Computational Systems Biology of Pathogen-Host Interactions
A thorough understanding of pathogenic microorganisms and their interactions with host organisms is crucial to prevent infectious threats due to the fact that Pathogen-Host Interactions (PHIs) have critical roles in initiating and sustaining infections. Therefore, the analysis of infection mechanism...
- Autores:
- Tipo de recurso:
- Book
- Fecha de publicación:
- 2016
- Institución:
- Universidad de Bogotá Jorge Tadeo Lozano
- Repositorio:
- Expeditio: repositorio UTadeo
- Idioma:
- eng
- OAI Identifier:
- oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/14247
- Acceso en línea:
- https://www.frontiersin.org/research-topics/2817/computational-systems-biology-of-pathogen-host-interactions
http://hdl.handle.net/20.500.12010/14247
- Palabra clave:
- Microbiology
Science (General)
Bioinformatics
OMICS data
Pathogen-host interaction
Computational Biology
Network Inference
Constraint-based modeling
Image-based systems biology
Protein-protein interaction
Gene regulatory network
Text mining
- Rights
- License
- Abierto (Texto Completo)
id |
UTADEO2_28e420482a9a8029e5235a30725e3348 |
---|---|
oai_identifier_str |
oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/14247 |
network_acronym_str |
UTADEO2 |
network_name_str |
Expeditio: repositorio UTadeo |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Computational Systems Biology of Pathogen-Host Interactions |
title |
Computational Systems Biology of Pathogen-Host Interactions |
spellingShingle |
Computational Systems Biology of Pathogen-Host Interactions Microbiology Science (General) Bioinformatics OMICS data Pathogen-host interaction Computational Biology Network Inference Constraint-based modeling Image-based systems biology Protein-protein interaction Gene regulatory network Text mining |
title_short |
Computational Systems Biology of Pathogen-Host Interactions |
title_full |
Computational Systems Biology of Pathogen-Host Interactions |
title_fullStr |
Computational Systems Biology of Pathogen-Host Interactions |
title_full_unstemmed |
Computational Systems Biology of Pathogen-Host Interactions |
title_sort |
Computational Systems Biology of Pathogen-Host Interactions |
dc.subject.spa.fl_str_mv |
Microbiology Science (General) Bioinformatics OMICS data |
topic |
Microbiology Science (General) Bioinformatics OMICS data Pathogen-host interaction Computational Biology Network Inference Constraint-based modeling Image-based systems biology Protein-protein interaction Gene regulatory network Text mining |
dc.subject.lemb.spa.fl_str_mv |
Pathogen-host interaction Computational Biology Network Inference Constraint-based modeling Image-based systems biology |
dc.subject.keyword.spa.fl_str_mv |
Protein-protein interaction Gene regulatory network Text mining |
description |
A thorough understanding of pathogenic microorganisms and their interactions with host organisms is crucial to prevent infectious threats due to the fact that Pathogen-Host Interactions (PHIs) have critical roles in initiating and sustaining infections. Therefore, the analysis of infection mechanisms through PHIs is indispensable to identify diagnostic biomarkers and next-generation drug targets and then to develop strategic novel solutions against drug-resistance and for personalized therapy. Traditional approaches are limited in capturing mechanisms of infection since they investigate hosts or pathogens individually. On the other hand, the systems biology approach focuses on the whole PHI system, and is more promising in capturing infection mechanisms. Here, we bring together studies on the below listed sections to present the current picture of the research on Computational Systems Biology of Pathogen-Host Interactions:- Computational Inference of PHI Networks using Omics Data- Computational Prediction of PHIs- Text Mining of PHI Data from the Literature- Mathematical Modeling and Bioinformatic Analysis of PHIs Computational Inference of PHI Networks using Omics Data Gene regulatory, metabolic and protein-protein networks of PHI systems are crucial for a thorough understanding of infection mechanisms. Great advances in molecular biology and biotechnology have allowed the production of related omics data experimentally. Many computational methods are emerging to infer molecular interaction networks of PHI systems from the corresponding omics data. Computational Prediction of PHIs Due to the lack of experimentally-found PHI data, many computational methods have been developed for the prediction of pathogen-host protein-protein