Computational Systems Biology of Pathogen-Host Interactions

A thorough understanding of pathogenic microorganisms and their interactions with host organisms is crucial to prevent infectious threats due to the fact that Pathogen-Host Interactions (PHIs) have critical roles in initiating and sustaining infections. Therefore, the analysis of infection mechanism...

Full description

Autores:
Tipo de recurso:
Book
Fecha de publicación:
2016
Institución:
Universidad de Bogotá Jorge Tadeo Lozano
Repositorio:
Expeditio: repositorio UTadeo
Idioma:
eng
OAI Identifier:
oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/14247
Acceso en línea:
https://www.frontiersin.org/research-topics/2817/computational-systems-biology-of-pathogen-host-interactions
http://hdl.handle.net/20.500.12010/14247
Palabra clave:
Microbiology
Science (General)
Bioinformatics
OMICS data
Pathogen-host interaction
Computational Biology
Network Inference
Constraint-based modeling
Image-based systems biology
Protein-protein interaction
Gene regulatory network
Text mining
Rights
License
Abierto (Texto Completo)
id UTADEO2_28e420482a9a8029e5235a30725e3348
oai_identifier_str oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/14247
network_acronym_str UTADEO2
network_name_str Expeditio: repositorio UTadeo
repository_id_str
dc.title.spa.fl_str_mv Computational Systems Biology of Pathogen-Host Interactions
title Computational Systems Biology of Pathogen-Host Interactions
spellingShingle Computational Systems Biology of Pathogen-Host Interactions
Microbiology
Science (General)
Bioinformatics
OMICS data
Pathogen-host interaction
Computational Biology
Network Inference
Constraint-based modeling
Image-based systems biology
Protein-protein interaction
Gene regulatory network
Text mining
title_short Computational Systems Biology of Pathogen-Host Interactions
title_full Computational Systems Biology of Pathogen-Host Interactions
title_fullStr Computational Systems Biology of Pathogen-Host Interactions
title_full_unstemmed Computational Systems Biology of Pathogen-Host Interactions
title_sort Computational Systems Biology of Pathogen-Host Interactions
dc.subject.spa.fl_str_mv Microbiology
Science (General)
Bioinformatics
OMICS data
topic Microbiology
Science (General)
Bioinformatics
OMICS data
Pathogen-host interaction
Computational Biology
Network Inference
Constraint-based modeling
Image-based systems biology
Protein-protein interaction
Gene regulatory network
Text mining
dc.subject.lemb.spa.fl_str_mv Pathogen-host interaction
Computational Biology
Network Inference
Constraint-based modeling
Image-based systems biology
dc.subject.keyword.spa.fl_str_mv Protein-protein interaction
Gene regulatory network
Text mining
description A thorough understanding of pathogenic microorganisms and their interactions with host organisms is crucial to prevent infectious threats due to the fact that Pathogen-Host Interactions (PHIs) have critical roles in initiating and sustaining infections. Therefore, the analysis of infection mechanisms through PHIs is indispensable to identify diagnostic biomarkers and next-generation drug targets and then to develop strategic novel solutions against drug-resistance and for personalized therapy. Traditional approaches are limited in capturing mechanisms of infection since they investigate hosts or pathogens individually. On the other hand, the systems biology approach focuses on the whole PHI system, and is more promising in capturing infection mechanisms. Here, we bring together studies on the below listed sections to present the current picture of the research on Computational Systems Biology of Pathogen-Host Interactions:- Computational Inference of PHI Networks using Omics Data- Computational Prediction of PHIs- Text Mining of PHI Data from the Literature- Mathematical Modeling and Bioinformatic Analysis of PHIs Computational Inference of PHI Networks using Omics Data Gene regulatory, metabolic and protein-protein networks of PHI systems are crucial for a thorough understanding of infection mechanisms. Great advances in molecular biology and biotechnology have allowed the production of related omics data experimentally. Many computational methods are emerging to infer molecular interaction networks of PHI systems from the corresponding omics data. Computational Prediction of PHIs Due to the lack of experimentally-found PHI data, many computational methods have been developed for the prediction of pathogen-host protein-protein interactions. Despite being emerging, currently available experimental PHI data are far from complete for a systems view of infection mechanisms through PHIs. Therefore, computational methods are the main tools to predict new PHIs. To this end, the development of new computational methods is of great interest. Text Mining of PHI Data from Literature Despite the recent development of many PHI-specific databases, most data relevant to PHIs are still buried in the biomedical literature, which demands for the use of text mining techniques to unravel PHIs hidden in the literature. Only some rare efforts have been performed to achieve this aim. Therefore, the development of novel text mining methods specific for PHI data retrieval is of key importance for efficient use of the available literature. Mathematical Modeling and Bioinformatic Analysis of PHIs After the reconstruction of PHI networks experimentally and/or computationally, their mathematical modeling and detailed computational analysis is required using bioinformatics tools to get insights on infection mechanisms. Bioinformatics methods are increasingly applied to analyze the increasing amount of experimentally-found and computationally-predicted PHI data. Acknowledgements: We, editors of this e-book, acknowledge Emrah Nikerel (Yeditepe University, Turkey) and Arzucan Özgür (Bogaaziçi University, Turkey) for their contributions during the initiation of the Research Topic.
