IT training kernel based data fusion for machine learning methods and applications in bioinformatics and text mining yu, tranchevent, de moor moreau 2011 03 26

228 283 0
IT training kernel based data fusion for machine learning  methods and applications in bioinformatics and text mining yu, tranchevent, de moor  moreau 2011 03 26

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Shi Yu, Léon-Charles Tranchevent, Bart De Moor, and Yves Moreau Kernel-based Data Fusion for Machine Learning Studies in Computational Intelligence, Volume 345 Editor-in-Chief Prof Janusz Kacprzyk Systems Research Institute Polish Academy of Sciences ul Newelska 01-447 Warsaw Poland E-mail: kacprzyk@ibspan.waw.pl Further volumes of this series can be found on our homepage: springer.com Vol 321 Dimitri Plemenos and Georgios Miaoulis (Eds.) Intelligent Computer Graphics 2010 ISBN 978-3-642-15689-2 Vol 322 Bruno Baruque and Emilio Corchado (Eds.) Fusion Methods for Unsupervised Learning Ensembles, 2010 ISBN 978-3-642-16204-6 Vol 323 Yingxu Wang, Du Zhang, and Witold Kinsner (Eds.) Advances in Cognitive Informatics, 2010 ISBN 978-3-642-16082-0 Vol 324 Alessandro Soro, Vargiu Eloisa, Giuliano Armano, and Gavino Paddeu (Eds.) Information Retrieval and Mining in Distributed Environments, 2010 ISBN 978-3-642-16088-2 Vol 325 Quan Bai and Naoki Fukuta (Eds.) Advances in Practical Multi-Agent Systems, 2010 ISBN 978-3-642-16097-4 Vol 326 Sheryl Brahnam and Lakhmi C Jain (Eds.) Advanced Computational Intelligence Paradigms in Healthcare 5, 2010 ISBN 978-3-642-16094-3 Vol 333 Fedja Hadzic, Henry Tan, and Tharam S Dillon Mining of Data with Complex Structures, 2011 ISBN 978-3-642-17556-5 Vol 334 Álvaro Herrero and Emilio Corchado (Eds.) Mobile Hybrid Intrusion Detection, 2011 ISBN 978-3-642-18298-3 Vol 335 Radomir S Stankovic and Radomir S Stankovic From Boolean Logic to Switching Circuits and Automata, 2011 ISBN 978-3-642-11681-0 Vol 336 Paolo Remagnino, Dorothy N Monekosso, and Lakhmi C Jain (Eds.) Innovations in Defence Support Systems – 3, 2011 ISBN 978-3-642-18277-8 Vol 337 Sheryl Brahnam and Lakhmi C Jain (Eds.) Advanced Computational Intelligence Paradigms in Healthcare 6, 2011 ISBN 978-3-642-17823-8 Vol 338 Lakhmi C Jain, Eugene V Aidman, and Canicious Abeynayake (Eds.) Innovations in Defence Support Systems – 2, 2011 ISBN 978-3-642-17763-7 Vol 339 Halina Kwasnicka, Lakhmi C Jain (Eds.) Innovations in Intelligent Image Analysis, 2010 ISBN 978-3-642-17933-4 Vol 327 Slawomir Wiak and Ewa Napieralska-Juszczak (Eds.) Computational Methods for the Innovative Design of Electrical Devices, 2010 ISBN 978-3-642-16224-4 Vol 340 Heinrich Hussmann, Gerrit Meixner, and Detlef Zuehlke (Eds.) Model-Driven Development of Advanced User Interfaces, 2011 ISBN 978-3-642-14561-2 Vol 328 Raoul Huys and Viktor K Jirsa (Eds.) Nonlinear Dynamics in Human Behavior, 2010 ISBN 978-3-642-16261-9 Vol 341 Stéphane Doncieux, Nicolas Bredeche, and Jean-Baptiste Mouret(Eds.) New Horizons in Evolutionary Robotics, 2011 ISBN 978-3-642-18271-6 Vol 329 Santi Caball´e, Fatos Xhafa, and Ajith Abraham (Eds.) Intelligent Networking, Collaborative Systems and Applications, 2010 ISBN 978-3-642-16792-8 Vol 330 Steffen Rendle Context-Aware Ranking with Factorization Models, 2010 ISBN 978-3-642-16897-0 Vol 342 Federico Montesino Pouzols, Diego R Lopez, and Angel Barriga Barros Mining and Control of Network Traffic by Computational Intelligence, 2011 ISBN 978-3-642-18083-5 Vol 343 XXX Vol 331 Athena Vakali and Lakhmi C Jain (Eds.) New Directions in Web Data Management 1, 2011 ISBN 978-3-642-17550-3 Vol 344 Atilla El¸ci, Mamadou Tadiou Koné, and Mehmet A Orgun (Eds.) Semantic Agent Systems, 2011 ISBN 978-3-642-18307-2 Vol 332 Jianguo Zhang, Ling Shao, Lei Zhang, and Graeme A Jones (Eds.) Intelligent Video Event Analysis and Understanding, 2011 ISBN 978-3-642-17553-4 Vol 345 Shi Yu, Léon-Charles Tranchevent, Bart De Moor, and Yves Moreau Kernel-based Data Fusion for Machine Learning, 2011 ISBN 978-3-642-19405-4 Shi Yu, Léon-Charles Tranchevent, Bart De Moor, and Yves Moreau Kernel-based Data Fusion for Machine Learning Methods and Applications in Bioinformatics and Text Mining 123 Dr Shi Yu Prof Dr Bart De Moor University of Chicago Katholieke Universiteit Leuven Department of Medicine Department of Electrical Engineering Institute for Genomics and Systems Biology SCD-SISTA Knapp Center for Biomedical Discovery Kasteelpark Arenberg 10 900 E 57th St Room 10148 Heverlee-Leuven, B3001 Chicago, IL 60637 Belgium USA E-mail: bart.demoor@esat.kuleuven.be E-mail: shiyu@uchicago.edu Dr Léon-Charles Tranchevent Katholieke Universiteit Leuven Department of Electrical Engineering Bioinformatics Group, SCD-SISTA Kasteelpark Arenberg 10 Heverlee-Leuven, B3001 Belgium Prof Dr Yves Moreau Katholieke Universiteit Leuven Department of Electrical Engineering Bioinformatics Group, SCD-SISTA Kasteelpark Arenberg 10 Heverlee-Leuven, B3001 Belgium E-mail: Yves.Moreau@esat.kuleuven.be E-mail: Leon-Charles.Tranchevent@esat.kuleuven.be ISBN 978-3-642-19405-4 e-ISBN 978-3-642-19406-1 DOI 10.1007/978-3-642-19406-1 Studies in Computational Intelligence ISSN 1860-949X Library of Congress Control Number: 2011923523 c 2011 Springer-Verlag Berlin Heidelberg This work is subject to copyright All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer Violations are liable to prosecution under the German Copyright Law The use of general descriptive names, registered names, trademarks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use Typeset & Cover Design: Scientific Publishing Services Pvt Ltd., Chennai, India Printed on acid-free paper 987654321 springer.com Preface The emerging problem of data fusion offers plenty of opportunities, also raises lots of interdisciplinary challenges in computational biology Currently, developments in high-throughput technologies generate Terabytes of genomic data at awesome rate How to combine and leverage the mass amount of data sources to obtain significant and complementary high-level knowledge is a state-of-art interest in statistics, machine learning and bioinformatics communities To incorporate various learning methods with multiple data sources is a rather recent topic In the first part of the book, we theoretically investigate a set of learning algorithms in statistics and machine learning We find that many of