This article has Open Peer Review reports available.

# Motif mining based on network space compression

- Qiang Zhang
^{1}Email author and - Yuan Xu
^{1}

**8**:29

https://doi.org/10.1186/s13040-014-0029-x

© Zhang and Xu; licensee BioMed Central Ltd. 2014

**Received: **14 January 2014

**Accepted: **25 November 2014

**Published: **11 December 2014

## Abstract

A network motif is a recurring subnetwork within a network, and it takes on certain functions in practical biological macromolecule applications. Previous algorithms have focused on the computational efficiency of network motif detection, but some problems in storage space and searching time manifested during earlier studies. The considerable computational and spacial complexity also presents a significant challenge. In this paper, we provide a new approach for motif mining based on compressing the searching space. According to the characteristic of the parity nodes, we cut down the searching space and storage space in real graphs and random graphs, thereby reducing the computational cost of verifying the isomorphism of sub-graphs. We obtain a new network with smaller size after removing parity nodes and the “repeated edges” connected with the parity nodes. Random graph structure and sub-graph searching are based on the *Back Tracking Method*; all sub-graphs can be searched for by adding edges progressively. Experimental results show that this algorithm has higher speed and better stability than its alternatives.

## Keywords

## Background

Researchers have discovered that the human genome is a complex network system. With the Human Genome Project (*HGP*), we step into a post-genome era. The network motif [1],[2] is generally represented as the smallest unit in a network. Motif analysis is increasingly recognized as a powerful approach to identify the function structure of a network, its organizational principle and species evolution.

The network motif was first defined systematically in Escherichia coli. After this, algorithms regarding network motif mining were developed. *Kashtan*, *Itzkovita, Milo* and *Alon*[3] proposed the Edge Sampling Algorithm (*ESA*), which unfortunately leads to sampling deviation and causes error. *Wernicke*[4] described an algorithm for enumerating sub-graphs, named Enumerating Subgraph *(ESU for short)*, which allows for a faster detection of network motifs and offers useful additional features. Considerable work has been made concerning subgraph searching, and we select the RAND-ESU method for its performance and unbiased estimation [5],[6]. Meanwhile, the generating random network model is a key to identifying motifs. We adopt the standard null model [7],[8], in which the degree of every node is not allowed to change, such that single node properties are fixed. *Lau* and *So*. [9] proposed the Markov Chain Algorithm to generate random networks [10], and we use it to construct the random networks for this paper. In addition, sub-graphs are another key to finding motifs because sub-graph isomorphism is an NP-complete problem [11],[12]. In order to solve this problem, a method aimed at reducing the searching size was introduced by *Ding* and *Huang*[13]. An algorithm to reduce the complexity of matching two graphs was proposed by *Knossow*,*Sharma, Mateus* and *Horaud*[14]. Another algorithm that optimizes the one-to-many matching problem was introduced by *Ogras* and *Marculescu*[15]. Moreover, some more recent algorithms have been developed [16], based on the G-trie method to list all stored subgraphs and the implicit tree method [17] to finding motifs of a size greater than eight. *Liao and Chen*[18] presented the Depth-First Spelling algorithm for mining sequential patterns of biological sequences with Gap constraints (termed DFSG). Zhang and Lu [19] employed a network stratification strategy to investigate the validity of the current network analysis of conglomerate PPI networks, finding that network stratification may help to resolve many controversies in the current research of systems biology. Srinivasan,*Vural, King* and *Guda*[20] presented a new substitution-based scoring function for identifying discriminative lower denominations that are highly specific to a class. Unfortunately, some of these methods, designed for both directed and undirected graphs, proved to be time-consuming. The aim of this paper is to achieve a method for reducing the searching time storage space required for a motif mining algorithm, while storing all sub-graphs.

We enumerate all sub-graphs that meet the requirements of a given graph by way of reducing the searching space. Then, the associated matrices of these sub-graphs are normalized and the isomorphic sub-graphs are uniquely marked. Through experiment, we verify the accuracy and extensive applicability of our algorithm, and improve the searching speed of sub-graphs enumeration.

