Table 3.
Method | Jackknife | 5-Fold | 10-Fold | Independent | Enhancer or Not | Strong or Weak |
---|---|---|---|---|---|---|
iEnhancer-2L [40] | √ | √ | √ | √ | ||
iEnhancer-PsedeKNC [41] | √ | √ | √ | |||
EnhancerPred [42] | √ | √ | √ | √ | ||
EnhancerPred2.0 [43] | √ | √ | √ | |||
Enhancer-Tri-N [44] | √ | √ | √ | |||
iEnhaner-2L-Hybrid [45] | √ | √ | √ | |||
iEnhancer-EL [46] | √ | √ | √ | √ | ||
iEnhancer-5Step [47] | √ | √ | √ | √ | ||
DeployEnhancer [48] | √ | √ | √ | √ | ||
ES-ARCNN [49] | √ | √ | √ | |||
iEnhancer-ECNN [50] | √ | √ | √ | |||
EnhancerP-2L [51] | √ | √ | √ | √ | √ | |
iEnhancer-CNN [52] | √ | √ | √ | √ | ||
iEnhancer-XG [53] | √ | √ | √ | √ | ||
Enhancer-DRRNN [54] | √ | √ | √ | |||
Enhancer-BERT [55] | √ | √ | √ | |||
iEnhancer-KL [56] | √ | √ | √ | |||
iEnhancer-RF [57] | √ | √ | √ | √ | ||
spEnhancer [58] | √ | √ | √ | |||
iEnhancer-EBLSTM [59] | √ | √ | √ | |||
iEnhancer-GAN [60] | √ | √ | √ | √ | ||
piEnPred [61] | √ | √ | √ | √ | ||
iEnhancer-RD [62] | √ | √ | √ | √ | ||
iEnhancer-MFGBDT [63] | √ | √ | √ | √ |
√ denoted conduction of corresponding cross validation.