00 | |
Glu | 2 | 2 | 1.00 | |
Trp | 1 | 1 | 1.00 | |
Met | 1 | 1 | 1.00 | |
Gly | 4 | 4 | 1.00 | |
Group 2 (n=7) | Leu | 6 | 2 | 0.3333 |
Gln | 2 | 1 | 0.5 | |
Arg | 6 | 2 | 0.3333 | |
Lys | 2 | 1 | 0.5 | |
Ser | 6 | 1 | 0.1667 | |
Thr | 4 | 1 | 0.25 | |
Pro | 4 | 1 | 0.25 | |
Group 3 (n=6) | Cys | 2 | 0 | 0.00 |
Asn | 2 | 0 | 0.00 | |
Ile | 3 | 0 | 0.00 | |
His | 2 | 0 | 0.00 | |
Phe | 2 | 0 | 0.00 | |
Tyr | 2 | 0 | 0.00 |
GENE | NAME | G4 (nt) | Ex | STOP(n=11) | VALID(n=59) | |PTG4| |
BACE1 | Beta-secretase 1 | 33 | 3 | n=0 | n=6 | n=2 |
BCL2 | B-cell lymphoma 2 | 33 | 2 | n=1 | n=6 | n=1 |
23 | n=0 | n=6 | ||||
28 | n=0 | n=6 | ||||
29 | n=1 | n=5 | ||||
34 | n=1 | n=5 | ||||
33 | 3 | n=2 | n=5 | |||
ESR1 | Estrogen receptor alpha (ERα) | 36 | 4 | n=1 | n=5 | n=2 |
KCNH2 | Potassium Voltage-Gated Channel sub family H | 18 | 12 | n=0 | n=0 | NA |
ZNF669 | Member 2 Zinc Finger Protein 669 |
1 | ||||
PRNP | Prion protein | 14 | 2 | n=0 | n=0 | n=1 |
15 | n=0 | n=0 | ||||
20 | n=0 | n=0 | ||||
24 | n=0 | n=6 | ||||
85 | n=6 | n=3 | ||||
TERF2 | Telomeric repeat-binding factor 2 | 55 | 1 | n=0 | n=6 | n=1 |
Disordered regions (IDRs; n=1445;0.00≤p-value < 0.05) | |||||||||||||||||
SL-PT- | SL-PT+ | SL+PT- | SL+PT+ | R1T | R2T | C1T | C2T | A (%) | P (%) | R (%) | |||||||
SLiMS1 | 1078 | 64 | 58 | 9 | 1142 | 67 | 1136 | 73 | 89.90 | 12.32 | 13.43 | ||||||
SLiMS2 | 749 | 18 | 121 | 29 | 767 | 150 | 870 | 47 | 84.84 | 61.70 | 19.33 | ||||||
SLiMS3 | 1212 | 108 | 34 | 9 | 1320 | 43 | 1246 | 117 | 89.58 | 7.69 | 20.93 | ||||||
Proteins with disordered segments (IDPs; n=800;0.00≤p-value < 0.05) | |||||||||||||||||
SL-PT- | SL-PT+ | SL+PT- | SL+PT+ | R1T | R2T | C1T | C2T | A (%) | P (%) | R (%) | |||||||
SLiMS1 | 86 | 12 | 28 | 18 | 98 | 46 | 114 | 30 | 72.22 | 60.00 | 39.10 | ||||||
SLiMS2 | 1 | 1 | 96 | 66 | 2 | 162 | 97 | 67 | 40.85 | 98.50 | 40.74 | ||||||
SLiMS3 | 250 | 57 | 26 | 25 | 307 | 51 | 276 | 82 | 76.81 | 30.48 | 49.01 |
SLiMS | Sample | (zn)n≥2∈pTG4ij∩SLiMSw (p-value) | |
SLiMS1=[ST]PzR | Pz | PG (n=1) | PG (Degenerate) |
SLiMS2=[ED]zzD[AGS] | z[DE] | G[DE] (n=2) | [WGRVAELMKQSTP][AG][DE]z2EG[VADE](p-value=0.00069) |
[DE]z | [DE]G (n=1) | ||
zz[DE] | [LMKQSTP]G[DE] (n=14) [VAE]G[DE] (n=6) [WGR][AG][DE] (n=6) |
||
[DE]zz[DE] | [VAE]G[DE]zzEG[VADE] (n=28) [WGR][AG][DE]zzEG[VADE] (n=24) [WGR][AG][DE]zzEG (n=6) GEzzEG[VADE] (n=4) GEzzEG (n=1) |
||
SLiMS3=[KR]zPzzP | Pzz | PG[VADE] (n=4) | PGV (Degenerate) PGA (Degenerate) PGD (Degenerate) PGE (Degenerate) |
Cellular function | Disordered regions of proteins | |
1. | Signal transduction | DP00274, DP00224, DP00141, DP00332, DP01063, DP00506, DP00418, DP00341, DP00435, DP00613, DP00463, DP00954, DP00959, DP01104, DP00611, DP00519, DP00086, DP00707, DP00712 |
2. | Endocytosis | DP01073, DP01065, DP01066, DP00225 |
3. | Calcium-calmodulin | DP00092, DP00132, DP00561, DP00118, DP00253 |
4. | Myofibril assembly | DP01090 |
5. | Cytoskeleton | DP01056 DP00240, DP01022, DP00169, DP00716, DP00717, DP01100, DP00122 |
6. | Nuclear pore | DP01075, DP01077, DP01079 |
7. | Phototransduction | DP00768, DP00347 |
8. | Targeting | DP00893, DP00609, DP00610, DP01058 |
9. | Transcription | DP00062, DP00177, DP00633, DP00348, DP00786, DP00049, DP00231, DP00873, DP00720, DP00217, DP00081 |
10. | Translation | DP00082, DP00164, DP00229 DP00949, DP00134 |
11. | Synaptic transmission | DP00943 |
12. | Supercoiling | DP00076 |
13. | Binding | DP00539, DP00854, DP01052, DP00659, DP00656 |
14. | Peptide bond formation | DP00944 |
15. | Enzymes | DP00557, DP00032, DP00095, DP00337, DP00379, DP00787, DP00427, DP00429 |
16. | Bacterial/parasitic virulence | |
Secreted toxins | DP00345, DP00591 | |
Cytoadherence | DP00025, DP00065, DP01096 | |
17. | Viral infectivity | |
Cyclophilin interaction | DP00615, DP01031 | |
Chaperones | DP00699, DP00700, DP00674 | |
Capsid assembly | DP00133, DP00876 | |
Membrane fusion | DP01043 | |
Latency | DP01060 | |
18. | Unknown | DP00119 |