interactions. Despite being emerging, currently available experimental PHI data are far from complete for a systems view of infection mechanisms through PHIs. Therefore, computational methods are the main tools to predict new PHIs. To this end, the development of new computational methods is of great interest. Text Mining of PHI Data from Literature Despite the recent development of many PHI-specific databases, most data relevant to PHIs are still buried in the biomedical literature, which demands for the use of text mining techniques to unravel PHIs hidden in the literature. Only some rare efforts have been performed to achieve this aim. Therefore, the development of novel text mining methods specific for PHI data retrieval is of key importance for efficient use of the available literature. Mathematical Modeling and Bioinformatic Analysis of PHIs After the reconstruction of PHI networks experimentally and/or computationally, their mathematical modeling and detailed computational analysis is required using bioinformatics tools to get insights on infection mechanisms. Bioinformatics methods are increasingly applied to analyze the increasing amount of experimentally-found and computationally-predicted PHI data. Acknowledgements: We, editors of this e-book, acknowledge Emrah Nikerel (Yeditepe University, Turkey) and Arzucan Özgür (Bogaaziçi University, Turkey) for their contributions during the initiation of the Research Topic. |
publishDate |
2016 |
dc.date.created.none.fl_str_mv |
2016-01-19 |
dc.date.accessioned.none.fl_str_mv |
2020-10-06T16:12:08Z |
dc.date.available.none.fl_str_mv |
2020-10-06T16:12:08Z |
dc.type.local.spa.fl_str_mv |
Libro |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_2f33 |
format |
http://purl.org/coar/resource_type/c_2f33 |
dc.identifier.isbn.none.fl_str_mv |
978-2-889198-21-4 |
dc.identifier.issn.none.fl_str_mv |
1664-8714 |
dc.identifier.other.none.fl_str_mv |
https://www.frontiersin.org/research-topics/2817/computational-systems-biology-of-pathogen-host-interactions |
dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/20.500.12010/14247 |
dc.identifier.doi.none.fl_str_mv |
10.3389/978-2-88919-821-4 |
identifier_str_mv |
978-2-889198-21-4 1664-8714 10.3389/978-2-88919-821-4 |
url |
https://www.frontiersin.org/research-topics/2817/computational-systems-biology-of-pathogen-host-interactions http://hdl.handle.net/20.500.12010/14247 |
dc.language.iso.spa.fl_str_mv |
eng |
language |
eng |
dc.relation.references.none.fl_str_mv |
Durmus¸, S., Çakır, T., Guthke, R., eds. (2016). Computational Systems Biology of Pathogen-Host Interactions. Lausanne: Frontiers Media. doi: 10.3389/978-2-88919-821-4 |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.local.spa.fl_str_mv |
Abierto (Texto Completo) |
dc.rights.creativecommons.none.fl_str_mv |
https://creativecommons.org/licenses/by/4.0/ |
rights_invalid_str_mv |
Abierto (Texto Completo) https://creativecommons.org/licenses/by/4.0/ http://purl.org/coar/access_right/c_abf2 |
dc.format.extent.spa.fl_str_mv |
220 páginas |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Frontiers Media SA |
institution |
Universidad de Bogotá Jorge Tadeo Lozano |
bitstream.url.fl_str_mv |
https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/1/Computational%20Systems%20Biology%20of%20Pathogen-Host%20Interactions.PDF https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/2/license.txt https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/3/Computational%20Systems%20Biology%20of%20Pathogen-Host%20Interactions.PDF.jpg |
bitstream.checksum.fl_str_mv |
e24964f77b4df4b8a86aadd7370db5ff abceeb1c943c50d3343516f9dbfc110f 69249ac6f669b18bfabf019e66e592bf |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional - Universidad Jorge Tadeo Lozano |
repository.mail.fl_str_mv |
expeditio@utadeo.edu.co |
_version_ |
1818152790881468416 |
spelling |
2020-10-06T16:12:08Z2020-10-06T16:12:08Z2016-01-19978-2-889198-21-41664-8714https://www.frontiersin.org/research-topics/2817/computational-systems-biology-of-pathogen-host-interactionshttp://hdl.handle.net/20.500.12010/1424710.3389/978-2-88919-821-4220 páginasapplication/pdfengFrontiers Media SAMicrobiologyScience (General)BioinformaticsOMICS dataPathogen-host interactionComputational BiologyNetwork InferenceConstraint-based modelingImage-based systems biologyProtein-protein interactionGene regulatory networkText miningComputational Systems Biology of Pathogen-Host InteractionsLibrohttp://purl.org/coar/resource_type/c_2f33Abierto (Texto