Ismb

Analysis of Gene Expression Microarrays for Phenotype Classification
Andrea Califano , Gustavo Stolovitzky, Yuhai Tu IBM Computational Biology Center, T.J. Watson Research Center, PO Box 704, Yorktown Heights, NY 10598 1 Introduction
Recent advances in DNA microarray technology are
Abstract
for the first time offering us exhaustive snapshots of some ofthe cell’s most intimate genetic mechanisms. These are cre- Several microarray technologies that monitor the level of ating a unique opportunity to improve our knowledge of the expression of a large number of genes have recentlyemerged. Given DNA-microarray data for a set of cells cellular machinery. Previous work on DNA microarrays has characterized by a given phenotype and for a set of control concentrated primarily on the identification of coregulated cells, an important problem is to identify “patterns” of gene genes to decipher the underlying structure of expression that can be used to predict cell phenotype. The genetic networks and/or the molecular classification of dis- potential number of such patterns is exponential in the In this paper, we propose a solution to this problem based been proposed which aim at extracting useful information from microarray data. Two general strategies have been fol- substantially from previous schemes. It couples a complex, lowed, based on either supervised or unsupervised learning algorithms. In these approaches, the probability of discovering discriminative gene expression quantitative expression of n genes in k samples are consid- patterns, and a pattern discovery algorithm called SPLASH.
The latter discovers efficiently and deterministically all ered as either n vectors in k-dimensional space or as k vec- statistically significant gene expression patterns in the tors in n-dimensional space. Various metrics measuring phenotype set. Statistical significance is evaluated based on distance between these vectors have been proposed.
the probability of a pattern to occur by chance in the control In the unsupervised learning category, hierarchical clus- set. Finally, a greedy set covering algorithm is used to tering has been used to produce a hierarchical dendro- select an optimal subset of statistically significant patterns, gram in which genes with similar expression patterns which form the basis for a standard likelihood ratio (according to standard correlation coefficient metric) are adjacent, and adjacency is interpreted as functional similar- We analyze data from 60 human cancer cell lines using ity. Other cluster analysis approaches attempt to this method, and compare our results with those of other make a partition of the n genes and/or the k samples into supervised learning schemes. Different phenotypes are homogeneous and well separated groups whose elements are studied. These include cancer morphologies (such asmelanoma), molecular targets (such as mutations in the p53 interpreted as functionally related.
gene), and therapeutic targets related to the sensitivity to an anticancer compounds. We also analyze a synthetic data set designed to assess whether or not cells belong to a class that shows that this technique is especially well suited for characterized by a known phenotype, based on the cells’ the analysis of sub-phenotype mixtures.
gene expression profiles. This is also known as the cell phe- For complex phenotypes, such as p53, our method notype prediction problem. Typically, these algorithms are produces an encouragingly low rate of false positives and first trained on two example sets: a positive example set or false negatives and seems to outperform the others. Similar phenotype set, which contains data for cells characterized by low rates are reported when predicting the efficacy of a predefined phenotype, and a negative example set or con- experimental anticancer compounds. This counts among trol set, which includes data for cells that do not exhibit that the first reported studies where drug efficacy has been phenotype. In a vector of “marker genes,” or signature, successfully predicted from large-scale expression dataanalysis.
is used for classification. Marker genes are selected based onthe discriminative power of their individual statistics. In Keywords:
it is shown that Support Vector Machine (SVM) based algo- Expression analysis. Gene Expression Patterns. Tissue rithms outperform other standard learning algorithms such as Classification. Phenotype Classification. Clustering.
decision trees, Parzen windows and Fisher’s linear discrimi-nant.
In this paper we introduce a novel supervised learning algorithm for cell phenotype prediction. While our objec- 1. Phone: (914)784-7827. Fax: (914)784-6223.
tives are similar in spirit to those reported in have been analyzed according to a variety of phenotypes.
