Learn More
O-glycosylation is one of the most important, frequent and complex post-translational modifications. This modification can activate and affect protein functions. Here, we present three support vector machines models based on physical properties, 0/1 system, and the system combining the above two features. The prediction accuracies of the three models have(More)
Protein SUMO modification is an important post-translational modification and the optimization of prediction methods remains a challenge. Here, by using Support Vector Machines algorithm (SVM), a novel computational method was developed for SUMO modification site prediction based on Sequential Forward Selection (SFS) of hundreds of amino acid properties,(More)
We estimated the reproducibility of tandem mass spectra for the widely used collision-induced dissociation (CID) of peptide ions. Using the Pearson correlation coefficient as a measure of spectral similarity, we found that the within-experiment reproducibility of fragment ion intensities is very high (about 0.85). However, across different experiments and(More)
BACKGROUND T cell receptor (TCR) reflects the status and function of T cells. We previously developed a gene melting spectral pattern (GMSP) assay, which rapidly detects clonal expansion of the T cell receptor β variable gene (TCRBV) in patients with HBV by using quantitative real-time reverse transcription PCR (qRT-PCR) with DNA melting curve analysis.(More)
For wireless sensor networks, pairwise key establishment is a fundamental security service. However, establishing pairwise keys in wireless sensor networks is not a trivial thing, particularly due to the resource constraints on sensor nodes, and the nodes capture attack. In this paper, we propose a new efficient pairwise key management scheme based on the(More)
One of the important objectives in mass spectrometry-based proteomics is the identification of post-translationally modified sites in cellular and extracellular proteomes. Proteomics techniques have been particularly effective in studying protein phosphorylation, where tens of thousands of new sites have been recently discovered in all domains of life. Such(More)
Numerous cluster-based key management schemes have been proposed to secure sensor networks. Nevertheless, most existing schemes did not take the legitimacy of the cluster- head into consideration, which might highly vulnerable to several attacks such as sinkhole; wormhole and selective-forwarding, besides, the network should deal with an addition of new(More)