In the following, we give some definitions:

### Definition 1

*Network motif*is generally represented as a topological pattern that occurs more often in a given network than in random networks, and takes on a certain function in practical biological applications. We utilize graph theory to research network. A sub-graph is considered as a

*Network Motif*when the following conditions are met [1],[2]:

- 1)
The frequency

*P*< 0.01, from 1000 randomized networks. - 2)
The number of sub-graph in the input graph

*N*_{real}is larger than four. - 3)
Set

*N*_{real}as the number of sub-graphs in the input graph,*N*_{rand}as the mathematical expectation of the random graphs, the following inequality should be satisfied:*N*_{ real }−*N*_{ rand }> 0.1*Nrand*.

### Definition 2

A *Network* is considered to be a large graph consisting of vertices and edges. A directed graph (or network) is usually indicated as *G* = (*V*, *E*), where *V* stands for a finite set of nodes in the graph and *E* the edges. Edge *e* = (*u*, *v*) ⊆ *E* represents an edge starting from the node *u* (the source) to the node *v* (the target).

### Definition 3

*G*= (

*V*,

*E*), any two nodes

*V*

_{ i }and

*V*

_{ j }that meet the following requirement are called

*Parity nodes*[21].

- i)
Both in-degree and out-degree of

*V*_{ i }and*V*_{ j }are the same, stated as $<{d}_{\mathit{in}}^{i},{d}_{\mathit{out}}^{i}>=<{d}_{\mathit{in}}^{j},{d}_{\mathit{out}}^{j}>$

### Definition 4

The frequency partition of a graph (simple graph) is a partition of its vertices grouped by their degree [22].

### Definition 5

Two sub-graphs *G* = (*V*_{1}, *E*_{1}) and *G*^{/}(*V*_{2}, *E*_{2}) are *Sub-graph isomorphic*[12] if there is a one-to-one correspondence between their vertices, stated as *f*: *v*_{1} → *v*_{2}, and also there is an edge correspondence *g*: *e*_{1} → *e*_{2}, directed from one node to another node within one sub-graph. *e*_{1} ∈ *E*_{1}, *Ψ*_{1}(*e*) = < *u*, *v* > if and only if there is another edge with the same direction between the corresponding vertices in the other sub-graph *Ψ*_{2}(*g*(*e*)) = < *f*(*u*), *f*(*v*) > .

## Methods

In this paper, we provide a new approach for motif mining based on compressing the searching space. Firstly, we use the associated matrices to store directed graphs, and then utilize parity nodes to compress searching space. Secondly, we use Back Tracking to enumerate all sub-graphs of a given size that occur in the input graph which are obtained from real graphs and random graphs. Thirdly, we normalize the associated matrix and mark isomorphism sub-graphs uniquely, by using the Symmetric Ternary to simulate the elements (−1, 0,1) in the associated matrix. And finally, we distinguish motifs among all the sub-graphs found on the basis of statistical parameters to identify it whether or not.

### Store graphs

The storage of graphs is the first step in the process of solving the motif-mining problem. The associated matrix is easy to compress and thus it is easy to know the size of a sub-graph, so we use the associated matrix to store real graphs and random graphs.

*M*(

*G*) shows the connection between the nodes and edges of

*G*. It is usually not a square matrix, shown as Figure 3

In this matrix, a row represents nodes, a column edges, and the algebraic sum of all elements is zero in *M*(*G*). In the matrix *M*(*G*), the sum of out-degree and in-degree are both equal to the number of edges, stated as $\sum _{i=1}^{n}{\displaystyle \sum _{j=1}^{m}\left({m}_{ij}=1\right)}}=m=-{\displaystyle \sum _{i=1}^{n}{\displaystyle \sum _{j=1}^{m}\left({m}_{ij}=-1\right)}$.

### Sub-graph mark and isomorphism

From this example, we know that after two similar matrices get elementarily transformed; we can get the same matrix and a unique Code. One Code marks an isomorphic class. We just have to count the same values of the Codes to detect the motif. We confirm the sufficiency and necessity of this unique mark theoretically, this being outlined below:

#### The sufficiency

If isomorphism exists, their associated matrix is similar matrix. According to the properties of the elementary transformation of matrix, similar matrices will become the same matrix after elementary transformation, and so their Code values are the same, and the mark the isomorphism class is the only.

