Feeds

Boffins decode Chromosome 16

Fulfil USA's Human Genome commitment

  • alert
  • submit to reddit

Top three mobile application threats

Scientists at the US Department of Energy Joint Genome Institute (JGI) have finished analysing and sequencing Chromosome 16. This completes the US share of the Human Genome Project, JGI said yesterday.

The research, published in today's issue of the science journal Nature, analysed the 880 genes, together consisting of 78m bases, making up Chromosome 16. These genes are implicated in the development of breast and prostate cancer, adult polycystic kidney disease, and Crohn's disease.

The scientists found many points where segmented duplication had occurred - sections of the chromosome were duplicated at other points on the chromosome, and even on entirely different chromosomes. They compared these regions to sequences in the genomes of other vertebrates, including chickens, dogs, mice and chimpanzees, looking for changes to the sequence since the last common ancestor, ranging from 5m to 400m years ago.

Work on Chromosome 16 at the DoE began in 1988 as part of DNA repair-gene studies. It was discovered that some of the genes on the chromosome were implicated in the detoxification and transport of heavy metals.

JGI is the first of the five primary Human Genome Project sequencing sites to publish a scientific article detailing the sequences of the chromosomes under their jurisdiction.

The JGI is now focusing its resources on other projects: "The considerable resources that the DoE has assembled to tackle the human genome are now being dedicated to illuminating the genomes of organisms that may figure into biological solutions to such challenges as economical hydrogen production, carbon sequestration, and environmental clean-up," said US Senator Pete Domenici, a Congressional proponent of efforts to sequence the human genome. ®

Related stories

£147.5m boost for British particle accelerators
Human genome data in hacker peril shocker
Human Genome out on CD

3 Big data security analytics techniques

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
KILLER ROBOTS, DNA TAMPERING and PEEPING CYBORGS: the future looks bright!
Americans optimistic about technology despite being afraid of EVERYTHING
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.