|
|
(47 intermediate revisions by 5 users not shown) |
Line 1: |
Line 1: |
| {{Groningen}} | | {{Groningen}} |
| <html> | | <html> |
| + | <style> |
| + | h3{ |
| + | background-repeat: no-repeat; |
| + | padding-left: 35px; |
| + | background-size: 30px 30px; |
| + | background-position: left center !important; |
| + | } |
| + | h3:before{ |
| + | content: "" !important; |
| + | } |
| + | |
| + | .apps{ |
| + | background-image: url("https://static.igem.org/mediawiki/2016/6/62/T--Groningen--tour-spore-nokey.png") !important; |
| + | } |
| + | .crypt{ |
| + | background-image: url("https://static.igem.org/mediawiki/2016/a/a1/T--Groningen--Design-1.png") !important; |
| + | } |
| + | .integrate{ |
| + | background-image: url("https://static.igem.org/mediawiki/2016/0/0d/T--Groningen--logo-bacilli.png") !important; |
| + | } |
| + | .transmit{ |
| + | background-image: url("https://static.igem.org/mediawiki/2016/c/c7/T--Groningen--tour-plaine.png") !important; |
| + | } |
| + | .treat{ |
| + | background-image: url("https://static.igem.org/mediawiki/2016/thumb/f/f2/T--Groningen--Tour-mediumalivesquare.png/240px-T--Groningen--Tour-mediumalivesquare.png") !important; |
| + | } |
| + | .model{ |
| + | background-image: url("https://static.igem.org/mediawiki/2016/6/62/T--Groningen--tour-spore-nokey.png") !important; |
| + | } |
| + | </style> |
| <article> | | <article> |
| <section> | | <section> |
Line 6: |
Line 36: |
| | | |
| <p>We designed a novel and safe data storage and transmission | | <p>We designed a novel and safe data storage and transmission |
− | system by combining digital and biological safety. The system | + | system by combining digital and biological safety precautions. The system |
| consists of the data which is to be transmitted or preserved, | | consists of the data which is to be transmitted or preserved, |
| further called: the message, and a key to the message. The key | | further called: the message, and a key to the message. The key |
Line 12: |
Line 42: |
| is encrypted and thereby protected by the digital key, the key | | is encrypted and thereby protected by the digital key, the key |
| itself also needs protection. Therefore we developed a system of | | itself also needs protection. Therefore we developed a system of |
− | different biological safety layers. Our system CryptoGErM is an | + | different biological safety layers. Our CryptoGErM system is an |
| unhackable bioencryption system. Even if cyber criminals would | | unhackable bioencryption system. Even if cyber criminals would |
| intercept the system, they would not be able to get their hands on | | intercept the system, they would not be able to get their hands on |
Line 20: |
Line 50: |
| biological procedure that has to be applied in order to access the | | biological procedure that has to be applied in order to access the |
| key.</p> | | key.</p> |
− | </section> | + | |
| + | <video controls preload="metadata"> |
| + | <source src="https://static.igem.org/mediawiki/2016/d/dc/T--Groningen--Design-spygem.mp4" /> |
| + | </video> |
| + | |
| + | <figcaption>Watch this animation to learn about the CryptoGErM system!</figcaption> |
| + | |
| + | </section> |
| <section> | | <section> |
− | <h3>Applications:</h3> | + | <h3 class="apps">Applications:</h3> |
| | | |
| <p>CryptoGErM has three main possibilities of application. Short | | <p>CryptoGErM has three main possibilities of application. Short |
Line 44: |
Line 81: |
| </section> | | </section> |
| <section> | | <section> |
− | <h3>Encryption and Conversion</h3> | + | <h3 class="crypt">Encryption and Conversion</h3> |
| | | |