#### The necessity

If the following conditions are met between two matrices, we can say that the two matrices are equal: the sizes (the row and column of matrix) of sub-graphs are the same; both the numbers of out-degree and that of in-degree are respectively equal; and so the matrices have the same *Code* value, and furthermore the corresponding symmetrical ternary number are the same. Under this condition, all the corresponding elements of these matrices are the same. Therefore, we can conclude that these matrices are equal and so they satisfy the requirement of uniqueness.

### Space compression

We perform a pre-treatment of the searching space before enumerating the sub-graphs. In this pre-treatment, we first identify the parity nodes. In a group of parity nodes, we remove all except the node with the minimum mark number such that the network has no pairs of parity nodes, and then search directly into the network. Finally, we determine the network motifs.

*v*

_{1},

*v*

_{2}represent vertex 1 and 2, respectively, and they are the remaining vertex after compression,

*e*

_{1}is the edge linking

*v*

_{1}and

*v*

_{2}.

*G*

_{ r },

*G*

_{ p },

*G*

_{ cv }represent the nodes and edges that remain after compression, the parity nodes that are removed and the vertex and edges connected with the parity nodes, respectively. Upon finishing the compression, we conduct a sub-graph search. At this point, we shall see that the space we need to search is considerably reduced. If we want to search a sub-graph with a specific topological structure, for instance (1,2,5), we need not go through the whole graph to find all sub-graphs with this topology, meaning that searching for sub-graphs like (2,3,5), (1,2,2), (1,4,5), (3,4,5), (1,3,4) is unnecessary. The aforementioned sub-graphs can be stored in

*G*

_{ cv }and

*G*

_{ p }. What we need to do is replace the parity nodes correspondingly and make sure there is no repeating. In this way the searching time is reduced.

### Enumerating Sub-graphs

*Back Tracking*[24] is often used to search the optimal solutions of complex problems. It enumerates a set of partial candidates, in which we keep just the initial and the end node of a path. We also reduce the space complexity using the method of saving storage space.

We aim to enumerate all sub-graphs of a given size that occur in the real graph, and then we combine the method for enumerating all sub-graphs (*Back Tracking*) with that for compressing space. The hybrid algorithm can reduce the complexity of the sub-graphs enumeration and the searching time. The process of enumerating sub-graphs [23] can be read for reference.

## Results and discussion

In this section, we will apply our method to some real networks in order to verify the validity. We evaluate our method on the metabolic pathway of the bacteria *E. coli*, the transcription network of *Yeast*, the *Sea Urchin* network, and an electronic network. These can be freely obtained online at http://www.weizmann.ac.il/UriAlon/groupNetworksData.html[25]*.*

### Effectiveness of the algorithm

[23]**A summary of Code values and the topological structures in different networks**

Network | Nodes | Edges | Size-N | Code | Motif |
---|---|---|---|---|---|

| 423 | 519 | 3 | 8528 | |

4 | 12925664 | ||||

236808 | |||||

| 122 | 189 | 3 | 5668 | |

4 | 13698880 | ||||

12925664 | |||||

| 252 | 399 | 3 | 5668 | |

4 | 12925664 | ||||

13698880 | |||||

| 512 | 819 | 3 | 5668 | |

4 | 12925664 | ||||

13698880 |

In Table 1, the different numbers of edges and nodes embody the differences between networks. Most motifs are similar in the different networks, but small parts are different. If motifs have the same topological structure, their *Codes* shall be the same. This proves the accuracy of the unique mark of isomorphic sub-graphs, and also that of our algorithm. In addition, our method achieves the motif mining in different kinds of networks, and it proves that our method is both valid and extensively applicable.

### The results of compression

In order to judge the performance of our method, we carry out a series of experiments on a set of testing data. The performance of the method is evaluated by the consumption time. We enumerate all sizes of sub-graphs for testing, and then compare them with method [26]. There are no parity nodes in the electronic circuit network, so the searching time remains unchanged. However, we can compress the searching space in the network based on the properties of parity nodes.