and [15] our method differs on several counts. First and fore- The term “cell phenotype,” is generally used in the literature most, rather than relying on a unique best-fit model, which to indicate a common property of a set of cells. For instance, optimally discriminates between the phenotype and control a cancer morphology, such as melanoma, is a typical pheno- set, we use multiple, optimally discriminative models. As type. More subtle phenotypes are also possible and useful. In supported by our results, this improves the analysis of com- for instance, we refer to a “p53 phenotype” plex phenotypes over single model techniques, especially which identifies cancer cells with mutations in the p53 onco- when those phenotypes are mixtures of multiple, simpler gene. Also, by measuring the drug concentration required to sub-phenotypes at the molecular level. Also, as opposed to inhibit by 50% the cell line growth, the so-called GI50, it is our analysis selects genes based on their collective dis- possible to define a drug-sensitivity phenotype. This can be criminative power, rather than on their individual one. In this used to divide cells in two groups: one with cells that are latter sense our method can be though of as complementary inhibited by low concentrations of the drug (i.e., that are highly sensitive to it) and the other with cells that require Our algorithm finds gene groups whose expression is high concentrations (i.e., that are resistant to it). A classifica- tightly clustered in a subset of the phenotype set and not tion method can then be used to predict whether an unknown tightly clustered in any subsets of the control set. (We shall cell line is likely to be sensitive or resistant to a given drug.
rigorously define what we mean by tightly in Some complex phenotypes, such as the p53-related one, Among these groups, an optimal subset is then used for clas- are likely to be mixtures of simpler unknown sub-pheno- sification. Given a microarray with Ng genes, there are 2 types at the molecular level, each one characterized by a pos- sibly independent pattern. Methods that rely on a single model are likely to perform poorly with these complex cases, First, we transform the gene expression axis using a as truly there is no single model that describes the entire set.
gene-dependent non-linear metric. This improves the This is verified in where a systematic compara- chances of finding tight clusters in the phenotype set that are tive analysis of the classification performance of several unlikely to occur in the control set (Section 2.1).
algorithms, including and has been performed Second, rather than exploring all potential gene groups using a standard leave-one-out cross-validation scheme.
by brute-force, we use an efficient pattern discovery algo- Results are analyzed based on the sum of false positive and rithm called SPLASH This is discussed in Each discovered pattern is defined by a subset of the genes For simple phenotypes, such as a specific cancer mor- and by the subset of the phenotype set over which these phology, a unique model is sufficient. In this case, perfor- mance is similar for all methods. In more complex cases Third, we discard all patterns that are not be statistically such as with the p53-related phenotype, where multiple significant under a null hypothesis which takes models clearly emerge, our technique outperforms the other into account some statistical properties of the control set, two. We have also performed tests on synthetic datasets that except for the correlations in the expression of different mimic the statistics of the human cancer cell lines. This is genes. In practice, genes are correlated and some patterns useful in determining the practical limits of the technique, may be deemed statistically significant even though they are whether promiscuous patterns have a negative impact on not. We shall call these promiscuous patterns. Promiscuous classification performance, and whether the technique over- patterns, however, are easily identified (see discussion in fits the data, a typical problem of supervised learning algo- and do not create serious consequences in the rithms with many degrees of freedom. Our method is shown Fourth, an optimal set of patterns is chosen among the Finally, the analysis of the sensitivity to the drug statistically significant ones using a greedy set covering Chlorambucil shows consistently good results for both algorithm For typical cases, this set is small, consisting our method and SVM. These are among the first results of one to three patterns. The combined pattern set is used to where drug efficacy is predicted based only on large-scale build a multivariate probability density model. A “control” gene expression data from microarrays. In general, results probability density model is also built for each gene from the clearly indicated that accurate and sensitive phenotype pre- samples in the control set. A standard classification scheme diction, from absolute gene expression levels is possible.
based on the ratio of the two probability densities is then The implication of our study is twofold. It could validate used. This scheme allows us to decide whether or not a pre- the possibility of creating diagnostic tools for the classifica- viously unseen cell belongs to the phenotype set.
tion and identification of several diseases. It could also help We have applied our supervised learning scheme to the devise new tools to predict which one, among a set of alter- classification of 60 human cancer cell lines from data native therapies, may have the highest chances of success obtained with Affymetrix HU6800 GeneChips Cell lines with a pathology linked to a specific cell phenotype. How- ever, we must be extremely cautious in extrapolating fromthe current analysis. The samples we have used are from cell lines rather than patient tissue. As a result, they could be much more homogeneous than real tissue samples. Also, since these are all cancer cells, the set statistics could be quite skewed. Therefore, these results would not be immedi-ately useful as a diagnostic tool. However, we believe thispaper constitutes proof of concept that successful phenotypeprediction can be accomplished from microarray data usingpattern discovery. Given more statistically sound phenotype and control sets, this approach could be used to discover Control-based data normalization. The shaded area multiple sets of marker genes both for diagnostic and thera- between two points (a) measures the distance between them.