− | <p>The message that is to be send and stored is being encrypted | + | <p>The message that is to be sent and stored is encrypted |
− | using the Rijndael algorithm which is an encryption algorithm. This | + | using the Rijndael algorithm. This |
− | means encoding the message so only an authorized person can read | + | means the message is encoded so only an authorized person can read |
| it. The plain text is being converted to cipher text. In this state | | it. The plain text is being converted to cipher text. In this state |
| the message cannot be read. The algorithm requires a key for the | | the message cannot be read. The algorithm requires a key for the |
Line 67: |
Line 104: |
| adds header and footer sequences to the message and key sequences | | adds header and footer sequences to the message and key sequences |
| for the recipient to be able to recover key and message from the | | for the recipient to be able to recover key and message from the |
− | full genome.</p> | + | full genome. Figure 1 shows a conversion table of text to the ASCII code, to binary and to DNA.</p> |
| | | |
| <p>The work with BioBricks requires some reserved sequences like | | <p>The work with BioBricks requires some reserved sequences like |
Line 144: |
Line 181: |
| </div> | | </div> |
| | | |
− | <figcaption>Conversion from text to DNA</figcaption> | + | <figcaption>Figure 1. Conversion from text to DNA</figcaption> |
| </figure> | | </figure> |
− | | + | <ul class="linkylist"> |
− | <p><a href="/Team:Groningen/Software">Learn more about our software</a></p> | + | <li><a href="/Team:Groningen/Software">Learn more about our software</a></li> |
| + | </ul> |
| </section> | | </section> |
| <section> | | <section> |
− | <h3>Integration:</h3> | + | <h3 class="integrate">Integration:</h3> |
| | | |
| <p>Our original message and our key have been converted into DNA | | <p>Our original message and our key have been converted into DNA |
| sequences. Synthesizing DNA is possible at constantly decreasing | | sequences. Synthesizing DNA is possible at constantly decreasing |
− | costs (reference). Data in DNA format has many advantages. The | + | costs <sup id="ref-1"><a href="#cite-1">[1]</a></sup>.</p> |
| + | |
| + | <p>Data in DNA format has many advantages. The |
| right choice of organism can deliver even more advantages. We | | right choice of organism can deliver even more advantages. We |
− | choose <em>Bacillus subtilis.</em> It is not pathogenic for humans, it is | + | chose <em>Bacillus subtilis.</em> It is not pathogenic for humans, it is |
| naturally competent and a well-researched model-organism. On top of | | naturally competent and a well-researched model-organism. On top of |
| all that it can form highly resistant endospores. Viable spores of | | all that it can form highly resistant endospores. Viable spores of |
− | <em>B. subtilis</em> could be recovered from a several million year old salt | + | <em>B. subtilis</em> could be recovered from a 250 million year old salt |
− | crystal (reference). What else could we wish for as a highly safe | + | crystal <sup id="ref-2"><a href="#cite-2">[2]</a></sup>. What else could we wish for as a highly safe |
| storage and transmission system? The sequences of key and message | | storage and transmission system? The sequences of key and message |
| are being integrated into the genome of two different <em>B. subtilis</em> | | are being integrated into the genome of two different <em>B. subtilis</em> |
| strains by making use of the <a href="http://parts.igem.org/Part:BBa_K823023">BBa_K823023</a> <em>B. subtilis</em> integration | | strains by making use of the <a href="http://parts.igem.org/Part:BBa_K823023">BBa_K823023</a> <em>B. subtilis</em> integration |
