Skip to main content
  • Methodology article
  • Open access
  • Published:

Evolutionary approaches for the reverse-engineering of gene regulatory networks: A study on a biologically realistic dataset

Abstract

Background

Inferring gene regulatory networks from data requires the development of algorithms devoted to structure extraction. When only static data are available, gene interactions may be modelled by a Bayesian Network (BN) that represents the presence of direct interactions from regulators to regulees by conditional probability distributions. We used enhanced evolutionary algorithms to stochastically evolve a set of candidate BN structures and found the model that best fits data without prior knowledge.

Results

We proposed various evolutionary strategies suitable for the task and tested our choices using simulated data drawn from a given bio-realistic network of 35 nodes, the so-called insulin network, which has been used in the literature for benchmarking. We assessed the inferred models against this reference to obtain statistical performance results. We then compared performances of evolutionary algorithms using two kinds of recombination operators that operate at different scales in the graphs. We introduced a niching strategy that reinforces diversity through the population and avoided trapping of the algorithm in one local minimum in the early steps of learning. We show the limited effect of the mutation operator when niching is applied. Finally, we compared our best evolutionary approach with various well known learning algorithms (MCMC, K2, greedy search, TPDA, MMHC) devoted to BN structure learning.

Conclusion

We studied the behaviour of an evolutionary approach enhanced by niching for the learning of gene regulatory networks with BN. We show that this approach outperforms classical structure learning methods in elucidating the original model. These results were obtained for the learning of a bio-realistic network and, more importantly, on various small datasets. This is a suitable approach for learning transcriptional regulatory networks from real datasets without prior knowledge.

Background

Introduction

Biological functions result from the interaction of various macromolecules in the cell. Among the different regulatory mechanisms at work in the cell, transcriptional regulation plays an important role as it links a coding space of genes to a functional space of proteins. The availability of a wide range of genome wide experimental techniques, such as DNA microarrays or ChIP on chip, gives the modellers the opportunity to consider reverse engineering of transcriptional networks from experimental data. The elucidation of these networks is usually implemented by choosing a mathematical model to describe the interactions between a regulee and its regulators and then using the data to learn both the graph of interactions and the parameters of the mathematical model. We consider here the case when the graph structure is unknown and the learning task consists of discovering the nature of interactions.

Up to now, a variety of frameworks to infer transcriptional regulatory networks from expression profiles have been considered [1, 2]. Among them, probabilistic graphical models appear to be a successful approach [3, 4]. They offer an adequate representation of conditional (in)dependencies between variables and allow the management of uncertainty which is relevant in case of noisy data and stochastic processes. Regarding the learning issue, the choice between dynamic and static modelling depends mainly on data availability. Learning dynamic systems requires observations of temporal variations of gene expressions which are costly to produce while the availability of static data in complex organisms is growing. In this work, we have thus chosen to focus on learning the structure of static models using static data. Among the probabilistic models, we selected Bayesian Networks (BN) [57] that cover acyclic interaction networks. This class of models has often been used in the field of computational biology [3, 813] in the past few years. Many approaches have been proposed to learn the structure of Bayesian networks [14]. Structure learning algorithms are generally based on a search within a set of candidate structures. The underlying idea is to discover the BN that best fits the available data. A scoring metric is required to assess the quality of each candidate structure with respect to the data.

To undertake the search in the huge space of BN structures [15], deterministic heuristics like greedy search [16] or the K2 algorithm [17] have been proposed. However, since the problem of structure learning is known to be NP-hard [18], stochastic heuristics like MCMC [19, 20] or Evolutionary Programming [21] are usually preferred. They are supposed to overcome some limitations of deterministic search strategies, such as local optimality and dependence on the initial solution. In this work, we developed Evolutionary Algorithms (EA) to learn network structures and we applied our strategies to learn a regulatory network, called the insulin network, introduced by [22] to serve as a benchmark problem in reverse-engineering of regulatory networks. We studied various implementations of EA dedicated to BN structure optimisation and showed that EA enhanced by a niching strategy, called Deterministic Crowding, performed a pertinent exploration of the search space.

Modelling gene regulatory networks with Bayesian networks

In this paper, gene regulatory networks are represented by (BN). Formally, BN are defined by a tuple (G, P G ). G is a Directed Acyclic Graph (DAG) where nodes are random variables X = {X1,...,X n } and the edges encode the conditional (in)dependencies between these variables. The graph topology defines a set of parents for each node i : Pa i . Here, the random variables correspond to gene expression levels, reflecting mRNA concentrations while edges represent the interactions between parent variables (regulators) and child variables (regulee). We must emphasise that with this kind of model, no loops can be represented. This induces a strong restriction in our modelling, but several works [4, 23] have shown that these approaches are successful in capturing a good part of the regulation characteristics.

According to the Markov assumption, which states that each node is independent of its non-descendants given its parents, we can factorise the joint probability distribution P(X1, X2, ..., X n ) using the product of probability distributions of the X i 's given their parents Pa i :

P ( X ) = P G ( X ) = i = 1 n P G ( X i | P a i ) MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaGaemiuaaLaeiikaGIaemiwaGLaeiykaKIaeyypa0Jaemiuaa1aaSbaaSqaaiabdEeahbqabaGccqGGOaakcqWGybawcqGGPaqkcqGH9aqpdaqeWbqaaiabdcfaqnaaBaaaleaacqWGhbWraeqaaOWaaeWaaeaacqWGybawdaWgaaWcbaGaemyAaKgabeaakmaaeeaabaGaemiuaaLaemyyae2aaSbaaSqaaiabdMgaPbqabaaakiaawEa7aaGaayjkaiaawMcaaaWcbaGaemyAaKMaeyypa0JaeGymaedabaGaemOBa4ganiabg+Givdaaaa@4AEB@
(1)

P G (X i | Pa i ) is the conditional probability distribution of X i given its parents in G or the marginal distribution when Pa i = . In this study, we use discrete random variables to model the gene expression levels and non-parametric modelling (e.g. Conditional Probability Tables or CPT) to represent the conditional probabilities. CPT present at least two main advantages. They enable representation of any complex regulatory interactions without requiring fixation of the nature of the interactions before learning and they also lead to very simple maximum likelihood estimators. The parametrisation of the BN relies on the coefficients of the CPT : { θ i k l MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaacciGae8hUde3aa0baaSqaaGqaciab+LgaPjab+TgaRbqaaiab+XgaSbaaaaa@31D4@ } with k, a given state of variable X i , and l a given configuration of its parental set Pa i

P G ( X i = k | P a i = l ) = { θ i k l } MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaGaemiuaa1aaSbaaSqaaiabdEeahbqabaGccqGGOaakcqWGybawdaWgaaWcbaGaemyAaKgabeaakiabg2da9iabdUgaRjabcYha8jabdcfaqjabdggaHnaaBaaaleaacqWGPbqAaeqaaOGaeyypa0JaemiBaWMaeiykaKIaeyypa0Jaei4EaShcciGae8hUde3aa0baaSqaaiabdMgaPjabdUgaRbqaaiabdYgaSbaakiabc2ha9baa@4779@

In this work, the Bayes Net Toolbox (BNT) [24] was used in order to create, manipulate and learn BN.