2 Methods
In the following sections we will (1) describe rigorously the metric used for distance/similarity measure; (2) describe the pattern discovery algorithm; (3) determine the probabil- In this new variable, the corresponding probability den- ity of patterns to arise spontaneously in the control set; (4) sity Q g(v) for the control set is uniformly distributed and show how patterns can form the basis of a supervised learn- normalized in the interval [0,1]. In Fig. 1b, the probability density is plotted together with the transformed values for 2.1 Metric Definition and Data Normalization
u , u , u , and u . As expected, the Euclidean distance In order to find useful gene expression clusters or pat- is now smaller than that between u terns, we must first define a metric in the space of gene and u , which makes them much more likely candidates for expression values to best distinguish the “signal” (phenotype a cluster. Indeed, if v = f (u) and v′ = f (u′) are two set) from the “noise” (control set). In other words, in design- transformed expression values, we shall take the Euclidean ing an appropriate metric for our problem, we wish to mini- metric in ν as our measure of similarity, or distance, between mize the probability of discovering patterns that would be likely to occur in the negative example set.
Suppose that the expression level u of the g-th gene, in D(u, u′) ≡ v v′ = the control set, is distributed according to a given probability density P g(u) . This density is estimated empirically, by The above equation is intuitively equivalent to the defini- using a sum of Gaussian densities centered around each tion given before. In other words, the distance between two expression measurement in the control set. The standard expression values is chosen to be equal to the integral of the deviation is a function of u and it is also computed empiri- gene expression probability density in the control set cally from repeatability studies. A sufficient number of sam- between these two values. Since, the number of measure- ples is required to measure this density with a sufficient ments in the control set falling between u and u′ is propor- degree of accuracy. In Fig.1a a possible shape for P g is tional to the integral in it follows that the more plotted along with four expression values from hypothetical measurements in the control set fall between two values, the phenotype cells a, b, c, and d: u , u , u and u . Although further apart they are in the new coordinate system and vice that between u and u , the likelihood of getting the former In the following sections, we will use the transformed values by chance is higher because they are very close to the gene expression space. One significant advantage is that, maximum of the expression probability density. In other since the probability density for all genes in the control set is words, if we want to minimize the probability of finding ran- uniformly distributed in the transformed space over the inter- dom clusters in the control set, we must choose a metric such val [0, 1] , it is now possible to analytically compute the sta- tistics of the patterns discovered in the control set. Based on u and u . A natural choice is to renormalize the expres- that, we can assign a statistical significance to patterns dis- sion axis so that the distance between two points on the new axis is equal to the integral of the P g(u) in the previouscoordinate system. This is accomplished by defining a newvariable v obtained by transforming the original variable uwith the following (gene specific) non-linear transformation 2.2 Definition of Gene Expression Patterns
Given a gene vector G = {1, 3, 4} and an experiment vector E = {1, 2, 4} , V
V
0.1 0.2 0.5 0.7 0.5 Ne = 4 expression pattern. We V
because the values in its 2nd and 3rd column are spread over an interval greater than 0.05. The same pattern, π in Expression
is ( δ = 0.1 )-valid but not maximal for the matrix of Fig. 2, Fig. 2: Example of a gene expression
Matrix: the result of a
because adding gene 2 to G, produces π which is still δ - valid. Pattern π is maximal because adding any other gene or experiment yields submatrices that are no longer gene expression levels, the level for each gene being roughly proportional to the concentration of the mRNA transcribed ( j = 2, k = 5 )-pattern.
from that particular gene in the cell. N gene probes in the microarray. N is the number of microar- 2.3 The Pattern Discovery Algorithm
ray samples (i.e., experiments or cells). Thus, a set of DNA Full details of the SPLASH algorithm are given in microarray experiments is conveniently represented by an In that paper, SPLASH was introduced as an algorithm to N × N gene expression matrix V = {v } , where e is
discover patterns in strings, where all possible relative the experiment index and g is the gene index. From the last strings alignment are allowed. Also, a density constraint is to be the transformed expression level introduced to limit the impact of random matches occurring according to of the g-th gene in the e-th sample.
over large distances on the string. For the equivalent associa- If the set is the control set, then the transformed gene expres- tion discovery problem, relevant in this context, the approach will be approximately uniformly distributed.
is analogous as we can imagine each row in the matrix to be Gene vector and Experiment vector: A list of gene
equivalent to a string. However, the strings are prealigned inthe present case. In addition, the density constraint criteria introduced in is no longer meaningful here, as the first 1 ≤ g < g < … < g N is called a gene vector. A and last genes are as likely to form patterns as two corre- E = {e , …, e } , w i t h sponding to contiguous matrix columns.