these algorithms can be formulated as a unified mathematical model as the Rayleigh quotient and can be extended as dual representations on the basis of Kernel methods Using the dual representations, the task of learning with multiple data sources is related to the kernel based data fusion, which has been actively studied in the recent five years In the second part of the book, we create several novel algorithms for supervised learning and unsupervised learning We center our discussion on the feasibility and the efficiency of multi-source learning on large scale heterogeneous data sources These new algorithms are encouraging to solve a wide range of emerging problems in bioinformatics and text mining In the third part of the book, we substantiate the values of the proposed algorithms in several real bioinformatics and journal scientometrics applications These applications are algorithmically categorized as ranking problem and clustering problem In ranking, we develop a multi-view text mining methodology to combine different text mining models for disease relevant gene prioritization Moreover, we solidify our data sources and algorithms in a gene prioritization software, which is characterized as a novel kernel-based approach to combine text mining data with heterogeneous genomic data sources using phylogenetic evidence across multiple species In clustering, we combine multiple text mining models and multiple genomic data sources to identify the disease relevant partitions of genes We also apply our methods in scientometric field to reveal the topic patterns of scientific publications Using text mining technique, we create multiple lexical models for more than 8000 journals retrieved from Web of Science database We also construct multiple interaction graphs by investigating the citations among these journals These two types VI Preface of information (lexical /citation) are combined together to automatically construct the structural clustering of journals According to a systematic benchmark study, in both ranking and clustering problems, the machine learning performance is significantly improved by the thorough combination of heterogeneous data sources and data representations The topics presented in this book are meant for the researcher, scientist or engineer who uses Support Vector Machines, or more generally, statistical learning methods Several topics addressed in the book may also be interesting to computational biologist or bioinformatician who wants to tackle data fusion challenges in real applications This book can also be used as reference material for graduate courses such as machine learning and data mining The background required of the reader is a good knowledge of data mining, machine learning and linear algebra This book is the product of our years of work in the Bioinformatics group, the Electrical Engineering department of the Katholieke Universiteit Leuven It has been an exciting journey full of learning and growth, in a relaxing and quite Gothic town We have been accompanied by many interesting colleagues and friends This will go down as a memorable experience, as well as one that we treasure We would like to express our heartfelt gratitude to Johan Suykens for his introduction of kernel methods in the early days The mathematical expressions and the structure of the book were significantly improved due to his concrete and rigorous suggestions We were inspired by the interesting work presented by Tijl De Bie on kernel fusion Since then, we have been attracted to the topic and Tijl had many insightful discussions with us on various topics, the communication has continued even after he moved to Bristol Next, we would like to convey our gratitude and respect to some of our colleagues We wish to particularly thank S Van Vooren, B Coessen, F Janssens, C Alzate, K Pelckmans, F Ojeda, S Leach, T Falck, A Daemen, X H Liu, T Adefioye, E Iacucci for their insightful contributions on various topics and applications We are grateful to W Glă anzel for his contribution of Web of Science data set in several of our publications This research was supported by the Research Council KUL (ProMeta, GOA Ambiorics, GOA MaNet, CoE EF/05/007 SymBioSys, KUL PFV/10/016), FWO (G.0318.05, G.0553.06, G.0302.07, G.0733.09, G.082409), IWT (Silicos, SBO-BioFrame, SBO-MoKa, TBM-IOTA3), FOD (Cancer plans), the Belgian Federal Science Policy Office (IUAP P6/25 BioMaGNet, Bioinformatics and Modeling: from Genomes to Networks), and the EU-RTD (ERNSI: European Research Network on System Identification, FP7-HEALTH CHeartED) Chicago, Leuven, Leuven, Leuven, November 2010 Shi Yu L´eon-Charles Tranchevent Bart De Moor Yves Moreau Contents Introduction 1.1 General Background 1.2 Historical Background of Multi-source Learning and Data Fusion 1.2.1 Canonical Correlation and Its Probabilistic Interpretation 1.2.2 Inductive Logic Programming and the Multi-source Learning Search Space 1.2.3 Additive Models 1.2.4 Bayesian Networks for Data Fusion 1.2.5 Kernel-based Data Fusion 1.3 Topics of This Book 1.4 Chapter by Chapter Overview References Rayleigh Quotient-Type Problems in Machine Learning 2.1 Optimization of Rayleigh Quotient 2.1.1 Rayleigh Quotient and Its Optimization 2.1.2 Generalized Rayleigh Quotient 2.1.3 Trace Optimization of Generalized Rayleigh Quotient-Type Problems 2.2 Rayleigh Quotient-Type Problems in Machine Learning 2.2.1 Principal Component Analysis 2.2.2 Canonical Correlation Analysis 2.2.3 Fisher Discriminant Analysis 2.2.4 k-means Clustering 2.2.5 Spectral Clustering 2.2.6 Kernel-Laplacian Clustering 1 4 18 21 22 27 27 27 28 28 30 30 30 31 32 33 33 VIII Contents 2.2.7 One Class Support Vector Machine 2.3 Summary References Ln -norm Multiple Kernel Learning and Least Squares Support Vector Machines 3.1 Background 3.2 Acronyms 3.3 The Norms of Multiple Kernel Learning 3.3.1 L∞ -norm MKL 3.3.2 L2 -norm MKL 3.3.3 Ln -norm MKL 3.4 One Class SVM MKL 3.5 Support Vector Machine MKL for Classification 3.5.1 The Conic Formulation 3.5.2 The Semi Infinite Programming Formulation 3.6 Least Squares Support Vector Machines MKL for Classification 3.6.1 The Conic Formulation 3.6.2 The Semi Infinite Programming Formulation 3.7 Weighted SVM MKL and Weighted LSSVM MKL 3.7.1 Weighted SVM 3.7.2 Weighted SVM MKL 3.7.3 Weighted LSSVM 3.7.4 Weighted LSSVM MKL 3.8 Summary of Algorithms 