{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T05:10:10Z","timestamp":1694495410799},"reference-count":74,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2005,1,19]],"date-time":"2005-01-19T00:00:00Z","timestamp":1106092800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Am. Soc. Inf. Sci."],"published-print":{"date-parts":[[2005,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this article we present an in silico method that automatically assigns putative functions to DNA sequences. The annotations are at an increasingly conceptual level, up to identifying general biomedical fields to which the sequences could contribute. This bioinformatics data\u2010mining system makes substantial use of several resources: a locally stored MEDLINE<jats:sup>\u00ae<\/jats:sup> database; a manually built classification system; the MeSH<jats:sup>\u00ae<\/jats:sup> taxonomy; relational technology; and bioinformatics methods. Knowledge is generated from various data sources by using well\u2010defined semantics, and by exploiting direct links between them. A two\u2010dimensional \u201cConcept Map\u2122\u201d displays the knowledge graph, which allows causal connections to be followed. The use of this method has been valuable and has saved considerable time in our in\u2010house projects, and can be generally exploited for any sequence\u2010annotation or knowledge\u2010condensation task.<\/jats:p>","DOI":"10.1002\/asi.20137","type":"journal-article","created":{"date-parts":[[2005,1,19]],"date-time":"2005-01-19T21:47:58Z","timestamp":1106171278000},"page":"483-492","source":"Crossref","is-referenced-by-count":1,"title":["Integrated bioinformatics application for automated target discovery"],"prefix":"10.1002","volume":"56","author":[{"given":"Luca","family":"Toldo","sequence":"first","affiliation":[]},{"given":"Friedrich","family":"Rippmann","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2005,1,19]]},"reference":[{"key":"e_1_2_10_2_1","volume-title":"Proceedings of the 7th International Conference on Electronic Publishing (EP '98) (pp. 476\u2013486)","author":"Ahonen H.","year":"1998"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/15.5.391"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1101\/gr.10.4.391"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1038\/75556"},{"key":"e_1_2_10_5_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.geneontology.org\/"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/30.1.276"},{"key":"e_1_2_10_6_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.sanger.ac.uk\/Software\/Pfam\/"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkg057"},{"key":"e_1_2_10_7_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.ncbi.nlm.nih.gov\/Genbank\/"},{"key":"e_1_2_10_8_1","unstructured":"Biojava. (2003). Retrieved November 25 2004 fromhttp:\/\/www.biojava.org\/"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1101\/gr.10.4.547"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkg095"},{"key":"e_1_2_10_10_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.expasy.org\/sprot\/"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/ng0895-369"},{"key":"e_1_2_10_11_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.ncbi.nlm.nih.gov\/UniGene\/"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8485(96)80003-9"},{"key":"e_1_2_10_13_1","unstructured":"Bunce T.(2003).DBI\u2014The Perl database interface."},{"key":"e_1_2_10_13_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.cpan.org\/"},{"key":"e_1_2_10_14_1","unstructured":"Celera Discovery System. (2003). Retrieved November 25 2004 fromhttp:\/\/www.celeradiscoverysystem.com\/"},{"key":"e_1_2_10_15_1","volume-title":"Proceedings of the SIGCHI conference on Human factors in computing systems (ACM CHI '88) (pp. 213\u2013218)","author":"Chin J.P.","year":"1988"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkg083"},{"key":"e_1_2_10_16_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.ensembl.org\/"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/17.7.587"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/14.9.755"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0168-9525(97)01224-9"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0168-9525(96)81406-5"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-024X(200009)30:11<1203::AID-SPE338>3.0.CO;2-N"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1137\/0604033"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/15.11.867"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1101\/gr. 183801"},{"key":"e_1_2_10_26_1","volume-title":"Information retrieval: A health care perspective","author":"Hersh W.R.","year":"1995"},{"key":"e_1_2_10_27_1","first-page":"138","volume-title":"Proceedings 7th International Conference on Intelligent Systems in Molecular Biology","author":"Iseli C.","year":"1999"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1038\/ng0501-21"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/30.1.42"},{"key":"e_1_2_10_29_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.kegg.com\/."