Completo)https://creativecommons.org/licenses/by/4.0/http://purl.org/coar/access_right/c_abf2Durmus¸, S., Çakır, T., Guthke, R., eds. (2016). Computational Systems Biology of Pathogen-Host Interactions. Lausanne: Frontiers Media. doi: 10.3389/978-2-88919-821-4A thorough understanding of pathogenic microorganisms and their interactions with host organisms is crucial to prevent infectious threats due to the fact that Pathogen-Host Interactions (PHIs) have critical roles in initiating and sustaining infections. Therefore, the analysis of infection mechanisms through PHIs is indispensable to identify diagnostic biomarkers and next-generation drug targets and then to develop strategic novel solutions against drug-resistance and for personalized therapy. Traditional approaches are limited in capturing mechanisms of infection since they investigate hosts or pathogens individually. On the other hand, the systems biology approach focuses on the whole PHI system, and is more promising in capturing infection mechanisms. Here, we bring together studies on the below listed sections to present the current picture of the research on Computational Systems Biology of Pathogen-Host Interactions:- Computational Inference of PHI Networks using Omics Data- Computational Prediction of PHIs- Text Mining of PHI Data from the Literature- Mathematical Modeling and Bioinformatic Analysis of PHIs Computational Inference of PHI Networks using Omics Data Gene regulatory, metabolic and protein-protein networks of PHI systems are crucial for a thorough understanding of infection mechanisms. Great advances in molecular biology and biotechnology have allowed the production of related omics data experimentally. Many computational methods are emerging to infer molecular interaction networks of PHI systems from the corresponding omics data. Computational Prediction of PHIs Due to the lack of experimentally-found PHI data, many computational methods have been developed for the prediction of pathogen-host protein-protein interactions. Despite being emerging, currently available experimental PHI data are far from complete for a systems view of infection mechanisms through PHIs. Therefore, computational methods are the main tools to predict new PHIs. To this end, the development of new computational methods is of great interest. Text Mining of PHI Data from Literature Despite the recent development of many PHI-specific databases, most data relevant to PHIs are still buried in the biomedical literature, which demands for the use of text mining techniques to unravel PHIs hidden in the literature. Only some rare efforts have been performed to achieve this aim. Therefore, the development of novel text mining methods specific for PHI data retrieval is of key importance for efficient use of the available literature. Mathematical Modeling and Bioinformatic Analysis of PHIs After the reconstruction of PHI networks experimentally and/or computationally, their mathematical modeling and detailed computational analysis is required using bioinformatics tools to get insights on infection mechanisms. Bioinformatics methods are increasingly applied to analyze the increasing amount of experimentally-found and computationally-predicted PHI data. Acknowledgements: We, editors of this e-book, acknowledge Emrah Nikerel (Yeditepe University, Turkey) and Arzucan Özgür (Bogaaziçi University, Turkey) for their contributions during the initiation of the Research Topic.Durmus, SalihaCak?r, TunahanGuthke, ReinhardORIGINALComputational Systems Biology of Pathogen-Host Interactions.PDFComputational Systems Biology of Pathogen-Host Interactions.PDFVer documentoapplication/pdf37740202https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/1/Computational%20Systems%20Biology%20of%20Pathogen-Host%20Interactions.PDFe24964f77b4df4b8a86aadd7370db5ffMD51open accessLICENSElicense.txtlicense.txttext/plain; charset=utf-82938https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/2/license.txtabceeb1c943c50d3343516f9dbfc110fMD52open accessTHUMBNAILComputational Systems Biology of Pathogen-Host Interactions.PDF.jpgComputational Systems Biology of Pathogen-Host Interactions.PDF.jpgIM Thumbnailimage/jpeg16507https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/14247/3/Computational%20Systems%20Biology%20of%20Pathogen-Host%20Interactions.PDF.jpg69249ac6f669b18bfabf019e66e592bfMD53open access20.500.12010/14247oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/142472021-02-22 19:08:41.094open accessRepositorio Institucional - Universidad Jorge Tadeo Lozanoexpeditio@utadeo.edu.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 |