network motifs: discovery and applications
DESCRIPTION
Network motifs: discovery and applications. Guy Zinman Seminar in Bioinformatics Technion, Spring 2005. Outline. Theory of network motifs Definition, Algorithm Application to E. Coli transcription network The dynamic behavior of the motifs Finding active subnetworks Simulated annealing - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/1.jpg)
Network motifs: discovery and applications
Guy Zinman
Seminar in Bioinformatics
Technion, Spring 2005
![Page 2: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/2.jpg)
Outline
• Theory of network motifs• Definition, Algorithm
• Application to E. Coli transcription network• The dynamic behavior of the motifs
• Finding active subnetworks• Simulated annealing• experiments
![Page 3: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/3.jpg)
Network
![Page 4: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/4.jpg)
Network
• Dictionary definition: • A group or system of (electric) components and
connecting circuitry designed to function in a specific manner.
• Network is the backbone of a complex system
• Studies of networks are similar to paleontology: learning about an animal
from its backbone
![Page 5: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/5.jpg)
Network motifs
• The notion of motif, widely used for sequence analysis, is generalized to the level of networks.
• Network Motifs are defined as patterns of interconnections that recur in many different parts of a network at frequencies much higher than those found in randomized networks.
![Page 6: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/6.jpg)
Network motifs (cont.)
Such motifs are found in networks from:
• Biochemistry• Transcriptional regulation networks
• Neurobiology• Neuron connectivity
• Ecology • Food webs
• Engineering• Electoronic circuits• World Wide Web
![Page 7: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/7.jpg)
Network motifs (cont.)
![Page 8: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/8.jpg)
![Page 9: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/9.jpg)
Schematic view of motif detection
• Occurrence of the FFL motif:
![Page 10: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/10.jpg)
Random vs designed/evolved features
• Large networks may contain information about design principles and/or evolution of the complex system
• Which features are there for a reason:• design principles (e.g. feed-forward loops)• constraints (e.g. the all nodes on the Internet must be
connected to each other)• evolution, growth dynamics (e.g. network growth is
mainly due to gene duplication)
![Page 11: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/11.jpg)
Network motifs
• Alon U. et al: “Network Motifs: Simple building Blocks of Complex Networks”; Science, 2002.
• Different motifs were found in different classes of network.
• The motif reflect the underlying processes that generate each type of network.
![Page 12: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/12.jpg)
Motifs detected
• Two significant motifs:
Both appeared numerous times in non-homologous gene systems that perform diverse biological functions
![Page 13: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/13.jpg)
Motifs detected
![Page 14: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/14.jpg)
Motifs detected
![Page 15: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/15.jpg)
Main tasks for detecting network motifs
There are two main tasks in detecting network motifs:
(1) generating an ensemble of proper random networks
(2) counting the subgraphs in the real network and in random networks.
![Page 16: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/16.jpg)
The algorithm
• Starting point: graph with directed edges
• Scan for n-node subgraphs (n=3,4) and count number of occurrences
• Compare to Erdos-Renyi randomized graph• (randomization preserves in-, out- and in+out- degree
of each node)
![Page 17: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/17.jpg)
All 3-node connected subgraphs
• 13 different isomorphic types of 3-node connected subgraph
• There are:199 4-node subgraphs, 9364 5-node subgraphs ……
![Page 18: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/18.jpg)
Generation of randomized network
• Algorithm A• Employ a Markov-chain algorithm based on starting
with the real network and repeatedly swapping randomly chosen pairs of connections (X1 => Y1, X2 => Y2 is replaced by X1 => Y2, X2 => Y1) until the network is well randomized.
• Switching is prohibited if the either of the connections X1 => Y2 or X2 => Y1 already exist.
![Page 19: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/19.jpg)
Generation of randomized network
• Algorithm B• Each network was presented as a connectivity matrix
M, such that Mij = 1 if there is a connection directed from node i to node j, and 0 otherwise.
• The goal is to create a randomized connectivity matrix Mrand, which has the same number of nonzero elements in each row and column as the corresponding row and column of the real connectivity matrix.