},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1038\/ng0501-17"},{"key":"e_1_2_10_31_1","unstructured":"Lion Bioscience AG(2003).BioScout."},{"key":"e_1_2_10_31_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.lionbioscience.com\/"},{"key":"e_1_2_10_32_1","unstructured":"McKusick(2002).Online Mendelian Inheritance in Man OMIM."},{"key":"e_1_2_10_32_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.ncbi.nlm.nih.gov\/omim\/"},{"key":"e_1_2_10_33_1","unstructured":"NIST. (2003).Text retrieval conference."},{"key":"e_1_2_10_33_2","unstructured":"Retrieved November 25 2004 from:http:\/\/trec.nist.gov\/"},{"key":"e_1_2_10_34_1","unstructured":"National Library of Medicine. (2003a).MEDLINE."},{"key":"e_1_2_10_34_2","unstructured":"Retrieved November 25 2004 from National Library of Medicine Web site:http:\/\/www.nlm.nih.gov\/"},{"key":"e_1_2_10_35_1","unstructured":"National Library of Medicine. (2003b).Unified medical language system."},{"key":"e_1_2_10_35_2","unstructured":"Retrieved November 25 2004 from National Library of Medicine Web site:http:\/\/www.nlm.nih.gov\/"},{"key":"e_1_2_10_36_1","unstructured":"National Library of Medicine. (2003c).MeSH tree structures."},{"key":"e_1_2_10_36_2","unstructured":"Retrieved November 25 2004 from National Library of Medicine Web site:http:\/\/www.nlm.nih.gov\/"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781410601629"},{"key":"e_1_2_10_37_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/cmap.coginst.uwf.edu\/refs.html"},{"key":"e_1_2_10_38_1","volume-title":"Mastering algorithms with Perl","author":"Orwant J.","year":"1999"},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0168-9525(99)01882-X"},{"key":"e_1_2_10_39_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.ncbi.nlm.nih.gov\/LocusLink\/"},{"key":"e_1_2_10_40_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/14.8.656"},{"key":"e_1_2_10_41_1","volume-title":"Automatic text processing","author":"Salton G.","year":"1989"},{"key":"e_1_2_10_42_1","doi-asserted-by":"publisher","DOI":"10.1186\/gb-2001-2-2-reports4003"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.1038\/35080529"},{"key":"e_1_2_10_44_1","unstructured":"Stein L.(2003).BoulderIO."},{"key":"e_1_2_10_44_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.cpan.org\/"},{"key":"e_1_2_10_45_1","unstructured":"Stodola R.K. Tobin F.L. &Williams A.L.(1997).Method for analyzing partial gene sequences. US Patent 5618672 SmithKline Beecham Corporation."},{"key":"e_1_2_10_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00008-8"},{"key":"e_1_2_10_47_1","first-page":"475","article-title":"JaMBW 1.1: Java\u2010based molecular biologists workbench","volume":"13","author":"Toldo L.","year":"1997","journal-title":"Computer Applications in Biological Sciences"},{"key":"e_1_2_10_47_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.bioinformatics.org\/JaMBW\/"},{"key":"e_1_2_10_48_1","unstructured":"Toldo L. &Rippmann F.(1999).Verfahren zum Ermitteln von Nuklein\u2010 und\/oder Aminos\u00e4uresequenzen. DE19941606. [Method for determining nucleic and\/or amino acid sequences. Patent Application No. DE19941606 Merck Patent GmbH.]"},{"key":"e_1_2_10_49_1","unstructured":"Toldo L.(2001 May).Interoperability of bioinformatics databases and software systems in the (post) Internet\/Genome era. Paper presented at the Meeting on Networked Applications in Bioinformatics Genova Italy."},{"key":"e_1_2_10_49_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/www.nettab.org\/2001\/"},{"key":"e_1_2_10_50_1","volume-title":"Programming Perl","author":"Wall L.","year":"1991"},{"key":"e_1_2_10_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(96)00028-3"},{"key":"e_1_2_10_52_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(19980501)49:6<517::AID-ASI4>3.0.CO;2-T"},{"key":"e_1_2_10_53_1","doi-asserted-by":"publisher","DOI":"10.1101\/gr.5.2.173"},{"key":"e_1_2_10_54_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkg040"},{"key":"e_1_2_10_54_2","unstructured":"Retrieved November 25 2004 fromhttp:\/\/pir.georgetown.edu\/"},{"key":"e_1_2_10_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/prot.10052"}],"container-title":["Journal of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fasi.20137","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.20137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T17:24:43Z","timestamp":1694453083000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/asi.20137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,1,19]]},"references-count":74,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,3]]}},"alternative-id":["10.1002\/asi.20137"],"URL":"https:\/\/doi.org\/10.1002\/asi.20137","archive":["Portico"],"relation":{},"ISSN":["1532-2882","1532-2890"],"issn-type":[{"value":"1532-2882","type":"print"},{"value":"1532-2890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,1,19]]}}}