Seqman program
SeqMan is a DNA sequence assembly and analysis software program developed by DNASTAR. It is designed to assemble and analyze DNA sequence data from various sources, including Sanger sequencing, next-generation sequencing, and other technologies. The core function of SeqMan is to align and assemble DNA sequences into contiguous sequences (contigs) and provide tools for visualization, editing, and analysis of the assembled data.
Lab products found in correlation
53 protocols using seqman program
Phylogenetic Analysis of Bacterial Sequences
Surveillance of Avian Influenza Viruses in Migratory Waterfowl
The samples were oscillated and then centrifuged, and the collected supernatant was inoculated into 9-day-old specific pathogen-free (SPF) chicken embryos. Then, 72 h after incubation, the allantoic fluid was harvested, and the hemagglutinin (HA) activity was assayed. Viral RNA was extracted from HA positive samples from incubated allantoic fluid using a QIAamp Viral RNA Mini Kit (Qiagen, Germany), reverse transcribed using the primer Un12 and subjected to RT-PCR using the method described in the WHO manual (World Health Organization [WHO], 2002 ) to confirm AIV positive. The PCR products of eight fragments of the isolates were sequenced using a set of specific sequencing primers listed in a previous dissertation (Chai, 2012 ). The sequence data were compiled using the SeqMan program (DNASTAR, Madison, WI, United States).
Phylogenetic Analysis of 16S rRNA Genes
Genetic Screening for Cardiomyopathy Mutations
The sequences were evaluated with the SeqMan program (DNASTAR Lasergene, Madison, WI) and compared with the reference sequence in the NCBI database. For MYH7, MYBPC3, and TNNT2, the references were, respectively, NM_000257.2, NM_000256.3, and NM_000364.2 [8 ]. When an undescribed mutation was found, we used bioinformatics algorithms to evaluate the pathogenic potential of the alteration. The SIFT [9 (link)] and Polyphen[10 (link)] programs were used only for substitutions, and the MutationTaster[11 (link)] was used to analyze deletions, insertions, and intron alterations. A mutation was labeled as pathogenic if (1) it had been previously described as causing disease; (2) it generated an aminoacid change and was considered pathogenic by all 3 programs above or in 2 programs but the aminoacid was conserved.
Molecular Characterization of H5N6 Influenza Virus
Metagenomic Virus Identification and Screening
Genomic Sequencing of CAV Strains
Viral RNA Extraction and Sequencing
Carlsbad, CA, USA) and reverse transcribed into cDNAs using the primer Uni12
(5′-AGCRAAAGCAGG-3′) or Uni9 (5′-AGCAGAAGC-3′). PCR was performed using a
previously described method.26 (link),27 (link) The PCR products were
subjected to electrophoresis on 1% agarose gels stained with ethidium bromide
and visualized with an ultraviolet light transilluminator. The PCR products were
purified and sequenced by Comate Bioscience Company Limited (Changchun, Jilin,
China). All sequence data were analyzed using the SEQMAN program (DNAStar Inc.,
Madison, WI, USA). All reference sequences used in this study were obtained from
the National Center for Biotechnology Information GenBank database. Phylogenetic
analysis was performed by the distance-based neighbor-joining method using MEGA
7 software (DNAStar Inc.).
Influenza A Virus Gene Sequencing
Phylogenetic Analysis of Nucleotide Sequences
The best-fit evolutionary model of nt substitution was determined using jModelTest [23 (link)]. The maximum-likelihood (ML) trees were constructed based on the general time-reversible (GTR) nucleotide substitution model and the optimized parameters of gamma (Γ)-distribution and proportion of invariable sites (i.e., GTR + Γ + I) with bootstrap support values calculated from 100 replicates implemented in MEGA X [24 (link)]. All phylogenetic trees were mid-point rooted for purposes of clarity only.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!