Boolean Network Models



Similar documents
Qualitative modeling of biological systems

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Data Integration. Lectures 16 & 17. ECS289A, WQ03, Filkov

Chapter 2. Multiprocessors Interconnection Networks

Discuss the size of the instance for the minimum spanning tree problem.

Offline 1-Minesweeper is NP-complete

Analysis of Computer Algorithms. Algorithm. Algorithm, Data Structure, Program

Discrete Optimization

Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems

Tutorial 8. NP-Complete Problems

Feed Forward Loops in Biological Systems

Efficiency of algorithms. Algorithms. Efficiency of algorithms. Binary search and linear search. Best, worst and average case.

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

A Toolbox for Bicluster Analysis in R

1 Review of Newton Polynomials

Approximation Algorithms

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

5.1 Bipartite Matching

Creating Metabolic and Regulatory Network Models using Fuzzy Cognitive Maps

FlipFlop: Fast Lasso-based Isoform Prediction as a Flow Problem

Topological Properties

LOGICAL TOPOLOGY DESIGN Practical tools to configure networks

Distance Degree Sequences for Network Analysis

Data Streams A Tutorial

Using Graph Theory to Analyze Gene Network Coherence

Algorithmic Techniques for Big Data Analysis. Barna Saha AT&T Lab-Research

Neural network model of gene expression

(67902) Topics in Theory and Complexity Nov 2, Lecture 7

Digital circuits make up all computers and computer systems. The operation of digital circuits is based on

IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS

1. Introduction Gene regulation Genomics and genome analyses Hidden markov model (HMM)

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Transportation Polytopes: a Twenty year Update

Chapter 6: Biological Networks

Algorithms in Computational Biology (236522) spring 2007 Lecture #1

Sorting revisited. Build the binary search tree: O(n^2) Traverse the binary tree: O(n) Total: O(n^2) + O(n) = O(n^2)

Optimization Modeling for Mining Engineers

2) What is the structure of an organization? Explain how IT support at different organizational levels.

Lecture 2: Complexity Theory Review and Interactive Proofs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

Contents. System Development Models and Methods. Design Abstraction and Views. Synthesis. Control/Data-Flow Models. System Synthesis Models

Network Monitoring in Multicast Networks Using Network Coding

GETTING STARTED WITH LABVIEW POINT-BY-POINT VIS

Feed-Forward mapping networks KAIST 바이오및뇌공학과 정재승

Randomized algorithms

Introduction to Support Vector Machines. Colin Campbell, Bristol University

Master's projects at ITMO University. Daniil Chivilikhin PhD ITMO University

Predictive Dynamix Inc

Compression algorithm for Bayesian network modeling of binary systems

Introduction to computer science

Lecture 1: Course overview, circuits, and formulas

Graphical Modeling for Genomic Data

One last point: we started off this book by introducing another famously hard search problem:

Metodi Numerici per la Bioinformatica

Social Media Mining. Network Measures

LECTURE 4. Last time: Lecture outline

Network Analysis. BCH 5101: Analysis of -Omics Data 1/34

Master s Program in Information Systems

Factoring Algorithms

Some Minesweeper Configurations

Topics of Chapter 5 Sequential Machines. Memory elements. Memory element terminology. Clock terminology

Load balancing in a heterogeneous computer system by self-organizing Kohonen network

Group Testing a tool of protecting Network Security

Flexible Neural Trees Ensemble for Stock Index Modeling

Recurrent Neural Networks

The Classes P and NP

Linear Threshold Units

1. The memory address of the first element of an array is called A. floor address B. foundation addressc. first address D.

