Difference between revisions of "SIFT"
Jump to navigation
Jump to search
Moskalenko (talk | contribs) m (Text replace - "<!--Location--> {{App_Location|app={{#var:app}}|{{#var:ver}}}}" to "") |
Moskalenko (talk | contribs) m (Text replace - "==Running the application using modules==" to "==Execution Environment and Modules==") |
||
Line 27: | Line 27: | ||
* 4.0.3b | * 4.0.3b | ||
<!--Modules--> | <!--Modules--> | ||
− | {{#if: {{#var: mod}}|== | + | {{#if: {{#var: mod}}|==Execution Environment and Modules== |
{{App_Module|app={{#var:app}}|intel={{#var:intel}}|mpi={{#var:mpi}}}}|}} | {{App_Module|app={{#var:app}}|intel={{#var:intel}}|mpi={{#var:mpi}}}}|}} | ||
<!--Add additional HPC_FOO_BIN and other ENV VARIABLES below--> | <!--Add additional HPC_FOO_BIN and other ENV VARIABLES below--> |
Revision as of 02:03, 10 August 2012
Description
SIFT predicts whether an amino acid substitution affects protein function. SIFT prediction is based on the degree of conservation of amino acid residues in sequence alignments derived from closely related sequences, collected through PSI-BLAST. SIFT can be applied to naturally occurring nonsynonymous polymorphisms or laboratory-induced missense mutations.
Available versions
- 4.0.3b
Execution Environment and Modules
To use sift with the environment modules system at HPC the following commands are available:
Get module information for sift:
$module spider sift
Load the default application module:
$module load sift
The modulefile for this software adds the directory with executable files to the shell execution PATH and sets the following environment variables:
- HPC_SIFT_DIR - directory where sift is located.