Constrained query of order-preserving submatrix in gene expression data

被引:1
|
作者
Jiang, Tao [1 ]
Li, Zhanhuai [1 ]
Shang, Xuequn [1 ]
Chen, Bolin [1 ]
Li, Weibang [1 ]
Yin, Zhilei [1 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci & Technol, Xian 710072, Peoples R China
关键词
gene expression data; OPSM; constrained query; brute-force search; feature sequence; cIndex;
D O I
10.1007/s11704-016-5487-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Order-preserving submatrix (OPSM) has become important in modelling biologically meaningful subspace cluster, capturing the general tendency of gene expressions across a subset of conditions. With the advance of microarray and analysis techniques, big volume of gene expression datasets and OPSM mining results are produced. OPSM query can efficiently retrieve relevant OPSMs from the huge amount of OPSM datasets. However, improving OPSM query relevancy remains a difficult task in real life exploratory data analysis processing. First, it is hard to capture subjective interestingness aspects, e.g., the analyst's expectation given her/his domain knowledge. Second, when these expectations can be declaratively specified, it is still challenging to use them during the computational process of OPSM queries. With the best of our knowledge, existing methods mainly focus on batch OPSM mining, while few works involve OPSM query. To solve the above problems, the paper proposes two constrained OPSM query methods, which exploit userdefined constraints to search relevant results from two kinds of indices introduced. In this paper, extensive experiments are conducted on real datasets, and experiment results demonstrate that the multi-dimension index (cIndex) and enumerating sequence index (esIndex) based queries have better performance than brute force search.
引用
收藏
页码:1052 / 1066
页数:15
相关论文
共 50 条
  • [21] A Group Order-Preserving Encryption Scheme based on Periodic Functions for Efficient Query Processing on Encrypted Data
    Lee, Hyunjo
    Choi, MunChol
    Chang, Jae-Woo
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 923 - 923
  • [22] Order-preserving indexing
    Crochemore, Maxime
    Iliopoulos, Costas S.
    Kociumaka, Tomasz
    Kubica, Marcin
    Langiu, Alessio
    Pissis, Solon P.
    Radoszewski, Jakub
    Rytter, Wojciech
    Walen, Tomasz
    THEORETICAL COMPUTER SCIENCE, 2016, 638 : 122 - 135
  • [23] A Secure Order-Preserving Indexing Scheme for Outsourced Data
    Moghadam, Somayeh Sobati
    Gavin, Gerald
    Darmont, Jerome
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 298 - 304
  • [24] RECOGNITION OF ORDER-PRESERVING MAPS
    ENGEL, K
    ORDER-A JOURNAL ON THE THEORY OF ORDERED SETS AND ITS APPLICATIONS, 1985, 2 (01): : 41 - 47
  • [25] Order-preserving reflectors and injectivity
    Carvalho, Margarida
    Sousa, Lurdes
    TOPOLOGY AND ITS APPLICATIONS, 2011, 158 (17) : 2408 - 2422
  • [26] Order-Preserving Transformations and Applications
    A. Cambini
    D.T. Luc
    L. Martein
    Journal of Optimization Theory and Applications, 2003, 118 : 275 - 293
  • [27] Order-preserving transformations and applications
    Cambini, A
    Luc, DT
    Martein, L
    JOURNAL OF OPTIMIZATION THEORY AND APPLICATIONS, 2003, 118 (02) : 275 - 293
  • [28] ORDER-PRESERVING KEY TRANSFORMATIONS
    GARG, AK
    GOTLIEB, CC
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1986, 11 (02): : 213 - 234
  • [29] Order-Preserving Symmetric Encryption
    Boldyreva, Alexandra
    Chenette, Nathan
    Lee, Younho
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 224 - 241
  • [30] Semigroups of order-preserving mappings
    Repnitskii, VB
    Vernitskii, AS
    COMMUNICATIONS IN ALGEBRA, 2000, 28 (08) : 3635 - 3641