**List of searching times for different networks before compression**

Time(s) | Size 3 | Size 4 | Size 5 | Size 6 | Size7 | Size 8 | N(edges) before compression | N(nodes) before compression |
---|---|---|---|---|---|---|---|---|

Networks | ||||||||

Yeast | 0.013 | 1.860 | 31.281 | 1079 | 688 | |||

E coli | 0.031 | 0.469 | 8.844 | 519 | 423 | |||

S208 | 0.001 | 0.002 | 0.031 | 0.125 | 0.579 | 2.953 | 189 | 122 |

S420 | 0.001 | 0.031 | 0.110 | 0.563 | 3.141 | 17.734 | 399 | 252 |

S838 | 0.063 | 0.110 | 0.500 | 2.843 | 17.204 | 819 | 512 |

**List of searching times for different networks after compression**

Time(s) | Size 3 | Size 4 | Size 5 | Size 6 | Size7 | Size 8 | N(edges) after compression | N(nodes) after compression |
---|---|---|---|---|---|---|---|---|

Networks | ||||||||

Yeast | 0.031 | 0.344 | 4.031 | 615 | 345 | |||

E coli | 0.016 | 0.266 | 4.141 | 320 | 256 | |||

S208 | 0.001 | 0.002 | 0.031 | 0.125 | 0.579 | 2.953 | 189 | 122 |

S420 | 0.001 | 0.031 | 0.110 | 0.563 | 3.141 | 17.734 | 399 | 252 |

S838 | 0.063 | 0.110 | 0.500 | 2.843 | 17.204 | 819 | 512 |

After compressing the searching space, we list the searching time in different networks with different sizes in Table 3. To avoid repeated searching, we only search one of the parity nodes and remove the edges connected with the with parity nodes which were abandoned. In this way we obtain a compressed network; the random network shall be compressed in the same way, which ensures that the random network can be used as a reference. This approach also ensures consistency of a sub-graph regardless of whether it is a network motif.

By comparing Table 3 with Table 2, it can be seen that there are no parity nodes in the electronic circuit networks, such as S208, S420, or S838. Therefore, the time for searching sub-graphs with different nodes is the same before and after compression. The subtle gaps between the results and the original results can be neglected. As for the biological networks with parity nodes, however, the more parity nodes that exist the more obvious the effect of compression is. In the example of the yeast network, the number of the parity nodes is 343, half the number of total nodes. The time for searching sub-graphs is greatly reduced after compression. With increasing numbers of sub-graphs, the efficiency of searching increases up to 10 times for 4-node sub-graphs. Of course, the efficiency of searching depends on the size of the network as well as the size of the sub-graph searched for, and the current hardware environment. In any network, the searching time is different when the size of sub-graph is different.

Through comparison of Tables 2 and 3, we confirm that the method of compressing the searching space based on the property of parity nodes is feasible, and the efficiency of searching is greatly improved by saving storage space. The advantage is particularly evident for a network with many parity nodes. This is a new attempt that ensures the identification of network motifs correctly while also improving the efficiency of searching.

### Comparison of searching times

**Computational cost for different algorithms on the E. coli network**

Time(s) | Size 3 | Size 4 | Size 5 | Size 6 | Size 7 | Size 8 |
---|---|---|---|---|---|---|

Algorithms | ||||||

Before compression | 0.031 | 0.469 | 8.844 | |||

After compression | 0.016 | 0.266 | 4.141 | |||

Kavosh | 0.300 | 1.840 | 14.910 | 141.98 | 1374.01 | 13173.74 |

Fanmod | 0.810 | 2.530 | 15.710 | 132.24 | 1205.97 | 9256.61 |

Mfinder | 31.000 | 297.000 | 23671.80 |

The comparison between our method and the FCGI method was performed on the same computer environment: Intel (R)Core(TM) i3 CPU, 2.53 GHZ work station, 1.8 G RAM, Windows XP operating system, and Visual C++ 6.0. This ensures that the comparison is meaningful.

