Skip to main content

Using the message passing algorithm on discrete data to detect faults in boolean regulatory networks

Abstract

Background

An important problem in systems biology is to model gene regulatory networks which can then be utilized to develop novel therapeutic methods for cancer treatment. Knowledge about which proteins/genes are dysregulated in a regulatory network, such as in the Mitogen Activated Protein Kinase (MAPK) Network, can be used not only to decide upon which therapy to use for a particular case of cancer, but also help in discovering effective targets for new drugs.

Results

In this work we demonstrate how one can start from a model signal transduction network derived from prior knowledge, and infer from gene expression data the probable locations of dysregulations in the network. Our model is based on Boolean networks, and the inference problem is solved using a version of the message passing algorithm. We have done simulation experiments on synthetic data to verify the efficacy of the algorithm as compared to the results from the much more computationally intensive Markov Chain Monte-Carlo methods. We also applied the model to analyze data collected from fibroblasts, thereby demonstrating how this model can be used on real world data.

Background

Modeling cellular behavior is a first step towards the holistic understanding of the multivariate interactions among various genes. One possible approach to do that is through gene regulatory networks. These networks could also help in developing better intervention strategies in order to shift the state of the cell or the tissue to a more favorable one. Many different approaches have been proposed in the literature for modeling the behavior of genetic regulatory networks. These include differential equations [1], deterministic and probabilistic Boolean networks [2],[3], and Bayesian and dynamic Bayesian networks [4],[5]. Some of these methods rely on the assumption that the transition probabilities are provided beforehand. Such an assumption may not be realistic since the sheer volume of data required to effectively estimate the transition probabilities makes it a practically difficult proposition. Some methods such as the REVEAL algorithm [6] provide approaches to learn deterministic Boolean networks from discretized time course data. However time course data from biological samples itself can be difficult to come by.

One way to get around the problem of insufficient data is to use prior knowledge about the regulatory interactions between the various biological molecules in a cell. In the biological literature, a lot of information is available regarding the various regulatory interactions. This information has been collected by biologists over a long period of time. These regulatory interactions, collectively referred to as pathway knowledge, are generally not incorporated into the various methods of modeling gene regulatory networks. Using this information, however, would result in models which describe cellular behavior more accurately.

A possible approach to use such prior information has been developed in [7]. In that reference, the authors use Boolean logic to model signal transduction networks. In [8], the authors have used boolean models derived from prior information to model the heterogeneity of cancerous tissues. Furthermore, in [9] Boolean logic is used to model the Mitogen Activated Protein Kinase (MAPK) signal transduction network and the result of that modeling is shown in Figure 1. Here, each connecting wire corresponds to a variable which represents the state of the corresponding protein/gene. In this model each variable is assumed to have two states, an activated and a deactivated one. For example the state of EGFR will be upregulated or activated when the cell is exposed to EGF. The way the various variables are dependent on each other can be modeled using standard Boolean logic functions such as AND, OR, NOT, NAND, etc. This is shown in Figure 1. In [9] the authors presented a stuck-at fault model of the mutations which result in the neoplastic behavior of the tissue. A stuck-at-one fault corresponds to a variable permanently being in an activated state irrespective of the states of the variables upstream of it. Similarly a stuck-at-zero fault would mean a variable has a permanently downregulated state irrespective of the states of the other upstream variables. These “stuck” variables would however affect the variables downstream of them through the Boolean Logic gates which have these variables as inputs. To show how Boolean regulatory networks with stuck-at faults can be used to model cancerous tissue, we give the following examples. In 30% of human breast cancers there is an over expression of the ERBB2 gene [10]. This causes ligand independent firing translating to a stuck-at-one fault in the Boolean network. A stuck-at one fault at ERBB2 means that the variable corresponding to ERBB2 in the Boolean network shown in Figure 1 is always upregulated regardless of the activity status of the variables upstream of it. Similarly in 90% of the pancreatic cancer cases we see a mutated Ras gene which causes it to lose its gtpase activity [10]. In other words, we have a stuck-at-one fault associated with the Ras variable. Stuck-at faults could also be interpreted as points of dysregulation in the Boolean network brought about by certain genes irrespective of the presence of mutations.

Figure 1
figure 1

A Boolean network model of the MAPK signal transduction network with target locations of inhibitory drugs shown.

Figure 1 also shows the locations where some important kinase inhibitory drugs act. The inputs in the Boolean network corresponding to these drugs are ‘1’ when the drugs are administered, ‘0’ otherwise. When the input corresponding to a drug is ‘1’, it causes the target variable to get downregulated irrespective of the variables upstream of it, which in turn affects other downstream variables. At the bottom of the network, various observable variables such as the transcription factors (FOS-JUN, SP1, SRF-ELK) are represented as arrows. Other proteins of interest (BCL2, BCL2L1, CCND1) are also represented as arrows. Activity of transcription factors can be determined by the use of appropriate reporter genes. Hence this network can be considered as a multi input multi output system with the inputs being the exposure to various drug combinations and the output being the activity of the observable variables. The growth factors can also be considered as inputs, but in this paper we are simply considering the drugs as inputs whereas the growth factors are all considered to be one, that is, constantly active.

Locating stuck-at faults in a given Boolean regulatory network could help in the identification of key dysregulated genes that have a strong impact on the observable variables. This in turn could be used to identify targets for new drugs. Knowledge about the locations of the stuckat faults along with knowledge about the targets of the kinase inhibitory drugs can be used to come up with optimal intervention strategies. A method to devise optimal intervention strategies using such Boolean regulatory networks with stuck-at faults is described in [9]. Accordingly, the problem we pose is this: given data points, where each data point consists of a combination of drugs used as the input and the activity of the observable variables as outputs, is it possible to locate the variables where stuck-at-faults have occurred? In the following sections we represent the problem as a statistical model with unknown parameters which are estimated from the data points using the message passing algorithm. This algorithm allows for rapid computation of the posterior probabilities of the parameters. The estimates obtained are evaluated by comparison with the results given by Markov Chain Monte Carlo methods.