Understanding the dynamics and function of cellular networks

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Near Optimal Solutions

Hidden Markov Models

Synthetic Biology: DNA Digital Storage, Computation and the Organic Computer

In developmental genomic regulatory interactions among genes, encoding transcription factors

Memory Systems. Static Random Access Memory (SRAM) Cell

Offline sorting buffers on Line

INTRODUCTION TO DIGITAL SYSTEMS. IMPLEMENTATION: MODULES (ICs) AND NETWORKS IMPLEMENTATION OF ALGORITHMS IN HARDWARE

Prediction Markets. 1 Introduction. 1.1 What is a Prediction Market? Algorithms Seminar

6.852: Distributed Algorithms Fall, Class 2

The Mixed Binary Euclid Algorithm

5. Binary objects labeling

KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS

A linear algebraic method for pricing temporary life annuities

Ex. 2.1 (Davide Basilio Bartolini)

Bounded-width QBF is PSPACE-complete

Graph theoretic approach to analyze amino acid network

Transcription:

Boolean Network Models 2/5/03

History Kaufmann, 1970s Studied organization and dynamics properties of (N,k) Boolean Networks Found out that highly connected networks behave differently than lowly connected ones Similarity with biological systems: they are usually lowly connected We study Boolean Networks as a model that yields interesting complexity of organization and leave out the philosophical context

Boolean Networks Boolean network: a graph G(V,E), annotated with a set of states X={x i i=1,,n}, together with a set of Boolean k functions B={b i i=1,,k}, b i : {0,1} {0,1}. Gate: Each node, v i, has associated to it a function, with inputs the states of the nodes connected to v i. Dynamics: The state of node v i at time t is denoted as x i (t). Then, the state of that node at time t+1 is given by: x i ( t + 1 ) = b i ( x i, x i 2,..., x 1 k i ) where x ij are the states of the nodes connected to v i.

General Properties of BN: Fixed Topology (doesn t change with time) Dynamic Synchronous Node States: Deterministic, discrete (binary) Gate Function: Boolean Flow: Information What kind of properties do they exhibit?

Boolean Functions True, False: 1,0 Boolean Variables: x can be true or false Logical Operators: and, or, not Boolean Functions: k input Boolean variables, connected by logical operators, 1 output Boolean value Total number, B, of Boolean functions of k variables: 2 2k (k =1, B=4; k=2, B=16; etc.)

Wiring Diagrams and Truth Tables C f f f A B C A f C f A B ( B) = B ( A, C) = AandC ( A) = not A time t f B A B C A B C time t+1 Boolean Network Wiring Diagram State 1 2 3 4 5 6 7 8 INPUT OUTPUT A B C A B C 0 0 0 0 0 1 0 0 1 0 0 1 0 1 0 1 0 1 0 1 1 1 0 1 1 0 0 0 0 0 1 0 1 0 1 0 1 1 0 1 0 0 1 1 1 1 1 0 Truth Table

Reverse Engineering of BNs Fitting the data: given observations of the states of the BN, find the truth table In general, many networks will be found Available algorithms: Akutsu et al. Liang et al. (REVEAL)

Fitting the Data The black box model: m (input, output) pairs Each pair is the observations of the states of a system before and after a transitions The states are 0,1

Formal Problem An example is a pair of observations (I j,o j ). A node is consistent with an example, if there is a Boolean function such that O j =f(i j ) A BN is consistent with (I j,o j ) if all nodes are consistent with that example. Similarly, a BN is consistent with EX={(I 1,O 1 ),,(I m,o m )} if it is consistent with each example Problem: Given EX, n the number of nodes in the network, and k (constant) the max indegree of a node, find a BN consistent with the data.

Algorithm (Akutsu et al, 1999) The following algorithm is for the case of k=2, for illustration purposes. It can easily be extended to cases where k>2 For each node v i For each pair of nodes v k and v h and For each Boolean function f of 2 variables (16 poss.) Check if O j (v i )=f(i j (v k ),I j (v h )) holds for all j.