Structure learning as an optimisation problem

In this part, we present a general and classical approach for BN structure learning often called the score and search method.

To identify both structure G and parameters given a sample of size s, D = (x1,...,xs) of n random variables X = {X1,...,X n }, we first need to define a scoring metric that evaluates how the structure and the parameters fit the data. In the case of biological networks, it is not possible to state what is the true cost function at stake. In order to infer the model from data, we know from the learning theory that the scoring metric should incorporate a term responsible for data fitting and a term that controls the complexity of the model.

The Bayesian Information Criterion (BIC) fulfils these requirements and offers a simple way to evaluate a BN structure. BIC was first defined by Schwarz in 1978 as a general proposal for estimating the complexity of a statistical model. Considering G MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaWenfgDOvwBHrxAJfwnHbqeg0uy0HwzTfgDPnwy1aaceaGae8NbXFeaaa@3753@ , the set of all possible DAGs containing the aforementioned n variables, the best DAG structure G ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaGafm4raCKbaKaaaaa@2CFA@ can be determined by selecting in G MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaWenfgDOvwBHrxAJfwnHbqeg0uy0HwzTfgDPnwy1aaceaGae8NbXFeaaa@3753@ the graph structure G that minimizes the BIC:

G ^ = a r g m i n G { 2 log P ( D | G , θ ^ ) + K G log ( s ) } MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaGafm4raCKbaKaacqGH9aqpcqWGHbqycqWGYbGCcqWGNbWzcqWGTbqBcqWGPbqAcqWGUbGBdaWgaaWcbaGaem4raCeabeaakiabcUha7jabgkHiTiabikdaYiGbcYgaSjabc+gaVjabcEgaNjabdcfaqjabcIcaOiabdseaejabcYha8jabdEeahjabcYcaSGGaciqb=H7aXzaajaGaeiykaKIaey4kaSIaem4saS0aaSbaaSqaaiabdEeahbqabaGccyGGSbaBcqGGVbWBcqGGNbWzcqGGOaakcqWGZbWCcqGGPaqkcqGG9bqFaaa@5487@

where θ ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaacciGaf8hUdeNbaKaaaaa@2DA0@ is the maximum likelihood estimate of θ, the set of parameters of model G : θ ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaacciGaf8hUdeNbaKaaaaa@2DA0@ = argmax θ P(D | G,θ) and K G the number of free parameters of model G.

For the class of models that we chose and given the i.i.d. data, the likelihood can be expressed as follows

P ( D | G , θ ) = i k l θ i k l N i k l MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaGaemiuaaLaeiikaGIaemiraqKaeiiFaWNaem4raCKaeiilaWccciGae8hUdeNaeiykaKIaeyypa0ZaaebuaeaadaqeqbqaamaarafabaGae8hUde3aa0baaSqaaiabdMgaPjabdUgaRbqaaiabdYgaSbaaaeaacqWGSbaBaeqaniabg+GivdaaleaacqWGRbWAaeqaniabg+GivdaaleaacqWGPbqAaeqaniabg+GivdGcdaahaaWcbeqaaiabd6eaonaaDaaameaacqWGPbqAcqWGRbWAaeaacqWGSbaBaaaaaaaa@4C2B@

with exponent N i k l MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaGaemOta40aa0baaSqaaiabdMgaPjabdUgaRbqaaiabdYgaSbaaaaa@3140@ being the number of co-occurrences of both X i = k and Pa(X i ) = l in the data. Therefore, the BIC can be rewritten as follows:

B I C ( G ) = i k l 2 N i k l log ( θ ^ i k l ) + K G i log ( s ) MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaGaemOqaiKaemysaKKaem4qamKaeiikaGIaem4raCKaeiykaKIaeyypa0ZaaabuaeaadaaeqbqaamaaqafabaGaeyOeI0IaeGOmaiJaemOta40aa0baaSqaaiabdMgaPjabdUgaRbqaaiabdYgaSbaaaeaacqWGSbaBaeqaniabggHiLdGccyGGSbaBcqGGVbWBcqGGNbWzcqGGOaakiiGacuWF4oqCgaqcamaaDaaaleaacqWGPbqAcqWGRbWAaeaacqWGSbaBaaGccqGGPaqkcqGHRaWkcqWGlbWsdaqhaaWcbaGaem4raCeabaGaemyAaKgaaaqaaiabdUgaRbqab0GaeyyeIuoaaSqaaiabdMgaPbqab0GaeyyeIuoakiGbcYgaSjabc+gaVjabcEgaNjabcIcaOiabdohaZjabcMcaPaaa@5CC3@

with K G i MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaGaem4saS0aa0baaSqaaiabdEeahbqaaiabdMgaPbaaaaa@2F91@ the number of parameters in the CPT of X i . θ ^ i k l MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaacciGaf8hUdeNbaKaadaqhaaWcbaGaemyAaKMaem4AaSgabaGaemiBaWgaaaaa@31E8@ is the maximum likelihood estimate of θ i k l MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaacciGae8hUde3aa0baaSqaaGqaciab+LgaPjab+TgaRbqaaiab+XgaSbaaaaa@31D4@ . The P latter can be computed by N i k l / N i l MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaGaemOta40aa0baaSqaaiabdMgaPjabdUgaRbqaaiabdYgaSbaakiabc+caViabd6eaonaaDaaaleaacqWGPbqAaeaacqWGSbaBaaaaaa@363E@ where N i l = k N i k l MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaGaemOta40aa0baaSqaaiabdMgaPbqaaiabdYgaSbaakiabg2da9maaqababaGaemOta40aa0baaSqaaiabdMgaPjabdUgaRbqaaiabdYgaSbaaaeaacqWGRbWAaeqaniabggHiLdaaaa@3995@ is the number of times the X i 's parental configuration equals l . Since it relies on frequencies, computing these estimators from data is straightforward. This allows to dedicate most of the computational time to the exploration of the structure space. Note that the BIC can be read as the sum of local scores: one local score only depends on the parental set of the node for which it is computed.

To achieve BIC minimization, an appropriate search in the space of candidate graphs has to be defined. To avoid testing all of the possible graphs, searches based on appropriate heuristics are usually preferred. In this work, we use Evolutionary Algorithms to explore the solution space. Various implementations of EA are described as well as their qualitative and quantitative performances assessed on bio-realistic data. Finally, a comparison with classical structure learning algorithms is given. The next section introduces these methods and the results of the testing.