Model description

There are many ways to model a gene regulatory network which describes the behavior of neoplastic tissue. The general rule is that the more the number of unknown parameters, the more the amount of data that is required to get an effective estimate of those parameters. Hence the modeling must be done keeping in mind the limited amount of data available from biological experiments.

Before we go into the details, we would like to point out that literature survey would enable us to know the most likely locations in the Boolean network where stuck-at faults can take place. As stated in the previous section, in 30% of human breast cancers there is an over expression of the ERBB2 gene, and in 90% of the pancreatic cancer cases we see a mutated Ras gene. These are among many examples where prior knowledge about locations of faults is available. This knowledge would allow us to limit the search space for faults in the network. For example we may provide a set of locations where we want to search for faults.

One important assumption made in the modeling of mutations is that they are random events that occur independently of each other [11]-[13]. We make use of this assumption in our model by assuming that the faults occur unconditionally independent from each other with certain unknown probabilities associated with them. These unknown probability parameters are to be estimated from the collected data. These estimated probabilities will indicate our confidence about where the faults have occurred in the Boolean regulatory network.

We now explain the key ideas through a simple example. Let us assume that we have narrowed down the set of locations where we want to search for faults to be composed of RAF, IRS1, and RHEB as shown in Figure 1 (we are assuming stuck-at-one faults). Let their probabilities of occurrences be ρ1, ρ2, and ρ3 which are to be determined. Define ρ=(ρ1ρ2ρ3)T as the vector of the three parameters. Three possible locations of faults implies that there are 23 different fault combinations and their associated networks corresponding to the binary numbers 000,001,....,111. The first network is one with no faults and has a probability of

P M = 0 / ρ = 1 ρ 1 1 ρ 2 1 ρ 3 .
(1)

The second network has a single stuck-at-one fault at RHEB alone, and it’s probability is given by P(M=1/ρ)=(1−ρ1)(1−ρ2)ρ3. Similarly, the third network has a single stuck-at-one fault at IRS1 alone, with a probability of P(M=2/ρ)=(1−ρ1)ρ2(1−ρ3), and so on. The variable M is the decimal equivalent of the binary number representing the different fault combinations and could equivalently represent the particular faulty Boolean network being considered. Since there are three possible locations where stuck-at-faults can take place in this example, M can take 23=8 different values. In our convention, we use integers from 0 to 23−1 to represent the values taken by M. For example M=6 corresponds to a network with faults at RAF and IRS1 but not at RHEB and has a corresponding probability of ρ1ρ2(1−ρ3).

In this example the dimension of ρ is three, but it can be any integer depending on the size of the search space. Determining the entries of ρ allows us to determine the most likely faulty networks. Let V be the dimension of ρ. Then it is clear that P(M=m/ρ) has the following form:

P M = m / ρ = v = 1 V ρ v R v , m 1 ρ v 1 R v , m
(2)

where Rv,m is either 0 or 1 and m can vary from 0 to 2V−1.

Consider any one of the variables represented as arrows at the bottom of Figure 1. Let us represent that variable by O j . j varies from 1 to 7 in our example based on Figure 1. The behavior or O j is determined by the network and what faults are in it. Let oi,j be an observation of that variable when the combination input is I i . oi,j can be either 0 or 1 since we are dealing with a boolean network here. Given that the network M is any one of the 2V possible networks and given that the drug combination input is I i , the probability P(O j =oi,j/M=m,I i ) can be either 0 or 1. It is 1 when oi,j matches the output of the jth output variable of the mth network for the the input drug combination I i , and is 0 otherwise. Let us represent P(O j =oi,j/M=m,I i ) by Sm,i,j. The probability P(M=m/ρ) is a function of ρ as described in equation (2). Therefore, by the theorem of total probability,

P O j = o i , j / I i , ρ = m = 0 2 V 1 S m , i , j P M = m / ρ
(3)

In our example, we will proceed by assuming that the observable variables (the O j ’s) are independent given the faulty network and the drug combinations. This assumption can be easily relaxed for the case when the 7 observable variables represented as arrows at the bottom of Figure 1 are observed together for each drug combination used as the input. In this case, instead of P(O j /M), we will be working with P(O1,O2,…,O7/M). This however does not affect our fundamental results and is a simple extension of our example.

Let O represent all of the observed data for all the observable variables and I represent the entire set of the corresponding inputs. Let J be the number of observable variables and N be the number of observations for each observable variable. Then we have

P O / ρ , I = j = 1 J i = 1 N P O j = o i , j / I i , ρ
(4)

which is nothing but the likelihood function. In order to handle experimental repeats, we can have the the drug combinations I i to be the same for more than one value of the index i.

An estimate of ρ can be obtained from equation 4, either by maximum likelihood estimation, or by calculating the posterior mean of the parameters. If the prior distributions of all the elements of ρ are assumed to be uniformly distributed between 0 and 1, the posterior distribution of ρ is directly proportional to P(O/ρ,I). If P(O/ρ,I) comes out to be zero for all values of ρ, then we have every reason to question the validity of the Boolean network used to model the behavior of the biological network, or the set of possible locations of faults. Various estimates of ρ, such as the posterior mean or the posterior mode (the value of ρ where the posterior distribution is maximal) can be obtained from P(O/ρ,I). Now we can algebraically expand the right hand side of equation (4) to write P(O/ρ,I) as

P O / ρ , I = k v = 1 V ρ v Q 1 v , k 1 ρ v Q 2 v , k
(5)

where Q 1v,k and Q 2v,k are non negative integers. Calculating P(ρ/O,I) from P(O/ρ,I) is now trivial since it only involves calculation of a multiplicative normalization constant.

