Quantifying the accessibility of the metagenome by random expression cloning techniques

Esther M Gabor, Wynand B L Alkema, Dick B Janssen

Research output: Contribution to journalArticleAcademicpeer-review


The exploitation of the metagenome for novel biocatalysts by functional screening is determined by the ability to express the respective genes in a surrogate host. The probability of recovering a certain gene thereby depends on its abundance in the environmental DNA used for library construction, the chosen insert size, the length of the target gene, and the presence of expression signals that are functional in the host organism. In this paper, we present a set of formulas that describe the chance of isolating a gene by random expression cloning, taking into account the three different modes of heterologous gene expression: independent expression, expression as a transcriptional fusion and expression as a translational fusion. Genes of the last category are shown to be virtually inaccessible by shotgun cloning because of the low frequency of functional constructs. To evaluate which part of the metagenome might in this way evade exploitation, 32 complete genome sequences of prokaryotic organisms were analysed for the presence of expression signals functional in E. coli hosts, using bioinformatics tools. Our study reveals significant differences in the predicted expression modes between distinct taxonomic groups of organisms and suggests that about 40% of the enzymatic activities may be readily recovered by random cloning in E. coli.

Original languageEnglish
Pages (from-to)879-886
JournalApplied and Environmental Microbiology
Issue number9
Publication statusPublished - 11 Aug 2004


  • bacteria/enzymology
  • cloning, molecular/methods
  • computational biology/methods
  • escherichia coli/metabolism
  • gene expression
  • gene library
  • genes/genetics
  • genomics/methods
  • species specificity


Dive into the research topics of 'Quantifying the accessibility of the metagenome by random expression cloning techniques'. Together they form a unique fingerprint.

Cite this