3.9 Numerical Experiments 3.9.1 Overview of the Convexity and Complexity 3.9.2 QP Formulation Is More Efficient than SOCP 3.9.3 SIP Formulation Is More Efficient than QCQP 3.10 MKL Applied to Real Applications 3.10.1 Experimental Setup and Data Sets 3.10.2 Results 3.11 Discussions 3.12 Summary References Optimized Data Fusion for Kernel k-means Clustering 4.1 Introduction 4.2 Objective of k-means Clustering 4.3 Optimizing Multiple Kernels for k-means 4.4 Bi-level Optimization of k-means on Multiple Kernels 4.4.1 The Role of Cluster Assignment 4.4.2 Optimizing the Kernel Coefficients as KFD 34 35 37 39 39 40 42 42 43 44 46 48 48 50 53 53 54 56 56 56 57 58 58 59 59 59 60 63 63 67 83 84 84 89 89 90 92 94 94 94 Contents IX 4.4.3 Solving KFD as LSSVM Using Multiple Kernels 96 4.4.4 Optimized Data Fusion for Kernel k-means Clustering (OKKC) 98 4.4.5 Computational Complexity 98 4.5 Experimental Results 99 4.5.1 Data Sets and Experimental Settings 99 4.5.2 Results 101 4.6 Summary 103 References 105 Multi-view Text Mining for Disease Gene Prioritization and Clustering 5.1 Introduction 5.2 Background: Computational Gene Prioritization 5.3 Background: Clustering by Heterogeneous Data Sources 5.4 Single View Gene Prioritization: A Fragile Model with Respect to the Uncertainty 5.5 Data Fusion for Gene Prioritization: Distribution Free Method 5.6 Multi-view Text Mining for Gene Prioritization 5.6.1 Construction of Controlled Vocabularies from Multiple Bio-ontologies 5.6.2 Vocabularies Selected from Subsets of Ontologies 5.6.3 Merging and Mapping of Controlled Vocabularies 5.6.4 Text Mining 5.6.5 Dimensionality Reduction of Gene-By-Term Data by Latent Semantic Indexing 5.6.6 Algorithms and Evaluation of Gene Prioritization Task 5.6.7 Benchmark Data Set of Disease Genes 5.7 Results of Multi-view Prioritization 5.7.1 Multi-view Performs Better than Single View 5.7.2 Effectiveness of Multi-view Demonstrated on Various Number of Views 5.7.3 Effectiveness of Multi-view Demonstrated on Disease Examples 5.8 Multi-view Text Mining for Gene Clustering 5.8.1 Algorithms and Evaluation of Gene Clustering Task 5.8.2 Benchmark Data Set of Disease Genes 5.9 Results of Multi-view Clustering 5.9.1 Multi-view Performs Better than Single View 5.9.2 Dimensionality Reduction of Gene-By-Term Profiles for Clustering 109 109 110 111 112 112 116 116 119 119 122 122 123 124 124 124 126 127 130 130 132 133 133 135 186 Weighted Multiple Kernel Canonical Correlation assigned to OptData (the v2 value), the WMKCCA projection becomes very similar to the KCCA projections of PenData illustrated in Figure 7.5, which is obtained by applying KCCA on the PenData alone Notice that the relative positions among digit groups and their shapes are almost exactly the same Analogously, as shown in Figure 7.4, if we increase the weighted assigned to OptData (the v2 value) and decrease the PenData weight (v1 ), the WMKCCA projection of OptData becomes similar to the KCCA projection of OptData presented in Figure 7.4 By analyzing the visualization of projections in canonical spaces, we find that the weights in WMKCCA leverage the effect data sources during the construction of the canonical spaces In other words, WMKCCA provides a flexible model to determine the canonical relationships among multiple data sources and this flexibility could be utilized in machine learning and data visualization 7.6 Experiment 187 Projection of PenData (v1=1.99 v2=0.01 v3=1) 0.1 0.08 2nd Canonical Variate 0.06 000 000 0000 00 00 0000 00 00 00 000 00 000 00 00 00 00 0 00 0.04 0.02 88 888888 88 88 98 88 88 88 888 8888888 8 8888 88 9 9 9 99 99 9 9 99 99 9 9 73 955 999999999 3 77 7 95 7 33 31 33 77 7 77 33 3 77 317 1 31 55 23 22 5555 21 22 1113 5553 22 55 11 22 22 111 55 22 11 11 59 1 11 555 2 21 44444444 5555 555 44 4444444484 11 44 44 44 44 44 44 44 444 444 4444 4444 444 −0.02 −0.04 6 66 666 66666 6666 6666 666 666 666 666 666 66 6 6 6 6 6 66 66 66 66 66 66 66 66 666 66 66 −0.06 −0.08 −0.06 −0.04 −0.02 0.02 1st Canonical Variate 0.04 0.06 0.08 0.06 0.08 0.06 0.08 Projection of PenData (v1=1 v2=1 v3=1) 0.1 0.08 2nd Canonical Variate 0.06 0.04 0.02 −0.02 44 4 7 47 77 47 444 222222 4 4 62 44 6 74 77 747 77 44 44 77 74 66 4 66 77 22 62 66 666 77 7 66 47 22 7 7 2 2666 77 6 777 477 77 22 226 7 7 666 7 62 666 47777 774 22 22 66 66 77 47 44 23 26 22 22 66 26 47 2222 62 22 2 2 266 2666 4747 2 77777 777 77777 66666666 222 2222 22222 47 7744474 6 2222222 44 777 74 111 11 11 111111111 1111111111 9999 11 00000 1 5 1 1 1 5 11 5 5 000 00 000000 00 555055555 18 555555555 11 11 55 999999999993933 11 1111 555 00 111111 555 00 00 11111 000 00 00 55 55 0 00 00 555 55 000 00000 111 11 00 5555 5 55 55 11 000 55 9999 555 99 00 00 55 81 81 00 8111 000 9998 0 1111 81 88 88 99 3933 33318189 81 81 55 81 939 99 88 000 888888 99 99 55595999 999 99 81 999 99 99 18 88 999 888 9 888 333333 93933 88 88 33 8 88 3333 93 33 888 333138 8883 88 88 888 88 999939 8888 88 93 88 333 33 888 33 3333 33333 33 333 33 3333 8888 33 3 −0.04 −0.06 −0.08 −0.06 −0.04 −0.02 0.02 1st Canonical Variate 0.04 Projection of PenData (v1=0.01 v2=1.99 v3=1) 0.1 0.08 2nd Canonical Variate 0.06 0.04 811111111 7777 77 77 777 111111 777 777 777777777 39933 77 11 77777 77 33 1111 999 999 3333 111 993 7007 11 33 77 111 1111 333 333 070777 993 333 111 70 11111 7999 11 333 33 77 99 93 33 11 7707 93 11 07 33 111 393 777 7 77 11 3 777 1113 1111 77 99 3333 333113 939 99 93 99 81 99 99 00 33 111 1118 11 999 3 007 455999999999 77 0070 00 00070 99 33 93 11111 700 77 39 777 93 0 07 07 7 7 00 11 81 777777777 7 0 7 8 8 8 8 811 1888 055555555 77 747444404 881 04 88 454 88 8 81 88 44 8 8 8 8 88 8 44 8 8 4 1 8 5 77 777774 8 444 5 8 4 5 5 5 4 8 5 44 55 88 181818 55555 4 55 45 55 45 55 55 88188 555 444 45 55 55 55 5 5 5 5 5 5 4545 811 81 1 −0.02 66 666666 6 6 6 6 6666 666 66 66 6 66 6 66 6666 66666 66 66 66 6 66 62 66 666 666666 666 −0.04 222 22222 2 2 22222 22222222 22222 2 2 222222 22 22 222 22 22222 222222 222 2222222 −0.06 3222 22 222222 22 2222 2222 2222 22 222 22222 22222222 2222 22 −0.08 −0.06 −0.04 −0.02 0.02 0.04 1st Canonical Variate 0.02 Fig 7.3 Visualization of Pendata in the canonical spaces obtained by WMKCCA The v1, v2, v3 values in the figures are respectively the weights assigned to pen data, optical data, and the label data 188 Weighted Multiple Kernel Canonical Correlation Projection of OptData (v1=1.99 v2=0.01 v3=1) 0.1 0.08 00 0 00 00 0 0 0 0000 00000 0000 00000 00 00 00 00 00 00 00000000 000 00 000 00 0000000000000 000 000 000 00 0000 907 0000000 00 000 50050 80 70 00 00 5015 000 29 20991 8 8 2581 878 585 8584 855 50 7987 8888 7888 9472128119337 98 88 997 8 58 98 88 8 88 78 98 13 818 88 88 99 5882 88 5 72 8 37 91 88 111 2113 889 3111 98 99 97737 85 4894 8 99 3 927 8 71 89 48 75 89 999 838 87 299 32 99 889 85 11 59 5 9 9 77112 3 71 9874 9 89 99 37 85 23 33 913 3 95 895 73 7 9 7 17 2 33 9 99 845 48 3 9 3 77 77 7 7 9 7 33 94 3 33 95 1 7 9919 45 31727 5 484 34 3 7 5 9 84445 22 11 3 11 4444 95 99 7722 53 2 11 35 33 55 52 55 22 11 9 22 251 2 7 5 1 2 22 9 5 5 22 3 7 1 1 9 44 2 2 9 5 9414 525 515 2351 51175 22 237 335 44 51575 47 12 3221 12 44 933 444 77 44 44 712 2532 444 44544 4 44 44444 44444 444 59 254 2232 7854494 44 4 25 84 771973 223133 4444444 44 13 48 44 44 3941954 5433 46 75312212 444 17717 586 44 46 62 212742952 8 31275676 2 22 61466 6446 645 66 166 66 6666664 66 666 66666666 6666666 6 666 66 66 6 6666 666 66 66 6666 66 6 666 66 66 66 66 6666666666 66 66 66 6 6 6 666 66 6 6666 2nd Canonical Variate 0.06 0.04 0.02 −0.02 −0.04 −0.06 −0.08 −0.06 −0.04 −0.02 0.02 1st Canonical Variate 0.04 0.06 0.08 0.06 0.08 Projection of OptData (v1=1 v2=1 v3=1) 0.1 0.08 2nd Canonical Variate 0.06 0.04 0.02 −0.02 −0.04 62 47 44 66 226 222 4447 74 66 266 74 74 44 74 6226 44 474 44 474 747444 46 766666 62 222 47 77 47 44 7 4 477 2 7 6266 4 44 2222222222 7 74 7 4 6 7 66 22 4 2 7 7 7 6 7 6 66 22 7 7 22 4 7 7 2 2 6 7 2 66 74 7447 744 6 4 222222222 66 64666 6666666666 747474 66 22 747 7 6 7 2 7 6 7 7 4 6 7 62622222 22 26 6622266 474477 9747744777 47 6212 62 266266 66426226 404575447 54444 47 27 622 77 4744444 94 54 275352 226 261612 70000 0504 4594 57 95565565 64 2161861 61 8822 9 90 700 050 31 18186 5 55 055 9399573 23389899 911 1811 00 000 1111111 0 000550 111181 0555 98 981931811111 50 999 755 5 5 5 1 1 5 5 00000 1 1 1111 39399 19 181 111 11111 00 5555 00 0000 9195999 00 00 0000500 550555 55 555 18 1818 5555595 81 000 919909 00 00 00 55 11 33 81 31 18 1181 5555 00 999 993 9999 0000000 18181 9999 991 33833988 183 393 00 118 555555555555559 99 000059 55505 81 1811 55 88 0005 00 18888 99 118 8939 188 00 99 383183313181 99 999 91888 999 590 88 18 8188 99 3333 00 93959 00500 5055 0500050 38 9 33 33 181 99 93 88 99 9999 983313813 88 83 39 888 19 88 8888 33 33 9999 33 50 88 3333 33 1888 8888818 888 333 33 05 35913 81 333 33 333 93 3 33 33 13 33 9933 3 9 3 3 33 8 88 8 3 −0.06 −0.08 −0.06 −0.04 −0.02 0.02 1st Canonical Variate 0.04 Projection of OptData (v1=0.01 v2=1.99 v3=1) 0.1 0.08 2nd Canonical Variate 0.06 0.04 0.02 −0.02 −0.04 −0.06 −0.08 −0.06 1 77 1 077 39 39 318 393 777770070 11118 11 000 79 93 11 31 3990 111 11111 11 33 339 839318 777777 33 333 04599 70 70 33 33 700 3939 111 7777 9999 400000 3833 07050 1111111 777 7 77 33 111 3 1 77 33 33 11 11 7 9 7 1 11 7 3 3 1 9 9 33 3 99 1 0 88 7 1 9 9 1 1 9 9 9 1 9 3 3 1 1 118 839 111 1 0750 40 98 00 99 95493599999 07 00 75 09 00 0040 939999 45 70 07 88811111 3399 5507 40 40 0 8881 8398 33 4770457 390 33 83 00 04 74 990 39383 5 455 88 8888 555 118 88 33393431 37 888888881 18 9553849 88 55 74 88 1888 9509 88 99381888 4 33 45590 45 44 5 44 7993 455 54 0400 4 88 44 445 54 881 18 45 5 5444 44 888 8 44 95 55 94 5 55 55 5 5 555 56935 818 50 70050547 4 5 55 5 8 5 5 8 8 81 665 638 59 40 475 4054 8 5 86 688 65 9 40 47 64 44 554654 4663 666 866 6666666656 663 66 66 266666 60 6666 666 6666 66 6 54 6666626666 6 666 66 6 66 66 6 2 66 62666 26 666626 22265266 2 22 226 26666266 2 22 222222262622 2 22 22222222 22 222 2 22 22 222 222 222222 222 22 2 22 22222 222 2222 22 222 −0.04 −0.02 0.02 1st Canonical Variate 0.04 0.06 0.08 Fig 7.4 Visualization of Optdata in the canonical spaces obtained by WMKCCA The v1, v2, v3 values in the figures are respectively the weights assigned to pen data, optical data, and the label data 7.7 Summary 189 Visualization of PenData 0.1 0.08 2nd Canonical Variate 0.06 00 00 0000 00 00 00 00 0 000 00 00 00 00 0.04 0.02 988888 88 88888 8888 88 8 8 731 559 71 77 7 77 95 222 999 99 2 3 11 317 99 111 3553555 11 71 99 9999 599 155 55 5 444444 15 4 444444 44 4444 44 44 44 4444 −0.02 −0.04 6 66 66 66 6666 66 6 6 6 66666 66 66 66 66 66 66 6666 −0.06 −0.08 −0.1 −0.1 −0.05 1st Canonical Variate 0.05 0.1 Visualization of OptData 0.1 0.08 0.06 11 11 111111111 11811 18 11 88 11 11 1111 81 111 1 88 81 11 8 11 81 88 88 81888 88 11 181 111 88 08 8888 11 81888 18181 888110 08 188 7 777 118 088 7777 7 74 777 77 777 009000 77 77777 11 777 77 77 05 7474944 77 77 0400 955 00 000990 040 7777 7777 0 9 00 4 4 9 59 05 400 99 000 559 59 55 9399 4444 77 60 44 4 44 5 4 44 4 0 5 5 9 5 9 599 35 999 4 96 05 55 595 59 0500 04444 55 5 95 3365 95 95 59 99 953399 5090044 44444445 60355 832 3333 33365 333 3335390 05696 99696 44 33 333333 329 33 6669 66 56 66 3633336633636 06666 6 6 6 6 66 66 66 666 6666 66666 2626666626 2222222 22 222 222 22 222 2222 2 2222 22222 2 22 22222 2 0.04 0.02 −0.02 −0.04 −0.06 −0.08 −0.1 −0.1 −0.05 1st Canonical Variate 0.05 0.1 Fig 7.5 Visualization of PenData (top) and Optdata (bottom) independently in the canonical spaces obtained by KCCA 7.7 Summary In this chapter we proposed a new weighted formulation of kernel CCA on multiple sets Using low rank approximation and incremental EVD algorithm, the WMKCCA is applicable in machine learning problems as a flexible model to extract common information among multiple data sources We tried some preliminary experiments to demonstrate the effect The CCA based data fusion is in a different paradigm than the MKL method introduced in previous chapters The multiple data sources are not merged, whereas the merit of data fusion relies in the subspace spanned by 190 Weighted Multiple Kernel Canonical Correlation the canonical vectors In machine learning, the projections of data in these canonical spaces may be useful and more significant to detect the common underlying patterns reside in multiple sources References Akaho, S.: A kernel method for canonical correlation analysis In: Proc of the International Meeting of Psychometric Society 2001 (2001) Bach, F.R., Jordan, M.I.: Kernel independent component analysis Journal of Machine Research 3, 1–48 (2003) Bengio, Y., Paiement, J.F., Vincent, P.: Out-of-Sample Extensions for LLE, Isomap, MDS, Eigenmaps, and Spectral Clustering