P ρ / O , I = P O / ρ , I P O / ρ , I
(6)

where in the denominator there is the normalization constant which turns out to be

P O / ρ , I = k v = 1 V β Q 1 v , k + 1 , Q 2 v , k + 1
(7)

where β(,) is the beta function. This equation is derived by considering a uniform prior on all the elements of ρ. The integrations can be done easily because of the form of equation 5. Each variable ρ v is integrated from 0 to 1. Equation 6 shows the joint posterior distribution of all the unknown parameters ρ1 through ρ V considered together. In order to find the marginal distribution of any given parameter of interest, we will need to integrate out the rest of the parameters. For example P(ρ l /O,I) for any given value of l can be found out to be

P ( ρ l / O , I ) = k ρ l Q 1 l , k 1 ρ l Q 2 l , k v = 1 v l V β Q 1 v , k + 1 , Q 2 v , k + 1 k v = 1 V β Q 1 v , k + 1 , Q 2 v , k + 1
(8)

Following this the posterior means can also be calculated.

However the number of additive terms in equation 5 represented by the summing variable k in general rises exponentially with the number of data points collected. In the worst case, the left hand side of equation (3) will contain 2V terms. Since the number of multiplicative terms in equation 4 is NJ (the number of data points collected), upon expanding the right hand side of equation 4 we get 2VNJ additive terms in equations 5, 7, and 8. Thus the computational cost to compute the mean of any given ρ l is O(2VNJ). Hence the total computation cost to compute the posterior means of all the elements of ρ (ρ1 through ρ V ) is O(V×2VJN). Therefore the straightforward approach for calculating the posterior distributions of ρ l ’s and their posterior means will get intractable as the amount of data collected increases.

To get around this difficulty we will use an iterative algorithm to obtain an approximation of the marginal distributions of the elements of the parameter vector ρ. From the marginal distribution it will be straightforward to obtain the posterior means and confidence intervals of the individual elements of ρ.

Factor graph representation of the model

Factor Graphs are an important tool used in various applications such as signal processing and telecommunications. Many algorithms can be easily understood and derived using the factor graph approach. These include Kalman Filters, the Viterbi Algorithm, the Forward-Backward algorithm and Turbo Codes to name a few. The approach involves first representing the probability model as a factor graph and then applying the message passing algorithm along the edges. The reader is referred to [14],[15] for an in-depth coverage of factor graphs and the message passing algorithm. Here we provide a short primer to the subjects and go into the details of only our particular example.

A simple example

Consider a simple function g(x1,x2,x3)=f1(x1,x2f2(x2,x3)f3(x3), where x i are discrete variables. Suppose we want to calculate x 1 , x 3 g x 1 , x 2 , x 3 for a particular value of x2 (the marginal of x2). In addition, suppose that each x i can take A different values. Hence the straight forward approach would require us to sum g(x1,x2,x3) over A2 different values. However x 1 , x 3 g x 1 , x 2 , x 3 can also be calculated as

x 1 , x 3 g x 1 , x 2 , x 3 = x 1 f 1 x 1 , x 2 x 3 f 2 x 2 , x 3 f 3 x 3
(9)

which sums over 2A different values. For continuous variables, the summation is replaced by integration. The optimal strategy for calculating the marginal of x2 is straightforward to derive in this simple example. However a systematic approach to find the optimal strategy to calculate the marginal of any variable for any given probability function is given by the message passing algorithm which acts on the factor graph representation of the function.

The factorization of a function can be represented by a factor graph. A factor graph is a bipartite graph with a variable node corresponding to each variable x i and a factor node corresponding to each independent factor f j and has an undirected edge connecting a variable node of x i to a factor node of f j iff x i is an argument of f j [14],[15]. The factor graph of g(x1,x2,x3) is shown in Figure 2.

Figure 2
figure 2

The factor graph representation of a factorizable function. The variable nodes are circular and the factor nodes are rectangular.

Messages pass along the edges in both directions. Messages are functions of the variable whose node is associated with the edge. Let μ f j x i x i and μ x i f j x i denote the messages from f j to x i and vice versa. We simply write down the update equations below. For an in-depth discussion on their derivation, the reader is referred to [14],[15]. The messages are calculated as follows:

μ x i f j x i = h n x i { f j } μ h x i x i
(10)
μ f j x i x i = x i f j X y n f j x i μ y f j y
(11)

where n(x i ) and n(f j ) denote the neighbors of x i and f j respectively in the factor graph. n(x i ){ f j } represents the set of all the neighbors of x i except f j . The definition of n(f j ){x i } is similar. Since the factor graph is bipartite, the neighbors of a variable node can only be factor nodes, and the neighbors of a factor node can only be variable nodes. X denotes the set of arguments of f j . { x i } denotes summation over all local variables except x i . The set of local variables will simply be the set X, since the factor node f j is connected by undirected edges only to the variable nodes of its arguments. The message going away from a leaf variable node is the constant 1, while the message going away from a leaf factor node is the value of that local factor. Using these rules on the simple example, we have μ x 1 f 1 x 1 =1 and μ f 3 x 3 x 3 = f 3 ( x 3 ).

