Cancer Systems Biology Methods and Protocols 1st Edition Louise Von Stechow (Eds.)
Cancer Systems Biology Methods and Protocols 1st Edition Louise Von Stechow (Eds.)
Cancer Systems Biology Methods and Protocols 1st Edition Louise Von Stechow (Eds.)
OR CLICK LINK
https://textbookfull.com/product/cancer-systems-
biology-methods-and-protocols-1st-edition-louise-
von-stechow-eds/
Read with Our Free App Audiobook Free Format PFD EBook, Ebooks dowload PDF
with Andible trial, Real book, online, KINDLE , Download[PDF] and Read and Read
Read book Format PDF Ebook, Dowload online, Read book Format PDF Ebook,
[PDF] and Real ONLINE Dowload [PDF] and Real ONLINE
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
https://textbookfull.com/product/computational-cell-biology-
methods-and-protocols-louise-von-stechow/
https://textbookfull.com/product/cancer-cytogenetics-methods-and-
protocols-methods-in-molecular-biology-1541-desconocido/
https://textbookfull.com/product/cancer-stem-cells-methods-and-
protocols-methods-in-molecular-biology-2777-papaccio/
https://textbookfull.com/product/systems-chemical-biology-
methods-and-protocols-slava-ziegler/
Yeast Systems Biology Methods and Protocols Stephen G.
Oliver
https://textbookfull.com/product/yeast-systems-biology-methods-
and-protocols-stephen-g-oliver/
https://textbookfull.com/product/proteomics-in-systems-biology-
methods-and-protocols-1st-edition-jorg-reinders-eds/
https://textbookfull.com/product/cancer-metabolism-methods-and-
protocols-majda-haznadar/
https://textbookfull.com/product/cancer-driver-genes-methods-and-
protocols-timothy-k-starr/
https://textbookfull.com/product/mucins-methods-and-protocols-
methods-in-molecular-biology-2763-1st-edition-kameyama/
Methods in
Molecular Biology 1711
Cancer Systems
Biology
Methods and Protocols
METHODS IN MOLECULAR BIOLOGY
Series Editor
John M. Walker
School of Life and Medical Sciences,
University of Hertfordshire, Hatfield,
Hertfordshire AL10 9AB, UK
Edited by
Cancer is a highly complex disease that is often characterized by vast changes in the genetic
and epigenetic landscape. Those changes result in altered protein expression levels in tumors
compared to healthy tissues. Moreover, posttranscriptional alterations lead to deregulation
of signaling processes, and altered metabolic pathways can produce aberrant metabolic
signatures in cancer cells.
A wealth of high-throughput information has emerged over the last decade, including
global measurements of genes, proteins, and metabolites, as well as many other molecular
species. Those studies provide a glimpse of the molecular makeup of cancer cells on various
levels. In order to classify tumor types and predict clinical outcomes of cancer, researchers
often employ sophisticated computational tools to extract cancer-specific events from the
excessive amounts of data that have been compiled.
This volume on “Cancer Systems Biology” comprises protocols, which describe systems
biology methodologies and computational tools, offering a variety of ways to analyze
different types of high-throughput cancer data. Those include for example network- and
pathway-based analyses. Other chapters cover descriptive and predictive mathematical mod-
els used to analyze complex cancer phenotypes and responses to anticancer drugs.
A number of chapters give an overview of data types available in large-scale data
repositories, describe state-of-the-art computational methods used, and highlight key
trends in the field of cancer systems biology.
v
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Contributors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
vii
viii Contents
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Contributors
ix
x Contributors
Abstract
Cancer genes may tend to mutate in a co-mutational or mutually exclusive manner in a tumor sample of a
specific cancer, which constitute two known combinatorial mutational patterns for a given gene set.
Previous studies have established that genes functioning in different signaling pathways can mutate in the
same sample, i.e., a tumor from one patient, while genes operating in the same pathway are rarely mutated
in the same cancer genome. Therefore, reliable identification of combinatorial mutational patterns of
candidate cancer genes has important ramifications in inferring signaling network modules in a particular
cancer type. While algorithms for discovering mutated driver pathways based on mutual exclusivity of
mutations in cancer genes have been proposed, a systematic pipeline for identifying both co-mutational and
mutually exclusive patterns with rational significance estimation is still lacking. Here, we describe a reliable
framework with detailed procedures to simultaneously explore both combinatorial mutational patterns
from public cross-sectional gene mutation data.