Advances in Neural Information Processing Systems 15, 177–184 (2003) Chang, Y.I., Lee, Y.J., Pao, H.K., Lee, M., Huang, S.Y.: Data visualization via kernel machines Technical report, Institute of Statistical Science, Academia Sinica (2004) Gretton, A., Herbrich, R., Smola, A., Bousquet, O., Scholkopf, B.: Kernel methods for measuring independence Journal of Machine Research 6, 2075–2129 (2005) Hardoon, D.R., Shawe-Taylor, J.: Canonical Correlation Analysis: An Overview with Application to Learning Methods Neural Computation 16, 2639–2664 (2004) Holmstrom, L., Hoti, F.: Application of semiparametric density estimation to classification In: Proc of ICPR 2004, pp 371–374 (2004) Hotelling, H.: Relations between two sets of variates Biometrika 28, 321–377 (1936) Kettenring, J.R.: Canonical analysis of several sets of variables Biometrika 58, 433–451 (1971) 10 Kim, H.C., Pang, S., Je, H.M., Bang, S.Y.: Pattern classification using support vector machine ensemble In: Proc of 16th International Conference on Pattern Recognition, pp 160–163 (2002) 11 Oliveira, A.L.I., Neto, F.B.L., Meira, S.R.L.: Improving rbfdda performance on optical character recognition through parameter selection In: Proc of 18th International Conference on Pattern Recognition, pp 625–628 (2004) 12 Yu, S., De Moor, B., Moreau, Y.: Learning with heterogeneous data sets by Weighted Multiple Kernel Canonical Correlation Analysis In: Proc of the Machine Learning for Signal Processing XVII IEEE, Los Alamitos (2007) Chapter Cross-Species Candidate Gene Prioritization with MerKator 8.1 Introduction In modern biology, the use of high-throughput technologies allows researchers and practicians to quickly and efficiently screen the genome in order to identify the genetic factors of a given disorder However these techniques are often generating large lists of candidate genes among which only one or a few are really associated to the biological process of interest Since the individual validation of all these candidate genes is often too costly and time consuming, only the most promising genes are experimentally assayed In the past, the selection of the most promising genes relied on the expertise of the researcher, and its a priori opinion about the candidate genes However, in silico methods have been developed to deal with the massive amount of complex data generated in the post-sequence era In the last decade, several methods have been developed to tackle the gene prioritization problem (recently reviewed in [13]) An early solution was proposed by Turner et al who proposed POCUS in 2003 [14] POCUS relies on Gene Ontology annotations, InterPro domains, and expression profiles to identify the genes potentially related to the biological function of interest The predictions are made by matching the Gene Ontology annotations, InterPro domains and expression profile of the candidate genes to the ones of the genes known to be involved in the biological function of interest The system favors the candidate genes that exhibit similarities with the already known genes Most of the proposed prioritization methods also rely on this ‘guilt-by-association’ concept Several methods rely solely on text-mining but nowadays most of the novel methods combine textual information with experimental data to leverage the effect between reliability and novelty Most of the existing approaches are restricted to integrating information in a single species Recently, people have started to collect phylogenetic evidences among multiple species to facilitate the prioritization of candidate genes Chen et al proposed ‘ToppGene’ that performs prioritization for human based on human data (e.g., functional annotations, proteins domains) as well as mouse data (i.e., phenotype S Yu et al.: Kernel-based Data Fusion for Machine Learning, SCI 345, pp 191–205 springerlink.com © Springer-Verlag Berlin Heidelberg 2011 192 Cross-Species Candidate Gene Prioritization with MerKator data) [3] Through an extensive validation, they showed the utility of mouse phenotype data in human disease gene prioritization Hutz et al [5] have developed CANDID, an algorithm that combines cross-species conservation measures and other genomic data sources to rank candidate genes that are relevant to complex human diseases In their approach, they adopted the NCBI’s HomoloGene database that analyzes genes from 18 organisms and collects homologs using amino acid and DNA sequences Liu et al have investigated the effect of adjusting gene prioritization results by cross-species comparison They identified the ortholog pairs between Drosophila melanogaster and Drosophila pseudoobscura by BLASTP and used this cross-species information to adjust the rankings of the annotated candidate genes in D melanogaster They report that a candidate gene with a lower score in the main species (D melanogaster) may be re-ranked higher if it exhibits strong similarity to orthologs in coding sequence, splice site location, or signal peptide occurrence [6] According to the evaluation on the test set of 7777 loci of D melanogaster, the cross-species model outperforms other single species models in sensitivity and specificity measures Another related method is String developed by von Mering et al [15] String is a database that integrates multiple data sources from multiple species into a global network representation In this paper, we present MerKator, whose main feature is the cross-species prioritization through genomic data fusion over multiple data sources and multiple species This software is developed on the Endeavour data sources [1, 12] and a kernel fusion novelty detection methodology [4] To our knowledge, MerKator is one of the first real bioinformatics softwares powered by kernel methods It is also one of the first cross-species prioritization softwares freely accessible online In this chapter, we present and discuss the computational challenges inherent to such implementation We also present a benchmark analysis, through leave-one-out cross-validation, that shows the efficiency of the cross-species approach 8.2 Data Sources The goal of MerKator is to facilitate the understandings of human genetic disorders using genomic information across organisms MerKator identifies the homologs of Homo sapiens, denoted as the main organism, in four reference organisms: Mus musculus, Rattus