• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yu Donghua, Guo Maozu, Liu Xiaoyan, Cheng Shuang. Predicted Results Evaluation and Query Verification of Drug-Target Interaction[J]. Journal of Computer Research and Development, 2019, 56(9): 1881-1888. DOI: 10.7544/issn1000-1239.2019.20180830
Citation: Yu Donghua, Guo Maozu, Liu Xiaoyan, Cheng Shuang. Predicted Results Evaluation and Query Verification of Drug-Target Interaction[J]. Journal of Computer Research and Development, 2019, 56(9): 1881-1888. DOI: 10.7544/issn1000-1239.2019.20180830

Predicted Results Evaluation and Query Verification of Drug-Target Interaction

Funds: This work was supported by the National Natural Science Foundation of China (61871020, 61571164, 61671189), the Scientific Research Key Project of Beijing Educational Committee (KZ201810016019), and the Special Funds for Basic Research Business in Municipal Universities of Beijing Architectural University (X18197, X18198, X18203).
More Information
  • Published Date: August 31, 2019
  • The drug-target interaction prediction is one of the important assistant approaches in drug discovery and design, however, experimental identification and validation of potential drug-target encoded by the human genome is both costly and time-consuming. Therefore, querying and validating the predicted drug-target interaction in databases is an important assessment of prediction methods. In this paper, the query and validation method of drug-target interaction named as DTcheck (drug-target check) is developed and designed with Web spider based on KEGG, DrugBank, ChEMBL databases, which realizes efficient query and validation function for drug-target pair providing both KEGG DRUG ID and KEGG GENES ID. ID mapping function is also designed in DTcheck, which can map Uniprot ID from DrugBank and ChEMBL into KEGG GENE ID. DTcheck expands 907, 766, 458, 40 pairs of new drug-target interaction for Enzyme, IC (ion channel), GPCR (G-protein-coupled receptor), NR (nuclear receptor) standard datasets, respectively. Moreover, combined with query and validation result, the analysis of the prediction results of the BLM (bipartite local models) method shows that evaluation of Top N is more reasonable than AUC (area under curve) value for the prediction method of drug-target interaction. It also shows that the BLMd method with low AUC value is superior to the BLMmax method with high AUC value in predicting the drug-target interaction.
  • Related Articles

    [1]Su Zelin, Zhang Wenfang, Wang Xiaomin. Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext[J]. Journal of Computer Research and Development, 2024, 61(12): 3088-3097. DOI: 10.7544/issn1000-1239.202220133
    [2]Shen Yuan, Song Wei, Zhao Changsheng, Peng Zhiyong. A Cross-Domain Ciphertext Sharing Scheme Supporting Access Behavior Identity Tracing[J]. Journal of Computer Research and Development, 2024, 61(7): 1611-1628. DOI: 10.7544/issn1000-1239.202330618
    [3]Yang Xiaodong, Zhou Hang, Ren Ningning, Yuan Sen, Wang Caifen. Aggregate Signcryption Scheme Supporting Multi-Ciphertext Equality Test for Wireless Body Area Network[J]. Journal of Computer Research and Development, 2023, 60(2): 341-350. DOI: 10.7544/issn1000-1239.202110775
    [4]Du Ruizhong, Li Mingyue, Tian Junfeng. Multi-keyword Ranked Ciphertext Retrieval Scheme Based on Clustering Index[J]. Journal of Computer Research and Development, 2019, 56(3): 555-565. DOI: 10.7544/issn1000-1239.2019.20170830
    [5]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [6]Zhang Kai, Wei Lifei, Li Xiangxue, Chen Jie, Qian Haifeng. An Efficient and Expressive Attribute-Based Encryption Scheme with Chosen Ciphertext Security[J]. Journal of Computer Research and Development, 2016, 53(10): 2239-2247. DOI: 10.7544/issn1000-1239.2016.20160430
    [7]Xiao Siyu, Ge Aijun, Ma Chuangui. Decentralized Attribute-Based Encryption Scheme with Constant-Size Ciphertexts[J]. Journal of Computer Research and Development, 2016, 53(10): 2207-2215. DOI: 10.7544/issn1000-1239.2016.20160459
    [8]Dong Xiaolei. Advances of Privacy Preservation in Internet of Things[J]. Journal of Computer Research and Development, 2015, 52(10): 2341-2352. DOI: 10.7544/issn1000-1239.2015.20150764
    [9]Zhang Jie, Ge Aijun, Ma Chuangui. Fully Secure Hierarchical Inner Product Encryption with Constant-Size Ciphertexts[J]. Journal of Computer Research and Development, 2015, 52(3): 691-701. DOI: 10.7544/issn1000-1239.2015.20131413
    [10]Zhang Hao, Zhao Lei, Feng Bo, Yu Rongwei, and Liu Weijie. CACDP: A Cryptographic Access Control for Dynamic Policy in Cloud Storage[J]. Journal of Computer Research and Development, 2014, 51(7): 1424-1435.

Catalog

    Article views (1240) PDF downloads (503) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return