Skip to main content

Efficient, sparse biological network determination

Abstract

Background

Determining the interaction topology of biological systems is a topic that currently attracts significant research interest. Typical models for such systems take the form of differential equations that involve polynomial and rational functions. Such nonlinear models make the problem of determining the connectivity of biochemical networks from time-series experimental data much harder. The use of linear dynamics and linearization techniques that have been proposed in the past can circumvent this, but the general problem of developing efficient algorithms for models that provide more accurate system descriptions remains open.

Results

We present a network determination algorithm that can treat model descriptions with polynomial and rational functions and which does not make use of linearization. For this purpose, we make use of the observation that biochemical networks are in general 'sparse' and minimize the 1-norm of the decision variables (sum of weighted network connections) while constraints keep the error between data and the network dynamics small. The emphasis of our methodology is on determining the interconnection topology rather than the specific reaction constants and it takes into account the necessary properties that a chemical reaction network should have – something that techniques based on linearization can not. The problem can be formulated as a Linear Program, a convex optimization problem, for which efficient algorithms are available that can treat large data sets efficiently and uncertainties in data or model parameters.

Conclusion

The presented methodology is able to predict with accuracy and efficiency the connectivity structure of a chemical reaction network with mass action kinetics and of a gene regulatory network from simulation data even if the dynamics of these systems are non-polynomial (rational) and uncertainties in the data are taken into account. It also produces a network structure that can explain the real experimental data of L. lactis and is similar to the one found in the literature. Numerical methods based on Linear Programming can therefore help determine efficiently the network structure of biological systems from large data sets. The overall objective of this work is to provide methods to increase our understanding of complex biochemical systems, particularly through their interconnection and their non-equilibrium behavior.

Background

Determining the interaction topology in large-scale biological systems has been an active area of research for some time now. Most methodologies that deal with high-throughput experimental data make use of information about the behavior of the system locally around the steady-state [13]. For example, a class of techniques that fall under the rubric of 'stationary state Jacobian Matrix Elements' analyzes the system behavior when it is perturbed locally from steady-state and looks at whether the concentration of one species is increased or decreased when another species' concentration is increased. In [4] and [5], the authors have built on this approach and determined the functional interactions in cellular signaling and gene networks by taking into account the 'modular' structure of the networks in question. Alternatively, inferences about the topology of the network can be made by introducing pulse changes in concentration of a chemical species in the network, and observing the network's response, concluding causal chemical connectivities [6]. In [3], a linear dynamical system was considered to represent a gene regulatory network, and an approach, based on Linear Programming, was proposed in order to obtain the sparsest network structure from genetic perturbation experiments.

However, most information of the system dynamics is in its transient behavior and, more importantly, many reactions that the living cell requires are actually for most of the time far from steady state [7]. The problem of determining the network structure in the case where transient time-series data for non-equilibrium behavior are available is much harder and this has been an active area of research for over a decade. The reason is that while such data are often abundant due to the development of high-throughput, effective experimental techniques, at the same time, a high computational effort is required to extract information about the network structure using traditional techniques. A recent review of available techniques can be found in [8] or [9], but earlier articles, such as [10], also list several approaches to this network identification problem.

In actual fact, identifying the interconnection topology in biological and biochemical systems is of greater importance than extracting the parameters (the rates of the various reactions) that best fit the particular time series data. There are several reasons for this: first, the parameters are often collected under noisy experimental conditions and are sensitive to the laboratory environment. Second, as is often the case with large networks, persistence of observed phenomena is robust to a large range of most parameter values and therefore identifying these parameters exactly is not of great interest. Indeed, chemical reaction networks often have the same functionality in the neighborhood of most of the nominal reaction rates. But most importantly, networks are rarely robust to the random rewiring of the underlying interconnection structure and hence determining the network connectivity is much more important than determining the kinetic parameters that fit the particular data.

In this paper, we first consider chemical reaction networks with mass action kinetics (see references [11] and [12]) and seek to identify the chemical pathways and mechanisms, that is, how the chemical complexes interact within the chemical network. Chemical reaction networks are dynamical systems of the form

x ˙ = A f ( x ) , x n , A n × m , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaiaacqGH9aqpcqWGbbqqcqWGMbGzcqGGOaakcqWG4baEcqGGPaqkcqGGSaalcaaMc8UaemiEaGNaeyicI48efv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacqWFDeIudaahaaWcbeqaaiabd6gaUbaakiabcYcaSiaaykW7cqWGbbqqcqGHiiIZcqWFDeIudaahaaWcbeqaaiabd6gaUjabgEna0kabd2gaTbaakiabcYcaSaaa@51F6@
(1)

where the unknown matrix encompassing the connectivity structure is A and the vector of functions f: nm(which need to satisfy appropriate smoothness conditions to ensure local existence and uniqueness of solutions) is known. This makes (1) linear in the unknown parameters. Our main objective is to provide a procedure to identify the interconnection topology that is encapsulated in A, given experimental time-series data.

An important property of the network given by A is sparseness, i.e., it has much less edges than the full graph with the same vertex set. In this paper, we extend the results in [13] that focus on obtaining sparse interconnection networks from experimental data to general and large-scale networks. We apply the presented methodology in order to reconstruct a biochemical network from mock-up experimental data obtained through simulations. More importantly, we show its validity in determining the glycolytic pathway of Lactococcus lactis from real experimental data. Although this pathway has been investigated in great detail (see for example, [1416]) and is the test object of many system identification approaches as a recent paper fittingly notes in its title, it is 'an unfinished systems biological case study' [14].

Finally, we suggest how the method of identifying connectivity for systems of the form (1) can be adjusted to determine the structure of gene regulatory networks, in which the unknown parameters do not enter the system dynamics in an affine way. We then apply the methodology in order to reconstruct a gene regulatory network from mock-up experimental data obtained through simulations.

Notation

, n, m × nis the set of all real numbers, real vectors of length n, m × n real matrices

A ij (i, j)th is the (i, j) entry of matrix A m × n

+ n , ¯ + n MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWefv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacqWFDeIudaqhaaWcbaGaey4kaScabaGaemOBa4gaaOGaeiilaWIaf8xhHiLbaebadaqhaaWcbaGaey4kaScabaGaemOBa4gaaaaa@3D8B@ :{x n: x i > 0, i = 1, ..., n}, {x n: x i ≥ 0, i = 1, ..., n}

vec(A) is a vector which contains the columns of A stacked one below each other

e =[1, 1, , 1]T

diag(A), A n × nis a vector of length n, where (diag(A)) i = A ii

diag(x), x nis a matrix in n × n, where (diag(x)) ii = x i and (diag(x)) ij = 0 if ji

Methods

Chemical reaction networks

Chemical reaction networks are used to describe and understand biological processes. An illustrative example is the following reaction network proposed by Michaelis and Menten for chemical reactions involving enzymes,

E + S k 1 k 1 E S k 2 k 2 E + P . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemyrauKaey4kaSIaem4uam1aa4qdaSqaaiabdUgaRnaaBaaameaacqaIXaqmaeqaaaWcbaGaem4AaS2aaSbaaWqaaiabgkHiTiabigdaXaqabaaakiaawkzicaGLqgcacqWGfbqrcqWGtbWudaGdnaWcbaGaem4AaS2aaSbaaWqaaiabikdaYaqabaaaleaacqWGRbWAdaWgaaadbaGaeyOeI0IaeGOmaidabeaaaOGaayPKHiaawcziaiabdweafjabgUcaRiabdcfaqjabc6caUaaa@4701@
(2)

Here, S denotes the substrate, E the enzyme, ES the enzyme-substrate complex and P the final product. They are the so called species that participate in the reactions. The positive constants k1, k-1, k2 and k-2 are the reaction rate constants, edges represent reactions and vertices represent complexes (the objects that appear before and after the reaction arrows).

In chemical kinetics, it is common to assume that the dynamics of the chemical reaction network (such as the one given by (2)) can be described by the following set of nonlinear ODEs [17]:

d x d t x ˙ = N v ( x ) , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaqcfa4aaSaaaeaacqWGKbazcqWG4baEaeaacqWGKbazcqWG0baDaaGccqWICjcqcuWG4baEgaGaaiabg2da9iabd6eaojabdAha2jabcIcaOiabdIha4jabcMcaPiabcYcaSaaa@3CD3@
(3)

where v(x) is the rate vector (or flux vector), x is the concentration vector of the different species and N is the stoichiometric matrix. If p molecules of species i appear before the reaction arrow in reaction j then N ij = -p and if they appear after then N ij = p.