μ f 1 x 2 ( x 2 ) = { x 2 } f 1 x 1 , x 2 μ x 1 f 1 x 1 = x 1 f 1 x 1 , x 2
(12)
μ x 3 f 2 ( x 3 ) = h n ( x 3 ) { f 2 } μ h x 3 ( x 3 ) = μ f 3 x 3 ( x 3 ) = f 3 ( x 3 )
(13)
μ f 2 x 2 ( x 2 ) = { x 2 } f 2 x 2 , x 3 μ x 3 f 2 x 3 = x 3 f 2 x 2 , x 3 f 3 x 3
(14)

The marginal distribution of a variable is simply the product of all the messages being received by the corresponding variable node. Hence x 1 , x 3 g( x 1 , x 2 , x 3 )= μ f 1 x 2 ( x 2 )× μ f 2 x 2 ( x 2 ) and thus equation (9) is derived using factor graphs and the message passing algorithm. Calculating the rest of the messages would allow us to calculate the marginals of x1 and x3 as well. The message passing algorithm would terminate when messages along both directions of all the edges in the graph have been calculated.

The message passing algorithm terminates and gives exact marginals for the cases where the factor graph has no cycles. But the most interesting applications are for those cases where the factor graph has cycles, where the marginals are calculated by iteratively updating the messages (for example the iterative decoding of turbo codes). We similarly use an iterative version of the message passing algorithm in our model to approximate the marginal posterior distribution of the unknown parameters.

Using factor graphs and the message passing algorithm on the signal transduction network model

Now, P(ρ/O,I)P(O/ρ,I) as is evident from equation (6), while the expression for P(O/ρ,I) is given in equation (4). Let Pi,j represent the multiplicative factor P(O j =oi,j/I i ,ρ) in equation (4). In a factor graph, each multiplicative factor is represented by a factor node and each element of ρ is represented by a variable node. Hence there are NJ number of factor nodes with each corresponding to one particular multiplicative term in equation 4, and there are V number of variable nodes with each corresponding to one particular unknown parameter (one out of ρ1 through ρ V ). The purpose of this algorithm is to compute the posterior marginal distributions of the unknown parameters ρ1 through ρ V , which can then be used to compute their means and confidence intervals.

Figure 3 shows the factor graph of equation (4).

Figure 3
figure 3

The factor graph representation of the probability model of the signal transduction network. The variable nodes are circular and the factor nodes are rectangular.

As we can see the factor graph in Figure 3 has cycles. In a factor graph with cycles, the message passing algorithm does not terminate and the messages are locally updated with every iteration. Every time a new message is calculated, it replaces the old message. The iterative message passing algorithm is as follows:

  1. 1.

    initialize all μ ρ v P i , j ρ v =1.

  2. 2.

    calculate all μ P i , j ρ v ρ v as per equation (11).

  3. 3.

    calculate all μ ρ v P i , j ρ v as per equation (10).

  4. 4.

    repeat steps 2 and 3 in that order.

Since we are dealing with continuous variables between 0 and 1, the summations are replaced by integrations. Every time μ P i , j ρ v ρ v are computed in step 2, they come out to be polynomials of degree one due to the multiplicatively separable nature of the integrands involved and that all the parameters ρ v are being integrated from 0 to 1 (a rectangular integration region). Let them be represented as b0,v,i,j+b1,v,i,j×ρ v . Hence μ P i , j ρ v ρ v can be represented by a vector bv,i,j=(b0,v,i,jb1,v,i,j)T. Every time μ ρ v P i , j ρ v are computed in step 3, they will be polynomials of degree N J−1 since they are simply the product of all incoming messages except one. Let them be represented as k = 0 NJ 1 a k , v , i , j ρ v k . Hence μ ρ v P i , j ρ v can be represented by a vector av,i,j=(a0,v,i,ja1,v,i,jaN J−1,v,i,j)T.

The values b0,v,i,j and b1,v,i,j can be updated in step 2 as follows.

b 0 , v , i , j m = 0 2 V 1 S m , i , j 1 R v , m × { 1 V } l v k = 0 NJ 1 a k , l , i , j k + 2 R l , m × k = 0 NJ 1 a k , l , i , j ( k + 1 ) ( k + 2 ) 1 R l , m
(15)
b 1 , v , i , j m = 0 2 V 1 S m , i , j 2 R v , m 1 × { 1 V } l v k = 0 NJ 1 a k , l , i , j k + 2 R l , m × k = 0 NJ 1 a k , l , i , j ( k + 1 ) ( k + 2 ) 1 R l , m
(16)

The av,i,j can be updated in step 3 by performing polynomial multiplications of the N J−1 incoming first degree polynomials to the vt h variable node and comparing coefficients. That is, the following equation must be satisfied.

k = 0 NJ 1 a k , v , i , j ρ v k = g i , h j b 0 , v , g , h + b 1 , v , g , h × ρ v
(17)

By comparing coefficients of either side of equation (17), the values of the elements of the vector av,i,j are updated. This is also equivalent to the convolution of the message vectors bv,g,h for gi,hj. At each iteration, the message vectors can be multiplied by constants so as to prevent overflow or underflow when implementing the algorithm on a digital computer with finite precision. In that case the final solutions we get are simply the required marginal distributions scaled by some unknown constant. If we are simply interested in the marginal distributions, then it is not necessary to keep track of the multiplied constants. We simply need to normalize the marginals so that their integrals from 0 to 1 give unity.

The message vectors av,i,j and bv,i,j are iteratively updated until some convergence criteria is satisfied (for example if the Hellinger distance between the marginals of two successive iterations is below a certain threshold). In our simulations, we saw that as few as 2 iterations gave satisfactory results in terms of convergence. Hence the time complexity of the algorithm is dependent on steps 2 and 3 of the algorithm.

