{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T18:04:35Z","timestamp":1720289075635},"reference-count":24,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Artif. Intell. Tools"],"published-print":{"date-parts":[[2005,8]]},"abstract":"<jats:p> An automated method for constructing 3D models of class II MHC structures that uses constraint logic programming to select side-chain conformations is described. This method follows a comparative modeling approach in basing the model structures on experimentally determined MHC-peptide structures, but it uses constraints to ease open the peptide binding groove so that the modeled MHC structure is a less specific fit for the co-crystallized peptide in the starting structure. The resulting models are used by a \"peptide threading\" program that attempts to predict peptides from a protein sequence that will bind strongly to particular MHC alleles. Our results indicate that MHC models that have been constructed in this way enable the peptide threading program to make binding predictions that are comparable with those obtained when using experimentally determined MHC structures, suggesting that a combined modeling and peptide threading approach is worth pursuing for MHC molecules for which experimentally determined structures are not available. <\/jats:p>","DOI":"10.1142\/s0218213005002260","type":"journal-article","created":{"date-parts":[[2005,7,25]],"date-time":"2005-07-25T04:57:18Z","timestamp":1122267438000},"page":"561-575","source":"Crossref","is-referenced-by-count":1,"title":["PREDICTING PEPTIDE INTERACTIONS WITH MODEL CLASS II MHC STRUCTURES"],"prefix":"10.1142","volume":"14","author":[{"given":"MARTIN T.","family":"SWAIN","sequence":"first","affiliation":[{"name":"Department of Computing Science,  University of Aberdeen, King's College, Aberdeen,  Scotland, UK, AB24 3UE, UK"}]},{"given":"ANTHONY J.","family":"BROOKS","sequence":"additional","affiliation":[{"name":"Department of Computing Science,  University of Aberdeen, King's College, Aberdeen,  Scotland, UK, AB24 3UE, UK"}]},{"given":"GRAHAM J. L.","family":"KEMP","sequence":"additional","affiliation":[{"name":"Department of Computing Science,  University of Aberdeen, King's College, Aberdeen,  Scotland, UK, AB24 3UE, UK"}]}],"member":"219","published-online":{"date-parts":[[2011,11,21]]},"reference":[{"key":"rf1","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.1995.0293"},{"key":"rf2","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/28.1.45"},{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-2836(77)80200-3"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.1997.0926"},{"key":"rf6","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/14.2.121"},{"key":"rf7","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/24.1.242"},{"key":"rf9","doi-asserted-by":"publisher","DOI":"10.1038\/358764a0"},{"key":"rf10","doi-asserted-by":"publisher","DOI":"10.1038\/356539a0"},{"key":"rf11","doi-asserted-by":"publisher","DOI":"10.1016\/S1074-7613(00)80369-6"},{"key":"rf12","doi-asserted-by":"publisher","DOI":"10.1002\/pro.5560060807"},{"key":"rf13","volume-title":"Technical report","author":"Fruhwirth T.","year":"1993"},{"key":"rf14","doi-asserted-by":"publisher","DOI":"10.1038\/378457a0"},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1432-1033.1970.tb01153.x"},{"key":"rf16","doi-asserted-by":"publisher","DOI":"10.1038\/368711a0"},{"key":"rf17","doi-asserted-by":"publisher","DOI":"10.1002\/1097-0134(20000815)40:3<389::AID-PROT50>3.0.CO;2-2"},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1021\/ma00145a039"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-2126(97)00288-8"},{"key":"rf20","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(87)90358-5"},{"key":"rf21","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.1993.1172"},{"key":"rf22","doi-asserted-by":"publisher","DOI":"10.1038\/368215a0"},{"key":"rf23","doi-asserted-by":"crossref","unstructured":"M. T.\u00a0Swain and G. J. L.\u00a0Kemp, Principles and Practice of Constraint Programming \u2014 CP2001, ed. T.\u00a0Walsh (Springer-Verlag, 2001)\u00a0pp. 479\u2013493.","DOI":"10.1007\/3-540-45578-7_33"},{"key":"rf24","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8485(01)00103-6"},{"key":"rf25","doi-asserted-by":"publisher","DOI":"10.1016\/S0959-440X(96)80077-7"},{"key":"rf26","volume-title":"Technical report","author":"Wallace M.","year":"1995"}],"container-title":["International Journal on Artificial Intelligence Tools"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218213005002260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T02:29:57Z","timestamp":1565144997000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218213005002260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,8]]},"references-count":24,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2011,11,21]]},"published-print":{"date-parts":[[2005,8]]}},"alternative-id":["10.1142\/S0218213005002260"],"URL":"https:\/\/doi.org\/10.1142\/s0218213005002260","relation":{},"ISSN":["0218-2130","1793-6349"],"issn-type":[{"value":"0218-2130","type":"print"},{"value":"1793-6349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,8]]}}}