Results and discussion

Learning Bayesian network structures with evolutionary algorithms

In this work, we propose to use EA [25, 26] to design regulatory network structures such as BN structures. The search for the BN structure, which minimizes the Bayesian Information Criterion (BIC), is implemented through a steady state genetic algorithm whose synopsis can be found below:

  • Initialisation : A population of BN structures is randomly generated and then evaluated according to a fitness function

  • Repeat until a stopping criterion is satisfied :

  1. 1.

    Pick two genitors at random from the population : P1 and P2

  2. 2.

    Produce a pair of offspring by recombining P1 and P2 : C1 and C2

  3. 3.

    Mutation may be applied to promote diversity : C1 and C2 undergo random edges additions or deletions

  4. 4.

    Evaluate C1 and C2 by computing their fitness function

  5. 5.

    Discard two individuals from the current population to recover the initial population size. To favour the survival of good candidate models, a selection scheme based on the chosen fitness function is used.

Structure representation and recombination

In EAs, candidate models are coded with (binary) vectors called chromosomes. Here, their constituents are termed EA-genes. Practically, EA-genes can take on multiple values from any finite alphabet.

Evolving BN structures is a hard task and DAGs encoding turns out to be a crucial issue. Two global strategies can be considered regarding this question: direct and indirect searches.

Indirect search [27, 28] performed the search in the set of precedence orders of the DAG nodes, when direct search works directly in the set of DAGs. A precedence order defines the set of potential parents for each node. For instance, a node X j must precede a node X i in this precedence order to be a parent of X i in the graph. We chose the second alternative and directly evolved BN structures as performed in [2932]. Since the search is conducted directly over the space of DAG, we faced the classical problem of producing infeasible solutions (digraph with cycle). A first answer is given in [33] to deal with this situation. EA-genes coding elementary edges of both genitors are put together and then injected in the future offspring according to some specific rules in order to maintain feasibility and increase the amount of information in the new Bayesian network [32]. An alternative approach is proposed in [31] by allowing the production of cyclic digraphs and arbitrarily assigning them a low score. In this paper, we considered the acyclicity constraint a posteriori using a repair function to remove cycles from new candidate structures (this process is detailed in the Methods section). Moreover, we set an upper bound on the number of potential parents per node to 10, which limited the frequency of cycle appearance. Indeed, for each X i , the number of parameters θ ^ i k l MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaacciGaf8hUdeNbaKaadaqhaaWcbaGaemyAaKMaem4AaSgabaGaemiBaWgaaaaa@31E8@ to estimate and store in the corresponding conditional probability table grows exponentially as a function of the number of parents of X i . For computational convenience, we chose to limit the size of the parental sets. Therefore, offspring produced by recombination had to respect both the acyclicity and the maximum in-degree constraints.

We focused on a generic pair-wise recombination method to perform the search in the space of BN structures. We used uniform crossover exchanging randomly selected EA-genes between two genitor chromosomes. An exchange rate parametrises the proportion of GA-genes that will be passed from one genitor to another during recombination. Since this process is symmetric, the exchange rate ranges between 0 and 0.5. Recombination efficiency depends on its ability to manipulate meaningful information units. We considered two different codings of BN structures making use of different types of EA-genes.

Link Recombination

First, we considered a link-chromosome. This is a ternary vector where each EA-gene φ ij (with ij) can take three values : 0 if there is no edge between X i and X j , 1 if X i X j , -1 if X j X i . This compact representation relies on meaningful information units which represent elementary interactions between nodes pairs.

Parental Recombination

We also considered the parental-chromosome previously used in [31]. A parental-chromosome is composed of a sequence of n GA-genes, each of them corresponding to a parental list Pa j (with j {1,...,n}). The scoring metric we used to evaluate BN structures can be expressed as the summation of local scores assessing the parental lists. Thus, the search for a high fitted BN structure can be achieved by finding proper associations of high scoring parental lists. From a biological point of view, one may assume that Pa j represent sets of regulators acting jointly on the transcriptional activity of gene X j which justifies exchanging it as a whole.

Maintaining the diversity in the population of solutions

A fundamental characteristic of EAs is their ability to search the DAG space from multiple points in parallel. However, as the algorithm goes along, the chromosomes of the population may become very similar. Population homogenisation may prevent the crossover operator from exploring new portions of the solution space.

A common approach to fight fast homogenisation is the mutation operator which introduces diversity by means of random edge additions and deletions among candidate models. This allows the algorithm to escape from local minima and exploration of new area in the search space.

Alternatively, niching approaches tend to maintain diversity by limiting the scope of selection processes to subsets of similar individuals. In this study, we used Deterministic Crowding (DC) [34], a crowding method [35] that takes place after reproduction and provides a restricted replacement scheme among similar individuals: each offspring replaces the most similar genitor if it is fitter. Further details regarding Deterministic Crowding are provided in the Method section.

Mutation and DC occur at two different steps of the classical process of GA. We will compare results obtained with mutation and/or Deterministic Crowding. When DC is not applied, we used an elitist replacement strategy: offspring replace the two worst individuals of the population if they have higher scores.

Benchmark and evaluation metrics

In order to evaluate the performance of a structure learning algorithm, we need to measure its ability to recover the true structure of the regulatory network. Currently there is no gold standard that serves as a benchmark for evaluation, including both real static data and full knowledge of existing pathways. When introducing a new approach, modellers classically use artificial data to test the algorithm in various conditions of size of the simulated samples.

We considered the synthetic model proposed in Le et al. [22], which is a bio-realistic Bayesian network based on established knowledge on the insulin regulatory network with a moderate size (35 discrete random variables) and complexity (parsimonious topology). This insulin DAG is the reference graph for the study. We generated samples with various numbers of measures for the 35 genes.

Prior to defining the evaluation metrics that measure the learning performance, it must be noted that BIC is a Markov equivalent scoring metric; therefore, it yields the same score for any DAG belonging to the same equivalence Markov class, i.e. encoding the same statistical model [36]. Formally, an equivalence Markov class is represented by a partially directed acyclic graph (PDAG). It gathers all of the DAGs with the same graph skeleton (undirected structure) and the same set of immoralities [37]. Since the learning process can not discriminate between Markov equivalent DAGs on the basis of only observed data, the analyses were performed on the PDAG containing the best DAG obtained for each run. In the evaluation of the learning process, the best PDAG we found was compared with the PDAG corresponding to the reference model.