![Page 20: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/20.jpg)
Generation of randomized network
• Ri = ∑jMrand,ij = ∑jMij, Ci = ∑iMrand,ij = ∑iMij. • To generate the randomized networks, we start with an empty
matrix Mrand. • We then repeatedly randomly choose a row n according to the
weights pi = Ri/∑Ri and a column m according to the weights qj = Rj/∑Rj.
• If Mrand,nm = 0, we set Mrand,mn = 1. • We then set Rm = Rm – 1 and Cn = Cn – 1. If the entry (m, n)
was previously entered to the randomized matrix, that is, ifMrand,mn = 1, or if m = n, we choose a new (m, n).
• This process is repeated until all Ri = 0 and Cj = 0.
![Page 21: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/21.jpg)
Network motif detection
• For each nonzero element (i,j):
Looping through all connected elements Mik = 1, Mki = 1, Mjk = 1, and Mkj = 1. This is recursively repeated with elements (i, k), (k, i), (j,k), and (k, j) until an n-node subgraph is obtained.
• A table is formed that counts the number of appearances of each type of subgraph in the network, correcting for the fact that multiple submatrices of M can correspond to one isomorphic architecture owing to symmetries.
![Page 22: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/22.jpg)
Network motif detection
• This process is repeated for each of the randomized networks. The number of appearances of each type of subgraph in the random ensemble is recorded, to assess its statistical significance.
• The present concepts and algorithms are easily generalized to nondirected or directed graphs with several “colors” of edges and nodes, multipartite graphs, and so forth.
![Page 23: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/23.jpg)
Criteria for Network Motif Selection
• The probability that it appears in a randomized network an equal or greater number of times than in the real network is smaller than P = 0.01.
Reminder:p-value: the probability to get the given result when the tested subject is not affected by the experiment.
if p-value < 0.01 than the subject is considered to be affected (the hypothesis is correct).
![Page 24: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/24.jpg)
Run time complexity
• The performance of this algorithm scales with the total number of n-node subgraphs in the network.
• The number of subgraphs and the algorithm runtime also increase dramatically for subgraphs with n ≥ 5.
![Page 25: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/25.jpg)
Sampling method for subgraph counting
• Kashtan et al.: “Efficient sampling algorithm for estimating subgraph concentrations and detecting network motifs”; Bioinformatics, 2004.
• This algorithm samples subgraphs in order to estimate their relative frequency.
• The runtime of the algorithm asymptotically does not depend on the network size.
• Surprisingly, few samples are needed to detect network motifs reliably.
![Page 26: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/26.jpg)
Subgraph sampling
Procedure description:• pick a random edge from the network and then expand
the subgraph iteratively by picking random neighboring edges until the subgraph reaches n nodes.
• For each random choice of an edge, in order to pick an edge that will expand the subgraph size by one, prepare a list of all such candidate edges and then randomly choose an edge from the list.
![Page 27: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/27.jpg)
Subgraph sampling
• Finally, the sampled subgraph is defined by the set of n nodes and all the edges that connect between these nodes in the original network.
• Finding n-node subgraphs for n ≥5 is much easier now….
![Page 28: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/28.jpg)
Comparing sampling method results with exhaustive enumeration
![Page 29: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/29.jpg)
Transcriptional Regulation Network ofEscherichia coli
• Operon – a group of contiguous genes that are transcribed into a single mRNA molecule.
• The transcriptional network is represented as a directed graph: each operon represents a node and edges represent
direct transcriptional
interactions.
![Page 30: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/30.jpg)
Application to E. Coli
Alon U.: “Network motifs in the transcriptional regulation network of Eschersichia coli”; Nature Genetics, 2002.