Key words Cancer genomics, Co-mutation, Mutual exclusivity, Signaling pathway, Hypergeometric test
1 Introduction
Louise von Stechow (ed.), Cancer Systems Biology: Methods and Protocols, Methods in Molecular Biology, vol. 1711,
https://doi.org/10.1007/978-1-4939-7493-1_1, © Springer Science+Business Media, LLC 2018
3
4 Hua Tan and Xiaobo Zhou
Tumor Samples
Gene 1 Co-mutational
Gene 2 pattern
Fig. 1 Schematic representation of two combinatorial mutational patterns studied in this protocol: the
co-mutational pattern (upper panel) refers to the scenario that a set of genes tends to mutate simultaneously
in a tumor sample, whereas the mutually exclusive pattern (lower panel) represents the opposite scenario:
genes in a given set tend to avoid mutating simultaneously in any one tumor sample
Mutaton
records in
database
Quality control
Preprocessing
Calculate Calculate
likelihood rato signifcance
level
Determine
mutatonal paern
For Inferring
signaling
network
Fig. 2 Schematic of the overall pipeline proposed in this protocol. The specific
steps of text processing, computation, and visualization are provided in
Subheading 3
6 Hua Tan and Xiaobo Zhou
2 Materials
3 Methods
3.1 Data Quality 1. Extract mutations of a designated cancer type from the mixed
Control mutation records in COSMIC by the keyword “Primary site”
and Preprocessing (see Note 1).
of COSMIC Mutation 2. Remove synonymous mutations by the keyword “Substitution-
Entries coding silent” (see Note 1).
3. Remove mutation records that are not from a genome-wide
study by the keyword “genome-wide screen” (see Note 1).
4. Generate a gene mutation pattern matrix based on the muta-
tions and sample IDs. The rows and columns of the matrix refer
to samples and genes, respectively. The entry at row i and
column j of the matrix refers to the number of mutations
occurring on gene j in tumor sample i. Figure 3 highlights an
example showing the 9th tumor sample has a mutation on gene
2 by marking the coordinate (9,2) (see Note 2).
Combinatorial Mutational Patterns in Human Cancers 7
12 11 10 9 8 7 6 5 4 3 2 1
12 10 9 8 7 6 5 4 3 2 1
Samples
Fig. 3 Schematic depicting the mutation pattern matrix and entry filtering criteria. (a) A mutation pattern matrix
is generated to represent the mutation profiles of the tumor samples across all genes. A gray grid indicates the
corresponding sample has at least one mutation on the gene specified by the column ID. (b) Columns 3, 5, and
6 are deleted since the associated genes are mutated in only a small fraction of samples (the threshold of
fraction can be prescribed). (c) Row 11 is deleted as the corresponding sample has no mutation in the
remaining genes after the processing in (b)
P ðg1 ¼ 1; g2 ¼ 1Þ
LR comb ¼ ð1Þ
P ðg1 ¼ 1ÞP ðg2 ¼ 1Þ
3.3 Calculation 1. Calculate the significance level of the co-mutational pattern Pco
of Significance by the hypergeometric test as the formula (2):
of Combinatorial
n2
X
Mutational Patterns n1 n n1 n
P co ¼ = ð2Þ
k n2 k n2
k¼n12
n12
X
n1 n n1 n
P excl ¼ = ð3Þ
k n2 k n2
k¼0
where n, n1, n2, n12 are defined as in the formula of Pco above.
5 Notes
Acknowledgments
References
1. Hanahan D, Weinberg RA (2000) The hall- mutations in cancer. FASEB J 22
marks of cancer. Cell 100(1):57–70. https:// (8):2605–2622. https://doi.org/10.1096/fj.
doi.org/10.1016/S0092-8674(00)81683-9 08-108985
2. Stratton MR, Campbell PJ, Futreal PA (2009) 11. Ciriello G, Cerami E, Sander C, Schultz N
The cancer genome. Nature 458 (2012) Mutual exclusivity analysis identifies
(7239):719–724. https://doi.org/10.1038/ oncogenic network modules. Genome Res 22
Nature07943 (2):398–406. https://doi.org/10.1101/gr.