1 ≤ e < e < … < e N is an experiment vector.
Using the notation of the canonical seed set P has -valid jk-patterns: Let V be a gene expression matrix,
a single pattern with no genes, all the rows, and an offset of 0 then a gene vector G and an experiment vector E for each row. The histogram operator T uniquely define a j × k submatrix V
simply sorting the values in each column and then selecting V. Given δ > 0 , V
all subsets of continuous values that are δ -valid. Non maxi- column is tightly clustered in an interval of size up to mal subsets that are completely contained within another δ . By this we mean that the maximum and the mini- subset are removed. Each subset is a potential superpattern mum value of each column must differ by less than δ.
of a maximal pattern. The enumerate operator T The length of the experiment vector j is called the sup- applied iteratively to create all possible maximal combina-tions of these superpatterns. As a results, all patterns that port of the jk-pattern. Intuitively, if δ is small, each exist in the data are generated hierarchically by combining gene in a jk-pattern is expressed at approximately the together smaller superpatterns, with fewer genes. Non maxi- same level across all the experiments in the experiment mal branches are eliminated at each iteration, as soon as their vector. However, because these are transformed values, corresponding superpattern arises. This contributes to the the actual gene expression interval may be large.
Maximal patterns: A δ -valid jk-pattern is maximal if
the following two conditions hold: (1) it cannot be
2.4 Statistical significance of Patterns in Gene
extended into a δ -valid jk’-pattern, with k′ > k , by Expression Matrices
When gene expression values are organized in a gene expres-
adding genes to its gene vector, and (2) it cannot be sion matrix, jk-patterns may occur for any given value of δ .
extended into a δ -valid j’k-pattern, with j′ > j, by add- Can any of these patterns occur merely by chance? In this ing experiments to its experiment vector.
subsection we address this question by studying the statistics Example. Consider the gene expression matrix V of
of patterns in any N × N matrix, whose elements are sta- tistically independent of each other and have the same proba- Fig. 3: (see matrix in Fig.
to the gene vector of amaximal pattern, e.g., gene Gene Vector {1; 3; 4} {1; 2; 3; 4} {1; 2; 3; 4; 5} bility distribution as that of the control set in the transformed , N ) ≈ ζk[1 – ζ]Ng [1 (1 + j )kδk An important observation is in order at this junction: we do not mean that the expression values of different genes in“real-life” gene-expression matrices are independent random variables. Rather, we intend to use such a model as the null hypothesis of our statistical framework precisely to identify terns in V is
any skew or co-regulation in the phenotype set. This null hypothesis definition is based on two assumptions: (a) that the probability densities for the expression levels of each gene are the same as in the control set, and (b) that the gene N is the total number of ways in which one can choose a expression levels in different experiments and/or those of gene and experiment vector. In we make an different genes are independently distributed. When discov- approximation that is valid when δ is small. This is consis- ering patterns in the phenotype set, the statistical relevant tent with the values used in the experimental section, typi- patterns will be those for which the null hypothesis is rejected. These are patterns whose constituent genes are To verify the validity of and also to show either distributed differently in the phenotype set than in the as a function of j and k, we have per- control set, and/or are expressed in a correlated fashion. Both formed simulations by running pattern discovery on syn- of these features are actually the kind of behavior that we are thetic gene expression matrices, using the statistics of the seeking to differentiate the two sets.
null hypothesis. shows an excellent agreement Of course, many genes are not independently distributed between various theoretical and experimental values of N in the control set. Therefore patterns may arise that reject the null hypothesis and yet are likely to occur in the control set.
ment is observed for other value of the parameters. In We shall call these promiscuous patterns. Promiscuous pat- terns, are easily eliminated in a post-processing phase and do ≈ N [ jδj 1 ( j – 1)δj not contribute significantly to remaining analysis. This is From the analysis of the variance of the number of jk-pat- verified by experimental results in where any terns (not reported here) we have also verified that this is correlation in the control set is artificially removed. Results typically very close to the mean number of jk-patterns, espe- for this set are not different from those on the real data, cially when the latter is small. This result suggests that the showing that gene correlation in the control set is not an distribution of the number of patterns could be well approxi- mated by a Poisson distribution. Indeed the histogram of the Our main result on the statistics of patterns is the follow- number ν of jk-patterns is very well fitted by the distribution ing: given δ > 0 , an N × N gene expression matrix V, a
N e N jk/ν! (data not shown).
k-dimensional gene vector G and a j-dimensional experiment We can use the previous observations to assess the statis- vector E, the probability that the submatrix V
tical significance of a pattern in the phenotype set with respect to the randomized control set. Using classical statis-tics reasoning, we reject maximal δ -valid jk-patterns thatwould be likely to occur in the randomized control set.
