Improving decoy databases for protein folding algorithms

Aaron Lindsey, Hsin-Yi (Cindy) Yeh, Chih-Peng Wu, Shawna Thomas, Nancy M. Amato

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Copyright © 2014 ACM. Predicting protein structures and simulating protein folding are two of the most important problems in computational biology today. Simulation methods rely on a scoring function to distinguish the native structure (the most energetically stable) from non-native structures. Decoy databases are collections of non-native structures used to test and verify these functions. We present a method to evaluate and improve the quality of decoy databases by adding novel structures and removing redundant structures. We test our approach on 17 different decoy databases of varying size and type and show significant improvement across a variety of metrics. We also test our improved databases on a popular modern scoring function and show that they contain a greater number of native-like structures than the original databases, thereby producing a more rigorous database for testing scoring functions.
Original languageEnglish (US)
Title of host publicationProceedings of the 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics - BCB '14
PublisherAssociation for Computing Machinery (ACM)
Pages717-724
Number of pages8
ISBN (Print)9781450328944
DOIs
StatePublished - 2014
Externally publishedYes

Bibliographical note

KAUST Repository Item: Exported on 2020-10-01
Acknowledged KAUST grant number(s): KUS-C1-016-04
Acknowledgements: This work is supported in part by NSF awards CRI-0551685,CCF-0833199, CCF-0830753, IIS-096053, IIS-0917266 by THECBNHARP award 000512-0097-2009, by Chevron, IBM, Intel,Oracle/Sun and by Award KUS-C1-016-04, made by KingAbdullah University of Science and Technology (KAUST).
This publication acknowledges KAUST support, but has no KAUST affiliated authors.

Fingerprint

Dive into the research topics of 'Improving decoy databases for protein folding algorithms'. Together they form a unique fingerprint.

Cite this