3. Peng H, Tan H, Zhao W, Jin G, Sharma S, 125567.111
Xing F, Watabe K, Zhou X (2016) Computa- 12. Vandin F, Upfal E, Raphael BJ (2012) De novo
tional systems biology in cancer brain metasta- discovery of mutated driver pathways in cancer.
sis. Front Biosci 8:169–186 Genome Res 22(2):375–385. https://doi.
4. Tan H, Bao J, Zhou X (2012) A novel org/10.1101/gr.120477.111
missense-mutation-related feature extraction 13. Leiserson MD, Blokh D, Sharan R, Raphael BJ
scheme for ‘driver’ mutation identification. (2013) Simultaneous identification of multiple
Bioinformatics 28(22):2948–2955. https:// driver pathways in cancer. PLoS Comput Biol 9
doi.org/10.1093/bioinformatics/bts558 (5):e1003054. https://doi.org/10.1371/jour
5. Tan H, Bao J, Zhou X (2015) Genome-wide nal.pcbi.1003054
mutational spectra analysis reveals significant 14. Forbes SA, Beare D, Gunasekaran P, Leung K,
cancer-specific heterogeneity. Sci Rep Bindal N, Boutselakis H, Ding M, Bamford S,
5:12566. https://doi.org/10.1038/ Cole C, Ward S, Kok CY, Jia M, De T, Teague
srep12566 JW, Stratton MR, McDermott U, Campbell PJ
6. Tan H, Li F, Singh J, Xia X, Cridebring D, (2015) COSMIC: exploring the world’s
Yang J, Bao J, Ma J, Zhan M, Wong STC knowledge of somatic mutations in human can-
(2012) A 3-dimentional multiscale model to cer. Nucleic Acids Res 43(Database issue):
simulate tumor progression in response to D805–D811. https://doi.org/10.1093/nar/
interactions between cancer stem cells and gku1075
tumor microenvironmental factors. IEEE 6th 15. Greenman C, Stephens P, Smith R, Dalgliesh
International Conference on Systems Biology GL, Hunter C, Bignell G, Davies H, Teague J,
(ISB):297–303. https://doi.org/10.1109/ Butler A, Stevens C, Edkins S, O’Meara S,
ISB.2012.6314153 Vastrik I, Schmidt EE, Avis T, Barthorpe S,
7. Tan H, Wei K, Bao J, Zhou X (2013) In silico Bhamra G, Buck G, Choudhury B,
study on multidrug resistance conferred by Clements J, Cole J, Dicks E, Forbes S,
I223R/H275Y double mutant neuraminidase. Gray K, Halliday K, Harrison R, Hills K,
Mol BioSyst 9(11):2764–2774. https://doi. Hinton J, Jenkinson A, Jones D, Menzies A,
org/10.1039/c3mb70253g Mironenko T, Perry J, Raine K, Richardson D,
8. Vogelstein B, Papadopoulos N, Velculescu VE, Shepherd R, Small A, Tofts C, Varian J,
Zhou S, Diaz LA Jr, Kinzler KW (2013) Can- Webb T, West S, Widaa S, Yates A, Cahill DP,
cer genome landscapes. Science 339 Louis DN, Goldstraw P, Nicholson AG,
(6127):1546–1558. https://doi.org/10. Brasseur F, Looijenga L, Weber BL, Chiew
1126/science.1235122 YE, DeFazio A, Greaves MF, Green AR,
Campbell P, Birney E, Easton DF, Chenevix-
9. Vogelstein B, Kinzler KW (2004) Cancer genes Trench G, Tan MH, Khoo SK, Teh BT, Yuen
and the pathways they control. Nat Med 10 ST, Leung SY, Wooster R, Futreal PA, Stratton
(8):789–799. https://doi.org/10.1038/ MR (2007) Patterns of somatic mutation in
nm1087 human cancer genomes. Nature 446
10. Yeang CH, McCormick F, Levine A (2008) (7132):153–158. https://doi.org/10.1038/
Combinatorial patterns of somatic gene nature05610
Combinatorial Mutational Patterns in Human Cancers 11
16. Ihaka P, Gentleman R (1996) R: a language for 18. Shannon P, Markiel A, Ozier O, Baliga NS,
data analysis and graphics. J Comput Graph Wang JT, Ramage D, Amin N,
Stat 5(3):299–314 Schwikowski B, Ideker T (2003) Cytoscape: a
17. Dempster AP, Laird NM, Rubin DB (1977) software environment for integrated models of
Maximum likelihood from incomplete data via biomolecular interaction networks. Genome
EM Algorithm. J Roy Stat Soc B Met 39 Res 13(11):2498–2504. https://doi.org/10.
