• Aucun résultat trouvé

Glycan Pattern Search

N/A
N/A
Protected

Academic year: 2022

Partager "Glycan Pattern Search"

Copied!
1
0
0

Texte intégral

(1)

Glycan pattern search

Davide Alocci, Julien Mariethoz and Frédérique Lisacek Swiss Institute of Bioinformatics

Abstract. Glycans are branched tree-like molecules composed by building blocks linked together by chemical bonds. The molecular structure of a glycan can be encoded into a direct acyclic graph where each node represents a build- ing block and each edge serves as a chemical linkage between two building blocks. In this context RDF is a possible software solution for storing structures and SPARQL can be directly used to perform a substructure search. Glycan pat- tern searching is an important database feature for querying structure and exper-

imental databases.

To perform a glycan pattern search, two questions need to be solved: (i) the au- tomatic generation of a relevant SPARQL query and (ii) the import of known glycan structures into a triple store. First we developed a software solution that reads a structure encoded in a widely used standard in glycomics (GlycoCT), and inserts it into a Virtuoso triple store using an ontology that we specially de- fined for glycan structures. Then we implemented the automatic translation of a pattern into a SPARQL query using the same ontology.

In the end the program is presented as a web interface. The user inputs the gly- can pattern encoded in the GlycoCT format and the software retrieves all the matching full structures in the triple store. This software is integrated and op- erational to search patterns in the appropriate glycan-related databases (e.g., SugarBindDB: sugarbind.expasy.org).

Références

Documents relatifs

We present GLAW-IT 1 (Un Grande Lessico Automaticamente estratto da Wiktionary Italia), a free large dictionary extracted from Wikizionario, the Italian edition of the

1, represent triple patterns and are responsible for routing partially matched copies of queries (referred to as query particles ) towards triple vertices that match the pattern of

In previous work we proposed a secure systems development methodology that uses security patterns.. This methodology applies security throughout the whole lifecycle

The intended learning outcomes of the Software Development Methodologies course cover these aspects. They range from low-level objectives such as “describe the core elements of

In addition, as part of the teepee demo, we have included further use cases that showcase the impact of factors from several dimensions using KGs with different characteristics and

A lay- out uses several HBase tables with different schemas to store RDF triples; each layout provides a tradeoff in terms of query performance/storage.. All operations on a RDF

This platform editorializes semantic enrichments carried out by the TRIPLE project by proposing the discovery of scientific issues in the fields of SSH by taking advantage of

Kando Text structure analysis based on human recognition: cases of newspaper articles and English newspaper articles. Bulletin of the National Center for Science Information Systems,