lecture_notes:04-07-2011

**This is an old revision of the document!**

We talked about the Jellyfish tool. Details of the space-efficient algorithm were explained, and we looked at how to schedule a run on the Campusrocks cluster.

jellyfish -m 22 -o output -c 3

qsub -hard -l num_proc=# jellyfish_script

The initial kmers (4^k possible) are first changed to keys with an invertible binary matrix. The keys are then reduced by a modulus M=2^l, so that they range from [0, M-1], condensing the hash table. The remainder 2k-l portion of the key is stored in front of each value. Because the keys are condensed, collisions are to be expected for dissimilar keys, so the algorithm uses a reprobe function: i(i+1)/2, where i is the number of reprobes; to resolve them. The first key that hashes to a position will store a reprobe value of 1 and following dissimilar keys will go to the next reprobe position and store i+1. There is also a maximum limit to the number of reprobes (the length of the reprobe counter), after which the algorithm will write the hash to disk(?) instead of reprobing.

The algorithm also limits the size of the value field, making use of the fact that the average number of reads is the coverage c. When it has filled, it will reprobe and store the higher order bits in the extension. In the reprobed position, it avoids repeating the 2k-l key and instead stores the number of reprobes from the original position, which is a shorter value. The extra space is used for the value field.

You could leave a comment if you were logged in.

lecture_notes/04-07-2011.1302277373.txt.gz · Last modified: 2011/04/08 08:42 by eyliaw