(1):1–38 1101/gr.1239303. 13/11/2498 [pii]
Chapter 2
Abstract
With the extraordinary rise in available biological data, biologists and clinicians need unbiased tools for data
integration in order to reach accurate, succinct conclusions. Network biology provides one such method for
high-throughput data integration, but comes with its own set of algorithmic problems and needed
expertise. We provide a step-by-step guide for using Omics Integrator, a software package designed for
the integration of transcriptomic, epigenomic, and proteomic data. Omics Integrator can be found at
http://fraenkel.mit.edu/omicsintegrator.
Key words Data integration, Network biology, Computational biology, High-throughput data
1 Introduction
Louise von Stechow (ed.), Cancer Systems Biology: Methods and Protocols, Methods in Molecular Biology, vol. 1711,
https://doi.org/10.1007/978-1-4939-7493-1_2, © Springer Science+Business Media, LLC 2018
13
14 Amanda J. Kedaigle and Ernest Fraenkel
sources can lead to novel discoveries that each assay could have
missed on its own [4–6].
Network biology is a fast-growing category of methods for this
type of analysis [7]. Network models provide a valuable resource for
biologists looking to analyze their high-throughput data in a sys-
tems context. By mapping “hits” from high-throughput assays
onto interaction networks, the mechanistic connections between
the hits become obvious, and investigators can focus on pathways,
or series of interactions in the cell that are related to a certain
function, that may be perturbed in the system.
Network methods typically involve modeling the molecules
within a cell—which can for example be DNA, mRNAs, proteins,
or metabolites—as nodes in a graph. Edges between these nodes
connect molecules that are functionally or physically connected
[7]. For example, a protein-protein interaction network (PPI)
would represent the binding of protein A to protein B by drawing
an edge between the “A” node and “B” node in the network.
Several publicly available databases have been created to translate
experimentally discovered protein interactions into PPIs, such as
iRefIndex [8], BioGRID [9], and STRING [10]. There are also
databases that store interactions of proteins with other molecules,
such as metabolites [11–13]. In other types of networks, the edges
can represent more abstract relationships. For example, in a
correlation-based network, edges between nodes might represent
probable co-regulation, rather than physical interactions, based on
covariance between the concentration of molecule A and molecule
B [14, 15].
Mapping high-throughput hits onto networks in search of
affected pathways has several advantages. Hits that are close to
each other in a network might function in the same pathway.
Focusing on subnetworks of functionally related nodes can produce
a more tractable number of targets, rather than the potentially
hundreds of individual factors identified in high-throughput
experiments. In addition, this type of pathway identification
reduces the chance of devoting resources to the analysis of false
positives from the high-throughput screen. Although the confi-
dence for each hit in a screen may be low, the confidence in a
pathway that contains many hits is much higher. Finally, pathway
analysis can help to find novel nodes that may not have appeared in
a high-throughput screen. These “hidden nodes” can be false
negatives in a screen, or true negatives that are nonetheless impor-
tant players in the investigated biological system. Our work has
shown that these hidden nodes can often be important to a system
under study, despite the lack of direct experimental evidence [4, 16,
17]. Using the PPI to discover these pathways de novo, rather than
relying on predetermined pathway databases like KEGG [18],
expands our ability to find novel information, and avoids biasing
the results toward well-studied pathways.
Network-based Integration of ‘Omic’ Data 15
2 Materials
Fig. 1 Outline of the Omics Integrator workflow. Epigenomic data (open chromatin regions or histone marks)
and transcriptomic data are used to predict influential transcription factors (TFs). Transcription factors and
proteomic data are then mapped onto an interactome, and the Prize Collecting Steiner Forest algorithm is used
to produce small pathways and subnetworks predicted to be relevant to the experimental system
3 Methods
3.1 Installation 1. You can run Omics Integrator as a web tool on our website:
of Omics Integrator http://fraenkel.mit.edu/omicsintegrator/or install it on your
own computer using the instructions at https://github.com/
fraenkel-lab/OmicsIntegrator. You should make sure you have
all dependencies (see Note 2) installed and that you have the
most updated version of Omics Integrator from our GitHub
page (see Note 3).