The description given by (3) hides the underlying chemical network structure, which we aim to determine in this paper. Hence, in the following, we introduce the notation used in chemical reaction network theory, which decomposes N and v(x) into: the so called bookkeeping matrix Y, which maps the space of complexes into the space of species; the concentration vector of the different complexes Ψ(x); and matrix A κ , which defines the network structure. For the Michaelis-Menten reaction, the vectors of species and complexes are given by

x = [ [ E ] [ S ] [ E S ] [ P ] ]  and  Ψ ( x ) = [ [ E ] [ S ] [ E S ] [ E ] [ P ] ] , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemiEaGNaeyypa0ZaamWaaeaafaqabeabbaaaaeaacqGGBbWwcqWGfbqrcqGGDbqxaeaacqGGBbWwcqWGtbWucqGGDbqxaeaacqGGBbWwcqWGfbqrcqWGtbWucqGGDbqxaeaacqGGBbWwcqWGqbaucqGGDbqxaaaacaGLBbGaayzxaaGaeeiiaaIaeeyyaeMaeeOBa4MaeeizaqMaeeiiaaIaeuiQdKLaeiikaGIaemiEaGNaeiykaKIaeyypa0ZaamWaaeaafaqabeWabaaabaGaei4waSLaemyrauKaeiyxa0Laei4waSLaem4uamLaeiyxa0fabaGaei4waSLaemyrauKaem4uamLaeiyxa0fabaGaei4waSLaemyrauKaeiyxa0Laei4waSLaemiuaaLaeiyxa0faaaGaay5waiaaw2faaiabcYcaSaaa@61BC@

respectively. The elements of the i th row of matrix Y tell us in which complexes species i appears and how often; or, equivalently, the entries to the j th column tell us of how much of each species complex j is made of. For (2),

Y = [ 1 0 1 1 0 0 0 1 0 0 0 1 ] . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemywaKLaeyypa0ZaamWaaeaafaqabeabdaaaaeaacqaIXaqmaeaacqaIWaamaeaacqaIXaqmaeaacqaIXaqmaeaacqaIWaamaeaacqaIWaamaeaacqaIWaamaeaacqaIXaqmaeaacqaIWaamaeaacqaIWaamaeaacqaIWaamaeaacqaIXaqmaaaacaGLBbGaayzxaaGaeiOla4caaa@3C87@

Matrix K is the transpose of the weighted adjacency matrix of the digraph representing the chemical reaction network; that is, entry K ij is nonnegative and corresponds to the rate constant associated with the reaction from complex j to i. The so called kinetic matrix A κ is given by A κ = K - diag(KTe). For (2),

K = [ 0 k 1 0 k 1 0 k 2 0 k 2 0 ]  and  A κ = [ k 1 k 1 0 k 1 ( k 1 + k 2 ) k 2 0 k 2 k 2 ] . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaem4saSKaeyypa0ZaamWaaeaafaqabeWadaaabaGaeGimaadabaGaem4AaS2aaSbaaSqaaiabgkHiTiabigdaXaqabaaakeaacqaIWaamaeaacqWGRbWAdaWgaaWcbaGaeGymaedabeaaaOqaaiabicdaWaqaaiabdUgaRnaaBaaaleaacqGHsislcqaIYaGmaeqaaaGcbaGaeGimaadabaGaem4AaS2aaSbaaSqaaiabikdaYaqabaaakeaacqaIWaamaaaacaGLBbGaayzxaaGaeeiiaaIaeeyyaeMaeeOBa4MaeeizaqMaeeiiaaIaemyqae0aaSbaaSqaaiabeQ7aRbqabaGccqGH9aqpdaWadaqaauaabeqadmaaaeaacqGHsislcqWGRbWAdaWgaaWcbaGaeGymaedabeaaaOqaaiabdUgaRnaaBaaaleaacqGHsislcqaIXaqmaeqaaaGcbaGaeGimaadabaGaem4AaS2aaSbaaSqaaiabigdaXaqabaaakeaacqGHsislcqGGOaakcqWGRbWAdaWgaaWcbaGaeyOeI0IaeGymaedabeaakiabgUcaRiabdUgaRnaaBaaaleaacqaIYaGmaeqaaOGaeiykaKcabaGaem4AaSMaeyOeI0IaeGOmaidabaGaeGimaadabaGaem4AaS2aaSbaaSqaaiabikdaYaqabaaakeaacqGHsislcqWGRbWAdaWgaaWcbaGaeyOeI0IaeGOmaidabeaaaaaakiaawUfacaGLDbaacqGGUaGlaaa@6C3D@

In chemical reaction network theory, it is common to assume mass action kinetics. The law of mass action assumes that if reactions take place at constant temperature in a homogenous and well mixed solution then the probability of a collision between molecules is proportional to the product of their concentrations. This means that ln Ψ(x) = YT ln x, and one reformulates the set of nonlinear ODEs given by (3) as [18]:

x ˙ = Y A κ Ψ ( x ) . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaiaacqGH9aqpcqWGzbqwcqWGbbqqdaWgaaWcbaGaeqOUdSgabeaakiabfI6azjabcIcaOiabdIha4jabcMcaPiabc6caUaaa@3877@
(4)

In general, we assume that a chemical reaction network has n species and m complexes. Thus, in (4): x ¯ + n MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWefv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacuWFDeIugaqeamaaDaaaleaacqGHRaWkaeaacqWGUbGBaaaaaa@3918@ , Ψ(x) ¯ + m MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWefv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacuWFDeIugaqeamaaDaaaleaacqGHRaWkaeaacqWGTbqBaaaaaa@3916@ , A κ m × m, and Y ¯ + n × m MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemywaKLaeyicI48efv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacuWFDeIugaqeamaaDaaaleaacqGHRaWkaeaacqWGUbGBcqGHxdaTcqWGTbqBaaaaaa@3F51@ . Experimental data is stacked in vector Ψ(x) and often matrix Y is known such that we can explicitly search for the network structure given by A κ . Finally, for clarity, we provide the expanded ODE representation of the Michaelis-Menten reaction given by (2):

[ E ˙ ] = k 1 [ E ] [ S ] + ( k 1 + k 2 ) [ E S ] k 2 [ E ] [ P ] , [ S ˙ ] = k 1 [ E ] [ S ] + k 1 [ E S ] , [ E ˙ S ] = k 1 [ E ] [ S ] ( k 1 + k 2 ) [ E S ] + k 2 [ E ] [ P ] , [ P ˙ ] = k 2 [ E S ] k 2 [ E ] [ P ] . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@B263@
(5)

Determining affine and sparse interconnections in dynamical systems

Consider a dynamical system of the following form:

x ˙ = A f ( x ) , x n , A n × m , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaiaacqGH9aqpcqWGbbqqcqWGMbGzcqGGOaakcqWG4baEcqGGPaqkcqGGSaalcaaMc8UaemiEaGNaeyicI48efv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacqWFDeIudaahaaWcbeqaaiabd6gaUbaakiabcYcaSiaaykW7cqWGbbqqcqGHiiIZcqWFDeIudaahaaWcbeqaaiabd6gaUjabgEna0kabd2gaTbaakiabcYcaSaaa@51F6@
(6)

where f(·) mis a vector of known functions, which satisfy appropriate smoothness conditions to ensure local existence and uniqueness of solutions. With A = Y A κ and f (x) = Ψ(x), the above description results in a dynamical system of the form given by (6). Note that the unknown parameters (which also encode the network structure) are in A, which enters the system dynamics linearly. Let neither the value of the entries nor the structure of matrix A be known. What we wish to find is the structure and entries in matrix A, given experimental data.

For this purpose, we consider the following discrete-time system:

x(tk + 1) = x(t k ) + (tk + 1- t k ) Af(x(t k )),

which is the Euler discretization of (6).

Now, the set of measurements, which we denote by x ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaKaaaaa@2D5E@ , can be used to fit the unknown entries to A such as to minimize the error between the data and the model predictions, which are given by (7). It is popular to solve the minimization problem which results in the least 2-norm of the error between x i (tk+1) and x ^ i ( t k + 1 ) MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaKaadaWgaaWcbaGaemyAaKgabeaakiabcIcaOiabdsha0naaBaaaleaacqWGRbWAcqGHRaWkcqaIXaqmaeqaaOGaeiykaKcaaa@3579@ (least squares minimization problem). We can write such an error metric as:

min||Ma - b||2

where a nmis a vector containing A ij , which we treat as decision variables, and M ((p-1) × n) × nmand b (p-1) × nare defined by 'stacking' all such conditions obtained by manipulating the data as per (7). Here p corresponds to the number of measurements. This problem has the following analytical solution:

a* = Mb (MT M)-1MTb

There are a few drawbacks of the above least-squares approach. In the presence of extra constraints on the variables A ij (constrained regression), the problem does not have a closed-form solution, in general. Such constrained minimizations, the simplest of which is a Second Order Cone Problem (SOCP) [19], may carry a significant computational cost for large problems. The same is true if the data are contaminated with error which needs to be taken into account when producing Aleast-squares [20]. Furthermore, the solution to a least-squares problem will not be sparse in general; it will rather result in a full matrix.