Under the null hypothesis, the probability p more jk-patterns occur in the phenotype set is 1. The derivation of this formula is lengthy and will be pub- lished elsewhere. The interested reader can request a draft This will be the p-value or significance level of our statistical test. Thus, setting a reasonable threshold P , we can say that Fig. 4: Average number of δ -valid jk-patterns in randomly generated synthetic data. Continuous curves are the theoretical values. Dots are
experimental values obtained with Splash. N if we observe one or more jk-patterns in the phenotype set < P , we reject the null hypothesis and conjecture that such jk-patterns could be specific of the cell phenotype Using this score, we can easily determine whether promiscu- 2.5 Classification
ous patterns are contained in the set of statistically signifi- Once the statistically significant patterns are found in the cant patterns. Patterns with positive values of S for samples phenotype set, we can use them as classifiers to build a dis- taken from the control set are considered promiscuous. Next criminant function. This function should determine whether we assign the statistically significant patterns a promiscuity or not a previously unseen sample v = (v , …, v
belongs to the phenotype or the control set. To this end we S (v ∈ Control Set) ,
build a model for the probability density function of the S (v) > 0
expression level for each statistically significant pattern π of the phenotype set. Each i-th gene of π contributes with a where the sum runs over all the samples in the control set for factor P (v) . The probability density P is chosen to be which S > 0 . Patterns whose S < 0 for all samples in the normally distributed with mean equal to the average of the control set have a promiscuity index of zero. Patterns can cluster for the i-th gene and standard deviation σ = δ ⁄ 2 .
now be sorted according to the promiscuity index, with the This method is preferred over an empirical derivation from actual measurements because patterns are typically sup- The next step is to associate each pattern π with a cov- erage set, which includes all the samples in the phenotype set For samples in the control set, the same gene would be with a positive score S (v
expressed according to a different probability density Finally, an optimal set of patterns is selected using a P (v) . The latter can be built empirically because all the greedy set covering algorithm to optimally cover the samples in the control set can be used. As discussed earlier, phenotype set. The set covering algorithm tries to use the we use a sum of Gaussian densities with a mean equal to the patterns in sort order according to the promiscuity index: the value of the sample measurement and a standard deviation least promiscuous and most covering pattern is chosen first.
derived from repeatability experiments.
The smallest subset of patterns whose coverage sets opti- On a first order approximation, we shall assume indepen- mally cover the phenotype set is then used for classification dence between genes and take the multivariate distribution to purposes. Therefore, if a non-promiscuous set that optimally be equal to the product of the probability densities of the covers the phenotype set exists, it will be selected over a pro- individual genes, both in the phenotype and in the control set. This assumption is necessary because we do not have enough data to construct a realistic multidimensional proba- ranges between one and three. The score of a previously unclassified sample v is defined as
Promiscuous patterns, which arise from correlations in S(v) = max(S (v), l = 1, …, N ) .
the control set, are likely to play a minor role in the classifi-cation as described in the following discussion. To determine Given a threshold S , the sample fits the phenotype model if a new microarray sample fits the phenotype model of a jk- S . The theoretical false positive (FP) and pattern π for the expression values (v , v , …, v ) over false negative (FN) probabilities can be easily estimated by the k genes that constitute π , we score it by the logarithm of and P over the region where their ratio is greater or smaller than the threshold. If a single classifier isused, S = 0 minimizes the sum of false positive and false negative probabilities In the multivariate model, Sc Fig. 5: Histogram of the log expression of gene 135.
expression of the nonbasal activity for all genes.
must be tuned. S is an useful tunable parameter practically since different problem requires different balance between 3 Results
An Affymetrix HU6800 GeneChip has been used to monitor the gene expression levels of 6,817 full length human genes in 60 human cancer cell lines These are organized into a set of panels for leukemia, melanoma, and In H ( x) is the Heaviside function, cancer of the lung, colon, kidney, ovary, and central nervous ( H ( x ≥ 0) = 1 and H ( x < 0) = 0 ), which results from system. The identity of the genes is not known to the authors.
the integration of the delta function in the u distribution.