publishDate 2016
dc.date.created.none.fl_str_mv 2016-01-19
dc.date.accessioned.none.fl_str_mv 2020-10-06T16:12:08Z
dc.date.available.none.fl_str_mv 2020-10-06T16:12:08Z
dc.type.local.spa.fl_str_mv Libro
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_2f33
format http://purl.org/coar/resource_type/c_2f33
dc.identifier.isbn.none.fl_str_mv 978-2-889198-21-4
dc.identifier.issn.none.fl_str_mv 1664-8714
dc.identifier.other.none.fl_str_mv https://www.frontiersin.org/research-topics/2817/computational-systems-biology-of-pathogen-host-interactions
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/20.500.12010/14247
dc.identifier.doi.none.fl_str_mv 10.3389/978-2-88919-821-4
identifier_str_mv 978-2-889198-21-4
1664-8714
10.3389/978-2-88919-821-4
url https://www.frontiersin.org/research-topics/2817/computational-systems-biology-of-pathogen-host-interactions
http://hdl.handle.net/20.500.12010/14247
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.references.none.fl_str_mv Durmus¸, S., Çakır, T., Guthke, R., eds. (2016). Computational Systems Biology of Pathogen-Host Interactions. Lausanne: Frontiers Media. doi: 10.3389/978-2-88919-821-4
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.local.spa.fl_str_mv Abierto (Texto Completo)
dc.rights.creativecommons.none.fl_str_mv https://creativecommons.org/licenses/by/4.0/
rights_invalid_str_mv Abierto (Texto Completo)
https://creativecommons.org/licenses/by/4.0/
http://purl.org/coar/access_right/c_abf2
dc.format.extent.spa.fl_str_mv 220 páginas
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Frontiers Media SA
institution Universidad de Bogotá Jorge Tadeo Lozano
bitstream.url.fl_str_mv https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/1/Computational%20Systems%20Biology%20of%20Pathogen-Host%20Interactions.PDF
https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/2/license.txt
https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/3/Computational%20Systems%20Biology%20of%20Pathogen-Host%20Interactions.PDF.jpg
bitstream.checksum.fl_str_mv e24964f77b4df4b8a86aadd7370db5ff
abceeb1c943c50d3343516f9dbfc110f
69249ac6f669b18bfabf019e66e592bf
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional - Universidad Jorge Tadeo Lozano
repository.mail.fl_str_mv expeditio@utadeo.edu.co
_version_ 1818152790881468416
spelling 2020-10-06T16:12:08Z2020-10-06T16:12:08Z2016-01-19978-2-889198-21-41664-8714https://www.frontiersin.org/research-topics/2817/computational-systems-biology-of-pathogen-host-interactionshttp://hdl.handle.net/20.500.12010/1424710.3389/978-2-88919-821-4220 páginasapplication/pdfengFrontiers Media SAMicrobiologyScience (General)BioinformaticsOMICS dataPathogen-host interactionComputational BiologyNetwork InferenceConstraint-based modelingImage-based systems biologyProtein-protein interactionGene regulatory networkText miningComputational Systems