In [19] and more recently in [21], the fact was mentioned that a large number of elements of the solution z of a Linear Program (LP) such as

min ||z||1,

are zero, that is, (10) produces sparse solutions. For this reason, this is the approach we follow in the paper. In particular, if A is sparse then the following program seeks explicitly to minimize the entries to matrix A and, thus, tries to recover this property of the matrix:

min | | vec ( A ) | | 1 s . t . μ k x ^ ( t k + 1 ) + x ^ ( t k ) + ( t k + 1 t k ) A f ( x ^ ( t k ) ) μ k + , μ k + 0 , μ k 0 , k , k = 1 , ... , p 1. MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaqbaeaabmGaaaqaaiGbc2gaTjabcMgaPjabc6gaUbqaaiabcYha8jabcYha8jabbAha2jabbwgaLjabbogaJjabcIcaOiabdgeabjabcMcaPiabcYha8jabcYha8naaBaaaleaacqaIXaqmaeqaaaGcbaGaee4CamNaeeOla4IaeeiiaaIaeeiDaqNaeeOla4cabaGaeyOeI0IaeqiVd02aa0baaSqaaiabdUgaRbqaaiabgkHiTaaakiabgsMiJkabgkHiTiqbdIha4zaajaGaeiikaGIaemiDaq3aaSbaaSqaaiabdUgaRjabgUcaRiabigdaXaqabaGccqGGPaqkcqGG8baFcqGHRaWkcuWG4baEgaqcaiabcIcaOiabdsha0naaBaaaleaacqWGRbWAaeqaaOGaeiykaKIaey4kaSIaeiikaGIaemiDaq3aaSbaaSqaaiabdUgaRjabgUcaRiabigdaXaqabaGccqGHsislcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabdgeabjabdAgaMjabcIcaOiqbdIha4zaajaGaeiikaGIaemiDaq3aaSbaaSqaaiabdUgaRbqabaGccqGGPaqkcqGGPaqkcqGHKjYOcqaH8oqBdaqhaaWcbaGaem4AaSgabaGaey4kaScaaOGaeiilaWcabaaabaGaeqiVd02aa0baaSqaaiabdUgaRbqaaiabgUcaRaaakiabgwMiZkabicdaWiabcYcaSiaaykW7cqaH8oqBdaqhaaWcbaGaem4AaSgabaGaeyOeI0caaOGaeyyzImRaeGimaaJaeiilaWIaaGPaVlabgcGiIiabdUgaRjabcYcaSiaaykW7cqWGRbWAcqGH9aqpcqaIXaqmcqGGSaalcqGGUaGlcqGGUaGlcqGGUaGlcqGGSaalcqWGWbaCcqGHsislcqaIXaqmcqGGUaGlaaaaaa@9BD1@
(11)

By making μ k + MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaeqiVd02aa0baaSqaaiabdUgaRbqaaiabgUcaRaaaaaa@2FF9@ and μ k MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaeqiVd02aa0baaSqaaiabdUgaRbqaaiabgkHiTaaaaaa@3004@ as small as possible for all k, we can ensure that the data are in close Euler-fit with the model making the approximation error as small as possible. The advantage of solving LPs is that the task can be performed using fast, efficient and readily available algorithms. Note also that the number of decision variables in (11) relates directly to the size of A and not of the data, which makes it suitable for the identification of large-scale systems. Support for the validity of above heuristic to obtain a sparse interconnection matrix A are also Theorem 1.1 of [22] and the work presented in [23].

An additional advantage of our approach is also that we may incorporate uncertainties in the measurements with little additional computational complexity. If we model the uncertainty in the measurements as

x ˜ ( t k ) ϵ ( k ) x ^ ( t k ) x ˜ ( t k ) + ϵ ( k ) , f ˜ ( t k ) δ ( k ) f ( x ^ ( t k ) ) f ˜ ( t k ) + δ ( k ) , ϵ ( k ) , δ ( k ) 0 , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaGaacqGGOaakcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabgkHiTmbvLH1qn1uy0Hws0fgBPngaryWyT1wAXadaiqGacqWF1pGScqGGOaakcqWGRbWAcqGGPaqkcqGHKjYOcuWG4baEgaqcaiabcIcaOiabdsha0naaBaaaleaacqWGRbWAaeqaaOGaeiykaKIaeyizImQafmiEaGNbaGaacqGGOaakcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabgUcaRiab=v=aYkabcIcaOiabdUgaRjabcMcaPiabcYcaSiaaykW7cuWGMbGzgaacaiabcIcaOiabdsha0naaBaaaleaacqWGRbWAaeqaaOGaeiykaKIaeyOeI0IaeqiTdqMaeiikaGIaem4AaSMaeiykaKIaeyizImQaemOzayMaeiikaGIafmiEaGNbaKaacqGGOaakcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabcMcaPiabgsMiJkqbdAgaMzaaiaGaeiikaGIaemiDaq3aaSbaaSqaaiabdUgaRbqabaGccqGGPaqkcqGHRaWkcqaH0oazcqGGOaakcqWGRbWAcqGGPaqkcqGGSaalcaaMc8Uae8x9diRaeiikaGIaem4AaSMaeiykaKIaeiilaWIaeqiTdqMaeiikaGIaem4AaSMaeiykaKIaeyyzImRaeGimaaJaeiilaWcaaa@8DC2@
(12)

x ˜ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaGaaaaa@2D5D@ (t k ) ≥ 0, f ˜ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmOzayMbaGaaaaa@2D39@ (t k ) ≥ 0, for all k, and A ij ≥ 0 then we can formulate the robust counterpart to (11) that is still an LP (see also [24, 25]). The following LP is a robust formulation of program (11):

min | | vec ( A ) | | 1 s . t . μ k x ˜ ( t k + 1 ) ϵ ( k + 1 ) + x ˜ ( t k ) ϵ ( k ) + ( t k + 1 t k ) A ( f ˜ ( t k ) δ ( k ) ) , x ˜ ( t k + 1 ) + ϵ ( k + 1 ) + x ˜ ( t k ) + ϵ ( k ) + ( t k + 1 t k ) A ( f ˜ ( t k ) + δ ( k ) ) μ k + , A i j 0 , i , j , x ˜ ( t k ) , f ˜ ( t k ) , ϵ ( k ) , δ ( k ) , μ k + , μ k 0 , k , k = 1 , ... , p 1. MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaqbaeaabqGaaaaabaGagiyBa0MaeiyAaKMaeiOBa4gabaGaeiiFaWNaeiiFaWNaeeODayNaeeyzauMaee4yamMaeiikaGIaemyqaeKaeiykaKIaeiiFaWNaeiiFaW3aaSbaaSqaaiabigdaXaqabaaakeaacqqGZbWCcqqGUaGlcqqGGaaicqqG0baDcqqGUaGlaeaacqGHsislcqaH8oqBdaqhaaWcbaGaem4AaSgabaGaeyOeI0caaOGaeyizImQaeyOeI0IafmiEaGNbaGaacqGGOaakcqWG0baDdaWgaaWcbaGaem4AaSMaey4kaSIaeGymaedabeaakiabcMcaPiabgkHiTmbvLH1qn1uy0Hws0fgBPngaryWyT1wAXadaiqGacqWF1pGScqGGOaakcqWGRbWAcqGHRaWkcqaIXaqmcqGGPaqkcqGHRaWkcuWG4baEgaacaiabcIcaOiabdsha0naaBaaaleaacqWGRbWAaeqaaOGaeiykaKIaeyOeI0Iae8x9diRaeiikaGIaem4AaSMaeiykaKIaeyOeI0IaeiikaGIaemiDaq3aaSbaaSqaaiabdUgaRjabgUcaRiabigdaXaqabaGccqGHsislcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabdgeabnaabmaabaGafmOzayMbaGaacqGGOaakcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabgkHiTiabes7aKjabcIcaOiabdUgaRjabcMcaPaGaayjkaiaawMcaaiabcYcaSaqaaaqaaiabgkHiTiqbdIha4zaaiaGaeiikaGIaemiDaq3aaSbaaSqaaiabdUgaRjabgUcaRiabigdaXaqabaGccqGGPaqkcqGHRaWkcqWF1pGScqGGOaakcqWGRbWAcqGHRaWkcqaIXaqmcqGGPaqkcqGHRaWkcuWG4baEgaacaiabcIcaOiabdsha0naaBaaaleaacqWGRbWAaeqaaOGaeiykaKIaey4kaSIae8x9diRaeiikaGIaem4AaSMaeiykaKIaey4kaSIaeiikaGIaemiDaq3aaSbaaSqaaiabdUgaRjabgUcaRiabigdaXaqabaGccqGHsislcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabdgeabnaabmaabaGafmOzayMbaGaacqGGOaakcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabgUcaRiabes7aKjabcIcaOiabdUgaRjabcMcaPaGaayjkaiaawMcaaiabgsMiJkabeY7aTnaaDaaaleaacqWGRbWAaeaacqGHRaWkaaGccqGGSaalaeaaaeaacqWGbbqqdaWgaaWcbaGaemyAaKMaemOAaOgabeaakiabgwMiZkabicdaWiabcYcaSiaaykW7cqGHaiIicqWGPbqAcqGGSaalcqWGQbGAcqGGSaalcaaMc8UafmiEaGNbaGaacqGGOaakcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabcYcaSiqbdAgaMzaaiaGaeiikaGIaemiDaq3aaSbaaSqaaiabdUgaRbqabaGccqGGPaqkcqGGSaalcqWF1pGScqGGOaakcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabcYcaSiabes7aKjabcIcaOiabdsha0naaBaaaleaacqWGRbWAaeqaaOGaeiykaKIaeiilaWIaeqiVd02aa0baaSqaaiabdUgaRbqaaiabgUcaRaaakiabcYcaSiabeY7aTnaaDaaaleaacqWGRbWAaeaacqGHsislaaGccqGHLjYScqaIWaamcqGGSaalcaaMc8UaeyiaIiIaem4AaSMaeiilaWIaaGPaVlabdUgaRjabg2da9iabigdaXiabcYcaSiabc6caUiabc6caUiabc6caUiabcYcaSiabdchaWjabgkHiTiabigdaXiabc6caUaaaaaa@15D3@
(13)