As in [22], the metrics used are sensitivity ( t p t p + f n MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaqcfa4aaSaaaeaacqWG0baDcqWGWbaCaeaacqWG0baDcqWGWbaCcqGHRaWkcqWGMbGzcqWGUbGBaaaaaa@35C1@ ), specificity ( t n t n + f p MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaqcfa4aaSaaaeaacqWG0baDcqWGUbGBaeaacqWG0baDcqWGUbGBcqGHRaWkcqWGMbGzcqWGWbaCaaaaaa@35BD@ ), and positive predictive value ( t p t p + f p MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaqcfa4aaSaaaeaacqWG0baDcqWGWbaCaeaacqWG0baDcqWGWbaCcqGHRaWkcqWGMbGzcqWGWbaCaaaaaa@35C5@ ). A true positive (tp) is an edge which appears both in the learnt graph and the reference graph, with the same orientation if it is oriented in the learnt graph. An undirected edge in the learnt graph is considered as a true positive even if it is directed in the reference graph since no speculation is made regarding its orientation. A true negative (tn) is the absence of any edge between two specific nodes in both the learnt and true graphs.

However, the specificity did not appear to be relevant. The introduction of an upper bound on the number of parents per node as well as the constraint on the network complexity in the BIC ensured the generation of parsimonious solutions. Since both the learnt and the reference network structures presented a small number of edges, the number of true negatives was always very high in comparison with the number of negatives (tn + fp) and therefore the specificity was not discriminative.

Finally, we only retained sensitivity and positive predictive value as quality metrics since the computation duration (up to a few hours on a conventional desktop) will always be short compared to the months which are necessary to achieve a biological experiment. The aim of genetic regulation network learning is to provide clues for gene/protein interaction discovery which have to be biologically validated. Therefore, one has to ensure a high ppv to avoid unnecessary costly and time consuming experiments.

In the next section, the performances of the EA optimisation depending on the recombination strategies and diversity preservation methods are first reported. Second, the most promising EA implementation we have found is compared with alternative learning algorithms like greedy search, K2 and MCMC algorithms.

Exploring the search space with evolutionary algorithms

A comparison of various evolutionary approaches

First, we compare the ability of an evolutionary algorithm to recover the true structure of the reference network depending on the recombination strategy it employs and the use of mutation and/or Deterministic Crowding. The results are expressed in terms of sensitivity and ppv in Table 1. The empirical means and standard deviations of the quality metrics are computed from 10 runs. The 10 runs were performed on 10 different i.i.d. training samples of size 300. The size 300 has been chosen as a balance between the small sample size of real data that we can hope for and the standard in BN learning.

Table 1 Comparison of the sensitivity and positive predictive value of various evolutionary strategies

The population size was set to 200 DAGs and the stopping criterion of the algorithm is the following: no improvement occurs during at least 1000 iterations.

We report the ability of link and parental recombination to explore the search space for a high (0.4) and a low (0.1) of the exchange rate: rows 1 and 2 are devoted to link recombination results, while rows 3 and 4 present the parental-recombination results. In each table, results are reported in various conditions: neither mutation nor niching (column 1), use of mutation (column 2), use of deterministic crowding (column 3) and use of both (column 4). When mutation is used, it is characterized by a small mutation rate implying about 2 edges modifications per DAG.

Considering the first columns of Table 1, we can see that for both link and parental recombination, the higher the exchange rate, the better the results. This was expected since a higher exchange rate favours a higher mix of EA-genes among candidate models. Thus, the exploration of the search space is accelerated through the generation of a wider variety of candidate models. For a given exchange rate, link-recombination outperforms parental-recombination. It performs recombination at a finer level (elementary interactions) than parental-recombination which, by manipulating large subsets of conditional (in)dependencies, explores the search space more slowly.

Adding the mutation operator (Columns 2) increases the sensitivity we obtain with every recombination methods. This improvement is particularly important for the less effective ones. For a low exchange rate, mutation allows attainment of new graph topologies that would not be considered due to the slow mix of EA-genes. For parental-recombination, each EA-gene can take on a huge number of values depending on the large number of parental lists that each node can admit. Since these parental lists are exchanged globally, they will be maintained unchanged during recombination. The mutation operator appears to be necessary to modify them and to explore new configurations of parental lists.

Using Deterministic Crowding (Columns 3) also increases the sensitivity of the recombination methods, especially for those with a low exchange rate. However, while the mutation operator fails to improve the ppv, Deterministic Crowding significantly increases this quality metric for all recombination methods and parameter values. Finally, the differences we previously observed among them tended to vanish. This improvement comes from the ability of Deterministic Crowding to prevent homogenisation of the population and delay the convergence of the algorithm. This allows even the less effective recombination strategies to pursue searches toward better minima.

Finally, adding the mutation operator to the Deterministic Crowding (Columns 4) leads to balanced results: we observe a moderate sensitivity improvement and a loss of ppv for the high exchange rate. It must be noted that the various evolutionary approaches we previously compared do not perform the same number of fitness function evaluations until reaching convergence. The biggest difference is related to the use of niching. In our experiments, an EA with link-recombination, a high exchange rate, a small mutation probability and using the Deterministic Crowding performs between 40000 and 50000 function evaluations. The same EA without Deterministic Crowding requires between 20000 and 30000 function evaluations. Considering these values are of the same order, the conditions of a fair comparison are granted for these algorithms.

DC significantly improves the learning process and its performances clearly balance the absence of mutation. Since using both mutation and DC does not yield better overall results than using DC alone, the need for random modification could be discussed. However, for the remaining part of this paper, we chose to use both. DC improvement is obviously of greater benefit for recombination methods which usually fail to efficiently explore the solution space. In order to get a better understanding of the improvement promoted by this niching technique, we propose to study its effect on the homogenisation of the population. For this purpose, we use an adapted visualisation method: the Kernel Principal Component Analysis (KPCA).

Visualization of the effect of Deterministic Crowding during learning

The impact of Deterministic Crowding on the exploration of the DAG space can also be evaluated by visualizing how much the DAG structures produced by the two different evolutionary strategies differ. For this purpose, we used Kernel Principal Components Analysis (KPCA) introduced by Schölkopf et al. [38] to project DAGs in 2D space. KPCA consists of applying the standard PCA in a feature space endowed with some kernel k as an inner product. A kernel k is a similarity function that is positive semi-definite. KPCA provides one way to apply PCA to complex objects for which a kernel can be defined. Kernels between graphs were introduced by Gaertner in [39]. Particularly, he proposed the direct product kernel based on the direct product graph.

Given two directed graphs noted G1 and G2, we define E× as the adjacency matrix of their direct product graph G1 × G2, given by the element by element product of the adjacency matrices of G1 and G2: (i,j) {1,...,m}2, E×(i,j) = A1(i,j)A2(i,j), where A1 and A2 are respectively the adjacency matrices of G1 and G2.

