{"id":127,"date":"2006-08-23T13:42:18","date_gmt":"2006-08-23T11:42:18","guid":{"rendered":"http:\/\/146.107.134.84\/wordpress\/index.php\/2006\/08\/23\/reading-behind-the-lines\/"},"modified":"2006-09-15T17:11:01","modified_gmt":"2006-09-15T15:11:01","slug":"reading-behind-the-lines","status":"publish","type":"post","link":"https:\/\/www.wjst.de\/blog\/sciencesurf\/2006\/08\/reading-behind-the-lines\/","title":{"rendered":"Reading behind the lines"},"content":{"rendered":"<p>-moblog&#8211; <a href=\"http:\/\/www.nature.com\/nature\/journal\/v442\/n7104\/abs\/nature04979.html;jsessionid=36A9D92F65990E3822F47C7B19975437\">Eran Segal et al.<\/a> describe in Nature a genomic code for correct nucleosome attachment of genomic DNA. DNA must be positioned for access to functional sites of gene activity where 147 bases are wrapped around each nucleosome core. AT is favored where phosphodiesterase backbones face inward and GC where it faces outward. Distance between nucleosomes may be variable &#8211; as the accompanying editoral by Timothy Richmond explains (the enigmatic histone H1 question). Do genomes use nucleosome DNA preference to target transcription factor towards appropriate sites? This might expain why current transcription factor models are rather poor as they are using only sequence binding matrices. It reminds me to steganograpy, algorithmic  procedures that can be used to hide secret messages in in pictures without affecting the visual impression. Yea, yea.<\/p>\n\n<p>&nbsp;<\/p>\n<div class=\"bottom-note\">\n  <span class=\"mod1\">CC-BY-NC Science Surf , accessed 15.04.2026<\/span>\n <\/div>","protected":false},"excerpt":{"rendered":"<p>-moblog&#8211; Eran Segal et al. describe in Nature a genomic code for correct nucleosome attachment of genomic DNA. DNA must be positioned for access to functional sites of gene activity where 147 bases are wrapped around each nucleosome core. AT is favored where phosphodiesterase backbones face inward and GC where it faces outward. Distance between &hellip; <a href=\"https:\/\/www.wjst.de\/blog\/sciencesurf\/2006\/08\/reading-behind-the-lines\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Reading behind the lines<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,9],"tags":[2949,2945],"class_list":["post-127","post","type-post","status-publish","format-standard","hentry","category-genetics-biology","category-computer-software","tag-computer-software","tag-genetics-biology"],"_links":{"self":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/comments?post=127"}],"version-history":[{"count":0,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/posts\/127\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/media?parent=127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/categories?post=127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wjst.de\/blog\/wp-json\/wp\/v2\/tags?post=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}