In order to calculate μ ρ v P i , j ρ v in step 3, first calculate the polynomial U v ρ v = g , h μ P g , h ρ v ρ v of degree NJ. Then find the quotient of the division operation U v ρ v ÷ μ P i , j ρ v ρ v . This gives μ ρ v P i , j ( ρ v ). Along with that, we can also calculate and store the value of θ v , i , j , 1 = 0 1 ρ v μ ρ v P i , j ( ρ v )d ρ v and θ v , i , j , 0 = 0 1 (1 ρ v ) μ ρ v P i , j ( ρ v )d ρ v which will be used in step 2. Note that θ v , i , j , 1 = k = 0 NJ 1 a k , v , i , j k + 2 and θ v , i , j , 0 = k = 0 NJ 1 a k , v , i , j ( k + 1 ) ( k + 2 ) . Calculating the coefficients of U v (ρ v ) is of time complexity at most O((N J)2). This is because it involves the convolution of NJ different first degree polynomials. Calculating the quotient of U v ρ v ÷ μ P i , j ρ v , and θv,i,j,1 and θv,i,j,0 are of time complexity O(N J). The last three operations of O(N J) have to be done for all NJ of the factor nodes for each variable node. Hence the time complexity of calculating the messages from one variable node to all factor nodes is of time complexity O((N J)2). Repeating this action for all V variable nodes gives us the time complexity of step 3 of the algorithm to be O((N J)2V).

If we look at equations (15) and (16), the computation of bv,i,j seems to be of O(N J V 2V) time complexity. Since there are NJV of bv,i,j to be computed, step 2 seems to be of O((N J)2(V)22V) time complexity. However some of the computations are repeated and storing these computations for reuse can reduce the time complexity. Let κ m , i , j = l = 1 V θ l , i , j , 1 R l , m θ l , i , j , 0 1 R l , m . Then μ P i , j ρ v ( ρ v )= m = 0 2 V 1 S m , i , j ρ v R v , m ( 1 ρ v ) 1 R v , m × κ m , i , j θ v , i , j , 1 R v , m θ v , i , j , 0 1 R v , m . Computation of κm,i,j for all m is of O(V 2V) time complexity for a given factor node Pi,j. Computation of μ P i , j ρ v ( ρ v ) for all v is of O(V 2V) time complexity for a given factor node Pi,j. Hence computation of μ P i , j ρ v ( ρ v ) from a single factor node to all variable nodes is of O(V 2V) time complexity. Hence total computation for all factor nodes in step 2 comes out to be of O(N J V 2V) time complexity.

Hence the complexity of each iteration of the algorithm comes out to be O(N J V(2V+C N J)), where C is a constant. This is quadratic with respect to the number of data points NJ, as opposed to the exponential complexity of the straightforward approach discussed in section ‘Model description’.

Once the convergence criteria is met and the algorithm is terminated, the marginal distribution of ρ v is calculated as

P ρ v / O , I =γ i , j μ P i , j ρ v ρ v
(18)

where γ is a normalization constant which can be calculated to give 0 1 P ρ v / O , I d ρ v =1.

Simulation experiments

We did simulations where the algorithm was tested on synthetic data as well as applied to real world data. The marginal posterior distributions estimated using the iterative message passing algorithm were compared with the marginal posteriors estimated using the time consuming and computationally intensive Markov Chain Monte Carlo (MCMC) methods and the estimates obtained using both methods came out to be close thereby verifying the iterative message passing algorithm’s correctness.

Various literature on MCMC methods exist [16]-[18]. We will describe the details used in our simulations instead of going into a detailed discussion of MCMC methods. The Markov Chain Monte Carlo Method involves creating a Markov Chain whose stationary distribution is the required posterior distribution. The Metropolis-Hastings Algorithm will be used to generate such a Markov Chain since the samples need to be generated from a non standard probability distribution. This method will be used to generate samples from the posterior distribution of the unknown parameters of the vector ρ. These samples can then be used to get an estimate of the joint as well as the marginal posterior distributions of the unknown parameters using kernel density estimation.

Samples are drawn from the posterior distribution of ρ using the Metropolis-Hastings (MH) Algorithm in the following manner. Let the nth sample drawn from the posterior distribution of ρ be ρ ( n ) = ρ 1 ( n ) ρ 2 ( n ) ρ V ( n ) .

  1. 1.

    Initialize all elements of ρ (0) to be 0.5.

  2. 2.

    At the n th iteration of the MH algorithm, generate ρ from the proposal distribution U(ρ/ρ (n),Δ). The proposal distribution and the tuning parameter Δ will be discussed in the next paragraph.

  3. 3.

    Calculate the acceptance ratio

    D = P O / ρ , I U ρ ( n ) / ρ , Δ P O / ρ ( n ) , I U ρ / ρ ( n ) , Δ
    (19)

    (Recall that the prior of the parameter vector is constant). P(O/ρ ,I) and P(O/ρ (n),I) can be easily calculated for known values of ρ and ρ (n) without the expansion of P(O/ρ,I) described in equation (5). Accept ρ as the next sample ρ (n+1) with probability m i n(1,D), or keep ρ (n+1) equal to ρ (n) with probability 1−m i n(1,D).

  4. 4.

    Repeat steps 2 and 3 to generate samples from the posterior of P(ρ/O,I).

The proposal distribution U(ρ/ρ(n),Δ) is such that ρ i is Beta distributed with parameters ρ i ( n ) Δ and 1 ρ i ( n ) Δ , that is

U ρ / ρ ( n ) , Δ = i = 1 V ρ i ρ i ( n ) Δ 1 ( 1 ρ i ) 1 ρ i ( n ) Δ 1 Beta ρ i ( n ) Δ , 1 ρ i ( n ) Δ
(20)

where B e t a(x,y) is the beta function with parameters x and y and Δ is a scalar tuning parameter which controls the variance of the distributions of the ρ i ’s. It can be adjusted to give autocorrelation properties of the Markov Chain within acceptable ranges.