The direct product kernel k× is defined by :

k × ( G 1 , G 2 ) = i , j = 1 m n = 0 β n n ! E × n = i , j = 1 m exp β E × MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@6635@

where m is the number of vertices of the graphs, β + MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaWenfgDOvwBHrxAJfwnHbqeg0uy0HwzTfgDPnwy1aaceaGae83gHi1aaWbaaSqabeaacqGHRaWkaaaaaa@37B2@ and exp is matrix exponential.

We chose the normalised version of the previous kernel:

k × n o r m ( G 1 , G 2 ) = k × ( G 1 , G 2 ) k × ( G 1 , G 1 ) k × ( G 2 , G 2 ) MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGacaGaaiaabeqaaeqabiWaaaGcbaGaem4AaS2aa0baaSqaaiabgEna0cqaaiabd6gaUjabd+gaVjabdkhaYjabd2gaTbaakiabcIcaOiabdEeahnaaBaaaleaacqaIXaqmaeqaaOGaeiilaWIaem4raC0aaSbaaSqaaiabikdaYaqabaGccqGGPaqkcqGH9aqpjuaGdaWcaaqaaiabdUgaRnaaBaaabaGaey41aqlabeaacqGGOaakcqWGhbWrdaWgaaqaaiabigdaXaqabaGaeiilaWIaem4raC0aaSbaaeaacqaIYaGmaeqaaiabcMcaPaqaamaakaaabaGaem4AaS2aaSbaaeaacqGHxdaTaeqaaiabcIcaOiabdEeahnaaBaaabaGaeGymaedabeaacqGGSaalcqWGhbWrdaWgaaqaaiabigdaXaqabaGaeiykaKIaeyyXICTaem4AaS2aaSbaaeaacqGHxdaTaeqaaiabcIcaOiabdEeahnaaBaaabaGaeGOmaidabeaacqGGSaalcqWGhbWrdaWgaaqaaiabikdaYaqabaGaeiykaKcabeaaaaaaaa@5FE7@

Reducing the visualization in a 2D space implies some loss of information, but it provides an understandable picture and relevant trends of the population behaviour.

During the learning process, the population of BN structures is recorded every 2000 generations. In order to emphasize the evolution of their distribution from one generation to the next, we apply KPCA to the individuals of two consecutive recorded populations (e.g. population at generation 2000 and 4000).

We present the evolution of candidate solutions for EA depending on the application of niching, for link and parental recombination with a high exchange rate. To avoid interferences with niching regarding the control of fast homogenisation, the mutation operator was disabled. For these tests, we used the SVM and Kernel Methods Matlab Toolbox [40].

The first and second column of Figure 1 represent the evolution of the population distribution when link-recombination is used with and without niching, respectively. These results are particularly interesting since they closely correlate with the quality of the solutions achieved by the EA. In the absence of niching, the population quickly converges toward a few points (only 4 different solutions were left after 6000 generations), while with niching the population maintained many distinct solutions until convergence. The distributions of the solutions for an EA using parental recombination are depicted in Figure 2 with and without niching in the first and second columns, respectively. In this case, the effect of niching is striking since the population of the EA without niching converges towards a unique point before 4000 generations. Due to niching, the population can preserve a large and heterogeneous population over more than 10000 generations.

Figure 1
figure 1

Evolution of the EA for a genetic algorithm with link-recombination. These figures show the evolution of the population distribution during the learning process using link-recombination with niching (A1-A4) and without niching (B1-B4). The populations were recorded every 2000 generations and after the algorithm's convergence. Each plot represents the graphs of two populations sampled consecutively. The graphs of both populations are represented as points on a 2D map using Kernel Principal Composant Analysis.

Figure 2
figure 2

Evolution of the EA for a genetic algorithm with parental-recombination. These figures show the evolution of the distribution of the population during the learning process using parental-recombination with niching (A1-A4) and without niching (B1-B4). The populations were recorded every 2000 generations and after the algorithm's convergence. Each plot represents the graphs of two populations sampled consecutively. The graphs of both populations are represented as points on a 2D map using Kernel Principal Composant Analysis.

Niching postpones population homogenisation and, more interestingly, preserves heterogeneous repartition even after convergence is reached. With such a setup, EA performs a more extensive search of the solution space. At this point, the only question left is the choice of the recombination method. Indeed, if link-recombination with a high exchange rate yields the best results in most cases, Deterministic Crowding seems to reduce most of the differences between the two recombination methods. Therefore, the efficiency of link and parental recombination for a high exchange rate was studied by plotting their learning curves.

Introducing the learning curve

The learning curves were built as follows: algorithms were tested for samples with increasing sizes ranging from 50 to 400 cases with a step size of 50. For each sample size, tests were performed on 10 different and independent datasets. We used the same datasets for every algorithm under study. Results are plotted according to the sensitivity and the ppv metric. Each point corresponding to a given sample size, represents the mean value and the standard deviation for one of these quality measurements across the 10 runs of the algorithms.

The learning curves are given for both parental and link recombination depending on the Crowding implementation. For both recombination strategies, we kept a high exchange rate and mutation was applied.

As one can see, for both ppv (Figure 3 [A1, A2]) and sensitivity (Figure 3 [B1, B2]), link recombination (in red) always performs better than parental-recombination (in blue), even if this difference is much more significant without niching (Figure 3 [A1, B1]) than with niching (Figure 3 [A2, B2]).

Figure 3
figure 3

Comparison of the learning curves of parental-recombination and link-recombination. For each learning algorithm, the results of the comparison of the graph learnt for various sample sizes and the reference graph are expressed in terms of positive predictive value (A1 and A2) and sensitivity (B1 and B2). Figures A1 and B1 show the results obtained without niching, while Figures A2 and B2 show the results obtained with niching. The color coding is blue for parental-recombination and red for link-recombination. For each sample size, tests are performed on 10 different and independent datasets. The same datasets are used for every EA. Each point along the curves, which correspond to a given sample size, represents the mean value and the standard deviation of the quality measurement across the 10 runs of the algorithms.

Considering these results, we chose link-recombination with a high exchange rate and used both mutation and Deterministic Crowding for the remainder of this paper. The resulting evolutionary algorithm will be compared to other classical structure learning methods for validation.

Comparison with other structure learning algorithms

Introduction to the structure learning algorithms used for comparison

The EA with the setup described above was compared with state of the art and widely used optimisation methods in the field of BN structure learning. The performances of these methods were assessed according to ppv and sensitivity learning curves which were built as described previously.

First we considered classical search and score methods: greedy search and K2 [17] algorithms. The greedy hill-climbing search procedure examines all possible local modifications of the curent DAG, relying on edge addition, deletion, and reversal. In each step it applies the one that leads to the biggest BIC improvement and respects the acyclicity constraint. Like the EA, this algorithm is randomly initialized.