In Figure 6, algorithm performance is evaluated with the consumption time, using the yeast network as a testing data. Searching for sub-graphs in a network is the most important part of the motif mining process. The efficiency of sub-graph enumeration is, therefore, an important standard with which to measure the quality of an algorithm. In reference [26], the sub-graphs are enumerated by the *Rand-ESU* algorithm. When there are only three and four nodes, there is only a subtle difference between the time spent on enumerating sub-graphs by *Back Tracking* algorithm compared with *Rand-ESU*; this gap is negligible and can be ignored. However, with more than five nodes, the time spent even before compressing the searching space is considerably shorter than that by *Rand-ESU*, with an improvement of 27 seconds. Most striking is that after compressing the searching space the time needed is a lot shorter than *Rand-ESU*, with an improvement of 15 times (our algorithm’s consumption time is about one twelfth of the time in *Rand-ESU*).

The algorithm of Mfinder can only search a small range of sizes, and its computational cost is the highest. The FANMOD algorithm, able to find sub-graphs and isomorphic groups of sizes up to eight, results in the identification of the same numbers as Kavosh. The searching time of the Kavosh is less than that of FANMOD. With our algorithm, while the size of sub-graphs is limited to a maximum of five, the searching time is shortest.

The references [5],[7],[17], are performed on superior computer hardware than our algorithm: Intel (R)Core(TM) 2 Quad CPU, 3.2 GHZ work station, 8 G RAM. This means that the increase in speed obtained with our algorithm may be even higher.

## Conclusion

In this paper, we presented a method for mining network motifs based on space compression. All sub-graphs can be enumerated by adding edges and nodes progressively in a *Back Tracking* algorithm, which saves storage space and reduces space complexity as only the initial and end nodes of the path are counted. By taking advantages of the parity nodes, a much more efficient solution for enumerating sub-graphs during the motif mining is provided. Particularly for networks with high ratio of parity nodes, the time spent on enumerating the sub-graphs is reduced significantly compared with other common algorithms. From the results obtained, we have proved the accuracy and effectiveness of our method. By comparing the results of our method with others, we can conclude that our approach has considerably shorter searching times and more extensive applicability.

## Declarations

### Acknowledgement

This work is supported by the National Natural Science Foundation of China (No. 31370778), Program for Changjiang Scholars and Innovative Research Team in University (No. IRT1109) and by the Program for Liaoning Key Lab of Intelligent Information Processing and Network Technology in University.

