Feeds

Online gamers strike major blow in battle against AIDS

Distributed human-brain cluster cracks protein conundrum

  • alert
  • submit to reddit

Top three mobile application threats

A bunch of gamers have untangled the structure of a key protein in the virus that causes AIDS, a mystery that has left scientists stumped for decades.

It took just three weeks for players of online game Foldit to predict an accurate model for the protein – a type of enzyme called a retroviral protease that has a critical role in how the HI virus grows and spreads.

The game Foldit was specially designed to help work out the structure of proteins. It combines computer intelligence with human spatial abilities by asking players to tweak and tug 3D models, a task that computers find hard to do.

A model of protein on online game Foldit, credit: Foldit

A screengrab of online protein-folding game, Foldit

The gamers – most of whom have no background in biochemistry – generated models good enough for the researchers to refine and, within a few days, determine the enzyme's structure. In the research published yesterday in Nature Structural & Molecular Biology, lead authors biochemists Firas Khatib and Frank DiMaio gave gamers equal billing with the rest of their biochemist co-authors.

Amazingly, surfaces on the molecule stood out as likely targets for drugs to de-active the enzyme. "These features provide exciting opportunities for the design of retroviral drugs, including AIDS drugs," wrote the authors of the paper.

The solution of the virus enzyme structure, the researchers said, "indicates the power of online computer games to channel human intuition and three-dimensional pattern matching skills to solve challenging scientific problems."

Proteins are made of long chains of amino acids that tend to fold up in particular ways. Understanding the shapes that the amino acids fold up into is important in working out what they do, and – in the case of disease proteins – finding means of stopping them doing it. The scientists behind Foldit explain:

Every kind of protein folds up into a very specific shape – the same shape every time [...] The more we know about how certain proteins fold, the better new proteins we can design to combat the disease-related proteins and cure the diseases.

The research was published on 18 September in Nature Structural & Molecular Biology.

A PDF of the research is available here (3-page/812KB PDF)

High performance access to file storage

More from The Register

next story
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
R.I.P. LADEE: Probe smashes into lunar surface at 3,600mph
Swan dive signs off successful science mission
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Dragon capsule arrives at space station for Easter Sunday delivery
SpaceX reports Falcon booster made controlled touchdown in ocean
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.