K2 [17] is a deterministic DAG builder. Starting from a graph with no edges, for each vertex, it adds incrementally the parent whose addition most decreases the BIC of the resulting structure. The algorithm stops these additions when adding a single parent do not decrease the BIC anymore. To deal with the acyclicity constraint and reduce drastically the size of the search space, K2 assumes a precedence order on the variables is available. It intends to add as parents only variables which precede the target node in this ordering. As we will see thereafter, this prior information is a crucial advantage.

We also tested a Markov Chain Monte Carlo (MCMC) method [19, 22]. Instead of focusing on a single solution optimizing the scoring metric, MCMC samples from the posterior probability distribution of the model P(G|D), which can be approximated with the BIC. Starting from a randomly generated DAG, MCMC constructs a Markov Chain following the Metropolis-Hastings algorithm. After a large number of steps, a state (a DAG in our case) of this chain can be considered as a sample from P(G|D). We performed 44000 steps and only keeps the last 4000 as samples. Each of these DAGs is processed to obtain the corresponding PDAG. These ones are then used to build a single consensus graph by only keeping likely edges that were present in over 50% of them.

Note that the three algorithms we just introduced were set up to respect the constraint on the maximum number of parents per node we imposed to the EA, i.e. parental sets containing more than 10 parents were forbidden.

Finally, we considered full and partial constraint-based methods: the Three Phase Dependency Analysis algorithm (TPDA) [41] and the Max-Min Hill Climbing Bayesian network structure learning algorithm (MMHC) [42]. These approaches build the networks by assessing the conditional independencies (CI) among the attribute of the data. In this work, we used a classical hypothesis test to assess the CI : the χ2-test. We chose the value of 0.05 as a threshold to decide if two variables were conditionally independent.

TPDA is an algorithm that uses an information-theoretic analysis to learn Bayesian network structures from data. It allows for effectively learning a partially directed acyclic graph, requiring only polynomial numbers of conditional independence tests in typical cases.

MMHC relies on a hybrid approach: it combines constraint-based and search and score technics. MMHC first constructs the skeleton of a Bayesian network using CI tests in a way similar to the famous PC algorithm [43]. It then performs a greedy hill-climbing search to orient the edges. This second phase of the algorithm uses the Bayesian Dirichlet metric [44] with uniform prior to assess the candidate solutions. For these experiments, we used the implementations of K2 and MCMC available in BNT [24]. The greedy hill-climbing algorithm came from the BNT Structure Learning Package [45]. For the TPDA and MMHC algorithms, we used the implementations proposed in Causal Explorer [46].

Numerical results

The plots of the sensitivity and ppv against the sample size are given in Figure 4 for all algorithms. For both ppv and sensitivity, the TPDA algorithm yields the worst results. Because of the lack of data, constraint-based methods seems to fail in identifying conditional independencies and therefore, in discovering relevant edges. Since it also relies on CI tests for building the skeleton of the network, the MMHC algorithm achieves similar sensitivity results to TPDA. However, it shows much better ppv results. Indeed, it produces less false positives thanks to the greedy search procedure it uses to perform better edges orientation. Of course, with a finer tuning of the threshold for the CI tests, it should be possible to increase the performances of these algorithms. However, with this setting, they are beaten by search and score methods, excepted for MMHC's ppv which remains higher.

Figure 4
figure 4

Comparison of the learning curves of six different structure learning algorithms. For each learning algorithm, the results of the comparison of the graph learnt for various sample sizes and the reference graph are expressed in terms of positive predictive value (A) and sensitivity (B). The color coding is green for Greedy search, blue for MCMC, black for K2, dashed black for MMHC, magenta for TPDA, and red for EA. For each sample size, tests are performed on 10 different and independent datasets. The same datasets are used for every algorithm. Each point along the curves, which correspond to a given sample size, presents the mean value and the standard deviation of the quality measurement across the 10 runs of the algorithm.

Since greedy search is a deterministic heuristic which converges towards local optima around the initial point, it usually achieves poor performances. The MCMC algorithm, which relies on an alternative and more efficient strategy, gives better results.

The EA outperforms the MCMC, greedy search and TPDA algorithms for both the sensitivity and the ppv metrics. The MCMC performance curves depend on the cut-off value used to build the consensus graph. This makes its comparison to other methods difficult. However the large difference between the EA and the MCMC ppv curves guarantee that EA performances are better. We note that for small dataset sizes, MMHC remains close to EA in terms of ppv.

Finally, K2 is the only algorithm which shows clearly better ppv results than EA. This was expected since K2 naturally generates less false positives than any other method. Indeed, prior knowledge is particularly critical when learning from small datasets and, due to node ordering, K2 performs the search in a smaller space including a limited amount of possible edges.

Since the numbers of fitness function evaluations performed by the EA, MCMC, and greedy hill-climbing algorithms are of the same order (tenth of thousands) the comparisons of performances are fair. This question is pointless for K2, TPDA and MMHC which are not stochastic heuristics. Therefore, we cannot consider a restart procedure even if the number of function evaluations performed by K2 and MMHC (during the greedy hill-climbing phase) is significantly smaller.

Conclusion

In this work, we present an evolutionary approach to undertake the hard task of learning gene regulatory networks from a reasonable amount of observational data. To perform this study, we use synthetic gene expression data sampled from a bio-realistic model of glucose homoeostasis. This model contains a realistic number of nodes and mimics the stochastic behaviour of biological systems. We study the robustness of the learning process with respect to the internal randomness of the EA and the variability of the learning datasets. We study the feasibility of structure learning from reasonably small datasets since gathering even hundreds of microarrays is very difficult.

We first compare various evolutionary strategies in order to find the one which achieves the best structure learning. We show that recombining edges (link-recombination) with a high exchange rate is the best reproduction strategy for the problem at hand. The niching method provides us with the most critical enhancement of the evolutionary approach. We confirm the ability of deterministic crowding to postpone convergence and to preserve diversity in order to allow an extensive search in the space of BN structures. Finally, we validate our evolutionary approach by comparing it with various state of the art learning algorithms. EA outperforms the greedy hill-climbing, MCMC, TPDA, and MMHC algorithms, while K2 yields less false positives than EA. This is expected since K2 is not a fair competitor and only considers a restricted set of potential parents for each node.

Evolutionary learning is a promising framework for the inference of gene regulation networks. An interesting extension may be expected through the study of a more elaborated version of crowding methods, making use of a similarity metric between network structures, such as kernels on graphs. Another perspective of this work is to apply this approach to learn the structure and parameters of dynamical bayesian network [47]. Indeed, as soon as a discrete representation of the dynamic model and a fitness function are available, EA can be applied as we proposed for the static BN.

We illustrate the good performance of EA to infer regulation networks when few learning data are available. With recent developments in EA, like Estimation of Distribution Algorithms that offer means to integrate exogenous information, these algorithms are a very promising way to cope with this very difficult task.