norvegicus, Drosophila melanogaster, and Caenorhabditis elegans The identification is based on NCBI’s HomoloGene [8, 16, 17], which provides the mapping of homologs among the genes of 18 completely sequenced eukaryotic genomes For each gene in each organism, MerKator stores the homolog pair with the lowest ratio of amino acid differences (the Stats-prot-change field in HomoloGene database) MerKator incorporates 14 genomic data sources in multiple species for gene prioritization The complete list of the data sources adopted in the current version is presented in Table 8.1 8.2 Data Sources 193 Training genes and Candidate genes Prioritization by Homo sapiens Training genes and Candidate genes Prioritization Prioritizationby by Homo sapiens Mus musculus Training genes and Candidate genes Prioritization by Rattus norvegicus Training genes and Candidate genes Prioritization by C’ elegans Training genes and Candidate genes Prioritization by D’ melanogaster Cross-species Prioritization Fig 8.1 Conceptual overview of Endeavour MerKator software The clip arts of species obtained from Clker.com by Brain Waves LLC Table 8.1 Genomic data sources adopted in Endeavour MerKator data source Annotation GO Annotation-Interpro Annotation-EST Sequence-BLAST Annotation-KEGG Expression-Microarray Annotation-Swissprot Text Annotation-Phenotype Annotation-Insitu Motif Interaction-Bind Interaction-Biogrid Interaction-Mint H.sapiens √ √ √ √ √ √ √ √ √ √ M.musculus √ √ √ √ √ √ √ R.norvegicus D.melanogaster C.elegans √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ 194 8.3 Cross-Species Candidate Gene Prioritization with MerKator Kernel Workflow MerKator applies 1-SVM method [4, 9, 11] to obtain prioritization scores within a single organism Then the prioritization scores obtained from multiple species are integrated using a Noisy-Or model As mentioned, MerKator is a real bioinformatics software powered by kernel methods therefore many challenges are tackled in its design and implementation Considering the efficiency of kernel methods implemented in real full-genomic scale application, MerKator separates the program into the offline process and the online process to improve its efficiency 8.3.1 Approximation of Kernel Matrices Using Incomplete Cholesky Decomposition The main computational burden is the kernel computation of various data sources in the full genomic scale, especially for the data that is represented in high dimensional space, such as Gene Ontology annotations, gene sequences, and text-mining among others To tackle this difficulty, MerKator manages all the kernel matrices in an offline process using a Matlab-Java data exchange tool In Matlab, the tool retrieves the genomic data from the databases and construct the kernel matrices The kernel matrices of the full genomic data may be very large so it is not practical to handle them directly in the software To solve this, we decompose all the kernel matrices with ICD (Incomplete Cholesky Decomposition), thus the dimensions of the decomposed kernel matrices are often smaller than the original data In MerKator, the precision of the ICD is set as 95% of the matrix norm, given by ||K − K ||2 ≤ 0.05, ||K||2 (8.1) where K is the original kernel matrix, K is the approximated kernel matrix as the inner product of the ICD matrix In this way the computational burden of kernel calculation is significantly reduced as the computation of the inner product of the decomposed matrices The Matlab-Java tool creates Java objects on the basis of decomposed kernel matrices in Matlab and stores them as serialized Java objects The kernel computation, its decomposition and the Java object transformation are computationally intensive processes, and so they are all executed offline For the online process, MerKator loads the decomposed kernel matrices from the serialized java objects, reconstructs the kernel matrices and solve the 1-SVM MKL optimization problem to prioritize the genes as already described in De Bie et al [4] Then the prioritization results are displayed on the web interface In contrast with the offline process, the online process is less computational demanding and the complexity is mainly determined by the d number of training genes (O(d )) In our implementation, the optimization solver is based on the Java API of MOSEK[2] that shows satisfying performance Decompose kernels on cluster machines ENDEAVOUR database OFFLINE Create kernels of full genome in Matlab 195 Store decomposed kernels as serialized Java objects ONLINE 8.3 Kernel Workflow 1-SVM kernel fusion and scoring Reconstruct kernels at runtime KEndeavour API Web interface JAMA API Fig 8.2 Separation of offline and online processes in MerKator 8.3.2 Kernel Centering In MerKator, when the prioritization task involves data set of the full genomic size, some trivial operations become quite inefficient To control the number of false positive genes in 1-SVM, De Bie et al suggest a strategy to center the kernel matrices that contain both the training genes and the test genes on the basis of the iid assumption As mentioned in the work of Shawe-Taylor and Cristianini [10], the kernel centering operation expressed on the kernel matrix can be written as 1 Kˆ = K − 11T K − K11T + (1T K1)11T , l l l (8.2) where l is the dimension of K, is the all 1s vector, T is the vector transpose Unfortunately, when the task is to prioritize the full genomic data, centering the full genome kernel matrices becomes very inefficient For MerKator, we use a strategy based on the split of the full genomic data into smaller subsets Let us assume that the full genome data contains N genes, and is split into several subsets containing M genes Instead of centering the kernel matrix sizes of N × N , we center the kernel matrix of size A × A , where A is the number of genes in the union of the M candidate genes with the training genes Because M is smaller than N , for each centered kernel matrix MerKator obtains the prioritization score of M candidate genes, so it need to iterate multiple times (denoted as k, which is the smallest integer larger than N M ) to calculate the scores of all the N candidate genes According to the iid assumption, if M is large enough then centering the kernel matrix of size A × A is statistically equivalent to centering the kernel matrix of the full genome, thus the prioritization