Biology of Pathogen-Host InteractionsLibrohttp://purl.org/coar/resource_type/c_2f33Abierto (Texto Completo)https://creativecommons.org/licenses/by/4.0/http://purl.org/coar/access_right/c_abf2Durmus¸, S., Çakır, T., Guthke, R., eds. (2016). Computational Systems Biology of Pathogen-Host Interactions. Lausanne: Frontiers Media. doi: 10.3389/978-2-88919-821-4A thorough understanding of pathogenic microorganisms and their interactions with host organisms is crucial to prevent infectious threats due to the fact that Pathogen-Host Interactions (PHIs) have critical roles in initiating and sustaining infections. Therefore, the analysis of infection mechanisms through PHIs is indispensable to identify diagnostic biomarkers and next-generation drug targets and then to develop strategic novel solutions against drug-resistance and for personalized therapy. Traditional approaches are limited in capturing mechanisms of infection since they investigate hosts or pathogens individually. On the other hand, the systems biology approach focuses on the whole PHI system, and is more promising in capturing infection mechanisms. Here, we bring together studies on the below listed sections to present the current picture of the research on Computational Systems Biology of Pathogen-Host Interactions:- Computational Inference of PHI Networks using Omics Data- Computational Prediction of PHIs- Text Mining of PHI Data from the Literature- Mathematical Modeling and Bioinformatic Analysis of PHIs Computational Inference of PHI Networks using Omics Data Gene regulatory, metabolic and protein-protein networks of PHI systems are crucial for a thorough understanding of infection mechanisms. Great advances in molecular biology and biotechnology have allowed the production of related omics data experimentally. Many computational methods are emerging to infer molecular interaction networks of PHI systems from the corresponding omics data. Computational Prediction of PHIs Due to the lack of experimentally-found PHI data, many computational methods have been developed for the prediction of pathogen-host protein-protein interactions. Despite being emerging, currently available experimental PHI data are far from complete for a systems view of infection mechanisms through PHIs. Therefore, computational methods are the main tools to predict new PHIs. To this end, the development of new computational methods is of great interest. Text Mining of PHI Data from Literature Despite the recent development of many PHI-specific databases, most data relevant to PHIs are still buried in the biomedical literature, which demands for the use of text mining techniques to unravel PHIs hidden in the literature. Only some rare efforts have been performed to achieve this aim. Therefore, the development of novel text mining methods specific for PHI data retrieval is of key importance