• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhu Shijia, Wang Yadong, Ji Chunguang, and Tao Haijun. TGG Based Automatic Transformation Between SBML and Other Biological Modeling Languages[J]. Journal of Computer Research and Development, 2011, 48(5): 885-896.
Citation: Zhu Shijia, Wang Yadong, Ji Chunguang, and Tao Haijun. TGG Based Automatic Transformation Between SBML and Other Biological Modeling Languages[J]. Journal of Computer Research and Development, 2011, 48(5): 885-896.

TGG Based Automatic Transformation Between SBML and Other Biological Modeling Languages

More Information
  • Published Date: May 14, 2011
  • XSLT based transformation, between SBML and other biological modeling languages, cannot describe comprehensive context-sensitive semantic correspondences among the inner elements of biological modeling objects; cannot guarantee the determinacy and syntactic correctness of transformation results; and also cannot meet industrial transformation requirements. Toward these problems, a triple graph grammar (TGG) based transformation method is presented, which utilizes graph grammars to define SBML schema and other biological modeling languages, and utilizes TGG to construct transformation between them. On this basis, a transformation algorithm is presented, which has polynomial time complexity and can guarantee determinacy and syntactic correctness. Compared with the traditional transformation between SBML and other biological modeling languages, the method in this paper has the following characteristics: 1) It utilizes context-sensitive grammar and has strong description capability; 2) It imposes graph-based approach to simplify transformation definition process; 3) It only needs static analysis of transformation rules at the design time without exploring dynamic analysis, because validation must be achieved if transformation rules satisfy some constraints; 4) It only requires to change direction of transformation rules to implement bi-directional transformation, without modifying any element; and 5) It supports incremental change propagation, since it preserves the correspondence information between source and target objects. Finally, correctness and effectiveness of this method are verified through an example of transformation between Petri net and SBML.
  • Related Articles

    [1]Shi Jianzhi, Wang Xingwei, Yi Bo. Analysis Method of the JointCloud Resource Market: A Game-Theoretic Approach[J]. Journal of Computer Research and Development, 2023, 60(9): 1988-1999. DOI: 10.7544/issn1000-1239.202330411
    [2]Liu Liu, Wang Yuyao, Ni Qixuan, Cao Jie, Bu Zhan. A Link Prediction Approach in Temporal Networks Based on Game Theory[J]. Journal of Computer Research and Development, 2019, 56(9): 1953-1964. DOI: 10.7544/issn1000-1239.2019.20180842
    [3]Dai Wangzhou, Zhou Zhihua. A Survey on Inductive Logic Programming[J]. Journal of Computer Research and Development, 2019, 56(1): 138-154. DOI: 10.7544/issn1000-1239.2019.20180759
    [4]Wang Bo, Liu Jinglei. An Algorithm for Computing Core of Boolean Game[J]. Journal of Computer Research and Development, 2018, 55(8): 1735-1750. DOI: 10.7544/issn1000-1239.2018.20180360
    [5]Wu Fan, Zheng Zhenzhe. Game Theory Based Spectrum Dynamic Management[J]. Journal of Computer Research and Development, 2016, 53(1): 38-52. DOI: 10.7544/issn1000-1239.2016.20150652
    [6]Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, Zhu Jianming. Game-Theoretic Mechanism for Cryptographic Protocol[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.
    [7]Mei Canhua, Zhang Yuhong, Hu Xuegang, and Li Peipei. A Weighted Algorithm of Inductive Transfer Learning Based on Maximum Entropy Model[J]. Journal of Computer Research and Development, 2011, 48(9): 1722-1728.
    [8]Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.
    [9]Shi Jin, Lu Yin, and Xie Li. Dynamic Intrusion Response Based on Game Theory[J]. Journal of Computer Research and Development, 2008, 45(5): 747-757.
    [10]Huang Guanyao, Hong Peilin, and Li Jinsheng. P2P-VCG: A Game Theory Proposal for Bandwidth Allocation[J]. Journal of Computer Research and Development, 2007, 44(1): 78-84.

Catalog

    Article views (821) PDF downloads (530) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return