Analysis of the Algorithm Correctness: Exhaustive Time: Examine all Boolean functions of 2 inputs, for all node triplets, and all examples O(2 2 2 2 n 3 m For k inputs ( k in front is the 2 above, time to access the k input observations) O( k 2 2 n k + 1 This is polynomial in n, if k is constant. k ) m)

Better Algorithms? If indegree is fixed to at most k, the best known deterministic algorithms run in O(mn k ) time Randomized: O(m w-2 n k +mn k+w-3 ), where w is the exponent in matrix multiplication, currently w<2.376 (Akutsu et al., 2000) If indegree is close to n, the problem is NPcomplete (Akutsu et al., 2000)

Data Requirement How many examples (I,O) do we need to reconstruct a Boolean Network? If indegree unbounded 2 n If indegree<k, information theoretic aruments yield the following bounds: Upper bound Lower bound O( 2 2k (2k + α) log n) Ω( 2 k + K log n) Experiments show that the constant in front of the log n is somewhere in between, i.e. k2 k

Boolean Network Dynamics

Nodes, States, Transitions, States: Values of all variables at given time Values updated synchronously Input Output State INPUT OUTPUT A B C A B C 1 2 3 4 5 6 7 8 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 0 0 1 0 0 1 1 0 1 1 0 1 0 0 0 0 1 0 1 0 0 1 1 0 Ex. (100 000 001 001...)

BN Dynamics Trajectories: series of state transitions Attractors: repeating trajectories Basin of Attraction: all states leading to an attractor One attractor basin for a BN n=13, k=3. The cycle is of size 7 Wuensch, PSB 1998

Previous basin of attraction is one of 15 possible ones for n=13 and k=3. Total of 8192 states, and attractors with periods ranging from 1 to 7 (Pictures come from DDLab Galery, Wuensche, Santa Fe Institute)

Why Are BNs Good for Biology? Complex behavior (synergistic behavior) Attractor steady states which can be interpreted as memory for the cell Stability and reproducibility Robustness The range of behaviors of the system is completely known and analyzable (for smaller networks) and is much smaller than the range of the individual variables Organizational properties: high connectivity (k>5) yields chaotic behavior Low connectivity (k=2) attractor number and median attractor length are O(Sqrt(n)) Simple to implement and use

BN and Biology Microarrays quantify transcription on a large scale. The idea is to infer a regulation network based solely on transcription data. Discretized gene expressions can be used as descriptors of the states of a BN. The wiring and the Boolean functions are reverse engineered from the microarray data.

BN and Biology, Cont d. From mrna measures to a Regulation Network: 1 Continuous gene expression values are discretized as being 0 or 1 (on, off), (each microarray is a binary vector of the states of the genes); 2 Successive measurements (arrays) represent successive states of the network i.e. X(t)->X(t+1)->X(t+2) 3 A BN is reverse engineered from the input/output pairs: (X(t),X(t+1)), (X(t+1),X(t+2)), etc.

Limitations BNs are Boolean! Very discrete Updates are synchronous Only small nets can be reverse engineered with current state-of-the-art algorithms

Summary BN are the simplest models that offer plausible real network complexity Can be reverse engineered from a small number of experiments O(log n) if the connectivity is bounded by a constant. 2 n experiments needed if connectivity is high Algorithms for reverse engineering are polynomial in the degree of connectivity

References Akutsu et al., Identification of Genetic Networks From a Small Number of Gene Expression Patterns Under the Boolean Network Model, Pacific Symposium on Biocomputing, 1999 Akutsu et al., Algorithms for Identifying Boolean Networks and Related Biological Networks Based on Matrix Multiplication and Fingerprint Function, RECOMB 00, 2000 Liang et al., REVEAL, A General Reverse Engineering Algorithm for Inference of Genetic Network Architectures, Pacific Symposium on Biocomputing, 1998 Wuensche, Genomic Regulation Modeled as a Network With Basins of Attraction, Pacific Symposium on Biocomputing, 1998 D Haeseleer et al., Tutorial on Gene Expression, Data Analysis, and Modeling, PSB, 1999