− | vector which integrates into the amyE locus. Like this they can be | + | vector which integrates into the amyE locus. A scheme of the integration process is shown in Figure 3 and the sequences integrated in the plasmid is visible in figure 3. Like this they can be |
| shipped or stored separately what makes interception of our system | | shipped or stored separately what makes interception of our system |
| for unauthorized parties even harder. Genomic integration of both | | for unauthorized parties even harder. Genomic integration of both |
| message and key is safer than plasmid integration because the | | message and key is safer than plasmid integration because the |
| relevant sequences are hidden in a full genome. Whole genome | | relevant sequences are hidden in a full genome. Whole genome |
− | sequencing is more elaborated than sequencing of plasmid. | + | sequencing is more elaborated than sequencing of plasmid, |
− | Especially if unauthorized parties don’t know what they are looking | + | especially if unauthorized parties don’t know what they are looking |
| for.</p> | | for.</p> |
| | | |
− | <figure class="split"> | + | <figure> |
− | <div class="left flone"><img src="https://static.igem.org/mediawiki/2016/5/5f/T--Groningen---Design---message_in_cell-.png" /></div> | + | <img src="https://static.igem.org/mediawiki/2016/a/aa/T--Groningen--Workflow2-wit.png" /> |
− | <div class="right flone"><img src="https://static.igem.org/mediawiki/2016/e/ef/T--Groningen---Design---messageBB-.png" /></div>
| + | |
| </figure> | | </figure> |
| + | |
| + | <figcaption>Figure 2. Workflow of the integration of message and key into the genomic DNA of <em>Bacillus subtilis</em>.</figcaption> |
| + | |
| + | <div class="split"> |
| + | <figure class="cycler left flone"> |
| + | <img class="active base dark" src="https://static.igem.org/mediawiki/2016/5/5f/T--Groningen---Design---message_in_cell-.png" /> |
| + | <img class="dark" src="https://static.igem.org/mediawiki/2016/e/ef/T--Groningen---Design---messageBB-.png" /> |
| + | </figure> |
| + | |
| + | <figure class="cycler right flone"> |
| + | <img class="active base dark" src="https://static.igem.org/mediawiki/2016/b/b4/T--Groningen---Design---keybacillusnew-.png" /> |
| + | <img class="dark" src="https://static.igem.org/mediawiki/2016/2/25/T--Groningen---Design---KeyBB-.png" /> |
| + | </figure> |
| + | |
| + | </div> |
| + | <p></p> |
| + | <figcaption>Figure 3. Sequences of message (<a href="http://parts.igem.org/Part:BBa_K1930001">BBa_K1930001</a>) and key (<a href="http://parts.igem.org/Part:BBa_K1930000">BBa_K1930000</a>) integrated into the <em>amyE</em> locus of the genomic DNA of <em>B. subtilis</em>.</figcaption> |
| + | |
| | | |
− | <figure class="split">
| |
− | <div class="left flone"><img src="https://static.igem.org/mediawiki/2016/b/b4/T--Groningen---Design---keybacillusnew-.png" /></div>
| |
− | <div class="right flone"><img src="https://static.igem.org/mediawiki/2016/2/25/T--Groningen---Design---KeyBB-.png" /></div>
| |
− | </figure>
| |
| | | |
| <ul class="linkylist"> | | <ul class="linkylist"> |
Line 187: |
Line 240: |
| advantages of using DNA and bacteria for data storage</a></li> | | advantages of using DNA and bacteria for data storage</a></li> |
| | | |
− | <li><a href="/Team:Groningen/Experiments">Learn more about the | + | <li><a href="/Team:Groningen/Proof">Learn more about the |
− | integration of the message sequence into the <em>B. subtilis</em> | + | integration of the sequences in to the <em>B. subtilis</em> |