In summary, using the above ideas, we aim to extract from data the sparsity pattern in matrix A, which is related to the connectivity of the underlying graph structure, drawing conclusions on the network interaction topology.

Finally, note that if data points are rare, that is pm, and there are not any constraints on matrix A then the error between the data and the model predictions can be made zero and (9) does not have a unique solution. However, the following LP can be used to try to recover the sparsity structure of the matrix:

min | | vec ( A ) | | 1 s . t . x ^ ( t k + 1 ) = x ^ ( t k ) + ( t k + 1 t k ) A f ( x ^ ( t k ) ) , k , k = 1 , ... , p 1. MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@7BAD@
(14)

Obtaining the structure of a gene regulatory network

Using the same ideas, another class of a networks that can be determined are gene regulatory networks given microarray time-series data. We first briefly explain the function of gene regulatory networks and DNA microarray time-series.

A gene encodes the information necessary to produce a specific protein. The process, in which the information is used to synthesize a protein, is highly controlled and this control allows the cell to vary the level of a particular protein in the cell depending on the cell's need for this protein. The first step of synthesizing a protein from a gene is RNA polymerase transcribing gene information from DNA to mRNA (see Figure 1a). This mRNA is then translated into synthesized proteins by ribosomes. Control can occur at a number of stages including the synthesis of mRNA, subsequent processing of the mRNA, control of the ribosome and control of mRNA stability. Some proteins, called transcription factors, are responsible for the regulation of the initiation of transcription. A transcription factor binds to the DNA, at the promoter site, in order to either inhibit or activate (or alternatively increase the rate of) the transcription of mRNA that is responsible for the synthesis of a specific protein (see Figure 1b). (Note that self regulation is also possible.) The collection of DNA segments which interact with each other in the manner described is called the gene regulatory network.

Figure 1
figure 1

Diagram showing the process of transcription. a) The RNA polymerase binds to the promoter sequence on the DNA and transcribes a gene. b) Transcription can be controlled by inhibitors or activators acting at the promoter sequence.

In order to understand the dynamics and behavior of a gene regulatory network, three levels of information are required:

1. The network interconnection in the form of a directed graph;

2. Whether an edge from node i to node j means that transcription factor i is activating (denoted by arrow) or repressing (denoted by 'hammer') j;

3. The activation/repression rates for the transcription factors.

Time-series obtained from DNA microarrays [26, 27] are extremely helpful to obtain the structure of gene regulatory networks. This is because DNA microarrays allow observation of the presence of specific mRNA within the cell and in particular, time-series data allow measurements on how these change over time after a perturbation, or when following the cell cycle.

Now, consider the model of a gene regulatory network as described in [28] and [29], where nodes represent genes. Knowledge of the three hierarchal levels of information mentioned previously is necessary to describe the network. The first level determines whether there is an interaction between proteins X1 and X2. An interaction of the form 'X1X2' means that protein X1 activates the production of protein X2 and 'X1 X2' that X1 inhibits it. This information belongs to the second level. The activation and repression Hill input functions are given mathematically by (see [28]):

k x 1 n 1 + k x 1 n ,  and  1 1 + k x 1 n , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaqcfa4aaSaaaeaacqWGRbWAcqWG4baEdaqhaaqaaiabigdaXaqaaiabd6gaUbaaaeaacqaIXaqmcqGHRaWkcqWGRbWAcqWG4baEdaqhaaqaaiabigdaXaqaaiabd6gaUbaaaaGccqGGSaalcqqGGaaicqqGHbqycqqGUbGBcqqGKbazcqqGGaaijuaGdaWcaaqaaiabigdaXaqaaiabigdaXiabgUcaRiabdUgaRjabdIha4naaDaaabaGaeGymaedabaGaemOBa4gaaaaakiabcYcaSaaa@493D@
(15)

respectively, where x1 is the concentration of X1. (In [29], the notation 1 K MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaqcfa4aaSaaaeaacqaIXaqmaeaacqWGlbWsaaaaaa@2E82@ is used instead of k. For clarity, we have adopted a 'simpler' notation.) Knowledge about the magnitude of activation or repression coefficient k, k > 0, and exponent n, n > 0, is part of the third level of information.

If there exists more than one connection to a particular gene/node then all transcription factors associated with the connections could be necessary to fulfill a specific task (activation or inhibition) or it might be that any of them is sufficient to have an effect on the transcription process; more complex combinations are also possible. In [28, 30], a generalized input function of the following form is presented, which takes the possible interplay of different transcription factors into account:

f i ( x ) = j b i j x j n i j 1 + j k i j x j m i j . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemOzay2aaSbaaSqaaiabdMgaPbqabaGccqGGOaakcqWG4baEcqGGPaqkcqGH9aqpjuaGdaWcaaqaamaaqababaGaemOyai2aaSbaaeaacqWGPbqAcqWGQbGAaeqaaiabdIha4naaDaaabaGaemOAaOgabaGaemOBa42aaSbaaeaacqWGPbqAcqWGQbGAaeqaaaaaaeaacqWGQbGAaeqacqGHris5aaqaaiabigdaXiabgUcaRmaaqababaGaem4AaS2aaSbaaeaacqWGPbqAcqWGQbGAaeqaaiabdIha4naaDaaabaGaemOAaOgabaGaemyBa02aaSbaaeaacqWGPbqAcqWGQbGAaeqaaaaaaeaacqWGQbGAaeqacqGHris5aaaakiabc6caUaaa@53B0@
(16)

Here, activation of protein X i by protein X j is represented by n ij = m ij > 0, and repression by n ij = 0, m ij > 0. The contribution of the different transcription factors on the transcription rate is denoted by b ij . Putting everything together, the mathematical description of the dynamics of the concentrations of protein X i of an arbitrarily large gene regulatory network is as follows:

x ˙ i = γ i + f i ( x ) d i x i , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaiaadaWgaaWcbaGaemyAaKgabeaakiabg2da9iabeo7aNnaaBaaaleaacqWGPbqAaeqaaOGaey4kaSIaemOzay2aaSbaaSqaaiabdMgaPbqabaGccqGGOaakcqWG4baEcqGGPaqkcqGHsislcqWGKbazdaWgaaWcbaGaemyAaKgabeaakiabdIha4naaBaaaleaacqWGPbqAaeqaaOGaeiilaWcaaa@4220@
(17)

where γ i > 0 is the basal transcription production rate and d i > 0 is the degradation/dilution rate. In the above model, however, the vector field (right hand side of Equation (17)) is not affine in the unknown parameters and therefore one may think that the method proposed in the previous section can not be extended for this case; we show here how the above can be reformulated and cast in a form that allows identification using Linear Programming.

Let Δt = tℓ+1 - t. A discrete-time system that approximates (17) is:

x i (tℓ+1) = x i (t) + Δt(γ i + f i (x i (t)) - d i x i (t)).

