Current IssuePrevious Issue   Next Issue

Volume 19 No. 6
20 December 2014

He Zhiquan,Ma Wenji,Zhang Jingfen,Xu Dong

2014, 19(6): 559-567.   doi:1007-0214-19-6-559
Abstract ( 154 HTML ( 84   PDF(485KB) ( 663 )   Save

Protein structure Quality Assessment (QA) is an essential component in protein structure prediction and analysis. The relationship between protein sequence and structure often serves as a basis for protein structure QA. In this work, we developed a new Hidden Markov Model (HMM) to assess the compatibility of protein sequence and structure for capturing their complex relationship. More specifically, the emission of the HMM consists of protein local structures in angular space, secondary struct...

Guo2014-6-568/img_1.wmf6.915.0 Jun-tao,Lofgren Shane,Farrel Alvin

2014, 19(6): 568-577.   doi:1007-0214-19-6-568
Abstract ( 405 HTML ( 43   PDF(1088KB) ( 1123 )   Save

Transcription Factors (TFs) are a very diverse family of DNA-binding proteins that play essential roles in the regulation of gene expression through binding to specific DNA sequences. They are considered as one of the prime drug targets since mutations and aberrant TF-DNA interactions are implicated in many diseases. Identification of TF-binding sites on a genomic scale represents a critical step in delineating transcription regulatory networks and remains a major goal in genomic annotations....

Liu Jin,Li Min,Wang Jianxin,Wu Fangxiang,Liu Tianming,Pan Yi

2014, 19(6): 578-595.   doi:1007-0214-19-6-578
Abstract ( 608 HTML ( 63   PDF(822KB) ( 1764 )   Save

Brain tumor segmentation aims to separate the different tumor tissues such as active cells, necrotic core, and edema from normal brain tissues of White Matter (WM), Gray Matter (GM), and Cerebrospinal Fluid (CSF). MRI-based brain tumor segmentation studies are attracting more and more attention in recent years due to non-invasive imaging and good soft tissue contrast of Magnetic Resonance Imaging (MRI) images. With the development of almost two decades, the innovative approaches applying comp...

Guo Xuan,Yu Ning,Gu Feng,Ding Xiaojun,Wang Jianxin,Pan Yi

2014, 19(6): 596-616.   doi:1007-0214-19-6-596
Abstract ( 207 HTML ( 47   PDF(558KB) ( 1052 )   Save

Genome-Wide Association Studies (GWASs) aim to identify genetic variants that are associated with disease by assaying and analyzing hundreds of thousands of Single Nucleotide Polymorphisms (SNPs). Although traditional single-locus statistical approaches have been standardized and led to many interesting findings, a substantial number of recent GWASs indicate that for most disorders, the individual SNPs explain only a small fraction of the genetic causes. Consequently, exploring multi-SNPs int...

Li Hui,Liu Chunmei,Robert Rwebangira Mugizi,Burge Legand

2014, 19(6): 617-623.   doi:1007-0214-19-6-617
Abstract ( 226 HTML ( 46   PDF(1008KB) ( 1018 )   Save

Mass spectrometry is one of the widely utilized important methods to study protein functions and components. The challenge of mono-isotope pattern recognition from large scale protein mass spectral data needs computational algorithms and tools to speed up the analysis and improve the analytic results. We utilized nave Bayes network as the classifier with the assumption that the selected features are independent to predict mono-isotope pattern from mass spectrometry. Mono-isotopes detected fro...

Tian Lu,Quitadamo Andrew,Lin Frederick,Shi Xinghua

2014, 19(6): 624-634.   doi:1007-0214-19-6-624
Abstract ( 385 HTML ( 56   PDF(831KB) ( 771 )   Save

Gene expression is a critical process in biological system that is influenced and modulated by many factors including genetic variation. Expression Quantitative Trait Loci (eQTL) analysis provides a powerful way to understand how genetic variants affect gene expression. For genome wide eQTL analysis, the number of genetic variants and that of genes are large and thus the search space is tremendous. Therefore, eQTL analysis brings about computational and statistical challenges. In this paper, ...

Hudson Cody,Chen Bernard,Che Dongsheng

2014, 19(6): 635-647.   doi:1007-0214-19-6-635
Abstract ( 238 HTML ( 29   PDF(1016KB) ( 919 )   Save

Protein sequence motifs extraction is an important field of bioinformatics since its relevance to the structural analysis. Two major problems are related to this field: (1) searching the motifs within the same protein family; and (2) assuming a window size for the motifs search. This work proposes the Hierarchically Clustered Hidden Markov Model (HC-HMM) approach, which represents the behavior and structure of proteins in terms of a Hidden Markov Model chain and hierarchically clusters each c...

Meng Junping,Dong Shoubin,Tang Liqun,Jiang Yi

2014, 19(6): 648-657.   doi:1007-0214-19-6-648
Abstract ( 206 HTML ( 34   PDF(761KB) ( 635 )   Save

Angiogenesis, the growth of new blood vessel from existing ones, is a pivotal stage in cancer development, and is an important target for cancer therapy. We develop a hybrid mathematical model to understand the mechanisms behind tumor-induced angiogenesis. This model describes uptake of Tumor Angiogenic Factor (TAF) at extracellular level, uses partial differential equation to describe the evolution of endothelial cell density including TAF induced proliferation, chemotaxis to TAF, and haptot...

Zhao Muwei,Zhong Wei,He Jieyue

2014, 19(6): 658-667.   doi:1007-0214-19-6-658
Abstract ( 161 HTML ( 26   PDF(491KB) ( 576 )   Save

Biological network alignment is an important research topic in the field of bioinformatics. Nowadays almost every existing alignment method is designed to solve the deterministic biological network alignment problem. However, it is worth noting that interactions in biological networks, like many other processes in the biological realm, are probabilistic events. Therefore, more accurate and better results can be obtained if biological networks are characterized by probabilistic graphs. This pr...

Hu Kangwen,Xue Jingfeng,Hu Changzhen,Ma Rui,Li Zhiqiang

2014, 19(6): 690-699.  
Abstract ( 123 HTML ( 24 )  ( 373 )   Save

ID-based constant-round group key agreement protocols are efficient in both computation and communication, but previous protocols did not provide valid message authentication. An improvement based on attack analysis is proposed in this paper. The improved method takes full advantage of the data transmitted at various stages of the protocol. By guaranteeing the freshness of authentication messages, the authenticity of the generator of authentication messages, and the completeness of the authen...