Methods

Repair process

Regardless of the type of codings we use to represent candidate solutions as well as the methods we use to manipulate them, recombination always results in two DAGs exchanging a subset of their elementary interactions (edges). After recombination, both genitor solutions present various modifications of their topology which can be expressed through edge additions or deletions. Edge deletions are systematically accepted and applied first to make room in the graph for subsequent additions. Edge additions are rejected if they break either the acyclicity or the maximum in-degree constraints. In this case, we try to add these edges in the opposite direction, by considering both constraints again. We are aware that by reversing the edges we cannot add in the first place, we still biases the recombination process. However, we estimate that simply suppressing them would be even worse, resulting in an important loss of connectivity among candidate BN structures.

To avoid the use of a time consuming cycle detection method, we apply the approach of Giudicci [48]: cycle insertions are detected according to an ancestor matrix which describes the set of predecessors for each vertex: to add an edge from X i to X j , one has to ensure that there is no path from X j to X i . We maintain an ancestor matrix for each DAG in the population. These matrices are updated every time a modification occurs in the corresponding DAG due to the recombination or the mutation.

Deterministic Crowding

Recombination relies on the exchange of a subset of EA-genes between two genitor chromosomes. Consequently, each offspring inherited the majority of its EA-genes from one of the genitor chromosomes, which will be called the main contributor. In addition, only EA-genes coming from the secondary contributor are modified during the repair process. Therefore, we can easily determine which "genitor" is the most similar to a given "child" after recombination, by considering the one from which it inherited the majority of its topological characteristics. Finally, we make the assumption that mutation will not change this similarity. This can be verified by computing the Hamming distance between each child and its genitors. In practice, this appears to be useless since mutation is designed to perform only very few modifications in the offspring (about one or two edge additions or deletions per DAG).

References

  1. de Jong H: Modeling and simulation of genetic regulatory systems: a literature review. Journal of Computational Biology 2002, 9(1):67–103. 10.1089/10665270252833208

    Article  CAS  PubMed  Google Scholar 

  2. van Someren EP, Wessels LFA, Backer E, Reinders MJT: Genetic network modeling. Pharmacogenomics 2002, 3(4):507–525. 10.1517/14622416.3.4.507

    Article  CAS  PubMed  Google Scholar 

  3. Friedman N, Linial M, Nachman I, Peer D: Using Bayesian Networks to Analyze Expression Data. J Comp Bio 2000, 7(3–4):601–620. 10.1089/106652700750050961

    Article  CAS  Google Scholar 

  4. Segal E, Shapira M, Regev A, Pe'er D, Botstein D, Koller D, Friedman N: Module networks: identifying regulatory modules and their condition-specific regulators from gene expression data. Nat Genet 2003, 34(2):166–76.

    Article  CAS  PubMed  Google Scholar 

  5. Pearl J: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc; 1988.

    Google Scholar 

  6. Cowell RG, Lauritzen SL, David AP, Spiegelhalter DJ, Spiegelhater DJ: Probabilistic Networks and Expert Systems. Secaucus, NJ, USA: Springer-Verlag New York, Inc; 1999.

    Google Scholar 

  7. Jensen FV: Bayesian Networks and Decision Graphs. Secaucus, NJ, USA: Springer-Verlag New York, Inc; 2001.

    Book  Google Scholar 

  8. Spirtes P, Glymour C, Scheines R, Kauffman S, Aimale V, Wimberly F: Constructing Bayesian Network Models of Gene Expression Networks from Microarray Data. Proc. of the Atlantic Symposium on Computational Biology, Genome Information Systems & Technology 2000.

    Google Scholar 

  9. Goto ImotoM: Estimation of genetic networks and functional structures between genes by using Bayesian network and nonparametric regression. Pacific Symposium on Biocomputin 2002, 7: 175–186. [http://bonsai.ims.u-tokyo.ac.jp/~imoto/imoto_psb2002.pdf]

    Google Scholar 

  10. Pe'er D, Regev A, Elidan G, Friedman N: Inferring subnetworks from perturbed expression profiles. Bioinformatics 2001, 17(Suppl 1):S215-S224.

    Article  PubMed  Google Scholar 

  11. Hartemink AJ, Gifford DK, Jaakkola TS, Young RA: Using graphical models and genomic expression data to statistically validate models of genetic regulatory networks. Pac Symp Biocomput 2001, 422–433. [http://www.psrg.csail.mit.edu/pubs/psbcamera.pdf]

    Google Scholar 

  12. Husmeier D: Reverse engineering of genetic networks with Bayesian networks. Biochemical Society Transactions 2003, 31: 1516–1518.

    Article  CAS  PubMed  Google Scholar 

  13. Pena JM, Bjorkegren J, Tegner J: Growing Bayesian network models of gene networks from seed genes. Bioinformatics 2005, 21(Suppl 2):ii224-ii229. 10.1093/bioinformatics/bti1137

    Article  CAS  PubMed  Google Scholar 

  14. Buntine W: A Guide to the Literature on Learning Probabilistic Networks from Data. IEEE Transactions on Knowledge and Data Engineering 1996, 8(2):195–210. 10.1109/69.494161

    Article  Google Scholar 

  15. Robinson R: Counting unlabeled acyclic digraphs. In Lecture Notes in Mathematics. Volume 622. Springer-Verlag; 1977.

    Google Scholar 

  16. Chickering: Optimal Structure identification with greedy search. Journal of machine learning research 2002, 3: 507–554. [http://www.ai.mit.edu/projects/jmlr/papers/volume3/chickering02b/source/chickering02b.pdf] 10.1162/153244303321897717

    Google Scholar 

  17. Cooper GF, Herskovits E: A Bayesian Method for the Induction of Probabilistic Networks from Data. Mach Learn 1992, 9(4):309–347.

    Google Scholar 

  18. DM Chickering DG, Heckermann D: Learning bayesian networks is NP-complete. In Learning from data: AI and Statistics. Volume 5. Edited by: Fisher D, Lenz HJ. New York NY: Springer-Verlag; 1996:121–130.

    Chapter  Google Scholar 

  19. Friedman , Koller : Being Bayesian About Network Structure: A Bayesian Approach to Structure Discovery in Bayesian Networks. Machine Learning 2003, 50: 95–126. 10.1023/A:1020249912095

    Article  Google Scholar 

  20. Kocka T, Castelo R: Improved learning of Bayesian networks. In UAI '01: Proceedings of the 17th Conference in Uncertainty in Artificial Intelligence. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc; 2001:269–276.