Network-based Integration of ‘Omic’ Data 17
3.2 Finding Garnet uses differentially expressed genes from your transcriptomic
Transcriptional assays (i.e., RNA-seq) to predict transcription factors (TFs) that are
Regulators with Garnet likely to be responsible for the altered gene expression. It uses
epigenomic data to find regions of the genome to look for differ-
ential TF binding. For example, this could be ATAC-seq data that
points out accessible regions of the genome in your cell type. The
algorithm will search for transcription factor binding motifs within
regions implicated by your epigenomic data. The strength of these
motifs is then correlated with the magnitude of change of nearby
differentially expressed genes to give each TF a score.
1. Obtain epigenomic data for cell lines related to your samples
from one of the sources listed under Subheading 2.1. Alterna-
tively, if you have epigenomic data for your own samples, you
can use this as well. These data can be in the form of histone
marks ChIP-seq, or DNase-seq or ATAC-seq, all of which
indicate accessible chromatin regions where a TF might be
bound. Collect these data in a BED-formatted file.
2. Go to the Galaxy webserver [23] (see Note 4) to extract the
DNA sequences for your epigenomic regions. Upload your
BED file to Galaxy under the “Get Data” tool, specify which
genome you are using, and then use the “Fetch Alignments/
Sequences”>“Extract Genomic DNA” tool to download a
FASTA-formatted file.
3. Format your experimentally derived gene expression data in a
tab-delimited file with two columns. The first should be the
name of the gene, and the second should be the log-fold-
change of that gene in the study conditions (i.e., tumor
vs. control). We recommend only including genes with a statis-
tically significant change in expression (see Note 5).
4. Create the Garnet configuration file. For an example configu-
ration file, see the README on the Omics Integrator GitHub
page, or the comment on the top of scripts/garnet.py. Your
configuration file should be formatted similarly, but you should
replace the paths to the bedfile, fastafile, and expressionFile with
the paths to the files you created in steps 1–3 in Subheading
3.2. Make sure the annotation files referenced by genefile,
xreffile, and genome are using the correct genome for your
sample (files for mm9 and hg19 are provided with Omics
Integrator).
5. You can change the parameters to your liking (Table 1).
6. Run Garnet on the command line by navigating to the direc-
tory with garnet.py and running python garnet.py yourconfigfile.
cfg. You can also add a --outdir directoryname flag if you would
like to put the output from garnet into a different directory.
Another random document with
no related content on Scribd:
properly prepared gesso is generally laid on the parchment where gold is to come,
so that the raised surface may give the polished metal more effect. The gold over
the bolus was always burnished. It may be noticed that our word ‘size’ is really
‘assise,’ the bed or layer under gilding, for which a gluey substance was suitable.
237. A ‘mordant’ as the word implies is some corrosive liquid, such as is used
by dyers to bite into the fabric and carry in with it the colouring matter. The word
is also employed, as in this passage, for a glutinous size used as ground for gilding,
such as the modern decorator’s ‘gold-size.’ Gold laid in this way has a ‘mat’ surface.
238. The scudo was worth in Tuscany about four-and-sixpence of our money.
In Florence its value was a little greater.
239. See Note 1, ante, p. 248.
240. For the various processes of preparing a panel for painting and for
gilding reference must be made to Cennini’s Trattato, where many technical
matters are elucidated that Vasari passes over almost without notice. It must be
remembered that Cennini writes as a tempera painter, while in Vasari’s time these
elaborate processes were falling out of use. In his chapters 115–119, Cennini gives
recipes for what he calls ‘gesso grosso’ and ‘gesso sottile.’ They are made of the
same materials, ‘volterrano,’ or plaster from Volterra, which is a sulphate of lime
corresponding to our ‘plaster of Paris,’ and size made from parchment shreds; but
the plaster for ‘gesso sottile’ is more finely prepared. The plaster, produced by
calcining gypsum, is first thoroughly slaked by being drenched with water till it
loses all tendency to ‘set,’ and is then as a powder or paste mixed with the heated
size. The size makes the composition dry quite hard, and Cennini speaks of its
having a surface like ivory.
241. See Note 2, ante, p. 248.
242. This we should call ‘shell gold.’ It is in common use. The employment of
the shell represents a very ancient tradition, for shells were the usual receptacles
for pigments in late classical and Early Christian times.
