Using closure tables to enable cross-querying of ontologies in database-driven applications

Daniel R. Harris, Darren W. Henderson, Jeffery C. Talbert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We demonstrate that closure tables are an effective data structure for developing database-driven applications that query biomedical ontologies and that require cross-querying between multiple ontologies. A closure table stores all available paths within a tree, even those without a direct parent-child relationship; additionally, a node can have multiple ancestors which gives the foundation for supporting linkages between controlled ontologies. We augment the meta-data structure of the ICD9 and ICD10 ontologies included in i2b2, an open source query tool for identifying patient cohorts, to utilize a closure table. We describe our experiences in incorporating existing mappings between ontologies to enable clinical and health researchers to identify patient populations using the ontology that best matches their preference and expertise.

Original languageEnglish
Title of host publication2017 IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2017
Pages493-496
Number of pages4
ISBN (Electronic)9781509041794
DOIs
StatePublished - Apr 11 2017
Event4th IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2017 - Orlando, United States
Duration: Feb 16 2017Feb 19 2017

Publication series

Name2017 IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2017

Conference

Conference4th IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2017
Country/TerritoryUnited States
CityOrlando
Period2/16/172/19/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

ASJC Scopus subject areas

  • Health Informatics
  • Computer Science Applications
  • Biomedical Engineering

Fingerprint

Dive into the research topics of 'Using closure tables to enable cross-querying of ontologies in database-driven applications'. Together they form a unique fingerprint.

Cite this