| genome</a></li> | | genome</a></li> |
| | | |
− | <li><a href="/Team:Groningen/Experiments">Learn more about the | + | <li><a href="/Team:Groningen/PlasmidConstruction">Learn more |
− | integration of the key sequence into the <em>B. subtilis</em> | + | about the plasmid construction</a></li> |
− | genome</a></li>
| + | |
| </ul> | | </ul> |
| </section> | | </section> |
| <section> | | <section> |
− | <h3>Transmission</h3> | + | <h3 class="transmit">Transmission</h3> |
| | | |
| <p>Spores are highly stable at room temperature and they don’t | | <p>Spores are highly stable at room temperature and they don’t |
| require and nutrients. The can stay in a test tube for weeks. This | | require and nutrients. The can stay in a test tube for weeks. This |
− | grants enough time to send them to any spot on the Earth. And who | + | grants enough time to send them to any spot on Earth. And who |
| would suspect highly secret data in a tiny amount of colorless | | would suspect highly secret data in a tiny amount of colorless |
− | liquid in a reaction tube?</p> | + | liquid in a reaction tube? A scheme of sporulation and shipping can seen in Figure 4.</p> |
| | | |
| <ul class="linkylist"> | | <ul class="linkylist"> |
Line 209: |
Line 261: |
| term storage of spores</a></li> | | term storage of spores</a></li> |
| </ul> | | </ul> |
| + | |
| + | |
| + | <figure> |
| + | <img src="https://static.igem.org/mediawiki/2016/d/d7/T--Groningen--Workflow3-wit2.png" /> |
| + | </figure> |
| + | |
| + | |
| + | <figcaption>Figure 4: <em>Bacillus subtilis</em> forms highly resistant endospores which can easily be shipped.</figcaption> |
| + | |
| + | |
| </section> | | </section> |
| <section> | | <section> |
− | <h3>Treatment</h3> | + | <h3 class="treat">Treatment</h3> |
| | | |
| <p>After the different spores, containing key and message, have | | <p>After the different spores, containing key and message, have |
| arrived at the recipient the key has to be recovered. Only with the | | arrived at the recipient the key has to be recovered. Only with the |
| key it is possible to decode the message in the genome of the | | key it is possible to decode the message in the genome of the |
− | message-spores. </p> | + | message-spores. As visible in Figure 5, the spores have to recieve the right treatment during germination, otherwise the key sequence cannot be recovered.</p> |
| | | |
| + | <!-- <p><img src="https://static.igem.org/mediawiki/2016/0/05/T--Groningen--Bacilluspinkwithstuff2.png" /></p> --> |
| | | |
− | <p><img src="https://static.igem.org/mediawiki/2016/0/05/T--Groningen--Bacilluspinkwithstuff2.png" /></p> | + | <div class="split"> |
− |
| + | <figure class="left flone"> |
− | | + | <img src="https://static.igem.org/mediawiki/2016/8/8e/T--Groningen--tour-medium2.png" /> |
− | | + | |
− | | + | <figcaption>Figure 5: Medium with spores</figcaption> |
− | | + | </figure> |
| + | <figure class="left flone"> |
| + | <img src="https://static.igem.org/mediawiki/2016/0/03/T--Groningen--tour-mediumdead.png" /> |
| + | |
| + | <figcaption>Wrong treatment: spores died & key lost <strong>forever</strong></figcaption> |
| + | </figure> |
| + | <figure class="right flone"> |
| + | <img src="https://static.igem.org/mediawiki/2016/6/6e/T--Groningen--tour-mediumalive.png" /> |
| + | |
| + | <figcaption>Right treatment: CryptoGErM lives</figcaption> |
| + | </figure> |
| + | </div> |
| | | |
| <h4>1. Decoy key hiding</h4> | | <h4>1. Decoy key hiding</h4> |
Line 237: |
Line 311: |
| recovery. Even better: This resistance cassette also provides | | recovery. Even better: This resistance cassette also provides |