243. This is excellent advice. The architectural character of mosaic decoration,
the distance of the work from the eye, the nature of the technique and material, all
invite to a broad and simple treatment, such as we find in the best mosaics at
Ravenna and Rome. Modern work is often too elaborate and too minute in detail.
244. A modern would say that if the work be really inlaid, it should look like
inlaid work, and not like something else. In the Italy of Vasari’s day however, as we
have seen, painting had so thoroughly got the upper hand, that to ape the nobler
art would seem a legitimate ambition for the mosaicist.
245. The durability of mosaic depends on the cement in which the cubes are
embedded and on the care taken in their setting. The pieces themselves are
indestructible but they will sometimes drop out from the wall. Hence extensive
restorations have been carried out on the Early Christian mosaics at Ravenna and
other places.
246. In his Proemio delle Vite (Opere, I, 242) Vasari explains what he means
by the words ‘antique’ and ‘old.’ The former refers to the so-called ‘classical’ epoch
before Constantine; the latter to the Early Christian and early mediaeval period,
prior to the Italian revival of the thirteenth century.
247. At S. Costanza (see Note 5, ante, p. 27) on the vault of the aisle there are
decorative mosaics of the time of Constantine showing vine scrolls issuing out of
vases, and classical genii gathering the grapes. Birds are introduced among the
tendrils.
248. The mosaics at Ravenna and S. Marco, Venice, are well known. In the
Duomo at Pisa, in the apse, there still remains the Saviour in Glory between the
Madonna and John the Baptist, designed by a certain Cimabue, and the only
existing work which modern criticism would accept as from the hand of the
traditional father of Florentine painting. It may however have been another painter
nicknamed ‘Cimabue,’ who worked at Pisa early in the fourteenth century. The
mosaics of the Tribune of the Baptistry at Florence were executed in 1225 by
Jacobus, a monk of the Franciscan Order, and this fact is attested by an inscription
in mosaic which forms part of the work.
249. This mosaic, called the ‘Navicella,’ represents the Gospel ship manned by
Christ and the disciples, with Peter struggling in the waves. It has been so much
restored that little if any of Giotto’s work remains in it. It was replaced in the
seventeenth century, after some wanderings, in the porch of the present Basilica,
but Vasari saw it of course in the porch of the old, or Constantinian, church, the
entrance end of which was still standing in his day.
250. This mosaic was executed at the end of the fifteenth century by Domenico
Ghirlandajo and his brother over the northern door of the nave of the cathedral of
Florence. It is still in situ but has been greatly restored. The date 1490 is
introduced in the composition.
251. This corresponds with modern practice. The following is from a paper by
Mr James C. Powell, who, as practical worker in glass, has been engaged with Sir
W. B. Richmond in the decoration in mosaic of the vaults of St Paul’s. ‘The glass
which is rendered opaque by the addition of oxide of tin, is coloured as required by
one of the metallic oxides; this is melted in crucibles placed in the furnace, and
when sufficiently fused is ladled out in small quantities on to a metal table, and
pressed into circular cakes about eight inches in diameter and from three-eighths
to half an inch in thickness; these are then cooled gradually in a kiln, and when
cold are ready for cracking up into tesserae, which can be further subdivided as the
mosaicist requires. It is the fractured surface that is used in mosaic generally, as
that has a pleasanter surface and a greater richness of colour; the thickness of the
cake, therefore, regulates the limit of the size of the tesserae, and the fractured
surface gives that roughness of texture which is so valuable from an artistic point
of view.’ (Transactions, R.I.B.A., 1893–4, p. 249).
252. This is a point attended to by the best modern workers in mosaic. Where
gold backgrounds are used it is advisable to carry the gold into the figures by using
it as Vasari suggests for the lights on the draperies. If this were not done the figures
would be liable to tell as dull masses against the more brilliant ground. The use of
gold backgrounds is specially Byzantine. The earlier mosaics at Rome and at
Ravenna have backgrounds of blue generally of a dark shade, which is particularly
fine at Ss. Cosma e Damiano at Rome and in the tomb of Galla Placidia at Ravenna.
The mosaics at S. Sophia at Constantinople of the sixth century had gold
backgrounds, and this is the case also with all the later examples in Italy from the
ninth and tenth centuries onwards. The finest displays of these varied fields of
gold, now deep now lustrous of hue, are to be seen in S. Sophia, S. Marco at Venice,
and the Cappella Palatina at Palermo.