Experiments with synthetic data

To demonstrate the working of the algorithm, we ran simulations of the message passing algorithm as well as the MH algorithm on synthetic data. We generated synthetic data from the example described in section ‘Model description’ which was derived from the MAPK signal transduction network, which is a well understood network.

The set of locations where faults can take place was taken to be composed of RAF, IRS1, and RHEB. The probabilities of stuck-at-one faults at these locations (The parameters ρ1, ρ2, and ρ3) were taken as 0.7, 0.4, and 0.2. Synthetic observations of the observable variable (the variables shown at the bottom of Figure 1 as arrows) were generated for various drug combinations as inputs (the drugs being AG1024, AG825, Lapatinib, LY294002, U0126, and Temsirolimus, whose action on the Boolean network of the MAPK network is shown in Figure 1) according to the probability model described in the previous sections. The inputs at the top of the network corresponding to growth factors (EGF, HBEGF, IGF, and NRG1) were all taken as 1 (if the cells were being grown on petridishes, then this would be equivalent to the case where all the four growth factors have been supplied in the serum). Hence the data set {(oi,1,oi,2,…,oi,J),I i } is generated. There are 6 drugs in the Boolean model. All the 26−1 drug combinations were used to generate the data points. Hence i varies from 1 to 63.

After the synthetic data set was generated, the marginal posterior distributions of the elements of ρ (The parameters ρ1, ρ2, and ρ3) were estimated using both the message passing algorithm as well as the MCMC method. For the MCMC method, the tuning parameter Δ is set to 0.04 which gives an acceptance rate of 40%. The reader is referred to [18] for information on acceptance rates. Then the Markov Chain was run to generate 50,000 samples to attain stationarity (the burn in period). Following this, the Markov chain was run long enough to generate 250,000 samples and thinned by a factor of 50 (one in 50 samples generated was stored for each parameter) resulting in 5000 samples for each ρ v . This resulted in effective sample sizes of atleast 4000 for each of the ρ i ’s. the reader is referred to [18] for information on effective sample sizes. The algorithms were implemented in MATLAB. The message passing algorithm was terminated after 2 iterations which took about 4 seconds. For our purposes, we used the Hellinger Distance between the marginals of the first parameter ρ1 calculated at consecutive iterations of the message passing algorithm to fall below a certain threshold to signal termination of the algorithm. However other convergence criterions could also be used. The MCMC samples were generated in 30 minutes after the initial burn in period. The marginal posterior distribution of ρ1 through ρ3 calculated using both the message passing algorithm and the MCMC approach are shown in Figure 4. Kernel density estimation with a Gaussian Kernel was used to estimate the marginals from the sample values generated using the MH algorithm. The estimate P ̂ ( ρ v /O,I) of P(ρ v /O,I) is calculated from the samples as follows

P ̂ ρ v / O , I = 1 L n = 1 L 1 2 π σ v exp ρ v ρ v ( n ) 2 2 σ v 2
(21)
Figure 4
figure 4

Marginal posterior distribution of ρ 1 through ρ 3 calculated using both the message passing algorithm and the MCMC approach.

where σ v is the bandwidth of the Gaussian kernel which is set to δ v L 1 5 . L is the number of samples generated by the MH algorithm (5000 in our case) and δ v is the standard deviation of the generated samples. This rule of thumb to calculate the bandwidth of the Gaussian kernel is discussed in [19].

As we can see in Figure 4, there is almost no difference in the inference of the marginal posterior distributions of the unknown parameters between the message passing algorithm and the MCMC approach. The posterior mean of ρ v is calculated from the message passing algorithm as 0 1 ρ v γ i , j μ P i , j ρ v ( ρ v )d ρ v and from the MCMC approach as 1 L n ρ v ( n ) . These come out to be (0.7254 0.3891 0.2799) and (0.7326 0.3961 0.2830) respectively. These estimates are close to each other and to the actual values of (0.7 0.4 0.2).

This simulation shows that the message passing algorithm successfully calculates the posterior marginal distributions of the unknown parameters ρ1 through ρ3 and gives the same inferences as the Metropolis-Hastings algorithm. We did simulations with various values of ρ and for different sets of locations of faults. The iterative message passing algorithm gave estimates of the posterior marginal distributions of the parameters same as those estimated using the MCMC approach for all the test cases considered in our simulations.

Applications to real data

To test our model, we performed experiments on healthy adult fibroblasts where it is fair to assume that there are no cancer causing mutations present in the tissue. Hence it is fair to assume that a Boolean regulatory network with no faults would best model this tissue.

Adult fibroblasts were grown in petri-dishes till confluence and then maintained in 0.2% FBS (Fetal Bovine Serum) for four days. It is a general assumption that FBS contains most of the important growth factors. After this, the cells were exposed to 0.2% FBS and 100 μ M Anisomycin for 30 minutes. Anisomycin is a protein synthesis inhibitor which activates the MAPK signal transduction network and keeps it responsive to kinase specific inhibitors [20],[21]. That is, with the addition of Anisomycin, we anticipate the MAPK signal transduction network to respond to the addition of kinase inhibitors such as U0126. Anisomycin, being a protein synthesis inhibitor, would also cut off any feedback path which has a translation (protein synthesis) step in it. The cells were then grouped into three groups (group 0, group 1, and group 2). Group 0 was the control group which was exposed to 100 μ M Anisomycin only. Group 1 was exposed to 100 μ M Anisomycin and 50 μ M of LY294002. Group 2 was exposed to 100 μ M Anisomycin, 50 μ M of LY294002, and 10 μ M of U0126. All three groups were also exposed to 20% FBS along with the other chemicals. LY294002 and U0126 are highly specific inhibitors of PI3 Kinase (PI3K in Figure 1) and MEK1 respectively. The molecular targets of LY294002 and U0126 are shown in Figure 1. Genes having the SP1 and SRF-ELK response elements in their promoters were quantified through real time PCR and the delta-delta method [22] with GAPDH as the reference gene and group 0 as the control. The genes were measured in quadruplets for each experiment.