Indeed, if b ij , k ij and m ij are unknown then (18) is not affine in the unknown parameters as is the case in (7). We rewrite (18) as follows:

( x i ( t ) ( 1 Δ t d i ) x i ( t + 1 ) + Δ t γ i ) ( 1 + j k i j x j m i j ) + Δ t j b i j x j n ˜ i j + Δ t b i = 0. MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@7EEE@
(19)

In (19), if n ij = 0 then we denote it by n ¯ i j MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmOBa4MbaebadaWgaaWcbaGaemyAaKMaemOAaOgabeaaaaa@3036@ and let b i = j b i j x j n ¯ i j = j b i j MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemOyai2aaSbaaSqaaiabdMgaPbqabaGccqGH9aqpdaaeqaqaaiabdkgaInaaBaaaleaacqWGPbqAcqWGQbGAaeqaaOGaemiEaG3aa0baaSqaaiabdQgaQbqaaiqbd6gaUzaaraWaaSbaaWqaaiabdMgaPjabdQgaQbqabaaaaaWcbaGaemOAaOgabeqdcqGHris5aOGaeyypa0ZaaabeaeaacqWGIbGydaWgaaWcbaGaemyAaKMaemOAaOgabeaaaeaacqWGQbGAaeqaniabggHiLdaaaa@470F@ . If n ij > 0 then we denote it by n ˜ i j MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmOBa4MbaGaadaWgaaWcbaGaemyAaKMaemOAaOgabeaaaaa@302D@ . For all i, j, let an entry to matrix B be b ij for which n ij > 0, and let an entry of matrix K be k ij . As before, given a set of measurements, which we denote by x ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaKaaaaa@2D5E@ , this set can be used to approximate the structure of the gene regulatory network determined by b ij , b i and k ij if the Hill coefficients m ij (and, thus, n ij ) are known and the basal production and degradation rates are known or considered uncertain but within a known range. For instance, we can try to recover B, K through a LP. The following LP puts emphasis on minimizing the 1-norm of vec(B), b, and vec(K), which are independent of each other, while we keep the Euler discretisation error, μ, as small as possible.

min | | vec ( [ B b K ] ) | | 1 s . t . μ < ( x ^ i ( t ) ( 1 Δ t d i ) x ^ i ( t + 1 ) + Δ t γ i ) ( 1 + j k i j x ^ j n i j + Δ t j b i j x ^ j n i j + Δ t b i < μ , μ > 0 , b i j 0 , k i j 0 , b i 0 , i , j , ( 0 ϵ 1 i γ i ϵ 2 i , 0 ε 1 i d i ε 2 i , i ) . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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v=aYoaaBaaaleaacqaIYaGmcqWGPbqAaeqaaOGaeiilaWIaeGimaaJaeyizImQaeqyTdu2aaSbaaSqaaiabigdaXiabdMgaPbqabaGccqGHKjYOcqWGKbazdaWgaaWcbaGaemyAaKgabeaakiabgsMiJkabew7aLnaaBaaaleaacqaIYaGmcqWGPbqAaeqaaOGaeiilaWIaeyiaIiIaemyAaKMaeiykaKIaeiOla4caaaaa@FBB6@
(20)

(The latter requirements in brackets correspond to the case of uncertain production and degradation rates.) Note that as per (16)

k ij = 0 if and only if b ij = 0 or b i = 0, i, j.

The following remark deals with the case when the solution of (20) violates (21). The rationale behind the idea is that by following these rules we can determine unambiguously whether activation or repression takes place.

Remark 1 Since requirement (21) cannot be implemented in a LP, we deduce the following from the solution of (20) about the connectivity of the network when (21) is violated:

- if k ij ≠ 0, b ij = 0 and b i = 0 then the production of X i is not affected by X j ; that is, it is the same case as when k ij = 0,

- if b ij ≠ 0 and k ij = 0 then X j enhances the production of X i ; i. e., it is the same case as when k ij ≠ 0,

- if b i ≠ 0 and k ij = 0 for all i then the production of X i is not affected by X j ; that is, it is the same case as when b i = 0.

Results and discussion

Numerical experiments

An artificial chemical reaction network

Consider the network with 5 species S MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWenfgDOvwBHrxAJfwnHbqeg0uy0HwzTfgDPnwy1aaceaGae8NeXpfaaa@376D@ = {A, B, C, D, E} and 5 complexes, C MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWenfgDOvwBHrxAJfwnHbqeg0uy0HwzTfgDPnwy1aaceaGae8NaXpeaaa@374D@ = {A, 2B, A + C, D, B + E} in Figure 2. Suppose we are given time series data for all the species in this system, but we do not know the topology of the interconnection. The first experiment examines the recovered interconnection diagram using the (non-robust) LP (11). Later on, we will consider the same problem with missing data on one species and a robust network determination problem.

Figure 2
figure 2

A chemical reaction network.

We have implemented the network shown in Figure 2 with a K matrix of the form:

K = [ 0 0 0 0 0.8492 0.3386 0 0 0 0.4290 0.8244 0 0 0.0563 0 0 0 0 0 0 0 0 0.7364 0 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@6427@
(22)

and have simulated the system with uniformly distributed initial conditions. The data sets were obtained by simulating the above set of nonlinear equations using SIMULINK. Ten such data sets were generated and incorporated in the LP.

Since we do not know how the chemical network is connected, and we cannot even speculate how parts of it may be connected, we need to assume a general structure for it and write the dynamics for the complete network. A least-squares approach, would yield the following structure in matrix K, where non-zero entries denote the fractional occurrences of non-zero k ij 's for the 10 data sets:

[ 0 0.1 1 0.1 1 1 0 0.8 0.2 1 1 0.6 0 1 0.9 0.1 0.8 0.9 0 0 1 0.9 1 0.9 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@5A12@

Essentially the only zero element predicted is k45. Note that the diagonal of this matrix does not enter into our optimization. We write these entries as zero, but this is merely a convenient notational place holder. The resulting structure of the K matrix from our linear programming approach is given by

[ 0 0 1 0 1 1 0 0.5 0.4 0.9 1 0 0 1 0.2 0 0 0.8 0 0 0.1 0 1 0.2 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWaamWaaeaafaqabeqbfaaaaaqaaiabicdaWaqaaiabicdaWaqaaiabigdaXaqaaiabicdaWaqaaiabigdaXaqaaiabigdaXaqaaiabicdaWaqaaiabicdaWiabc6caUiabiwda1aqaaiabicdaWiabc6caUiabisda0aqaaiabicdaWiabc6caUiabiMda5aqaaiabigdaXaqaaiabicdaWaqaaiabicdaWaqaaiabigdaXaqaaiabicdaWiabc6caUiabikdaYaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabiIda4aqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabigdaXaqaaiabicdaWaqaaiabigdaXaqaaiabicdaWiabc6caUiabikdaYaqaaiabicdaWaaaaiaawUfacaGLDbaaaaa@5286@

where again non-zero entries denote the fractional occurrences of non-zero entries for the 10 data sets tested. Observe that the second column is equal to zero which implies that the second complex is not the product of any reaction. Having determined this sparse structure for the system, we can repeat the same LP optimization, but now impose the new information about the sparse structure obtained in the new linear program, i.e. that k12 = 0 etc. Iterating once on this data, we get the following results:

[ 0 0 1 0 1 1 0 0.5 0.3 0.7 1 0 0 1 0 0 0 0.8 0 0 0 0 0.8 0 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWaamWaaeaafaqabeqbfaaaaaqaaiabicdaWaqaaiabicdaWaqaaiabigdaXaqaaiabicdaWaqaaiabigdaXaqaaiabigdaXaqaaiabicdaWaqaaiabicdaWiabc6caUiabiwda1aqaaiabicdaWiabc6caUiabiodaZaqaaiabicdaWiabc6caUiabiEda3aqaaiabigdaXaqaaiabicdaWaqaaiabicdaWaqaaiabigdaXaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabiIda4aqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabiIda4aqaaiabicdaWaqaaiabicdaWaaaaiaawUfacaGLDbaaaaa@4EE0@

This experiment reveals that the sparsity structure can be further reduced by an iterative procedure. One could also use the above as a 'probability' lookup table, and investigate sparsity structures, such as setting k23 and k24 equal to zero. Indeed this solution is also feasible, which reveals additional structure in the matrix K. Working this way, we have found that the following non-zero matrix results in feasible LPs:

K nom = [ 0 0 k 13 0 k 15 k 21 0 0 0 k 25 k 31 0 0 k 34 0 0 0 0 0 0 0 0 k 53 0 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@5DE5@

which is the same as the network shown in Figure 2, but for a link between complex 1 and complex 3. Of course, this is not surprising: there is no unique reaction mechanism that can fit a data set; rather, there can be many networks which with some kinetic parameters can represent the same data within experimental error. In fact, we can only hope to invalidate a postulated reaction mechanism using data, a point we will return to in the concluding section.