| resistance against spirofloxacin which is a conjugate of the | | resistance against spirofloxacin which is a conjugate of the |
− | regular antibiotic ciprofloxacin and a spiropyrin photoswitch. In | + | regular antibiotic ciprofloxacin and a spiropyran photoswitch. In |
− | case of using the photoswitchable antibiotic, spirofloxacin, in its | + | case of using the photoswitchable antibiotic, spirofloxacin (in its |
− | inactivated state, could be already added to the spore mixture. The | + | inactivated state) could be already added to the spore mixture. The |
− | recipient simply has to activate it by shining UV light of the | + | recipient simply has to activate it by shining light of the |
| right wavelength on it.</p> | | right wavelength on it.</p> |
| | | |
− | <p>To design a qnrS1 resistance cassette BioBrick we designed a | + | <p>To design a <em>qnrS1</em> resistance cassette BioBrick we designed a |
| gBlock that contains the <em>Bacillus subtilis</em> promoter PatpI, which is | | gBlock that contains the <em>Bacillus subtilis</em> promoter PatpI, which is |
| active from a very early stage of germination and includes a | | active from a very early stage of germination and includes a |
− | ribosome binding site. The gBlock also contains the original qnrS1 | + | ribosome binding site. The gBlock also contains the original <em>qnrS1 </em> |
| gene sequence from <em>E. coli</em>, the double terminator <a href="http://parts.igem.org/Part:BBa_B0015">BBa_B0015</a> from | | gene sequence from <em>E. coli</em>, the double terminator <a href="http://parts.igem.org/Part:BBa_B0015">BBa_B0015</a> from |
− | iGEM as well as the prefix and suffix for BioBricks. The qnrS1 | + | iGEM as well as the prefix and suffix for BioBricks. The <em>qnrS1</em> |
| resistance cassette was integrated into the amyE locus of the <em>B. | | resistance cassette was integrated into the amyE locus of the <em>B. |
| subtilis</em> genome using the <a href="http://parts.igem.org/Part:BBa_K823023">BBa_K823023</a> <em>B. subtilis</em> integration | | subtilis</em> genome using the <a href="http://parts.igem.org/Part:BBa_K823023">BBa_K823023</a> <em>B. subtilis</em> integration |
− | vector.</p> | + | vector. The <em>qnrS1</em> plasmid and the selection process of the key-containing spores from the decoy can be seen in Figure 6.</p> |
| | | |
− | <figure> | + | <div class="centrate"> |
− | <img src="https://static.igem.org/mediawiki/2016/d/d9/T--Groningen---Design---qnrs1BB-.png" /> | + | <figure class="cycler"> |
− | </figure>
| + | <!-- |
− | | + | <img class="dark" src="https://static.igem.org/mediawiki/2016/thumb/4/4c/T--Groningen---Design---decoy-.png/694px-T--Groningen---Design---decoy-.png" /> |
− | <figure> | + | <img class="dark base" src="https://static.igem.org/mediawiki/2016/thumb/c/cd/T--Groningen--Add_cipro_then_spores_die_copia2.png/694px-T--Groningen--Add_cipro_then_spores_die_copia2.png" />--> |
− | <img src="https://static.igem.org/mediawiki/2016/4/4c/T--Groningen---Design---decoy-.png" /> | + | <img class="dark active" src="https://static.igem.org/mediawiki/2016/d/d9/T--Groningen---Design---qnrs1BB-.png" /> |
− | </figure>
| + | <img class="dark" src="https://static.igem.org/mediawiki/2016/4/4c/T--Groningen---Design---decoy-.png" /> |
− | | + | <img class="dark base" src="https://static.igem.org/mediawiki/2016/c/cd/T--Groningen--Add_cipro_then_spores_die_copia2.png" /> |
− | <figure>
| + | </figure><p></p> |
