Checking Phylogenetics Decisiveness in Theory and in Practice

被引:0
|
作者
Parvini, Ghazaleh [1 ]
Braught, Katherine [2 ]
Fernandez-Baca, David [3 ]
机构
[1] Univ Massachusetts, Coll Informat & Comp Sci, Amherst, MA 01003 USA
[2] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
[3] Iowa State Univ, Dept Comp Sci, Ames, IA 50011 USA
关键词
Phylogeny; Partitioning algorithms; Color; Terminology; Steel; Software; Reliability; Phylogenetic tree; taxon coverage; algorithms; no-rainbow hypergraph coloring; integer linear programming; satisfiability; TREE;
D O I
10.1109/TCBB.2021.3128381
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
Suppose we aim to build a phylogeny for a set of taxa X using information from a collection of loci, where each locus offers information for only a fraction of the taxa. The question is whether, based solely on the pattern of data availability, called a taxon coverage pattern, one can determine if the data suffices to construct a reliable phylogeny. The problem can be expressed combinatorially as follows. Let us call a taxon coverage pattern decisive if, for any binary phylogenetic tree T for X, the collection of phylogenetic trees obtained by restricting T to the subset of X covered by each locus uniquely determines T. Here we relate the problem of checking whether a taxon coverage pattern is decisive to a hypergraph coloring problem. Using this connection, we (1) show that checking decisiveness is co-NP complete; (2) obtain lower bounds on the amount of coverage needed to achieve decisiveness; (3) devise an exact algorithm for decisiveness; (4) develop problem reduction rules, and use them to obtain efficient algorithms for inputs with few loci; and (5) devise Boolean satisfiability (SAT) and integer linear programming formulations (ILP) of decisiveness that allow us to analyze data sets that arise in practice. For data sets that are not decisive, we use our SATand ILP formulations to obtain decisive subsets of the data.
引用
收藏
页码:3307 / 3316
页数:10
相关论文
共 50 条
  • [31] Computing Tree Width: From Theory to Practice and Back
    Berndt, Sebastian
    SAILING ROUTES IN THE WORLD OF COMPUTATION, 2018, 10936 : 81 - 88
  • [32] Evaluation theory and practice as applied to security education - An overview
    Dark, MJ
    SECURITY EDUCATION AND CRITICAL INFRASTRUCTURES, 2003, 125 : 197 - 214
  • [33] Contribution of Vaclav!Peterka to adaptive control theory and practice
    Kárny, M
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 1999, 13 (06) : 423 - 431
  • [34] Dynamic vehicle routing with time windows in theory and practice
    Yang, Zhiwei
    van Osta, Jan-Paul
    van Veen, Barry
    van Krevelen, Rick
    van Klaveren, Richard
    Stam, Andries
    Kok, Joost
    Back, Thomas
    Emmerich, Michael
    NATURAL COMPUTING, 2017, 16 (01) : 119 - 134
  • [35] Risk management for geotechnical structures: consolidating theory into practice
    Assis, Andre P.
    SOILS AND ROCKS, 2020, 43 (03): : 311 - 336
  • [36] Temporal Privacy in Wireless Sensor Networks: Theory and Practice
    Kamat, Pandurang
    Xu, Wenyuan
    Trappe, Wade
    Zhang, Yanyong
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (04)
  • [37] From theory to practice: Understanding DevOps culture and mindset
    Jha, Amitkumar V.
    Teri, Riya
    Verma, Subra
    Tarafder, Susmita
    Bhowmik, Wriddhi
    Mishra, Sunil Kumar
    Appasani, Bhargav
    Srinivasulu, Avireni
    Philibert, Nsengiyumva
    COGENT ENGINEERING, 2023, 10 (01):
  • [38] Portfolio optimisation: Bridging the gap between theory and practice
    Valle, Cristiano Arbex
    COMPUTERS & OPERATIONS RESEARCH, 2025, 175
  • [39] Real World Scrum A Grounded Theory of Variations in Practice
    Masood, Zainab
    Hoda, Rashina
    Blincoe, Kelly
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (05) : 1579 - 1591
  • [40] The Science of Criminal Investigation between Theory and Practice in Slovenia
    Frangez, Danijela
    Lindav, Bostjan
    REVIJA ZA KRIMINALISTIKO IN KRIMINOLOGIJO, 2019, 70 (02): : 141 - 161