Vasari’s account of the fabrication of the gilded tesserae required for this part
of the work is quite clear and agrees with modern practice. The gold leaf is
hermetically sealed between two sheets of glass by the fusion of a thin film over it.
The technique of the ‘fondi d’ oro,’ or glass vessels adorned with designs in gold,
found in the Roman catacombs, was of the same nature.
253. It has been noticed at some places, as at Torcello, that before the cubes
were laid in the soft cement the whole design was washed in in colour on the
surface of the cement. This facilitated correct setting and avoided any appearance
of white cement squeezed up in the interstices between the cubes. On this
particular feature of the mosaic technique Berger has founded an ingenious theory
of the origin of painting in fresco. It is his thesis, in his Beiträge zur Entwicklungs-
Geschichte der Maltechnik, I, München, 1904, that the ancients did not employ the
fresco process, but that this was evolved in early mediaeval days out of the mosaic
technique as seen, e.g., at Torcello. The stucco, that Vasari describes, must be put
on portion by portion, for it only keeps soft two or three days, and can only be used
for setting the cubes while in a moist state. Now, Berger contends, if the design for
the mosaic be painted in colours on the wet stucco, and the whole allowed to dry,
without any use of the mosaic cubes, we should have a painting in fresco, and he
imagines that fresco painting began in this way. Unfortunately for the theory, (1),
the testimony of Vitruvius and Pliny is absolutely decisive in favour of the
knowledge in antiquity of the fresco technique, and, (2), the use of the coloured
painting on the stucco as a guide for the setting of the cubes was not normal, and
can never have been used so freely as to give rise to a new technique of painting. As
a fact, this colouring of the stucco is objected to by the best modern workers on
aesthetic grounds, for they point out that the lines of grey cement between the
coloured cubes answer to the lead lines in the stained glass window, and should be
reckoned with by the designer as part of his artistic effect. No doubt the older
mosaicists, like the workers in stained glass, instinctively apprehended this, and
had no desire for the coloured cement.
254. One would expect here ‘lime of travertine,’ for what Vasari must mean is
lime prepared by burning this stone, which he recommends elsewhere, e.g.
‘Architettura,’ cap. iv, and ‘Scultura,’ cap. vi (calce di trevertino). The cement here
given is a lime cement mixed with water. A sort of putty mixed with boiled oil is
also employed, and is said to have been introduced by Girolamo Muziano of
Brescia, a contemporary of Vasari. Each mosaic worker seems to have his own
special recipe for this compound.
255. The process described by Vasari of building up the mosaic in situ, tessera
by tessera, according to the design pounced portion by portion on the soft cement,
is the most direct and by far the most artistic, and was employed for all the fine
mosaics of olden time. In modern days labour-saving appliances have been tried,
though it is satisfactory to know that they are all again discarded in the best work
of to-day, such as that of Sir W. B. Richmond in St. Paul’s. One of the methods
referred to, which can be carried out in the studio, is to take a reversed tracing of
the design, covered with gum, and place the cubes face downwards upon it
according to the colour scheme. When they are all in position, as far as can be
judged when working from the back, a coating of cement is laid over them and they
are thus fixed in their places. The whole sheet is then lifted up and cemented in its
proper place on the wall, the drawing to which the faces of the cubes are gummed
being afterwards removed by wetting. A better plan than this is called by the
Italians ‘Mosaico a rivoltatura.’ For this process the tesserae are laid, face upwards,
in a bed of pozzolana, slightly damp, which forms a temporary joint between the
adjacent cubes. Coarse canvas is pasted over the face of the work; it is lifted up,
and the pozzolana brushed out of the interstices. The whole is then applied to the
wall surface and pressed into the cement with which this has been coated. When
the cement has set the canvas is removed from the face.
256. The Duomo of Siena is a veritable museum of floor decorations in incised
outlines and in black and white, in the various processes described by Vasari.
There is a good notice of them in Labarte, Histoire des Arts Industriels. None of
the work is as early as the time of Duccio, but Beccafumi executed a large amount
of it. See the Life of that artist by Vasari.
It is worthy of notice that Dante had something of this kind in his thoughts,
when in the 12th Canto of the Purgatorio he describes the figure designs on the
ground of the first circle of Purgatory.
· · · · ·
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information