The next experiment we performed was to assume that some of the species could not be observed in the experiments for technical reasons. In particular, we assumed that the concentration of species A could not be measured. This does not pose significant problems, as we can replace the occurrences of the terms in the vector field involving the variable x1 with a vector of new variables q which we also ask to be 'sparse', through minimization of the sum of q i . Eight such substitutions need to be made; the result is a matrix of the form:

K miss = [ 0 0 0 0 0 k 21 0 k 23 0 k 25 0 0 0 0 0 0 0 k 43 0 0 0 0 k 53 k 54 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaem4saS0aaSbaaSqaaiabb2gaTjabbMgaPjabbohaZjabbohaZbqabaGccqGH9aqpdaWadaqaauaabeqafuaaaaaabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaem4AaS2aaSbaaSqaaiabikdaYiabigdaXaqabaaakeaacqaIWaamaeaacqWGRbWAdaWgaaWcbaGaeGOmaiJaeG4mamdabeaaaOqaaiabicdaWaqaaiabdUgaRnaaBaaaleaacqaIYaGmcqaI1aqnaeqaaaGcbaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaem4AaS2aaSbaaSqaaiabisda0iabiodaZaqabaaakeaacqaIWaamaeaacqaIWaamaeaacqaIWaamaeaacqaIWaamaeaacqWGRbWAdaWgaaWcbaGaeGynauJaeG4mamdabeaaaOqaaiabdUgaRnaaBaaaleaacqaI1aqncqaI0aanaeqaaaGcbaGaeGimaadaaaGaay5waiaaw2faaaaa@5CCD@

and a q = [q1, ..., q8] which corresponds to nonzero entries for k31, k34, k35 k13 and k15. Therefore in this case too, a sparse topology interconnection is obtained, but the matrix in this case is not as sparse as before.

Suppose now that data are uncertain, and we want to search for robust sparse structures for the K matrix. We set ϵ i + MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWeuvgwd1utHrhAjrxySL2yaeHbJ1wBPfdmaGabciab=v=aYoaaDaaaleaacqWGPbqAaeaacqGHRaWkaaaaaa@382E@ = ϵ i MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWeuvgwd1utHrhAjrxySL2yaeHbJ1wBPfdmaGabciab=v=aYoaaDaaaleaacqWGPbqAaeaacqGHsislaaaaaa@3839@ = 0.0004 for i = 1, ..., 5 and all data points – such uncertainty could be due to roundoff errors (see Equation (12)). A robust LP can be formulated, as discussed earlier, and the obtained optimization results in a network with a richer sparsity structure:

K rob = [ 0 0 k 13 0 k 15 k 21 0 k 23 0 k 25 k 31 0 0 k 34 0 0 0 k 43 0 0 0 0 k 53 0 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@62F5@

Finally, we note that once a candidate network is determined, we can perform a least-squares minimization to obtain the best k values for a particular sparsity structure. For example, if we choose Knom as the sparsity structure and fit the least squares error over all 10 experiments, we get the following K matrix:

K = [ 0 0 0.0364 0 0.7721 0.3295 0 0 0 0.3999 0.7804 0 0 0.0553 0 0 0 0 0 0 0 0 0.6668 0 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@68F9@
(23)

In figures 3A and 3B we show how the nominal system, with the K matrix given by Equation (22) compares in simulation with the K matrix given by Equation (23) for different initial conditions. We see that some initial conditions have better behavior for the two parameter sets than others. There is hope, however, that using other methods and through choice of a particular initial condition we can distinguish between the two network structures; the initial condition in Figure 3B shows some deviation in the dynamics of x1, and designing an experiment that would yield 'maximum' deviation would allow for differentiability between various models that can explain the same data. More details about this approach can be found in [31].

Figure 3
figure 3

Simulation of chemical reaction networks. Simulation of the network with reaction rates (22) (solid line) and with reaction rates given by (23) (dashed line) from two initial conditions.

A sample gene regulatory network

Consider the artificial gene regulatory network modeled through

x ˙ 1 = γ 1 d 1 x 1 , x ˙ 2 = γ 2 + b 12 x 1 1 + k 12 x 1 d 2 x 2 , x ˙ 3 = γ 3 + b 43 x 4 + b 13 x 1 + b 3 1 + k 43 x 4 + k 13 x 1 + k 53 x 5 d 3 x 3 , x ˙ 4 = γ 4 + b 54 x 5 1 + k 54 x 5 d 4 x 4 , x ˙ 5 = γ 5 + b 15 x 1 + b 5 1 + k 15 x 1 + k 25 x 2 d 5 x 5 , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@CE00@
(24)

where

B = [ 0 0.51 0.87 0 0.80 0 0 0 0 0 0 0 0 0 0 0 0 0.20 0 0 0 0 0 0.22 0 ] , K = [ 0 0.31 0.87 0 0.15 0 0 0 0 0.77 0 0 0 0 0 0 0 0.97 0 0 0 0 0.79 0.44 0 ] , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@86B5@

b3 = 0.71, b5 = 0.80, γ i = 0.1 and d i = 1. The network is depicted in Figure 4, where solid lines with an arrow head denote activation and dash pointed lines with a hammer head denote inhibition.

Figure 4
figure 4

The artificial gene regulatory network modeled through (24). Solid lines with an arrow head denote activation and dash pointed lines with a hammer head denote inhibition.

We assume that d i is known and γ i = γ for all i, where 0.095 ≤ γ ≤ 0.105. We take 'measurements' every Δt = 0.05 between t = 0 and t = 5 (time is in arbitrary units) from four different random initial conditions between 0 and 1 in order to obtain mock-up data. Solving (20) using the solver SeDuMi [32], we obtain the following results for matrices B and K:

B = [ 0 0.48 0.22 0 1.15 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0.11 0 ] , K = [ 0 0 0 0 0.61 0 0 0 0 0.75 0 0 0 0 0 0 0 0.32 0 0 0 0 0.35 0 0 ] ; MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@7B61@

b3 = 0.64, b5 = 0.80, and all other b i = 0. Following the rules given by Remark 1, we are able to reconstruct the network shown in Figure 4. As the example shows, we are able to determine the interaction network given by (24) through the LP (20) even when degradation rates are considered uncertain.

Reconstructing the glycolytic pathway of Lactococcus lactis

Lactococcus lactis is a bacterium used in the industrial production of cheese and buttermilk as it converts more than 90% of lactose (milk sugar) to lactic acid [14]. In general, the glycolytic pathway (or glycolysis) consists of chemical reactions that convert glucose into pyruvate. In the first step, glucose is converted into glucose-6-phosphate (G6P). A conversion of G6P into fructose-1,6-bisphosphate (FBP) follows, which is then converted sequentially to glyceraldehyde-3-phosphate (Ga3P), 3-phosphoglyceric acid (3-PGA) and PEP [16]. Additionally, Glucose and PEP are converted directly to pyruvate and G6P. Note that since measurement data for the intermediate Ga3P were unavailable, we include an additional rate denoting depletion of FBP. A simplified description of the pathway from reference [33] is depicted in Figure 5. The relative simplicity of this metabolic network makes L. lactis an attractive model for biological systems approaches [14]. A recent paper which presents an approach to determine the connectivity of this system and puts some emphasis on its sparsity is [16]. However, this approach does not take into account the characteristic particulars that make up a chemical reaction network. Here, we first use LP (11) to try to elucidate the glycolytic pathway of L. lactis using the same experimental data from [33].

Figure 5
figure 5

The glycolytic pathway of Lactococcus lactis.

Particularly, we wish to elucidate the glycolytic pathway of L. lactis under the assumption that the following complexes participate in the chemical reaction network: Glu, G6P, FBP, 2 × 3PGA, 2 × PEP, 2 × Pyru and Lact. In other words, we wish to obtain interaction topology of the chemical reaction network given by x ˙ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaiaaaaa@2D57@ = Y A κ f (x), where

Y = [ 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 1 ] , x = [ [ Glu ] [ G6P ] [ FBP ] [ 3 PGA ] [ PEP ] [ Pyru ] [ Lact ] ] , f ( x ) = [ [ Glu ] [ G6P ] [ FBP ] [ 3 PGA ] 2 [ PEP ] 2 [ Pyru ] 2 [ Lact ] ] . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@CC97@

Note that the network topology is completely determined by A κ . Recall that

A κ = K - diag(KTe), K ij ≥ 0 i, j.