They are therefore identified by a numeric id.
For α ≠ 0 , different values of u can correspond to the Genes with expression values of 20 or less are considered same value of v . This is not a problem unless α is of the switched off. From the 6,817 original genes, a subset of 418 same order of δ , in which case we discard the values at u was selected by means of a variational filter to eliminate genes that did not change significantly across samples (varia- 3.1 Phenotype Analysis
The fluorescence intensity φ of each gene, roughly pro- Given a gene expression matrix V, with renormalized values
portional to the mRNA concentration, appears to be lognor- , the pattern discovery algorithm SPLASH is used to find mally distributed. The value of variable u is then chosen as all maximal δ -valid jk-patterns for k ≥ 4 and j ≥ 4 . These u = log (φ ) . In the histogram of a typical gene’s parameters are chosen because patterns with too few genes expression over the 60 samples is shown. This distribution is are not specific enough, while patterns with too small a sup- clearly bimodal. There is a peak at the basal level, corre- port do not characterize a significant consensus in the sponding to the gene being switched off in some experi- dataset. δ is chosen between 0.05 and 0.15, depending on ments. The non-basal expression values, on the other hand, the dataset, such that a sufficient number of patterns is dis- are distributed with a well behaved mean and standard devia- covered, typically on the order of 10 to 50 statistically signif- tion. Thus, we write the corresponding probability density icant patterns. Larger values of δ are possible but they increase the probability of finding promiscuous pattern and reduce performance. In general, the smaller value of δ one P (u ) = α δ(u u ) + (1 – α )P can choose and still discover patterns, the better the results.
where α is the percentage of expression data being at the The threshold of significance P is chosen to be 10 (u ) is the density function for the We discuss experimental results on the classification of 7 non-basal expression values. For each gene, we determine its samples in the melanoma panel, of 17 samples with muta- basal level α , the mean u , and standard deviation σ of its tions in the p53 gene, and of 10 samples whose growth is (u ) . Non-basal values of u are nor- highly inhibited by the drug Chlorambucil. For each experi- mally distributed in accord with the observed lognormal dis- tribution of the φ .This is shown in where we plot the and false negative probabilities as a function of the matching combined distribution obtained by shifting and rescaling the nonbasal activity of each gene as u′ = (u u ) ⁄ σ Three methods are studied: our pattern discovery method (PD), the support vector machine (SVM) method of [15];and the gene by gene method (GBG) of [11]. For each givenphenotype, we use its complement in the NCI-60, excluding Fig. 7: Classification performance for (a) Melanoma, (b) Complex Synthetic phenotype, (c) p53 and (d) Chlorambucil. The sum of the false
positive and false negative probabilities is plotted as a function of the classification score threshold. PD is shown by a thick Solid line, SVM by a
dashed line with diamonds, and GBG by a dotted line with circles.
the samples whose phenotype cannot be accurately deter-
significant range of the match threshold S where both false mined (neutral samples), as the control set.
positive and false negative probabilities are zero. This is con- Given the limited number of samples in the NCI-60 set, sidered perfect recognition. The GBG produces results false positive and false negative ratios are computed by cross which are very similar, although a fraction less accurate. The validation. Each sample both in the phenotype and in the time required to classify a sample with the PD method is control set is removed in turn. The algorithm is trained using the remaining samples, this includes gene axis transforma- p53 Mutation: A more challenging phenotype is that of 17
tion, pattern discovery, and set covering. Finally, the previ- samples for cells with mutations in the p53 gene. The corre- ously removed sample is classified as described in sponding set of cancer morphologies is considerably more When a phenotype set sample is misclassified it is con- complex. It includes 5 melanoma, 3 renal cancer samples, 2 sidered a false negative. When a control sample is misclassi- samples for cancer of the central nervous system, leukemia, fied it is considered a false positive. All computation times ovarian cancer, and breast cancer, and 1 sample for colon reported are relative to a 450MHZ Pentium II.
