Untying a Protein Knot by Circular Permutation

被引:18
|
作者
Chuang, Ya-Chu [1 ,2 ]
Hu, I-Chen [2 ]
Lyu, Ping-Chiang [2 ]
Hsu, Shang-Te Danny [1 ,3 ]
机构
[1] Acad Sinica, Inst Biol Chem, Taipei 11529, Taiwan
[2] Natl Tsing Hua Univ, Inst Bioinformat & Struct Biol, Hsinchu 30013, Taiwan
[3] Natl Taiwan Univ, Inst Biochem Sci, Taipei 10617, Taiwan
关键词
knotted protein; SPOUT RNA methyltransferase; protein folding; circular permutation; FOLDING MECHANISM; DATABASE;
D O I
10.1016/j.jmb.2019.01.005
中图分类号
Q5 [生物化学]; Q7 [分子生物学];
学科分类号
071010 ; 081704 ;
摘要
Topologically knotted proteins are tantalizing examples of how polypeptide chains can explore complex free energy landscapes to efficiently attain defined knotted conformations. The evolution trails of protein knots, however, remain elusive. We used circular permutation to change an evolutionally conserved topologically knotted SPOUT RNA methyltransferase into an unknotted form. The unknotted variant adopted the same three-dimensional structure and oligomeric state as its knotted parent, but its folding stability was markedly reduced with accelerated folding kinetics and its ligand binding was abrogated. Our findings support the hypothesis that the universally conserved knotted topology of the SPOUT superfamily evolved from unknotted forms through circular permutation under selection pressure for folding robustness and, more importantly, for functional requirements associated with the knotted structural element. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:857 / 863
页数:7
相关论文
共 50 条
  • [1] Untying a Knotted SPOUT RNA Methyltransferase by Circular Permutation Results in a Domain-Swapped Dimer
    Ko, Kuang-Ting
    Hu, I-Chen
    Huang, Kai-Fa
    Lyu, Ping-Chiang
    Hsu, Shang-Te Danny
    STRUCTURE, 2019, 27 (08) : 1224 - +
  • [2] Protein engineering using circular permutation - structure, function, stability, and applications
    Das, Debanjana
    Ainavarapu, Sri Rama Koti
    FEBS JOURNAL, 2024, 291 (16) : 3581 - 3596
  • [3] Revealing Topological Barriers against Knot Untying in Thermal and Mechanical Protein Unfolding by Molecular Dynamics Simulations
    Xu, Yan
    Kang, Runshan
    Ren, Luyao
    Yang, Lin
    Yue, Tongtao
    BIOMOLECULES, 2021, 11 (11)
  • [4] Structure of AP205 Coat Protein Reveals Circular Permutation in ssRNA Bacteriophages
    Shishovs, Mihails
    Rumnieks, Janis
    Diebolder, Christoph
    Jaudzems, Kristaps
    Andreas, Loren B.
    Stanek, Jan
    Kazaks, Andris
    Kotelovica, Svetlana
    Akopjana, Inara
    Pintacuda, Guido
    Koning, Roman I.
    Tars, Kaspars
    JOURNAL OF MOLECULAR BIOLOGY, 2016, 428 (21) : 4267 - 4279
  • [5] Flexible secondary structure based protein structure comparison applied to the detection of circular permutation
    Vesterstrom, J
    Taylor, WR
    JOURNAL OF COMPUTATIONAL BIOLOGY, 2006, 13 (01) : 43 - 62
  • [6] Circular permutation of the Thermus thermophilus ribosomal protein S6 imparting to it the topology of the artificial protein albebetin
    Latypov, RF
    Abdullaev, ZK
    Badretdinov, AY
    Bocharov, EV
    Mel'nik, TN
    Afasizheva, IY
    Arsen'ev, AS
    Dolgikh, DA
    Uverskii, VN
    Finkelstein, AV
    Kirpichnikov, MP
    MOLECULAR BIOLOGY, 1998, 32 (01) : 109 - 116
  • [7] Alteration of the disulfide-coupled folding pathway of BPTI by circular permutation
    Bulaj, G
    Koehn, RE
    Goldenberg, DP
    PROTEIN SCIENCE, 2004, 13 (05) : 1182 - 1196
  • [8] CPSARST: an efficient circular permutation search tool applied to the detection of novel protein structural relationships
    Wei-Cheng Lo
    Ping-Chiang Lyu
    Genome Biology, 9
  • [9] Metal-binding and circular permutation-dependent thermodynamic and kinetic stability of azurin
    Das, Debanjana
    Yadav, Priya
    Mitra, Soumyajit
    Ainavarapu, Sri Rama Koti
    PROTEINS-STRUCTURE FUNCTION AND BIOINFORMATICS, 2023, 91 (05) : 634 - 648
  • [10] A DNA Algorithm of A Kind of Circular Forbidden Permutation Problem
    Wang, Lei
    Yang, Yu-xing
    Wang, Ai-min
    Ma, Ji-lan
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 13 - +