EGR1 is measured as a reporter gene of SRF-ELK transcription factor [23]. JUN, and cMYC are measured as reporters of SP1 [24],[25]. Other genes having the SP1 response element in their promoters are Decorin, IRF3 and VEGFA [26]-[29]. These six genes were quantified in quadruplets for each experiment. The readings of each gene are discretized using Otsu’s method [30]. As an example the readings of ERG1 and their corresponding discretized values are shown in Table 1. The threshold level for EGR1 came out to be 0.3824. the expressions above this level are labeled as 1 and those below are labeled as 0. The measured normalized gene expression ratios are shown in Table 2.

Table 1 Gene expression levels and their discrete values for the gene EGR1
Table 2 Table showing the normalized gene expression ratios and their Reference Sequence (RefSeq) numbers

For demonstration purposes, we have taken the set of locations where to search for faults to be composed of ERK1/2 and IRS1 (shown in Figure 1). The marginal posterior probability distributions of the probabilities of faults associated with these two locations are shown in Figure 5.

Figure 5
figure 5

Marginal posterior distribution of the unknown parameters associated with ERK1/2 and IRS1.

As we can see in Figure 5, the posterior marginal distribution associated with ERK1/2 comes out to be quite tightly distributed with a mean of 0.1538 while that for IRS1 comes out to be uniformly distributed between 0 and 1. This is because the data does not contain any discriminating information about the occurrence of any fault at IRS1 under this MAPK Boolean model. But it does tell us that the probability of occurrence of a fault at the variable corresponding to ERK1/2 is pretty low, judging by its mean to be having a low value of close to 15%. This is expected since the data comes from adult fibroblasts, where we can be fairly sure that no cancer causing mutations are present. If data had been collected after exposure to other combinations of other drugs (for instance Lapatinib or Temsirolimus) then the data might have allowed the model to make meaningful inferences regarding occurrences of faults at locations besides ERK1/2 as well as give sharper confidence intervals than that shown in Figure 5.

Conclusion

In this paper we have described a method to estimate the probabilities with which certain faults have taken place in a given Boolean Regulatory network, provided we have the observations of the observable variables whose behavior is determined by the network. We have described the probability model and described a fast algorithm based on message passing to make the inferences about the posterior marginal probability distributions of the unknown parameters of the model (These parameters being the probabilities of the occurrences of the faults). We have compared the performance of the algorithm with Markov Chain Monte Carlo techniques (the Metropolis-Hastings Algorithm) through simulations, and we have shown that the message passing algorithm gives results comparable to those obtained using the MCMC methods with the added advantage of much smaller computation times. We also applied the model to analyze data collected from fibroblasts, thereby demonstrating how this model can be used on real world data. Such a computationally manageable approach has the potential to allow the inference of locations of faults in a Boolean regulatory network in a probabilistic setting from data, such as gene expression data.

Locating the points of dysregulations in a deterministic Boolean signal transduction network could be used to suggest therapies as described in [9]. Since we are locating faults in a probabilistic setting, the therapy could be designed keeping in mind the tradeoff between treating cancer and managing the side effects of the treatment. For example, consider a case where we have two possible locations of faults. Let the computed probability of the occurrence of a fault at the first location be smaller than that of the second location. Then we may only consider the second fault in our therapy design process, thereby reducing the exposure of the patient to excessive drugs which may have unwanted side effects.

Future work could focus on performing experiments on cancerous cell lines being exposed to various combinations of drugs and infer from the collected data the likely locations of dysregulations in the corresponding Boolean regulatory network. Also, algorithms could be developed to automate the process of selecting the set of locations of faults instead of having the user provide it to the algorithm.

Availability of codes and data

The MATLAB codes and the data can be obtained by sending a request to anwoy.rkl@gmail.com.

References

  1. Bower JM, Bolouri H: Computational Modeling of Genetic and Biochemical Networks, 1st edition, Boston: MIT Press; 2001.,

  2. Shmulevich I, Dougherty ER, Kim S, Zhang W: Probabilistic Boolean networks: a rule-based uncertainty model for gene regulatory networks. Bioinformatics 2002, 18(2):261–274.,

    Article  CAS  PubMed  Google Scholar 

  3. Datta A, Dougherty E: Introduction to Genomic Signal Processing with Control, New York: CRC Press; 2007.,

    Google Scholar 

  4. Friedman N, Linial M, Nachman I, Pe’er D: Using Bayesian networks to analyze expression data. J Comput Biol 2000, 7(3–4):601–620.,

    Article  CAS  PubMed  Google Scholar 

  5. Zou M, Conzen SD: A new dynamic Bayesian network (DBN) approach for identifying gene regulatory networks from time course microarray data. Bioinformatics 2005, 21:71–79.,

    Article  CAS  PubMed  Google Scholar 

  6. Liang S, Fuhrman S, Somogyi R: REVEAL, a general reverse engineering algorithm for inference of genetic network architectures. Pac Symp Biocomput 1998, 3(3):18–29.,

    Google Scholar 

  7. Layek RK, Datta A, Dougherty ER: From biological pathways to regulatory networks. Mol BioSyst 2011, 7:843–851.,

    Article  CAS  PubMed  Google Scholar 

  8. Mohanty AK, Datta A, Venkatraj V: A model for cancer tissue heterogeneity. IEEE T Bio-Med Eng 2014, 61(3):966–974.,

    Article  Google Scholar 

  9. Layek RK, Datta A, Bittner M, Dougherty ER: Cancer therapy design based on pathway logic. Bioinformatics 2011, 27(4):548–555.,

