State Key Laboratory of Crop Gene Exploration and Utilization in Southwest China, Wenjiang, Sichuan, China.
Maize Research Institute, Sichuan Agricultural University, Wenjiang, Sichuan, China.
Plant Biotechnol J. 2022 Jul;20(7):1417-1431. doi: 10.1111/pbi.13823. Epub 2022 Apr 27.
Single amino acid substitution (SAAS) produces the most common variant of protein function change under physiological conditions. As the number of SAAS events in plants has increased exponentially, an effective prediction tool is required to help identify and distinguish functional SAASs from the whole genome as either potentially causal traits or as variants. Here, we constructed a plant SAAS database that stores 12 865 SAASs in 6172 proteins and developed a tool called Plant Protein Variation Effect Detector (PPVED) that predicts the effect of SAASs on protein function in plants. PPVED achieved an 87% predictive accuracy when applied to plant SAASs, an accuracy that was much higher than those from six human database software: SIFT, PROVEAN, PANTHER-PSEP, PhD-SNP, PolyPhen-2, and MutPred2. The predictive effect of six SAASs from three proteins in Arabidopsis and maize was validated with wet lab experiments, of which five substitution sites were accurately predicted. PPVED could facilitate the identification and characterization of genetic variants that explain observed phenotype variations in plants, contributing to solutions for challenges in functional genomics and systems biology. PPVED can be accessed under a CC-BY (4.0) license via http://www.ppved.org.cn.
单个氨基酸替换(SAAS)在生理条件下产生最常见的蛋白质功能变化变体。随着植物中 SAAS 事件数量呈指数级增长,需要一种有效的预测工具来帮助从整个基因组中识别和区分功能 SAAS,以确定其是否为潜在的因果特征或变体。在这里,我们构建了一个植物 SAAS 数据库,其中存储了 6172 种蛋白质中的 12865 个 SAAS,并开发了一种称为植物蛋白变异效应探测器(PPVED)的工具,用于预测 SAAS 对植物中蛋白质功能的影响。当应用于植物 SAAS 时,PPVED 的预测准确率达到 87%,这一准确率远高于 SIFT、PROVEAN、PANTHER-PSEP、PhD-SNP、PolyPhen-2 和 MutPred2 等六种人类数据库软件。通过湿实验室实验验证了拟南芥和玉米中三个蛋白质的六个 SAAS 的预测效果,其中五个取代位点得到了准确预测。PPVED 可以促进遗传变异的识别和特征描述,从而解释植物中观察到的表型变异,有助于解决功能基因组学和系统生物学中的挑战。PPVED 可以通过 http://www.ppved.org.cn 在 CC-BY(4.0)许可下访问。