scores obtained from the k iterations can precisely approximate the values obtained when centering the full genome data Therefore, we may compare the prioritization scores of the N genes even if they are obtained from different centered matrices, and thus we can prioritize the full genome All 196 Cross-Species Candidate Gene Prioritization with MerKator these assumptions come to one non-trivial question: how to select the appropriate M to trade off between the reliability of iid assumption and the computational efficiency? In MerKator, M is determined via experiments conducted on the text mining data source with a set of 20 human training genes First, a prioritization model is built and the 22743 human genes are scored by centering the linear kernel matrix of the full genome The obtained values are regarded as the true prioritization scores, denoted as f We also calculate the overall computation time, denoted as t To benchmark the effect of M , we try 10 different values from 1000 to 10000 In each iteration, the 20 training genes are mixed with M randomly selected candidate genes and the prioritization scores of the candidate genes are computed by centering the small kernel matrix In the next iteration, we select M new candidate genes until all the 22743 genes are prioritized The prioritization scores obtained by centering this small kernel matrix are denoted as f , and the computation time is also compared The difference (error) between the prioritization scores obtained in these two approaches represents how well the M candidate genes approximates the iid assumption of the full genome, and is given by e= || f − f ||2 || f ||2 (8.3) We use this difference to find the optimal M According to the benchmark result presented in Table 8.2, large M values lead to small error but take much longer time for the program to center the kernel matrix In MerKator, we set the M to 4000, which represents a balance between a low error (e < 0.05) and a fast computing time (16 times faster than centering the full genome) Table 8.2 The approximation error and the computational time of using M randomly selected genes in kernel matrix centering M 22,743 10000 9000 8000 7000 6000 5000 4000 3000 2000 1000 e 0.015323701440092 0.022324135658694 0.028125449554702 0.048005271001603 0.041416998355952 0.048196878290559 0.045700854755551 0.087474107488752 0.098294618397952 0.136241837096454 time(seconds) 11969 4819.2 3226.3 2742.0 2135.2 1638.2 1117.0 745.40 432.76 191.95 72.34 8.4 Cross-Species Integration of Prioritization Scores 8.3.3 197 Missing Values In bioinformatics applications, clinical and genomic datasets are often incomplete and contain missing values This is also true for the genomic data sources that underly MerKator, for which a significant number of genes are missing In MerKator, the missing gene profiles are represented as zeros in the kernel matrices mainly for computational convenience However, zeros still contain strong information so that they may lead to imprecise prioritization scores In MerKator, kernel matrices are linearly combined to create the global kernel that is used to derive the prioritization scores In order to avoid relying on missing data for this calculation (and therefore to favor the well studied genes), we use a strategy illustrated in Supplementary Figure 8.2 to combine kernel matrices with missing values This strategy is similar to what is done within Endeavour For a given candidate gene, only the non-missing based scores are combined to calculate the overall score The combined kernel matrix obtained by this strategy is still a valid positive semi-definite kernel and thus the obtained prioritization scores only rely on the non-missing information gene a K2 K1 ș1 gene b + ș2 ȍ = ș1K1(xi,yj)+ș2K2(xi,yj) K2(a,yj) K1(b,yj) c is missing gene c Fig 8.3 Kernel fusion with missing values Suppose gene a and gene c are missing in the first kernel K1; gene b and gene c are missing in the second kernel K2; θ1 , θ2 are the kernel coefficients In the combined kernel Ω , we fill the missing values of gene a by the nonmissing information in K2 and gene b by the non-missing information in K1 The gene c is missing in all data sources so it will not be prioritized in MerKator For the case with more than data sources, the coefficients of missing values are recalculated by considering non-missing sources only 8.4 Cross-Species Integration of Prioritization Scores MerKator first uses the 1-SVM algorithm to prioritize genes in a single species, and then adopts a Noisy-Or model [7] to integrate prioritization scores from multiple species We assume the scenario of cross-species prioritization as depicted in Figure 8.1 Similar to Endeavour, MerKator takes a machine learning approach by building a disease-specific model on a set of disease relevant genes, denoted as training set, then that model is used to rank the candidate genes, denoted as candidate set, according to their similarities to the model 198 Cross-Species Candidate Gene Prioritization with MerKator training genes test genes reference organisms R1 a3 a2 H1 R0 c0 main organism f1 a1 R2 f0 H2 H0 H3 d0 b1 b2 M1 M2 homology scores of training genes f2 prioritization scores M0 homology scores of test genes Fig 8.4 Integration of cross-species prioritization scores Some fundamental notions in cross-species gene prioritization are illustrated in Figure 8.4 Suppose in the main organism we specify N1 number of human genes as {H1 , , HN1 } and MerKator obtains the corresponding training sets in reference species rat and mouse The training set of rat contains N2 genes as {R1 , , RN2 } and the training set of mouse has N3 genes as {M1 , , MN3 } Note that MerKator always selects the homolog with the highest similarity ratio of sequence, so it is a many-to-one mapping thus N2 , N3 are always smaller or equal to N1 We define the homolog scores between the training sets of human and rat as a1 , , aN2 ; Similarly, the homolog scores between human and mouse training sets are b1 , , bN3 For the candidate set, each candidate gene of human is mapped to at most one rat gene and one mouse gene, where the homolog score is respectively denoted as c0 and d0 The homolog genes and the associated scores are all obtained from the NCBI HomoloGene database (release 63) To calculate the cross-species prioritization score, we introduce