− | <img src="https://static.igem.org/mediawiki/2016/c/cd/T--Groningen--Add_cipro_then_spores_die_copia2.png" /> | + | <figcaption>Figure 6. The <em>qnrS1</em> resistance cassette (<a href="http://parts.igem.org/Part:BBa_K1930007">BBa_K1930007</a>) is integrated into the <em>amyE</em> locus of the <em>B. subtilis</em> genome. Addition of the antibiotic ciprofloxacin will enable selection of the key-containing spores from the decoy.</figcaption> |
− | </figure> | + | </div> |
− | | + | |
| | | |
| <p>For testing the efficiency of the selection of the correct key | | <p>For testing the efficiency of the selection of the correct key |
| spores from the decoy a superfolder GFP was integrated into the | | spores from the decoy a superfolder GFP was integrated into the |
− | genome of the key spores. Via microscopy and flow cytometry the | + | genome of the key spores. This can be seen in figure 7. Via microscopy and flow cytometry the |
| selection efficiency could be observed. The superfolder GFP was | | selection efficiency could be observed. The superfolder GFP was |
| integrated into the <em>B. subtilis</em> genome by using the pDR111 <em>B. | | integrated into the <em>B. subtilis</em> genome by using the pDR111 <em>B. |
| subtilis</em> shuttle vector.</p> | | subtilis</em> shuttle vector.</p> |
| | | |
− | <figure> | + | <figure class="cycler"> |
− | <img src="https://static.igem.org/mediawiki/2016/c/ca/T--Groningen--Labjournal-sfGFP-message-in-pDR111-plasmid-1.png" /> | + | <img class="active dark" src="https://static.igem.org/mediawiki/2016/0/05/T--Groningen--Bacilluspinkwithstuff2.png" /> |
− | </figure>
| + | <img class="base dark" src="https://static.igem.org/mediawiki/2016/c/c2/T--Groningen--Bacilluspink_glow2.png" /> |
− |
| + | <img class="dark" src="https://static.igem.org/mediawiki/2016/c/ca/T--Groningen--Labjournal-sfGFP-message-in-pDR111-plasmid-1.png" /> |
− | | + | </figure><p></p> |
− | <figure>
| + | <figcaption>Figure 7: Integration of a <em>sfGFP</em> (<a href="http://parts.igem.org/Part:BBa_K1930006">BBa_K1930006</a>) into the genomic DNA of <em>B. subtilis</em>.</figcaption> |
− | <img src="https://static.igem.org/mediawiki/2016/c/c2/T--Groningen--Bacilluspink_glow2.png" /> | + | |
− | </figure> | + | |
| | | |
| <h4>2. NucA key deletion</h4> | | <h4>2. NucA key deletion</h4> |
Line 300: |
Line 371: |
| tries to grow the key-containing spores in regular growth medium | | tries to grow the key-containing spores in regular growth medium |
| without the addition of tetracycline, the key deletion will be | | without the addition of tetracycline, the key deletion will be |
− | active and the DNA will be digested by the nuclease.</p> | + | active and the DNA will be digested by the nuclease. This process can be seen in figure 8.</p> |
| | | |
− | <figure> | + | <figure class="cycler"> |
− | <img src="https://static.igem.org/mediawiki/2016/b/bf/T--Groningen--Labjournal-nucA-in-pSB1C3-plasmid.png" /> | + | <img class="active dark" src="https://static.igem.org/mediawiki/2016/0/05/T--Groningen--Bacilluspinkwithstuff2.png" /> |
− | </figure>
| + | <img class="dark" src="https://static.igem.org/mediawiki/2016/5/55/T--Groningen---Design---nucAcutting-.png" /> |
− | | + | <img class="dark base" src="https://static.igem.org/mediawiki/2016/b/bf/T--Groningen--Labjournal-nucA-in-pSB1C3-plasmid.png" /> |
− | <figure>
| + | |
− | <img src="https://static.igem.org/mediawiki/2016/5/55/T--Groningen---Design---nucAcutting-.png" /> | + | |
| </figure> | | </figure> |
| | | |
| + | <figcaption>Figure 8. If the right repressor is not added a nuclease will cut the genome and thus delete the key sequence.</figcaption> |
| | | |
| <h4>3. CRISPR key deletion</h4> | | <h4>3. CRISPR key deletion</h4> |
Line 327: |
Line 397: |