    Article  CAS  PubMed  Google Scholar 

  10. Weinberg RA: The Biology of Cancer, 1st edition, Princeton: Garland Science; 2006.,

  11. Greenman C, Wooster R, Futreal PA, Stratton MR, Easton DF: Statistical analysis of pathogenicity of somatic mutations in cancer. Genetics 2006, 173(4):2187–2198.,

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  12. Goldman N, Yang Z: A codon-based model of nucleotide substitution for protein-coding DNA sequences. Mol Biol Evol 1994, 11(5):725–736.,

    CAS  PubMed  Google Scholar 

  13. Yang Z, Ro S, Rannala B: Likelihood models of somatic mutation and codon substitution in cancer genes. Genetics 2003, 165:695–705.,

    CAS  PubMed  PubMed Central  Google Scholar 

  14. Kschischang FR, Frey BJ, Loeliger HA: Factor graphs and the sum-product algorithm. IEEE T Inform Theory 2001, 47(2):498–519.,

    Article  Google Scholar 

  15. Wymeersch H: Iterative Receiver Design, New York: Cambridge University Press; 2007.,

    Book  Google Scholar 

  16. Gelman A, Carlin JB, Stern HS, Rubin DB: Bayesian Data Analysis, 2nd edition, Boca Raton, London, New York, Washington D.C.: Chapman and Hall/CRC; 2004.,

  17. Gelman A, Hill J: Data Analysis Using Regression and Multi-level/hierarchical Models, New York: Cambridge University Press; 2007.,

    Google Scholar 

  18. Hoff PD: A First Course in Bayesian Statistical Methods, Dordrecht, Heidelberg, London, New York: Springer Texts in Statistics; 2009.,

    Book  Google Scholar 

  19. Scott DW: Multivariate Density Estimation: Theory, Practice, and Visualization, New York, Chichester, Brisbane, Toronto, Singapore: John Wiley & Sons; 1992.,

    Book  Google Scholar 

  20. Bébien M, Salinas S, Becamel C, Richard V, Linares L, Hipskind RA: Immediate-early gene induction by the stresses anisomycin and arsenite in human osteosarcoma cells involves MAPK cascade signaling to Elk-1, CREB and SRF. Oncogene 2003, 22(12):1836–1847.,

    Article  PubMed  Google Scholar 

  21. Dhawan P, Bell A, Kumar A, Golden C, Mehta KD: Critical role of p42/44(MAPK) activation in anisomycin and hepatocyte growth factor-induced LDL receptor expression: activation of Raf-1/Mek-1/p42/44(MAPK) cascade alone is sufficient to induce LDL receptor expression. J Lipid Res 1999, 40(10):1911–1919.,

    CAS  PubMed  Google Scholar 

  22. Livak KJ, Schmittgen TD: Analysis of relative gene expression data using real-time quantitative PCR and the 2−ΔΔC t method. Methods 2001, 25(4):402–408.,

    Article  CAS  PubMed  Google Scholar 

  23. Clarkson RW, Shang CA, Levitt LK, Howard T, Waters MJ: Ternary complex factors Elk-1 and Sap-1a mediate growth hormone induced transcription of Egr-1 (early growth response factor-1) in 3T3-F442A Preadipocytes. Mol Endocrinol 1999, 13(4):619–631.,

    Article  CAS  PubMed  Google Scholar 

  24. Rozek D, Pfeifer GP: In vivo protein-DNA interactions at the c jun promoter: preformed complexes mediate the UV response. Mol Cell Biol 1993, 13(9):5490–5499.,

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  25. Levens D: How the c-myc promoter works and why it sometimes does not. J Natl Cancer I Monographs 2008, 39:41–43.,

    Article  CAS  PubMed  Google Scholar 

  26. Verrecchia F, Rossert J, Mauviel A: Blocking sp1 transcription factor broadly inhibits extracellular matrix gene expression in vitro and in vivo: implications for the treatment of tissue fibrosis. J Invest Dermatol 2001, 116(5):755–763.,

    Article  CAS  PubMed  Google Scholar 

  27. Xu HG, Jin R, Ren W, Zou L, Wang Y, Zhou GP: Transcription factors Sp1 and Sp3 regulate basal transcription of the human IRF-3 gene. Biochimie 2012, 94(6):1390–1397.,

    Article  CAS  PubMed  Google Scholar 

  28. Samson SL, Wong NC: Role of Sp1 in insulin regulation of gene expression. J Mol Endocrinol 2002, 29(3):265–279.,

    Article  CAS  Google Scholar 

  29. Pagés G, Pouysségur J: Transcriptional regulation of the vascular endothelial growth factor gene-a concert of activating factors. Cardiovasc Res 2005, 65(3):564–573.,

    Article  PubMed  Google Scholar 

  30. Otsu N: A threshold selection method from gray-level histograms. Automatica 1975, 11(285–296):23–27.,

    Google Scholar 

Download references

Acknowledgements

This work was supported by the National Science Foundation under Grant ECCS-1068628 and by a Texas A&M Engineering Genomics and Bioinformatics Seed Grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aniruddha Datta.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ contributions

AKM designed and implemented the algorithm and performed the computational experiments. AD conceived the study. VV set up the wet-lab experiments. All authors read and approved the final manuscript.

Authors’ original submitted files for images

Rights and permissions

Open Access  This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.

The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

To view a copy of this licence, visit https://creativecommons.org/licenses/by/4.0/.

The Creative Commons Public Domain Dedication waiver (https://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mohanty, A.K., Datta, A. & Venkatraj, V. Using the message passing algorithm on discrete data to detect faults in boolean regulatory networks. Algorithms Mol Biol 9, 20 (2014). https://doi.org/10.1186/s13015-014-0020-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13015-014-0020-6

Keywords