• Database - RegulonDBcontains interactions between Transcription Factors and the operons they regulate
• Contains 577 interactions, 424 operons and 116 TFs• 35 more TFs were added from literature• Previously described algorithm was run on this data (1000
random networks)
![Page 31: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/31.jpg)
Significant motifs
Feedforward loop
found in 22 different systems,
10 TFs and 40 operons
P-Val=0.001
![Page 32: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/32.jpg)
Concentration of FFL
![Page 33: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/33.jpg)
Same in the yeast regulatory network
• Young et. al: Transcriptional Regulatory Networks in Saccharomyces cerevisiae; Science, 2002
![Page 34: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/34.jpg)
• Can you think of a possible role for this motif?
![Page 35: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/35.jpg)
Dynamics for the FFL
![Page 36: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/36.jpg)
• Mangan et al., “Structure and function of the feed-forward loop”; PNAS, 2003.
Consider Sx and Sy as
Input signal – small molecules
That activate or inhibit the
Activity of X and Y.
![Page 37: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/37.jpg)
Coherency of FFLs
• The FFL is ‘coherent’ if the direct effect of the general TF on the effector has the same sign.
• 85% of the FFL found were coherent.
![Page 38: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/38.jpg)
Significant motif
Single Input Motif (SIM)
• Single Transcription Factor controls set of operons.
• All operons in a SIM are regulated
with the same sign.
• Appeared in 24 different systems
![Page 39: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/39.jpg)
Dynamics for the SIM
![Page 40: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/40.jpg)
Significant motif
Dense Overlapping Regulon (DOR) -
a layer of overlapping interactions between operons and a group of TFs, much denser than this structure would appear in an Erdos-Renyi random graph
![Page 41: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/41.jpg)
E. Coli network
![Page 42: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/42.jpg)
Dor detection
Briefly…
• Define a (nonmetric) distance measure between operon k and j.
• The operons were clustered.
• DORs corresponded to clusters with more than C=10 connections, with ratio of connections to TF greater than R=2.
![Page 43: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/43.jpg)
mFinder
• A software tool for estimating subgraph concentrations and detecting network motifs.
• www.weizmann.ac.il/mcb/UriAlon/
![Page 44: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/44.jpg)
Discussion
• The concept of homology between genes based on sequence motifs has been crucial for understanding the function of uncharacterized genes.
• Likewise, the notion of similarity between connectivity patterns in networks, based on network motifs, may be helpful in gaining insight into the dynamic behavior of newly identified gene circuits.
![Page 45: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/45.jpg)
Discussion
• Until now we considered only transcription interactions specifically manifested by transcription factors that bind regulatory sites.
• This transcriptional network can be thought of as ‘slow’ part of the cellular regulation network (time scale of minutes).
![Page 46: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/46.jpg)
Discussion
• An additional layer of faster interactions, which include interaction between proteins (often subsecond timescale), contributes to the full regulatory behavior.
![Page 47: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/47.jpg)
Finding active subnetworks
• Ideker, T.: “Discovering regulatory and signaling circuits in molecular interaction networks”; Bioinformatics, 2002.
• Integrates protein-protein and protein-DNA interactions with mRNA expression data, in a goal of better understanding the molecular mechanism of the observed gene expression.
• Uses a method of searching the network to find ‘active subnetwork’, i.e., connected sets of genes with unexpectedly high levels of differential expression, under one or more perturbation.
![Page 48: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/48.jpg)
Methodology
• Using a molecular interaction network to analyze changes in expression over 20 perturbations to the yeast galactose utilization (GAL) pathway.
• Determining which conditions significantly affected the gene expression in each active subnetwork.
![Page 49: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/49.jpg)
The means
• Combining a rigorous statistical measure for scoring subnetworks with a search algorithm for identifying subnetworks with high score.
![Page 50: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/50.jpg)
• To rate the biological activity of a particular subnetwork, begin with assessing the significance of differential expression for each gene.
• The error model provided by VERA (Variability and ERror Assessment) program.• VERA estimates the parameters of a statistical model using
the method of maximum likelihood.
• Output: p-values (pi), representing the significance of expression change.
