| Literature DB >> 25336896 |
Yuan Xu1, Qiang Zhang1, Changjun Zhou1.
Abstract
Network motifs are overly represented as topological patterns that occur more often in a given network than in random networks, and take on some certain functions in practical biological applications. Existing methods of detecting network motifs have focused on computational efficiency. However, detecting network motifs also presents huge challenges in computational and spatial complexity. In this paper, we provide a new approach for mining network motifs. First, all sub-graphs can be enumerated by adding edges and nodes progressively, using the backtracking method based on the associated matrix. Then, the associated matrix is standardized and the isomorphism sub-graphs are marked uniquely in combination with symmetric ternary, which can simulate the elements (-1,0,1) in the associated matrix. Taking advantage of the combination of the associated matrix and the backtracking method, our method reduces the complexity of enumerating sub-graphs, providing a more efficient solution for motif mining. From the results obtained, our method has shown higher speed and more extensive applicability than other similar methods.Entities:
Keywords: associated matrix; backtracking; sub-graphs mark; symmetric ternary
Year: 2014 PMID: 25336896 PMCID: PMC4196890 DOI: 10.4137/EBO.S15207
Source DB: PubMed Journal: Evol Bioinform Online ISSN: 1176-9343 Impact factor: 1.625
Figure 1Examples of isomorphic graphs. (A) The isomorphism of an undirected graph. (B) The isomorphism of a directed graph.
Figure 2Flow chart of mining motifs.
Figure 3An example of an associated matrix. It shows the corresponding relationship between a graph and its form for storage.
Figure 4Schematic view of edge switching operator, edge replacement for generating random networks. As shown in this figure, the replacement process does not change the node degrees.
Figure 5An example of searching sub-graphs by backtracking.
A summary of Code and the topological structure in different networks.
| NETWORK | NODES | EDGES | SIZE-K | CODE | MOTIF |
|---|---|---|---|---|---|
| 3 | 519 | 3 | 8528 |
| |
| 4 | 12925664 |
| |||
| 236808 |
| ||||
| 122 | 189 | 3 | 5668 |
| |
| 4 | 13698880 |
| |||
| 12925664 |
| ||||
| 252 | 399 | 3 | 5668 |
| |
| 4 | 12925664 |
| |||
| 13698880 |
| ||||
| 512 | 819 | 3 | 5668 |
| |
| 4 | 12925664 |
| |||
| 13698880 |
|
The summary of Z-score in different networks, compared with the ESA method.
| NETWORK | MOTIF | NAMED | Z-SCORE | |
|---|---|---|---|---|
| ESA | OUR METHOD | |||
|
| Feed-forward loop | 10 | 12.19 | |
|
| Bi-fan | 13 | 13.82 | |
|
| Three-node feedback loop | 9 | 11.51 | |
|
| Four-node feedback loop | 5 | 5.56 | |
|
| Bi-fan | 3.8 | 4.12 | |
|
| Three-node feedback loop | 18 | 18.91 | |
|
| Four-node feedback loop | 11 | 14.92 | |
|
| Bi-fan | 10 | 10.95 | |
|
| Three-node feedback loop | 38 | 40.05 | |
|
| Four-node feedback loop | 25 | 20.21 | |
|
| Bi-fan | 20 | 20.40 | |
The comparison of accuracy.
| SIZE(N) | TYPE | FCGI | ACCURACY | ENSA | ACCURACY |
|---|---|---|---|---|---|
| 3 | 13 | 13 | 100% | 13 | 100% |
| 4 | 199 | 199 | 100% | 199 | 100% |
| 5 | 9364 | 9364 | 100% | 9364 | 100% |
Figure 6The performance evaluation is reflected in consuming time, using the yeast network as the testing data. The blue column denoting the time consumed in our algorithm is compared with the green column, which represents time using the method of the ESU-Tree.17 The x-coordinate denotes the size of sub-graph, and the y-coordinate denotes the searching time.
Search time in different networks. The first column has the names of different networks, and columns 2–7 has the sizes of sub-graphs and time.
| TIME(S) NETWORKS | SIZE 3 | SIZE 4 | SIZE 5 | SIZE 6 | SIZE 7 | SIZE 8 |
|---|---|---|---|---|---|---|
| 0.053 | 0.556 | 10.093 | ||||
| Sea urchin | 0.003 | 0.026 | 0.237 | 2.794 | ||
| S208 | 0.003 | 0.012 | 0.05 | 0.181 | 0.825 | 4.157 |
| S420 | 0.011 | 0.044 | 0.142 | 0.692 | 3.648 | 20.326 |
| S838 | 0.037 | 0.122 | 0.554 | 3.13 | 18.696 |