for efficient use of the available literature. Mathematical Modeling and Bioinformatic Analysis of PHIs After the reconstruction of PHI networks experimentally and/or computationally, their mathematical modeling and detailed computational analysis is required using bioinformatics tools to get insights on infection mechanisms. Bioinformatics methods are increasingly applied to analyze the increasing amount of experimentally-found and computationally-predicted PHI data. Acknowledgements: We, editors of this e-book, acknowledge Emrah Nikerel (Yeditepe University, Turkey) and Arzucan Özgür (Bogaaziçi University, Turkey) for their contributions during the initiation of the Research Topic.Durmus, SalihaCak?r, TunahanGuthke, ReinhardORIGINALComputational Systems Biology of Pathogen-Host Interactions.PDFComputational Systems Biology of Pathogen-Host Interactions.PDFVer documentoapplication/pdf37740202https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/1/Computational%20Systems%20Biology%20of%20Pathogen-Host%20Interactions.PDFe24964f77b4df4b8a86aadd7370db5ffMD51open accessLICENSElicense.txtlicense.txttext/plain; charset=utf-82938https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/2/license.txtabceeb1c943c50d3343516f9dbfc110fMD52open accessTHUMBNAILComputational Systems Biology of Pathogen-Host Interactions.PDF.jpgComputational Systems Biology of Pathogen-Host Interactions.PDF.jpgIM Thumbnailimage/jpeg16507https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/3/Computational%20Systems%20Biology%20of%20Pathogen-Host%20Interactions.PDF.jpg69249ac6f669b18bfabf019e66e592bfMD53open access20.500.12010/14247oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/142472021-02-22 19:08:41.094open accessRepositorio Institucional - Universidad Jorge Tadeo Lozanoexpeditio@utadeo.edu.coQXV0b3Jpem8gYWwgU2lzdGVtYSBkZSBCaWJsaW90ZWNhcyBVbml2ZXJzaWRhZCBkZSBCb2dvdMOhIEpvcmdlIFRhZGVvIExvemFubyBwYXJhIHF1ZSBjb24gZmluZXMgYWNhZMOpbWljb3MsIHByZXNlcnZlLCBjb25zZXJ2ZSwgb3JnYW5pY2UsIGVkaXRlIHkgbW9kaWZpcXVlIHRlY25vbMOzZ2ljYW1lbnRlIGVsIGRvY3VtZW50byBhbnRlcmlvcm1lbnRlIGNhcmdhZG8gYWwgUmVwb3NpdG9yaW8gSW5zdGl0dWNpb25hbCBFeHBlZGl0aW8KCkV4Y2VwdHVhbmRvIHF1ZSBlbCBkb2N1bWVudG8gc2VhIGNvbmZpZGVuY2lhbCwgYXV0b3Jpem8gYSB1c3VhcmlvcyBpbnRlcm5vcyB5IGV4dGVybm9zIGRlIGxhIEluc3RpdHVjacOzbiBhIGNvbnN1bHRhciB5IHJlcHJvZHVjaXIgZWwgY29udGVuaWRvIGRlbCBkb2N1bWVudG8gcGFyYSBmaW5lcyBhY2Fkw6ltaWNvcyBudW5jYSBwYXJhIHVzb3MgY29tZXJjaWFsZXMsIGN1YW5kbyBtZWRpYW50ZSBsYSBjb3JyZXNwb25kaWVudGUgY2l0YSBiaWJsaW9ncsOhZmljYSBzZSBsZSBkZSBjcsOpZGl0byBhIGxhIG9icmEgeSBzdShzKSBhdXRvcihzKS4KCkV4Y2VwdHVhbmRvIHF1ZSBlbCBkb2N1bWVudG8gc2VhIGNvbmZpZGVuY2lhbCwgYXV0b3Jpem8gYXBsaWNhciBsYSBsaWNlbmNpYSBkZWwgZXN0w6FuZGFyIGludGVybmFjaW9uYWwgQ3JlYXRpdmUgQ29tbW9ucyAoQXR0cmlidXRpb24tTm9uQ29tbWVyY2lhbC1Ob0Rlcml2YXRpdmVzIDQuMCBJbnRlcm5hdGlvbmFsKSBxdWUgaW5kaWNhIHF1ZSBjdWFscXVpZXIgcGVyc29uYSBwdWVkZSB1c2FyIGxhIG9icmEgZGFuZG8gY3LDqWRpdG8gYWwgYXV0b3IsIHNpbiBwb2RlciBjb21lcmNpYXIgY29uIGxhIG9icmEgeSBzaW4gZ2VuZXJhciBvYnJhcyBkZXJpdmFkYXMuCgpFbCAobG9zKSBhdXRvcihlcykgY2VydGlmaWNhKG4pIHF1ZSBlbCBkb2N1bWVudG8gbm8gaW5mcmluZ2UgbmkgYXRlbnRhIGNvbnRyYSBkZXJlY2hvcyBpbmR1c3RyaWFsZXMsIHBhdHJpbW9uaWFsZXMsIGludGVsZWN0dWFsZXMsIG1vcmFsZXMgbyBjdWFscXVpZXIgb3RybyBkZSB0ZXJjZXJvcywgYXPDrSBtaXNtbyBkZWNsYXJhbiBxdWUgbGEgVW5pdmVyc2lkYWQgSm9yZ2UgVGFkZW8gTG96YW5vIHNlIGVuY3VlbnRyYSBsaWJyZSBkZSB0b2RhIHJlc3BvbnNhYmlsaWRhZCBjaXZpbCwgYWRtaW5pc3RyYXRpdmEgeS9vIHBlbmFsIHF1ZSBwdWVkYSBkZXJpdmFyc2UgZGUgbGEgcHVibGljYWNpw7NuIGRlbCB0cmFiYWpvIGRlIGdyYWRvIHkvbyB0ZXNpcyBlbiBjYWxpZGFkIGRlIGFjY2VzbyBhYmllcnRvIHBvciBjdWFscXVpZXIgbWVkaW8uCgpFbiBjdW1wbGltaWVudG8gY29uIGxvIGRpc3B1ZXN0byBlbiBsYSBMZXkgMTU4MSBkZSAyMDEyIHkgZXNwZWNpYWxtZW50ZSBlbiB2aXJ0dWQgZGUgbG8gZGlzcHVlc3RvIGVuIGVsIEFydMOtY3VsbyAxMCBkZWwgRGVjcmV0byAxMzc3IGRlIDIwMTMsIGF1dG9yaXpvIGEgbGEgVW5pdmVyc2lkYWQgSm9yZ2UgVGFkZW8gTG96YW5vIGEgcHJvY2VkZXIgY29uIGVsIHRyYXRhbWllbnRvIGRlIGxvcyBkYXRvcyBwZXJzb25hbGVzIHBhcmEgZmluZXMgYWNhZMOpbWljb3MsIGhpc3TDs3JpY29zLCBlc3RhZMOtc3RpY29zIHkgYWRtaW5pc3RyYXRpdm9zIGRlIGxhIEluc3RpdHVjacOzbi4gRGUgY29uZm9ybWlkYWQgY29uIGxvIGVzdGFibGVjaWRvIGVuIGVsIGFydMOtY3VsbyAzMCBkZSBsYSBMZXkgMjMgZGUgMTk4MiB5IGVsIGFydMOtY3VsbyAxMSBkZSBsYSBEZWNpc2nDs24gQW5kaW5hIDM1MSBkZSAxOTkzLCBhY2xhcmFtb3MgcXVlIOKAnExvcyBkZXJlY2hvcyBtb3JhbGVzIHNvYnJlIGVsIHRyYWJham8gc29uIHByb3BpZWRhZCBkZSBsb3MgYXV0b3Jlc+KAnSwgbG9zIGN1YWxlcyBzb24gaXJyZW51bmNpYWJsZXMsIGltcHJlc2NyaXB0aWJsZXMsIGluZW1iYXJnYWJsZXMgZSBpbmFsaWVuYWJsZXMuCgpDb24gZWwgcmVnaXN0cm8gZW4gbGEgcMOhZ2luYSwgYXV0b3Jpem8gZGUgbWFuZXJhIGV4cHJlc2EgYSBsYSBGVU5EQUNJw5NOIFVOSVZFUlNJREFEIERFIEJPR09Uw4EgSk9SR0UgVEFERU8gTE9aQU5PLCBlbCB0cmF0YW1pZW50byBkZSBtaXMgZGF0b3MgcGVyc29uYWxlcyBwYXJhIHByb2Nlc2FyIG8gY29uc2VydmFyLCBjb24gZmluZXMgZXN0YWTDrXN0aWNvcywgZGUgY29udHJvbCBvIHN1cGVydmlzacOzbiwgYXPDrSBjb21vIHBhcmEgZWwgZW52w61vIGRlIGluZm9ybWFjacOzbiB2w61hIGNvcnJlbyBlbGVjdHLDs25pY28sIGRlbnRybyBkZWwgbWFyY28gZXN0YWJsZWNpZG8gcG9yIGxhIExleSAxNTgxIGRlIDIwMTIgeSBzdXMgZGVjcmV0b3MgY29tcGxlbWVudGFyaW9zIHNvYnJlIFRyYXRhbWllbnRvIGRlIERhdG9zIFBlcnNvbmFsZXMuIEVuIGN1YWxxdWllciBjYXNvLCBlbnRpZW5kbyBxdWUgcG9kcsOpIGhhY2VyIHVzbyBkZWwgZGVyZWNobyBhIGNvbm9jZXIsIGFjdHVhbGl6YXIsIHJlY3RpZmljYXIgbyBzdXByaW1pciBsb3MgZGF0b3MgcGVyc29uYWxlcyBtZWRpYW50ZSBlbCBlbnbDrW8gZGUgdW5hIGNvbXVuaWNhY2nDs24gZXNjcml0YSBhbCBjb3JyZW8gZWxlY3Ryw7NuaWNvIHByb3RlY2Npb25kYXRvc0B1dGFkZW8uZWR1LmNvLgoKTGEgRlVOREFDScOTTiBVTklWRVJTSURBRCBERSBCT0dPVMOBIEpPUkdFIFRBREVPIExPWkFOTyBubyB1dGlsaXphcsOhIGxvcyBkYXRvcyBwZXJzb25hbGVzIHBhcmEgZmluZXMgZGlmZXJlbnRlcyBhIGxvcyBhbnVuY2lhZG9zIHkgZGFyw6EgdW4gdXNvIGFkZWN1YWRvIHkgcmVzcG9uc2FibGUgYSBzdXMgZGF0b3MgcGVyc29uYWxlcyBkZSBhY3VlcmRvIGNvbiBsYSBkaXJlY3RyaXogZGUgUHJvdGVjY2nDs24gZGUgRGF0b3MgUGVyc29uYWxlcyBxdWUgcG9kcsOhIGNvbnN1bHRhciBlbjogaHR0cDovL3d3dy51dGFkZW8uZWR1LmNvL2VzL2xpbmsvZGVzY3VicmUtbGEtdW5pdmVyc2lkYWQvMi9kb2N1bWVudG9zCg==