Basic z-score calculation
![Page 51: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/51.jpg)
Basic z-score calculation
• Each pi is converted to z-score:
zi = Φ-1(1-pi) • Φ-1 = The inverse normal CDF (cumulative distribution
function)• Smaller p-values correspond to larger z-score
z-score - quantifies how different from normal the given value is:
x
xxxZ
![Page 52: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/52.jpg)
• Aggregate z-score for an entire subnetwork A of k genes:
Notice:
• zA will also be distributed according the standard normal (because the variables are independent).
• Subnetworks of all sizes are comparable under this scoring system, independent of k.
• A high zA indicates a biologically active subnetwork.
Ai
iA Zk
Z1
Scoring of Subnetworks
![Page 53: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/53.jpg)
Calibrating z against background distribution
• Randomly sample gene sets of size k using a Monte Carlo approach, compute their scores zA, and calculate standard deviation parameters for each k.
• The corrected subnet score SA is:
k
kAA
ZS
![Page 54: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/54.jpg)
Scoring an example subnetwork
Za Zb Zc Zd ZA SA
![Page 55: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/55.jpg)
Scoring over multiple conditions
• Starting with a matrix of p-values (genes vs. conditions) and corresponding z-scores.
• Producing m different aggregate scores, one for each condition, and sorting them.
• Finding the probability that at least j of the m conditions had scores above zA(j)
• Monte Carlo technique is used for estimating the mean and the standard deviation from random gene set of size k.
![Page 56: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/56.jpg)
Scoring over multiple conditions
![Page 57: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/57.jpg)
Finding the maximal scoring
• Problem:
Finding the maximal scoring connected subgraph is NP-hard.
![Page 58: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/58.jpg)
The Difficulty in Searching Global Optima
Global maxima
Local maximaLocal maxima
subnetwork
sig
nifi
can
ce
sco
re
![Page 59: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/59.jpg)
Rugged landscapes and local maxima problem
![Page 60: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/60.jpg)
Monte Carlo random search
• Known also as the ‘Metropolis algorithm’• A simulation technique for conformational sampling and
optimization based on a random search for energetically favourable conformations
• Finding global (or at least “good” local) maximum by biased random walk may take some luck …
![Page 61: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/61.jpg)
Global maxima
Local maxima
Local maxima
subnetwork
sig
nifi
can
ce
sco
re
![Page 62: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/62.jpg)
Climbing mountains easier: simulated annealing
Global maxima
Local maxima
Local maxima
subnetwork
sig
nifi
can
ce
sco
re
In order to get out from a local maxima one needs to allow for locally unfavorable moves
![Page 63: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/63.jpg)
Introduction to simulated annealing
Simulated annealing (Kirkpatrick et al.,1983).Mathematical method developed together with Monte Carlo techniques to avoid false maxima Method simulates slow cooling of a solidifying solution to form a single crystal
Origin: The annealing process of heated solids
Intuition:By allowing occasional descent in the search process, we might be able to escape the trap of local maxima.
In our context:
Allow nodes to be removed from the subsets, even if the resulting subnetwork’s score is a (little) lower.
![Page 64: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/64.jpg)
• What can be an adverse effect of this method?
![Page 65: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/65.jpg)
Consequences of the Occasional Ascents
Help escaping the local optima.
desired effectMight pass global optima
after reaching it
adverse effect
So the result is not guaranteed to be optimal. But here we don’t care- any high-scoring subnetwork is
suspected to be biologically significant.
![Page 66: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/66.jpg)
Climbing mountains easier: simulated annealing
• Defining a “temperature” function.• Increasing the effective “temperature” means
higher probability of accepting moves that increase the energy Thus, the likelihood of escaping from a local maximum may be tuned.
![Page 67: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/67.jpg)
Control of Annealing Process
Acceptance of a search step (Metropolis Criterion):
Assume the performance change in the search direction is .
Accept a descending step only if it pass a random test, i.e. with probability
p =
Always accept a ascending step, i.e. 0
Te
![Page 68: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/68.jpg)
Control of Annealing Process
Cooling Schedule:
T, the annealing temperature, is the parameter that control the frequency of acceptance of decending steps.
