As with all genotyping tools, the accuracy and consistency of the data is dependent on the selection of appropriate reference sequences. To overcome the limitations of other commonly used methods that employ a single reference sequence or a consensus reference sequence (SIMPLOT, RIP and NCBI-genotyping tools), we used sets of carefully selected, full-length viral genomes to represent each individual subtype and recombinant virus. The initial step in the selection of reference strains involved the screening of published data to identify highly divergent, but equidistant, genomes that were representative of the diversity within a given subtype or CRF. The selected sequences were then aligned, edited and subjected to phylogenetic analysis using NJ, Bayesian and ML methods (18–20 ). Sequences that gave similar topologies using all three tree construction methods were retained for further analysis of their sub-genomic regions. In this phase of the evaluation, the sub-genomic regions were assessed using consecutive windows of fixed, but increasing, sizes, ranging from 200 to 2000 nt. The process began with an initial window size of 200 nt and was repeated with subsequent windows until all segments of the genome were classified with a bootstrap value of ≥70%.
Viral Genotyping Protocol with Robust References
As with all genotyping tools, the accuracy and consistency of the data is dependent on the selection of appropriate reference sequences. To overcome the limitations of other commonly used methods that employ a single reference sequence or a consensus reference sequence (SIMPLOT, RIP and NCBI-genotyping tools), we used sets of carefully selected, full-length viral genomes to represent each individual subtype and recombinant virus. The initial step in the selection of reference strains involved the screening of published data to identify highly divergent, but equidistant, genomes that were representative of the diversity within a given subtype or CRF. The selected sequences were then aligned, edited and subjected to phylogenetic analysis using NJ, Bayesian and ML methods (18–20 ). Sequences that gave similar topologies using all three tree construction methods were retained for further analysis of their sub-genomic regions. In this phase of the evaluation, the sub-genomic regions were assessed using consecutive windows of fixed, but increasing, sizes, ranging from 200 to 2000 nt. The process began with an initial window size of 200 nt and was repeated with subsequent windows until all segments of the genome were classified with a bootstrap value of ≥70%.
Partial Protocol Preview
This section provides a glimpse into the protocol.
The remaining content is hidden due to licensing restrictions, but the full text is available at the following link:
Access Free Full Text.
Corresponding Organization :
Other organizations : National Health Laboratory Service, University of KwaZulu-Natal, University of Pretoria, Fundação Oswaldo Cruz
Protocol cited in 30 other protocols
Variable analysis
- Reference strains (initially selected from strains curated at the RNA Virus Database, Los Alamos HIV and HCV Sequence Databases)
- Ability of the reference strains to accurately classify a set of well-classified (gold standard) genomic sequences
- Gold standard dataset of well-classified genomic sequences
- Reference alignments of complete and sub-genomic gold standard sequences that gave a bootstrap value of >95% were deemed suitable for routine use
- Not explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!