cancer. As mentioned earlier, this is likely to have several Melanoma: The melanoma panel includes 7 samples. There
sub-phenotypes at the molecular level. This is confirmed by are also 14 neutral samples. These have been selected by our analysis, which also highlights a much wider range of biologists prior to this analysis. When the complete set of variability for the various methods. As shown in the melanoma samples is used for the training, there is only one statistically significant gene expression pattern that is selected after the set covering phase. a shows the per- result, bringing that value to about 0.46. Our pattern discov- formance of the complete analysis, with δ = 0.12 , as ery based approach, with δ = 0.12 , has the best result at described in the previous section. Both SVM and PD show a ) = 0.33 . Three distinct, rather orthogonal pat-
same gene by gene statistics as the control set for the p53 terns are used on average for each sample classification. If study. A set of 48 control samples have been generated from only one pattern is allowed, results become close to that of this model at random. Their gene by gene probability density the SVM method. The time required to classify a sample is virtually identical to that of the real control set in the p53 with the PD method is approximately 20 seconds.
study. A set of 18 phenotype samples has been synthetically Chlorambucil GI50: Some truly interesting phenotypes are
generated. This set consist of three independent sub-pheno- associated to the ability of a given drug to inhibit cell types of 6 samples each. Each sub-phenotype is character- growth. These are relevant because many experimental anti- ized by 10 marker genes clustered around a tight interval.
cancer compounds exhibit relatively poor growth inhibition Remaining genes are modeled as in the control set. Marker rates across large variety of cancer cells of similar morphol- genes are different for different sub-phenotype with some ogy. If one could however correlate the effectiveness of a overlap. In particular, sub-phenotype 1 and 2 have 6 marker compound to the much richer space of the gene expression genes in common; sub-phenotype 2 and 3 have 2 marker profile of a cell, it could be possible to determine a-priori genes in common. Marker genes are expressed differently which cells are most likely to be inhibited by a drug. To test than in the control according to the following criteria: 1) they this scenario, we have selected Chlorambucil (NSC 3088) have a different mean located about 0.5σ away from the from the NCI anti-cancer database. Since the growth inhibi- control mean, 2) they have a smaller standard deviation tion rate is distributed rather continuously over the entire 0.33σ , where σ is the standard deviation of the same gene NCI-60 spectrum, we have split the samples in three groups.
in the control set. As shown in there is a dramatic dif- The phenotype group, contains the 10 cells that are most ference between the performance of the SVM method and inhibited by Chlorambucil. The control group contains the that of the PD method. The minimum of p 20 samples whose growth is least inhibited by the com- for the SVM method and 0.19 for the PD method. About pound. The third set of 30 cells is considered neutral. As 80% of the genes composing the sub-phenotypes are cor- shown in the SVM and PD methods perform simi- rectly identified by the 3 resulting patterns. Of course, we larly, with a slight advantage towards the former. Best values must be careful not to draw conclusions from this simple are 0.35 and 0.4 respectively. For the PD method, a minded exercise. Yet, this seems a good indication that the value of δ = 0.12 is used. The other method cannot to bet- PD method is a suitable choice for the classification of some ter than 0.55. The time required by the PD method to classify complex phenotypes that may be mixtures of simpler sub- The second synthetic data set has been designed to deter- 3.2 Synthetic data analysis
mine whether correlation of genes in the control set is a sig- Several cross-validation checks using synthetic or random- nificant factor and could reduce the performance of the ized data have been performed to validate our approach.
technique. To accomplish this goal, the values of the genes Three synthetic data sets are analyzed.
have been randomly permuted only across the control set on The first test has been designed to evaluate the theoretical a gene by gene basis. This has the effect of leaving the performance of the algorithms in the case of phenotype mix- expression probability density for each gene for the control tures. A synthetic data model has been generated with the virtually unchanged, while removing any possible correla-tion between the values of Results for the classification are shown in (squares).
There are no major differences with respect to the same curve for the real data of and reproduced in as the thick solid line. This proves that correlation in the geneseven though present in the data does not result in classifiers that are highly correlated over the control set.
Finally, we have designed a test to determine whether this approach may suffer from overfitting the data. To thatend, classification has been performed using the same data and criteria as for the p53 phenotype study but after the expression values of the individual genes have been ran-domly permuted across all the samples on a gene by gene basis. The results of the classification are shown as triangles in As clearly shown, performance is very poor, with a consistently larger than 1 over the entire clas- Fig. 8: Performance of the PD method with the actual p53 training
sification threshold interval. The PD method, as well as the randomized control and phenotype sets (triangles).