## Authors’ Affiliations

## References

- Milo R, Shen-Orr S, Itzkovita S, Kastan N, Chklovskii D, Alon U: Network motifs: simple building blocks of complex networks. Sci STKE. 2002, 298: 824-827.Google Scholar
- Koyutürk M, Subramaniam S, Grama A: Introduction to Network Biology.Functional Coherence of Molecular Networks in Bioinformatics 2012, 1–13.,Google Scholar
- Kashtan N, Itzkovita S, Milo R, Alon U: Efficient sampling algorithm for estimating subgraph concentrations and detecting network motifs. Bioinformatics. 2004, 20: 1746-1758. 10.1093/bioinformatics/bth163.View ArticlePubMedGoogle Scholar
- Wernicke S: Efficient detection of network motifs. Comput Biol Bioinform. 2006, 3 (4): 347-359. 10.1109/TCBB.2006.51.Google Scholar
- Itzhack R, Mogilevski Y, Louzoun Y: An optimal algorithm for counting network motifs. Physics A. 2007, 381: 482-490. 10.1016/j.physa.2007.02.102.View ArticleGoogle Scholar
- Itzkovitz S, Milo R, Kastan N, Ziv G, Alon U: Physics Review E 2003(2), 68:026127.Google Scholar
- Wernicke S, Rasche FFANMOD: A tool for fast network motif detection. Bionformatics. 2006, 22 (9): 1152-1153. 10.1093/bioinformatics/btl038.View ArticleGoogle Scholar
- Baskerville K, Paczuski M: Subgraph Ensembles and motif discovery using a new heuristic for graph isomorphism. Physics Review E. 2006, 74: 051903. 10.1103/PhysRevE.74.051903.View ArticleGoogle Scholar
- Lau JW, So MKP: A Monte Carlo Markov chain algorithm for a class of mixture time series models. Stat Comput. 2011, 21 (1): 69-81. 10.1007/s11222-009-9147-6.View ArticleGoogle Scholar
- Srinivasa S, Haenggi M: Distance distributions in finite uniformly random networks: Theory and applications. Vehicular Technology. 2010, 59 (2): 940-949. 10.1109/TVT.2009.2035044.View ArticleGoogle Scholar
- Tian LJ, Liu CQ, Xie JQ: A Partition Method for Graph Isomorphism. Phys Procedia. 2012, 25: 1761-1768. 10.1016/j.phpro.2012.03.308.View ArticleGoogle Scholar
- Arvind V, Kurur PP: Graph Isomorphism is in SPP. Inf Comput. 2006, 204 (5): 835-852. 10.1016/j.ic.2006.02.002.View ArticleGoogle Scholar
- Ding H, Huang Z: Isomorphism identification of graphs: Especially for the graphs of kinematic chains. Mech Mach Theory. 2009, 44 (1): 122-139. 10.1016/j.mechmachtheory.2008.02.008.View ArticleGoogle Scholar
- Knossow D, Sharma A, Mateus D, Horaud R: Inexact matching of large and sparse graphs using laplacian eigenvectors. Graph-Based Representations in Pattern Recognition. 2009, 5534: 144-153. 10.1007/978-3-642-02124-4_15.View ArticleGoogle Scholar
- Ogras UY, Marculescu R: Energy-and performance-driven NoC communication architecture synthesis using a decomposition approach, Proceeding of the conference on Design, Automation and Test in Europe, Washington, DC, USA 2005. 2005, 1:352–357.Google Scholar
- Ribeiro P, Sliva F: G-Tries: an efficient data structure for discovering network motifs. Sierre, Switzerland: ACM 25th Symposium On Applied Computing-Bioinformatics Track; 2010:1559–1566.Google Scholar
- Kashani ZR, Ahrabian H, Elahi E, Nowzari-Dalini A, Ansari ES, Asadi S, Mohammadi S, Schreiber F, Masoudi-Nejad A: Kavosh: a new algorithm for finding network motifs. BMC Bioinformatics. 2009, 10 (318): 1-12.Google Scholar
- Liao V, Chen M: Efficient mining gapped sequential patterns for motifs in biological sequences. BMC Syst Biol. 2013, 7 (4): S7. 10.1186/1752-0509-7-S4-S7.View ArticlePubMedPubMed CentralGoogle Scholar
- Zhang M, Lu L: Investigating the validity of current network analysis on static conglomerate networks by protein network stratification. BMC Bioinformatics. 2010, 11: 466. 10.1186/1471-2105-11-466.View ArticlePubMedPubMed CentralGoogle Scholar
- Srinivasan S, Vural S, King B, Guda C: Mining for class-specific motifs in protein sequence classification. BMC Bioinformatics. 2013, 14: 96. 10.1186/1471-2105-14-96.View ArticlePubMedPubMed CentralGoogle Scholar
- Bondy JA, Murty USR: Graph Theory. 2008, Springer Verlag, BerlinView ArticleGoogle Scholar
- Chinn PZ: The frequency partition of a graph. Recent Trends in Graph Theory. Lecture Notes in Mathematics (Berlin: Springer-Verlag). 1971, 186: 69-70. 10.1007/BFb0059424.View ArticleGoogle Scholar
- Xu Y, Zhang Q, Zhou C: A New Method for Motif Mining in Biological Network. Evol Bioinforma. 2014, 10: 155-163.Google Scholar
- Xie P: A dynamic model for processive transcription elongation and backtracking long pauses by multisubunit RNA polymerases. Proteins: Structure, Function, and Bioinformatics. 2012, 80 (8): 2020-2034.Google Scholar
- UriAlonLab: Weizmannnetworks. 2012. http://www.weizmann.ac.il/mcb/UriAlon/groupNetworksData.html.
- Hu JL, Gao L: A novel graph isomorphism algorithm based on feature selection in network motif discovery. 2011. http://www.paper.edu.cn/html/releasepaper/2011/09/56/.

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.