Preview

Algorithym

Powerful Essays
Open Document
Open Document
6418 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Algorithym
Informatica 30 (2006) 357–364 357

A Three-Phase Algorithm for Computer Aided siRNA Design
Hong Zhou
Saint Joseph College, West Hartford, CT 06117, USA hzhou@sjc.edu Xiao Zeng
Superarray Bioscience Corporation, 7320 Executive Way, Frederick, MD 21704, USA xzeng@superarray.net Yufang Wang and Benjamin Ray Seyfarth
University of Southern Mississippi, Hattiesburg, MS 39406, USA
Keywords: siRNA, RNA interference, three-phase, Smith-Waterman, BLAST
Received: July 10, 2005

As our knowledge of RNA interference accumulates, it is desirable to incorporate as many selection rules as possible into a computer-aided siRNA-designing tool. This paper presents an algorithm for siRNA selection in which nearly all published siRNA-designing rules are categorized into three groups and applied in three phases according to their identified impact on siRNA function. This tool provides users with the maximum flexibility to adjust each rule and reorganize them in the three phases based on users’ own preferences and/or empirical data. When the generally accepted stringency was set to select siRNA for 23,484 human genes represented in the RefSeq Database (NCBI, human genome build 35.1), we found 1,915 protein-coding genes (8.2%) for which none suitable siRNA sequences can be found.
Curiously, among these 1,915 genes, two had validated siRNA sequences published. After close examination of another 105 published human siRNA sequences, we conclude that (A) many of the published siRNA sequences may not be the best for their target genes; (B) some of the published siRNA may risk off-target silencing; and (C) some published rules have to be compromised in order to select a testable siRNA sequence for the hard-to-design genes.
Povzetek: Predstavljen je algoritem za obdelovanje genoma.

1

Introduction

Since the seminal paper published by Craig C. Mello’s group in 1998 [1], RNA interference (RNAi) has emerged as a powerful technique to knock out/down the



References: 5, 2002 2002. 362 Informatica 30 (2006) 357–364

You May Also Find These Documents Helpful

Related Topics