Now, by solving (11) we indeed obtain a sparse chemical reaction topology (Figure 6(a)). However, the error between the model dynamics and experimental data is unreasonably large (Figure 6(b)). Therefore, it is not surprising that this configuration differs greatly from the the proposed pathway of Figure 5.

Figure 6
figure 6

Reaction pathway obtained through (11). a) The reaction pathway obtained through (11). b) The simulated model dynamics defined through the reaction network shown in (a) are shown in dashed lines and solid lines correspond to experimental data.

The ℓ1 regularized least squares problem, which is called Lasso is statistics, considers an objective function to minimize, which consists of the sum of the 1-norm of the vector of unknowns and the least squares of the error:

given Y min [ x ^ ( t 1 ) x ^ ( t 2 ) + ( t 2 t 1 ) A f ( x ^ ( t 1 ) ) x ^ ( t p 1 ) x ^ ( t p ) + ( t p t p 1 ) A f ( x ^ ( t p 1 ) ) ] 2 + α | | vec( A ) | | 1 s . t . A = Y A k , A κ i , j 0 , i j , i , j , e T A κ = 0 ( this follows from  ( 25 ) ) , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@DE4E@
(26)

where α is a nonnegative constant that allows us to regulate the weight we put on the sparsity of A explicitly. Note that for α = 0, program (26) minimizes the the error between data and model dynamics solely (Figure 7(b)). This time, the error between the model dynamics and experimental data is considerably smaller. The connection topology is shown in Figure 7(a). Now, we increase α to see whether or which interconnections disappear without altering the system dynamics significantly. This pathway, which remains unaltered for 2 ≤ α ≤ 10, is shown in Figure 7(a). The dynamic behavior of this system is indistinguishable from the one shown in Figure 7(b) and, thus, is not shown.

Figure 7
figure 7

Reaction pathway obtained through (26). a) Reaction pathway obtained through (26) for α = 0 and α = 2. All reactions participate in both pathways except for two which are marked accordingly. The one reaction that was obtained for α = 0 but not for α = 2 is marked with α0 and the one that appears only for α = 2 is marked with α2. b) Here, solid lines correspond to experimental data and dashed lines to the model with the interaction matrix obtained by solving (26) with α = 0.

Further increase of α results first in the disappearance of the links between G6P and FBP, and sequential changes do not result in 'sensible' connection topologies. Of course, this is something that in general the investigator does not know. While the pathway depicted in Figure 6(a) might be dismissed because the resulting model behavior compares badly with data, this argument does not hold for the pathway in Figure 7(a).

Now, we exploit the following related approach to try to deduce the interactions of the system by solving the following LP:

given Y min [ x ^ ( t 1 ) x ^ ( t 2 ) + ( t 2 t 1 ) A f ( x ^ ( t 1 ) ) x ^ ( t p 1 ) x ^ ( t p ) + ( t p t p 1 ) A f ( x ^ ( t p 1 ) ) ] 1 + α | | vec( A ) | | 1 s . t . A = Y A k , A κ i , j 0 , i j , i , j , e T A κ = 0 ( follows from  ( 25 ) ) , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@D7F9@
(27)

We solve (27) for α = 0, α = 2 and α = 3, and obtain the reaction pathway shown in Figure 8(a) which results in a model with the dynamics depicted in Figure 8(b). (Note that for 0 <α ≤ 75, the model dynamics are indistinguishable from the ones shown in Figure 8(b) and are not shown.)

Figure 8
figure 8

Reaction pathway obtained through (27). a) All reactions participate in both pathways except for four which are marked accordingly. Two reactions that were obtained for α = 0 and α = 2 but not for α = 3 are marked with α0 and α2, one that appears only for α = 0 is marked with α0, and one that appears only for α = 3 is marked with α3. (Note that a gradual increase of α, for 3 ≤ α ≤ 75, did not change the network structure.) b) Here, solid lines correspond to experimental data and dashed lines to the model dynamics defined through the reaction network shown in Figure 8(a) for α = 0.

The error between the model dynamics and experimental data is again considerably smaller than the error shown in Figure 6(b). As we can see from Figure 8(a), a relatively sparse reaction topology was obtained.

The pathway x1 → ... → x7 was almost reconstructed. A sensible assumption to make is that the degradation of G6P which appears at α = 3 corresponds to the conversion into FBP suggested at α = 2.

Also, the direct link between glucose and pyruvate was discovered. Finally, with

A κ = [ 0.3452 0 0 0 0 0 0 0.0185 0.4105 0 0 0 0 0 0.2431 0.4105 0.3735 0 0 0.0350 0 0 0 0.0009 0.0008 0 0 0.0237 0 0 0 0.0008 0.0106 0 0.0079 0.0835 0 0 0 0 0.0377 0 0 0 0.1551 0 0.0105 0.0027 0.0393 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemyqae0aaSbaaSqaaiabeQ7aRbqabaGccqGH9aqpdaWadaqaauaabeqahCaaaaaabaGaeyOeI0IaeGimaaJaeiOla4IaeG4mamJaeGinaqJaeGynauJaeGOmaidabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaaJaeiOla4IaeGimaaJaeGymaeJaeGioaGJaeGynaudabaGaeyOeI0IaeGimaaJaeiOla4IaeGinaqJaeGymaeJaeGimaaJaeGynaudabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaaJaeiOla4IaeGOmaiJaeGinaqJaeG4mamJaeGymaedabaGaeGimaaJaeiOla4IaeGinaqJaeGymaeJaeGimaaJaeGynaudabaGaeyOeI0IaeGimaaJaeiOla4IaeG4mamJaeG4naCJaeG4mamJaeGynaudabaGaeGimaadabaGaeGimaadabaGaeGimaaJaeiOla4IaeGimaaJaeG4mamJaeGynauJaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaaJaeiOla4IaeGimaaJaeGimaaJaeGimaaJaeGyoaKdabaGaeyOeI0IaeGimaaJaeiOla4IaeGimaaJaeGimaaJaeGimaaJaeGioaGdabaGaeGimaadabaGaeGimaadabaGaeGimaaJaeiOla4IaeGimaaJaeGOmaiJaeG4mamJaeG4naCdabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaaJaeiOla4IaeGimaaJaeGimaaJaeGimaaJaeGioaGdabaGaeyOeI0IaeGimaaJaeiOla4IaeGimaaJaeGymaeJaeGimaaJaeGOnaydabaGaeGimaadabaGaeGimaaJaeiOla4IaeGimaaJaeGimaaJaeG4naCJaeGyoaKdabaGaeGimaaJaeiOla4IaeGimaaJaeGioaGJaeG4mamJaeGynaudabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeyOeI0IaeGimaaJaeiOla4IaeGimaaJaeG4mamJaeG4naCJaeG4naCdabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaaJaeiOla4IaeGymaeJaeGynauJaeGynauJaeGymaedabaGaeGimaadabaGaeGimaaJaeiOla4IaeGimaaJaeGymaeJaeGimaaJaeGynaudabaGaeGimaaJaeiOla4IaeGimaaJaeGimaaJaeGOmaiJaeG4naCdabaGaeyOeI0IaeGimaaJaeiOla4IaeGimaaJaeG4mamJaeGyoaKJaeG4mamdaaaGaay5waiaaw2faaaaa@BFA8@

our approach provides a meaningful chemical reaction network of the form (4). (This matrix corresponds to the case when α = 2.) Nevertheless, without biochemical information the superiority of this pathway to the pathway in Figure 7(a) cannot be established and it follows that experiments have to be designed to discriminate between several competing models.

Conclusion

We have presented a methodology for determining the interaction topology of biological networks, that are either affine in the unknown parameters or can be transformed to have this property, using time series data collected from experiments. We demonstrated the ability of our method to identify a chemical reaction network structure through several numerical examples. We have also tested our approach by elucidating the glycolytic pathway of the bacterium Lactococcus lactis. Our method respects the structural properties that chemical reaction network dynamics should have [11, 12].

In the case of gene regulatory networks, more realistic models could be used, but those would include additional parameters, first, by making the Hill coefficient in the activation and repression terms a free variable; and second, encoding the fact that when two transcription factors act on DNA, either both are required (AND) or any of them is sufficient (OR) for action. Thus, a valuable research direction is to investigate this case and establish whether similar analysis techniques to the ones presented in this paper can be used.

In (27) we introduced a free variable α whose value can change the solution considerably. Hence, it is worthwhile to explore different possible heuristics how to choose the value of this variable. (Here, we kept the balance between increasing α and keeping the model dynamics that followed from the solution of (27) relatively close to experimental data.) An iterative method can also be used, which uses 'live' information from simulations and then iterates with a simple Linear Program to find the network structure that fits best the parameters.

Finally, as shown, different methods or the same one with different constraints provide different models that represent the same data, which is an expected feature of such methods. It follows that experiments have to be designed to discriminate between competing models, in a way that 'closes the loop' between modelling and experiment (see for example [31]).

