KEA: kinase enrichment analysis
نویسندگان
چکیده
MOTIVATION Multivariate experiments applied to mammalian cells often produce lists of proteins/genes altered under treatment versus control conditions. Such lists can be projected onto prior knowledge of kinase-substrate interactions to infer the list of kinases associated with a specific protein list. By computing how the proportion of kinases, associated with a specific list of proteins/genes, deviates from an expected distribution, we can rank kinases and kinase families based on the likelihood that these kinases are functionally associated with regulating the cell under specific experimental conditions. Such analysis can assist in producing hypotheses that can explain how the kinome is involved in the maintenance of different cellular states and can be manipulated to modulate cells towards a desired phenotype. SUMMARY Kinase enrichment analysis (KEA) is a web-based tool with an underlying database providing users with the ability to link lists of mammalian proteins/genes with the kinases that phosphorylate them. The system draws from several available kinase-substrate databases to compute kinase enrichment probability based on the distribution of kinase-substrate proportions in the background kinase-substrate database compared with kinases found to be associated with an input list of genes/proteins. AVAILABILITY The KEA system is freely available at http://amp.pharm.mssm.edu/lib/kea.jsp
منابع مشابه
Security Analysis of KEA Authenticated Key Exchange Protocol
KEA is a Diffie-Hellman based key-exchange protocol developed by NSA which provides mutual authentication for the parties. It became publicly available in 1998 and since then it was neither attacked nor proved to be secure. We analyze the security of KEA and find that the original protocol is susceptible to a class of attacks. On the positive side, we present a simple modification of the protoc...
متن کاملEfficient Identification Protocols and the Knowledge-of-Exponent Assumption
In this paper, we propose an extremely simple identification protocol and prove its security using the Knowledge-of-Exponent Assumption (KEA). We discuss the applicability of KEA in various protocol settings as well. Recently, doubts have been raised about applying KEA in some protocols where an adversary has auxiliary inputs. However, we suggest that KEA is applicable in these cases. We presen...
متن کاملAn Efficient Identification Protocol and the Knowledge-of-Exponent Assumption
In this paper, we propose an extremely simple identification protocol and prove its security using the Knowledge-of-Exponent Assumption (KEA). We also discuss the applicability of KEA in various protocol settings as well. Recently, doubts have been raised about applying KEA in some protocols where an adversary has auxiliary inputs. However, we suggest that KEA is applicable in these cases. We p...
متن کاملAn Evaluation of Kea: An Automatic Keyphrase Extraction Algorithm
Keyphrases, often defined as keywords, are an important means of document summarization, searching, browsing, and clustering. This paper describes and evaluates Kea, an algorithm for automatically extracting keyphrases from text. Kea identifies candidate keyphrases using lexical methods, calculates TFIDF feature values for each candidate, and uses naïve Bayes learning scheme to predict keyphras...
متن کاملIntroduction to the RKEA Package
A short introduction to the RKEA package. Introduction The RKEA package provides a R interface to Kea (http://www.nzdl.org/Kea/), a tool for keyword extraction in texts. See https://code.google.com/p/kea-algorithm/ and http: //www.nzdl.org/Kea/Download/Kea-5.0-Readme.txt for further information on Kea. Note that Maui (http://maui-indexer.googlecode.com/), an algorithm for topic indexing, can be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Bioinformatics
دوره 25 شماره
صفحات -
تاریخ انتشار 2009