We gradually reduce temperature T(k) between 1 and 0. The probability to accept declining steps is proportional!
Te
![Page 69: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/69.jpg)
In our context
• Input:
Graph G = (V,E) of molecular interactions,
N – number of iteration
Ti – temperature function which decreases from Tstart to Tend
• Output:
Gw – Subgraph of G
• Initialize Gw by setting each node to an ‘active/inactive’ state randomly (with p = ½).
![Page 70: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/70.jpg)
Simulated Annealing Algorithm
• For i = 1 to N DO• Randomly pick a node v from V and toggle it’s state.
• Compute the score si for the working subgraph Gw
• IF (si > si-1), keep v toggled;
• ELSE keep v toggled with probability iii TSSep /)( 1
![Page 71: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/71.jpg)
Heuristics for improved annealing
• Look for M active subnetworks simultaneously.
• M is a user defined variable• Maintaining multiple components can improve
the efficiency of annealing.• Can be done by:
• multiple annealing runs
Or by• extending the annealing approach to maintain a
graph state vector of the top M component scores.
![Page 72: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/72.jpg)
Galactose metabolic flow
![Page 73: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/73.jpg)
Results:
Experiment #1
small network of 362 interaction. 2 conditions of the expression data: gal80 deletion vs. WT.
5 significant subnetworks were found, including 41 out of 77 significant genes.
![Page 74: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/74.jpg)
Score and temperature vs. number of iteration
Temperature cooling is geometric from 1 to 0.
• N =
• By the end of the run, each of the 5 subnetworks reach a (local) maximum.
5101
![Page 75: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/75.jpg)
Evaluation of the subnetworks
Z-score distribution with real data
Z-score distribution with random data ( scrambled nodes z-scores )
Z-score distribution of the top 5 active networks.
![Page 76: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/76.jpg)
Experiment #2
• Network consists of all known interactions:7145 protein-protein interactions from BIND317 regulation interactions from TRANSFAC
• Expression data includes 20 perturbations to genes in the Galactose pathway.
• 7 active subnetworks found. The biggest consists of 340 genes.
• Repeating annealing with the network above, generated 5 significant sub-sub-networks.
• All results were evaluated with methods similar to what we have seen.
Results:
![Page 77: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/77.jpg)
![Page 78: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/78.jpg)
Discussion
![Page 79: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/79.jpg)
Cytoscape
• www.cytoscape.org
![Page 80: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/80.jpg)
Summary
• Theory of network motifs• Definition, Alogorithm
• Application to E. Coli transcription network• The dynamic behavior of the motifs
• Finding active subnetworks• Simulated annealing• 2 experiments
![Page 81: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/81.jpg)
References
• S Shen-Orr, R Milo, S Mangan & U Alon,
Network motifs in the transcriptional regulation network of Escherichia coli.
Nature Genetics, 31:64-68 (2002).
• R Milo, S Shen-Orr, S Itzkovitz, N Kashtan, D Chklovskii & U Alon,Network Motifs: Simple Building Blocks of Complex Networks
Science, 298:824-827 (2002).
• Ideker, T., Ozier, O., Schwikowski, B., and Siegel, A.
Discovering regulatory and signaling circuits in molecular interaction networks.
Bioinformatics 18 : S233 (2002).
![Page 82: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/82.jpg)
• S. Mangan and U. AlonStructure and function of feed forward loop network motif.
PNAS 100:11980-11985 (2003).
• N. Kashtan, S. Itzkovitz, R. Milo and U. AlonEfficient sampling algorithm for estimating subgraph concentration and detecting network motifs; Bioinformatics 20:1746-175 (2004).
• S. kirkpatrick, C. D. Gelatt and M. P. VecchiOptimization by simulated annealing
Science 220:671-680 (1983).
![Page 83: Network motifs: discovery and applications](https://reader035.vdocument.in/reader035/viewer/2022062321/56814038550346895daba459/html5/thumbnails/83.jpg)
Thank you