| containing the CRISPR/Cas9 system are being revived by unauthorized | | containing the CRISPR/Cas9 system are being revived by unauthorized |
| parties who are unaware of the correct treatment procedure, the | | parties who are unaware of the correct treatment procedure, the |
− | targeted area, in this case the key-sequence will be deleted. This | + | targeted area, in this case the key-sequence will be deleted as visible in Figure 9. This |
| way the message will be safe and secure.</p> | | way the message will be safe and secure.</p> |
| | | |
− | <figure> | + | <figure class="split"> |
− | <img src="https://static.igem.org/mediawiki/2016/3/30/T--Groningen--Design-10.png" /> | + | <div class="left fltwo"><img src="https://static.igem.org/mediawiki/2016/5/55/T--Groningen--crisprsomething.png" /></div> |
| + | <div class="right flthree"><img src="https://static.igem.org/mediawiki/2016/5/55/T--Groningen---Design---crisprcutting-.png" /></div> |
| </figure> | | </figure> |
| | | |
− | <figure> | + | <figcaption>Figure 9. Without the addition of the correct repressor the CRISPR/Cas9 system will delete the key sequence from the genome of <em>B. subtilis</em>.</figcaption> |
− | <img src="https://static.igem.org/mediawiki/2016/5/55/T--Groningen---Design---crisprcutting-.png" />
| + | |
− | </figure>
| + | |
| | | |
| | | |
| <ul class="linkylist"> | | <ul class="linkylist"> |
| <li><a href="/Team:Groningen/Decoy">Learn more about the selection of the correct spores from the decoy.</a></li> | | <li><a href="/Team:Groningen/Decoy">Learn more about the selection of the correct spores from the decoy.</a></li> |
− | <li><a href="/Team:Groningen/">Learn more about the modelling of the DNA-ciprofloxacin-interaction.</a></li> | + | <li><a href="/Team:Groningen/SpiroModel">Learn more about the modelling of the DNA-spirofloxacin-interaction.</a></li> |
| <li><a href="/Team:Groningen/PhotoswitchableAntibiotics">Learn more about the photoswitchable antibiotic.</a></li> | | <li><a href="/Team:Groningen/PhotoswitchableAntibiotics">Learn more about the photoswitchable antibiotic.</a></li> |
| <li><a href="/Team:Groningen/KeyDeletion">Learn more about the key deletion</a></li> | | <li><a href="/Team:Groningen/KeyDeletion">Learn more about the key deletion</a></li> |
Line 347: |
Line 417: |
| </section> | | </section> |
| <section> | | <section> |
− | <h3>Decoding</h3> | + | <h3 class="crypt">Decoding</h3> |
| | | |
| <p>Now that the receiver has received the message and was able to | | <p>Now that the receiver has received the message and was able to |
Line 371: |
Line 441: |
| </section> | | </section> |
| <section> | | <section> |
− | <h3>What if?</h3> | + | <h3 class="model">What if?</h3> |
| | | |
| <p>Making use of artificial intelligence and computational | | <p>Making use of artificial intelligence and computational |
Line 390: |
Line 460: |
| </ul> | | </ul> |
| </section> | | </section> |
| + | <section> |
| + | <h2>References</h2> |
| + | <ul> |
| + | <li id="cite-1"><a href="#ref-1">[1]</a> <a href="https://www.genome.gov/sequencingcosts/">NIH National Human Genome Research Institute.</a> [Online. Accessed October 19, 2016].</li> |
| + | <li id="cite-2"><a href="#ref-2">[2]</a> Vreeland, R.H., Rosenzweig, W.D. & Powers, D.W., 2000. <a href="http://www.ncbi.nlm.nih.gov/pubmed/11057666">Isolation of a 250 million-year-old halotolerant bacterium from a primary salt crystal</a>. Nature, 407(6806), pp.897–900. [Online. Accessed September 26, 2016].</li> |
| + | </ul> |
| + | </section> |
| + | |
| + | |
| </article> | | </article> |
| </html> | | </html> |
| {{Groningen/footer}} | | {{Groningen/footer}} |