a set of utility parameters as follows We denote h1 and h2 as the parameters describing the quality of the homology, given by: h1 = min{c0 , median(a1 , a2 , , aN2 )}, h2 = min{d0 , median(b1 , b2 , , bN3 )} 8.4 Cross-Species Integration of Prioritization Scores 199 z1 and z2 are denoted as the parameters describing the ratio of the number of homologs in the reference organism with the number of genes in the main organism, given by z1 = N2 N3 , z2 = N1 N1 (8.4) Next, we denote f0 as the prioritization score of candidate gene H0 ranked by the training set {H1 , , HN1 }; denote f1 as the score of reference candidate gene R0 prioritized by the reference training set {R1 , , RN2 } and f2 as the score of M0 ranked by the set {M1 , , MN3 } The raw prioritization scores obtained by 1-SVM are in the range of [−1, +1], thus we scale them into [0, +1] The adjustment coefficient ad j is defined as: ad j = − ∏ (1 − hizi fi ) (8.5) organism i The ad j coefficient combines information from multiple species by the Noisy-Or model A larger ad j means there is strong evidence from the homologs that the candidate gene is relevant to the model Considering the case one may want to eliminate the homolog bias, we further correct the ad j parameter, denoted as ad j+ , given by ad j+ = median({ad j}), − {∏organism i (1 − hizi fi )} if j has no homolog k if j has homolog(s) (8.6) The first case of equation (8.6) means that when gene j has no homolog related, its ad j+ score equals to the median value of the set {ad j} that contains the adjustment values of the genes that have at least one homolog gene In the second case, when there are k number of homologs mapped to gene j, we use the k-th exponential root removes the additional bias of the prioritization score caused by the multiple homologs This coefficient ad j+ is used to adjust f0 , the prioritization score of the main organism, and we have tried two different versions as follows: human non-special: fcross-species = − (1 − f0)(1 − ad j+), (8.7) and human special: fcross-species = − (1 − f0 )(2 − ad j+) (8.8) The human non-special version considers the human prioritization score as equivalent to the homology evidence and combines them again using the Noisy-Or function In contrast, the human special version only adjusts the human prioritization score with the homology evidence by average In the Noisy-Or integration, the cross-species score is boosted up if either the main species or the homology 200 Cross-Species Candidate Gene Prioritization with MerKator evidence shows good prioritization score In the average score integration, the crossspecies score compromises between the homology evidence and the main species score, and is only boosted up if both of them are good 8.5 Software Structure and Interface This section presents the interface of the software and explains how MerKator works Using MerKator, a prioritization can be prepared in steps (see Figure 8.5) In the first step, the user has to define the main organism, it will be the reference organism and will be used to input the training and candidate genes In addition, the user can select other organisms to use, the corresponding species specific data sources will then be included further in the analysis If no other organism is selected, the results are only based on the main organism data sources In a second step, the training genes are inputed Genes from the main organism can be input using various gene identifiers (e.g., EnsEMBL, gene name, EntrezGene) or even pathway identifiers from KEGG or Gene Ontology In addition, for human, an OMIM entry number can be inputted Genes are loaded into the system using the ‘Add’ button In the third step, the data sources to be used are selected by checking the corresponding boxes By default, only the data sources of the main organism are displayed and the program is automatically selecting the corresponding data sources in the reference organisms when available To have a full control on the data sources, the user must enter the advanced mode by clicking the dedicated button Using the advanced mode, data sources from other organisms can be selected individually In the fourth step, the candidate genes to prioritize are inputted The user has two possibilities, Fig 8.5 Typical MerKator workflow This includes the species selection step (first step - top left), the input of the training genes (second step - top right), the selection of the data sources (third step - bottom left) and the selection of the candidate genes (fourth step - bottom right) Screenshots were taken from our online web server ... Yves Moreau Kernel- based Data Fusion for Machine Learning, 2011 ISBN 978-3-642-19405-4 Shi Yu, Léon-Charles Tranchevent, Bart De Moor, and Yves Moreau Kernel- based Data Fusion for Machine Learning. .. exquisiteness of learning, has just begun S Yu et al.: Kernel- based Data Fusion for Machine Learning, SCI 345, pp 1 26 springerlink.com © Springer-Verlag Berlin Heidelberg 2011 Introduction Learning. .. as machine learning and data mining The background required of the reader is a good knowledge of data mining, machine learning and linear algebra This book is the product of our years of work in

Ngày đăng: 05/11/2019, 13:14

Từ khóa liên quan

Mục lục

  • Cover

  • Studies in Computational Intelligence, 345

  • Kernel-based Data Fusion for Machine Learning

  • ISBN 9783642194054

  • Preface

  • Contents

  • 1 Introduction

    • General Background

    • Historical Background of Multi-source Learning and Data Fusion

      • Canonical Correlation and Its Probabilistic Interpretation

      • Inductive Logic Programming and the Multi-source Learning Search Space

      • Additive Models

      • Bayesian Networks for Data Fusion

      • Kernel-based Data Fusion

      • Topics of This Book

      • Chapter by Chapter Overview

      • References

      • 2 Rayleigh Quotient-Type Problems in Machine Learning

        • Optimization of Rayleigh Quotient

          • Rayleigh Quotient and Its Optimization

          • Generalized Rayleigh Quotient

          • Trace Optimization of Generalized Rayleigh Quotient-Type Problems

          • Rayleigh Quotient-Type Problems in Machine Learning

            • Principal Component Analysis

            • Canonical Correlation Analysis

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan