I Use This!
Activity Not Available
Analyzed over 1 year ago. based on code collected about 5 years ago.

Project Summary

Phyutility (fyoo-til-i-te) is a command line program that performs simple analyses or modifications on both trees and data matrices. Makes use of JADE (PEBLS) and JEBL libraries. Please see the NEWS page for info concerning updates, etc.

Please use this citation when using Phyutility Smith, S. A. and Dunn, C. W. (2008) Phyutility: a phyloinformatics tool for trees, alignments, and molecular data. Bioinformatics. 24: 715-716

Currently it performs the following functions (to suggest another feature, submit an Issue and use the label Type-Enhancement) :


rerooting pruning type conversion consensus leaf stability lineage movement tree support Data Matrices

concatenate alignments genbank parsing trimming alignments search NCBI fetch NCBI please reroot your trees before performing the leaf stability, lineage movement, or consensus functions -- unrooted functions for these will be incorporated ASAP

07-04-2009 Uploaded new .jar file for phyutility. Please download this and replace your existing phyutility.jar file (of course, if yours is named Phyutility.jar, change the name of the new file to reflect that). If you haven't downloaded phyutility package before, please download both and replace the .jar in the folder with the new one. More features soon!


bioinformatics biology evolution java phylogenetics phyloinformatics

In a Nutshell, phyutility...

GNU General Public License v3.0 or later

Commercial Use



Place Warranty

Use Patent Claims



Hold Liable


Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

Include Install Instructions

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    search using multiple tags to find exactly what you need
  • ...
    use of OSS increased in 65% of companies in 2016
  • ...
    compare projects before you chose one to use
About Project Security


5 Other

30 Day Summary

Apr 9 2016 — May 9 2016

12 Month Summary

May 9 2015 — May 9 2016


Be the first to rate this project
Click to add your rating
Review this Project!