    Google Scholar 

  21. Wong ML, Lam W, Leung KS: Using Evolutionary Programming and Minimum Description Length Principle for Data Mining of Bayesian Networks. IEEE Transactions on Pattern Analysis and Machine Intelligence 1999, 21(2):174–178. 10.1109/34.748825

    Article  Google Scholar 

  22. Le PP, Bahl A, Ungar LH: Using prior knowledge to improve genetic network reconstruction from microarray data. Silico Biology 2004, 4(3):335–53.

    CAS  Google Scholar 

  23. Friedman N: Inferring Cellular Networks Using Probabilistic Graphical Models. Science 2004, 303(5659):799–805. 10.1126/science.1094068

    Article  CAS  PubMed  Google Scholar 

  24. Bayes Net Toolbox[http://www.cs.ubc.ca/~murphyk/Software/BNT/bnt.html]

  25. Holland JH: Adaptation in Natural and Artificial Systems. University of Michigan Press; 1975.

    Google Scholar 

  26. Goldberg DE: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley Publishing Company, Inc; 1989.

    Google Scholar 

  27. Hsu WH, Guo H, Perry BB, Stilson JA: A Permutation Genetic Algorithm For Variable Ordering In Learning Bayesian Networks From Data. In GECCO '02: Proceedings of the Genetic and Evolutionary Computation Conference. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc; 2002:383–390.

    Google Scholar 

  28. Larranaga P, Kuijpers C, Murga R, Yurramendi Y: Learning Bayesian network structures by searching for the best ordering with genetic algorithms. 1996.

    Google Scholar 

  29. Larranaga P, Poza M, Yurramendi Y, Murga RH, Kuijpers CMH: Structure Learning of Bayesian Networks by Genetic Algorithms: A Performance Analysis of Control Parameters. IEEE Trans Pattern Anal Mach Intell 1996, 18(9):912–926. 10.1109/34.537345

    Article  Google Scholar 

  30. Etxeberria R, Larranaga P, Picaza JM: Analysis of the behaviour of genetic algorithms when learning Bayesian network structure from data. Pattern Recogn Lett 1997, 18(11–13):1269–1273. 10.1016/S0167-8655(97)00106-2

    Article  Google Scholar 

  31. Myers JW, Laskey KB, DeJong KA: Learning Bayesian Networks from Incomplete Data using Evolutionary Algorithms. 1999, 1: 458–465.

    Google Scholar 

  32. Cotta C, Muruzabal J: Towards a More Efficient Evolutionary Induction of Bayesian Networks. In PPSN VII: Proceedings of the 7th International Conference on Parallel Problem Solving from Nature. London, UK: Springer-Verlag; 2002:730–739.

    Google Scholar 

  33. Cotta C, Troya JM: Analyzing Directed Acyclic Graph Recombination. In Proceedings of the International Conference, 7th Fuzzy Days on Computational Intelligence, Theory and Applications. London, UK: Springer-Verlag; 2001:739–748.

    Google Scholar 

  34. Mahfoud SW: Niching methods for genetic algorithms. PhD thesis. Champaign, IL, USA; 1995.

    Google Scholar 

  35. Jong KAD: An analysis of the behavior of a class of genetic adaptive systems. PhD thesis. 1975.

    Google Scholar 

  36. Chickering D: A Transformational Characterization of Equivalent Bayesian Network Structures. In Proceedings of the 11th Annual Conference on Uncertainty in Artificial Intelligence (UAI-95). San Francisco, CA: Morgan Kaufmann; 1995:87–98.

    Google Scholar 

  37. Verma T, Pearl J: Equivalence and Synthesis of Causal Models. New York, NY: Elsevier Science; 1991.

    Google Scholar 

  38. Schölkopf B, Smola A, Müller K: Kernel principal component analysis. In 7th International Conference on Artificial Neural Networks, ICANN 97, Lausanne, Switzerland. Volume 1327. Edited by: W Gerstner MH A Germond, Nicoud JD. Berlin: Springer Lecture Notes in Computer Science; 1997:583–588.

    Chapter  Google Scholar 

  39. Gärtner T, Driessens K, Ramon J: Graph Kernels and Gaussian Processes for Relational Reinforcement Learning. In Thirteenth International Conference on Inductive Logic Programming (ILP-2003). Springer; 2003.

    Google Scholar 

  40. SVM and Kernel Methods Matlab Toolbox[http://asi.insa-rouen.fr/enseignants/~arakotom/toolbox/index.html]

  41. Cheng J, Greiner R, Kelly J, Bell D, Liu W: Learning Bayesian networks from data: an information-theory based approach. Artif Intell 2002, 137(1–2):43–90. 10.1016/S0004-3702(02)00191-1

    Article  Google Scholar 

  42. Tsamardinos I, Brown LE, Aliferis CF: The max-min hill-climbing Bayesian network structure learning algorithm. Machine Learning 2006, 65: 31–78. 10.1007/s10994-006-6889-7

    Article  Google Scholar 

  43. Peter Spirtes CG, Scheines R: Causation, Prediction, and Search. The MIT Press; 2000.

    Google Scholar 

  44. Heckerman D, Geiger D: Likelihoods and parameter priors for Bayesian networks. 1995.

    Google Scholar 

  45. BNT Structure Learning Package[http://bnt.insa-rouen.fr/ajouts.html]

  46. Aliferis CF, Tsamardinos I, Statnikov AR, Brown LE: Causal Explorer: A Causal Probabilistic Network Learning Toolkit for Biomedical Discovery. 2003, 371–376.

    Google Scholar 

  47. Quach M, Brunel N, d'Alché Buc F: Estimating parameters and hidden variables in non-linear state-space models based on ODEs for biological networks inference. Bioinformatics 2007, 23: 3209–3216. 10.1093/bioinformatics/btm510

    Article  CAS  PubMed  Google Scholar 

  48. Giudici P, Castelo R: Improving Markov Chain Monte Carlo model search for Data Mining. Machine Learning 2003, 50(1/2):127–158. 10.1023/A:1020202028934

    Article  Google Scholar 

Download references

Acknowledgements

CA would like to thank CEA for funding his PhD grant. FA is grateful to Genopole for funding her research. This collaboration between IBISC and CEA has also been partially funded by the french national research agency (ANR) through the project Genomic Data to Graph Structure.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Cédric Auliac, Vincent Frouin or Florence d'Alché-Buc.

Additional information

Authors' contributions

CA implemented the learning algorithms, performed tests and analyzed the results. FA and VF chose the mathematical framework and supervised the work. CA, VF, and FA drafted the manuscript. XG critically reviewed the manuscript. All authors read and approved the final manuscript.

Authors’ original submitted files for images

Rights and permissions

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Auliac, C., Frouin, V., Gidrol, X. et al. Evolutionary approaches for the reverse-engineering of gene regulatory networks: A study on a biologically realistic dataset. BMC Bioinformatics 9, 91 (2008). https://doi.org/10.1186/1471-2105-9-91

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1471-2105-9-91

Keywords