References

  1. Yeung MKS, Tegnér J, Collins JJ: Reverse engineering gene networks using singular value decomposition and robust regression. PNAS. 2002, 99 (9): 6163-6168.

    Article  PubMed Central  CAS  PubMed  Google Scholar 

  2. Tegnér J, Yeung MKS, Hasty J, Collins JJ: Reverse engineering gene networks: Integrating genetic perturbations with dynamical modeling. PNAS. 2003, 100 (10): 5944-5949.

    Article  PubMed Central  PubMed  Google Scholar 

  3. Julius AA, Zavlanos M, Boyd S, Pappas GJ: Genetic network identification using convex programming. Technical Report MS-CIS-07-20. 2007, Department of Computer and Information Science, University of Pennsylvania

    Google Scholar 

  4. Kholodenko BN, Kiyatkin A, Bruggeman FJ, Sontag ED, Westerhoff HV, Hoek JB: Untangling the wires: A strategy to trace functional interactions in signalling and gene networks. PNAS. 2002, 99 (20): 12841-12846.

    Article  PubMed Central  CAS  PubMed  Google Scholar 

  5. Kholodenko BN, Sontag ED: Determination of functional network structure from local parameter dependence data. 2002, arXiv.org:physics/0205003.

    Google Scholar 

  6. Vance W, Arkin A, Ross J: Determination of causal connectivities of species in random networks. PNAS. 2002, 99 (9): 5816-5821.

    Article  PubMed Central  CAS  PubMed  Google Scholar 

  7. Westerhoff HV, Kolodkin A, Conradie R, Wilkinson SJ, Bruggeman FJ, Krab K, van Schuppen JH, Hardin H, Bakker BM, Moné MJ, Rybakova KN, Eijken M, van Leeuwen HJP, Snoep JL: Systems biology towards life in silico: mathematics of the control of living cells. Journal of Mathematical Biology. 2009, 58 (1–2): 7-34.

    Article  PubMed  Google Scholar 

  8. Crampin EJ, Schnell S, McSharry PE: Mathematical and computational techniques to deduce complex biochemical reaction mechanisms. Prog Biophys Mol Biol. 2004, 86 (1): 77-112.

    Article  CAS  PubMed  Google Scholar 

  9. Ross J, Schreiber I, Vlad MO: Determination of Complex Reaction Mechanisms: Analysis of Chemical, Biological and Genetic Networks. 2006, Oxford, UK: Oxford University Press

    Google Scholar 

  10. Chevalier T, Schreiber I, Ross J: Toward a systematic determination of complex reaction mechanisms. J Phys Chem. 1993, 97 (26): 6776-6787.

    Article  CAS  Google Scholar 

  11. Feinberg M: Lectures on chemical reaction networks. 1979, Mathematics Research Centre, University of Wisconsin, http://www.che.eng.ohio-state.edu/~FEINBERG/LecturesOnReactionNetworks

    Google Scholar 

  12. Feinberg M: Chemical reaction network structure and the stability of complex isothermal reactors-I. The deficiency zero and deficiency one theorems. Chem Eng Sci. 1987, 42 (10): 2229-2268.

    Article  CAS  Google Scholar 

  13. Papachristodoulou A, Recht B: Determining Interconnections in Chemical Reaction Networks. Proceedings of the 2007 American Control Conference. 2007, 4872-4877. New York City, USA

    Chapter  Google Scholar 

  14. Voit EO, Almeida J, Marino S, Lall R, Goel G, Neves AR, Santos H: Regulation of glycolysis in Lactococcus lactis: An unfinished systems biological case study. Syst Biol (Stevenage). 2006, 153 (4): 286-298.

    Article  CAS  Google Scholar 

  15. del Rosario RCH, Mendoza E, Voit EO: Challenges in lin-log modelling of glycolysis in Lactococcus lactis. IET Systems Biology. 2008, 2: 136-149.

    Article  CAS  PubMed  Google Scholar 

  16. Srividhy J, Crampin EJ, McSharry PE, Schnell1 S: Reconstructing biochemical pathways from time course data. Proteomics. 2007, 7: 828-838.

    Article  Google Scholar 

  17. Gunawardena J: Notes on Metabolic Control Analysis. 2002, Bauer Center for Genomics Research, Harvard University, Cambridge, MA 02138, USA, http://vcp.med.harvard.edu/papers/mca.pdf

    Google Scholar 

  18. Gunawardena J: Chemical reaction network theory for in-silico biologists. 2003, Bauer Center for Genomics Research, Harvard University, Cambridge, MA 02138, USA, http://vcp.med.harvard.edu/papers/crnt.pdf

    Google Scholar 

  19. Boyd S, Vandenberghe L: Convex Optimization. 2004, Cambridge, UK: Cambridge University Press

    Book  Google Scholar 

  20. El Ghaoui L, Lebret H: Robust Solutions to Least-Squares Problems with uncertain data. SIAM J Matrix Anal Appl. 1997, 18 (4): 1035-1064.

    Article  Google Scholar 

  21. Zavlanos MM, Julius AA, Boyd SP, Pappas GJ: Identification of Stable Genetic Networks using Convex Programming. 2008, 2755-2760. Proceedings of the American Control Conference, Seattle, Washington, USA

    Google Scholar 

  22. Candès EJ, Romberg J, Tao T: Stable signal recovery from incomplete and inaccurate measurements. Communications of Pure and Applied Mathematics. 2006, 59: 1207-1223.

    Article  Google Scholar 

  23. Donoho DL, Tanner J: Sparse nonnegative solution of underdetermined linear equations by linear programming. PNAS. 2005, 102 (27): 9446-9451.

    Article  PubMed Central  CAS  PubMed  Google Scholar 

  24. Soyster AL: Convex Programming with set-inclusive constraints and applications to inexact linear programming. Operations Research. 1973, 21: 1154-1157.

    Article  Google Scholar 

  25. Bertsimas D, Sim M: The Price of Robustness. Operations Research. 2004, 52: 35-53.

    Article  Google Scholar 

  26. Filkov V, Skiena S, Zhi J: Analysis Techniques for Microarray Time-Series Data. Journal of Computational Biology. 2002, 9 (2): 317-330.

    Article  CAS  PubMed  Google Scholar 

  27. Hana S, Yoon Y, Choc KH: Inferring biomolecular interaction networks based on convex optimization. Comput Biol Chem. 2007, 31 (5-6): 347-354.

    Article  Google Scholar 

  28. Alon U: An Introduction to Systems Biology: Design Principles of Biological Circuits. 2006, Boca Raton, FL: Chapman & Hall/CRC

    Google Scholar 

  29. Mangan S, Alon U: Structure and function of the feed-forward loop network motif. PNAS. 2003, 100 (21): 11980-11985.

    Article  PubMed Central  CAS  PubMed  Google Scholar 

  30. Setty Y, Mayo AE, Surette MG, Alon U: Detailed map of a cis-regulatory input function. PNAS. 2003, 100 (13): 7702-7707.

    Article  PubMed Central  CAS  PubMed  Google Scholar 

  31. Papachristodoulou A, El-Samad H: Algorithms for Discriminating Between Biochemical Reaction Network Models: Towards Systematic Experimental Design. Proceedings of the 2007 American Control Conference, New York City, USA. 2007, 2714-2719.

    Chapter  Google Scholar 

  32. Sturm JF: Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones. Optimization Methods and Software. 1999, 11–12: 625-653. http://sedumi.ie.lehigh.edu/

    Article  Google Scholar 

  33. Neves AR, Ventura R, ansour N, Shearman C, Gasson MJ, Maycock C, Ramos A, Santos H: Is the Glycolytic Flux in Lactococcus lactis Primarily Controlled by the Redox Charge? Kinetics of NAD+ and NADH Pools Determined in vivo by 13C NMR. The Journal of Biological Chemistry. 2002, 277 (31): 28088-28098.

    Article  CAS  PubMed  Google Scholar 

Download references

Acknowledgements

This work was financially supported by EPRSC project E05708X. The authors would like to thank Ben Recht and Mark Roberts for useful discussions about this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elias August.

Additional information

Authors' contributions

The authors contributed equally to this work. The first author developed the algorithm for determining gene regulatory networks and performed the example of L. Lactis while the second author developed the algorithm for biochemical reaction networks and conceived the general idea. Both authors read and approved the final manuscript.

Authors’ original submitted files for images

Rights and permissions

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

August, E., Papachristodoulou, A. Efficient, sparse biological network determination. BMC Syst Biol 3, 25 (2009). https://doi.org/10.1186/1752-0509-3-25

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1752-0509-3-25

Keywords