Skip to main content

previous disabled Page of 15
and
  1. No Access

    Protocol

    Mining Biomedical Data Using MetaMap Transfer (MMTx) and the Unified Medical Language System (UMLS)

    Detailed instruction is described for map** unstructured, free text data into common biomedical concepts (drugs, diseases, anatomy, and so on) found in the Unified Medical Language System using MetaMap Trans...

    John D. Osborne, Simon Lin, Lihua Julie Zhu, Warren A. Kibbe in Gene Function Analysis (2007)

  2. No Access

    Protocol

    Proteomic Data Exchange and Storage

    The ever increasing volumes of proteomic data now being produced by laboratories across the world have resulted in major issues in data storage and accessibility. The further demands of multilaboratory initiat...

    Sandra Orchard, Philip Jones, Chris Taylor in Mass Spectrometry Data Analysis in Proteom… (2007)

  3. No Access

    Protocol

    Construction of Simple and Efficient DNA Vector-Based Short Hairpin RNA Expression Systems for Specific Gene Silencing in Mammalian Cells

    RNA interference (RNAi) is an evolutionarily conserved mechanism of posttranscriptional gene silencing induced by introducing the double-stranded RNAs (dsRNAs) into cells. Recent progress in RNAi-based gene-si...

    Tsung-Lin Cheng, Wen-Tsan Chang in Gene Function Analysis (2007)

  4. No Access

    Protocol

    Assaying Calpain Activity

    The calpains represent a well-conserved family of intracellular proteases that exhibit broad substrate specificity and consequently influence many cellular processes. Calpain activity regulates the turnover of...

    Neil O. Carragher in Adhesion Protein Protocols (2007)

  5. No Access

    Protocol

    Microarray Technology for Use in Molecular Epidemiology

    Microarrays are a powerful laboratory tool for the simultaneous assessment of the activity of thousands genes. Remarkable advances in biological sample collection, preparation and automation of hybridization h...

    Suzanne D. Vernon, Toni Whistler in Microarrays (2007)

  6. No Access

    Protocol

    Sequence Handling by Sequence Analysis Toolbox v1.0

    The fact that mass spectrometry have become a high-throughput method calls for bioinformatic tools for automated sequence handling and prediction. For efficient use of bioinformatic tools, it is important that...

    Christian Ravnsborg Ingrell, Rune Matthiesen in Mass Spectrometry Data Analysis in Proteom… (2007)

  7. No Access

    Protocol

    Predicting DNA Duplex Stability on Oligonucleotide Arrays

    DNA duplex stability on oligonucleotide microarray was calculated using recently developed electrostatic theory of on-array hybridization thermodynamics. In this method, the first step is to finding the enthal...

    Arnold Vainrub, Norha Deluge, **aolin Zhang, **aochuan Zhou, **aolian Gao in Microarrays (2007)

  8. No Access

    Protocol

    Nonlinear Predictive Modeling of MHC Class II-Peptide Binding Using Bayesian Neural Networks

    Methods for predicting the binding affinity of peptides to the MHC have become more sophisticated in the past 5–10 years. It is possible to use computational quantitative structure-activity methods to build mo...

    David A. Winkler, Frank R. Burden in Immunoinformatics (2007)

  9. No Access

    Protocol

    Predicting Virulence Factors of Immunological Interest

    In this chapter, three prediction servers used for predicting virulence factors, bacterial toxins, and neurotoxins have been described. VICMpred server predicts the functional proteins of gram-negative bacteri...

    Sudipto Saha, Gajendra P.S. Raghava in Immunoinformatics (2007)

  10. No Access

    Protocol

    A Bacterial/Yeast Merged Two-Hybrid System

    The yeast two-hybrid system is a useful tool for identifying new protein-protein interactions, and for the dissection of previously identified interactions. An important issue in protein-interaction studies is...

    Nadezhda Y. Tikhmyanova, Eugene A. Izumchenko in Gene Function Analysis (2007)

  11. No Access

    Protocol

    A Microarray-Based Method to Profile Global microRNA Expression in Human and Mouse

    The microRNAs (or miRNAs) are small noncoding RNAs (21—25 nt) that are processed from large hairpin RNA precursors and are believed to be involved in a wide range of developmental and cellular processes, by ei...

    Ranjan J. Perera in Microarrays (2007)

  12. No Access

    Protocol

    In Silico Gene Selection for Custom Oligonucleotide Microarray Design

    A method for systematically selecting the large number of sequences needed to custom design an oligonucleotide microarray was presented. This approach uses a Perl script to query sequence databases with gene l...

    Conor W. Sipe, Vijay R. Dondeti, Margaret S. Saha in Microarrays (2007)

  13. No Access

    Protocol

    Prediction Methods for B-cell Epitopes

    In this chapter, two prediction servers of linear B-cell epiotpes have been described; (i) BcePred, based on physico-chemical properties that include hydrophilicity, flexibility/mobility, accessibility, polari...

    Sudipto Saha, Gajendra P.S. Raghava in Immunoinformatics (2007)

  14. No Access

    Protocol

    Engineering Cys2His2 Zinc Finger Domains Using a Bacterial Cell-Based Two-Hybrid Selection System

    Synthetic Cys2His2 zinc finger domains with novel DNA-binding specificities can be identified from large randomized libraries using selection methodologies such as phage display. It has been previously demonst...

    Stacey Thibodeau-Beganny, J. Keith Joung in Gene Function Analysis (2007)

  15. No Access

    Protocol

    Immunoinformatics and the in Silico Prediction of Immunogenicity

    Immunoinformatics is the application of informatics techniques to molecules of the immune system. One of its principal goals is the effective prediction of immunogenicity, be that at the level of epitope, subu...

    Darren R. Flower in Immunoinformatics (2007)

  16. No Access

    Protocol

    Useful Mass Spectrometry Programs Freely Available on the Internet

    The intention with this chapter is to give an overview of a broad range of freely available programs on the internet which are useful for analyses of mass spectrometry data. The list is by no means a full list...

    Rune Matthiesen in Mass Spectrometry Data Analysis in Proteomics (2007)

  17. No Access

    Protocol

    Organization of Proteomics Data With YassDB

    In recent years the organization of mass spectrometry (MS) data obtained in large-scale proteomics projects became an important issue. This has catalyzed the development of a few different database schemes for...

    Allan L. Thomsen, Kris Laukens in Mass Spectrometry Data Analysis in Proteom… (2007)

  18. No Access

    Protocol

    The IMGT/HLA Database

    The human leukocyte antigen (HLA) complex is located within the 6p21.3 region on the short arm of human chromosome 6 and contains more than 220 genes of diverse function. Many of the genes encode proteins of t...

    James Robinson, Steven G.E. Marsh in Immunoinformatics (2007)

  19. No Access

    Protocol

    SYFPEITHI

    Reverse immunology has been used for about 12 years in order to identify T-cell epitopes from pathogens or tumor-associated antigens. In this chapter, we discuss the advantages and pitfalls of T-cell epitope p...

    Mathias M. Schuler, Maria-Dorothea Nastke, Stefan Stevanović in Immunoinformatics (2007)

  20. No Access

    Protocol

    Structural Basis for HLA-A2 Supertypes

    The human leukocyte antigen (HLA) alleles are extremely polymorphic among ethnic population, and the peptide-binding specificity varies for different alleles in a combinatorial manner. However, it has been sug...

    Pandjassarame Kangueane, Meena Kishore Sakharkar in Immunoinformatics (2007)

previous disabled Page of 15