SVM and GBG methods, exhibits no predictability for these data sets, i.e., the sum of the false positive and the false neg- Hart, Laxmi Parida, and Ruud Bolle for many useful discus- ative rates is close to 1, as it should be.
sions on pattern discovery and statistics, Donna Slonim for acareful reading of the manuscript and Hilary Coller for very 4 Summary and Conclusions
helpful insights on the NCI-60 data.
Based on a combinatorial multivariate approach, we have developed a systematic framework for cell phenotype classi- 6 References
fication from gene expression microarray data. We have used Lockhart, D. J.; Dong, H.; et al. (1996). Expression SPLASH, a deterministic pattern discovery algorithm, to dis- monitoring by hybridization to high-density oligonu- cover all gene expression patterns on a given data set.
cleotide arrays. Nature Biotechnol. 14:1675-1680.
We have then evaluated analytically the statistical signifi- Brown, P.O.; and Botstein, D. (1999). Exploring thenew world of the genome with DNA microarrays, cance the patterns. The set of statistically significant patterns form the basis our classification scheme. A scoring system, DeRisi, J.; Penland, L; et al. (1996). Use of a cDNA based on the ratio of the probabilities between the phenotype microarray to analyse gene expression patterns in and the control sets is constructed in accordance with the human cancer. Nature Genetics 14:457-460.
multivariate nature of the patterns.
Wodicka, L.; Dong, H.; et al. (1997). Genome-wide We have applied our classification method to gene expression monitoring in Saccharomyces cerevisiae.
expression data from 60 human cancer cell lines. Results for the classification of melanoma, p53 mutations and the GI Cho, R. J.; Campbell, M. J.; et al. (1998). A genome- wide transcriptional analysis of the mitotic cell cycle.
activity of Chlorambucil are excellent. They range from 0% to about 40% sum of false positive and false negative proba- Chu, S.; DeRisi,J.L.; et al. (1998). The transcriptional bility. The high sensitivity and specificity of the method for program of sporulation in budding yeast. Science complex phenotypes such as p53 show that the method can successfully deal with multiple independent sub-phenotypes.
Iyer, V. R.; Eisen, M.B.; et al. (1999). The transcrip- We also report results from one of the first attempts to pre- tional program in the response of human fibroblasts to dict drug effectiveness from gene expression data.
We compare our method with other supervised learning DeRisi, J.L.; Iyer, V.R.; et al. (1997). Exploring themetabolic and genetic control of gene expression on a schemes: the gene by gene method of and the support vector machine method of The classification based on Perou, Ch.; Jeffrey, S.S.; et al. (1999). Distinctive gene pattern discovery performed almost as good or better than expression patterns in human mammary epithelial cells the other methods. However these comparisons depend and breast cancers, Proc Natl Acad Sci U S A 96:9212- strongly on the data set under classification. One relevant conclusion in this context is that our approach is especially [10] Alon, U.; Barkai, N.; Notterman, D.A.; Grish, K.; Yba-
well suited to treat complex phenotypes, composed of sev- rra, S.; Mack, D.; and Levine, A.J. (1999). Broad pat-terns of gene expression revealed by clustering analysis eral sub-phenotypes. We showed that such is the case for the of tumor and normal colon tissues probed by oligonu- p53-related phenotype and for a synthetic data set.
cleotide arrays. Proc Natl Acad Sci U S A 96:6745- Besides the better predictive power, another advantage of our method over SVM is that our method highlights the rele- [11] Golub, T.R.; Slonim, D.K. ; et al. (1999), Molecular
vant marker genes, their expression range in the phenotype, classification of cancer: class discovery and class pre- and the independent patterns that relate them. Such informa- diction by gene expression monitoring. Science
286:531-537.
tion is highly desirable for discovering the mechanism for [12] Eisen, M. B., Spellman, P. T.; et al. (1998). Cluster
various diseases at the molecular level. The SVM method, on analysis and display of genome-wide expression pat- the other hand, is more like a black box for classification.
terns. Proc Natl Acad Sci U S A 95:14863-14868.
The method described in this paper is a significant contri- [13] Tamayo, P., Slonim, D.; et al. (1999). Interpreting pat-
bution to the set of tools for the analysis of gene expression terns of gene expression with self-organizing maps: microarray data. It constitutes proof of concept for a range of methods and application to hematopoietic differentia- important practical applications for diagnostics and for the tion. Proc Natl Acad Sci U S A 96: 2907-2912.
design of highly specific therapies. It may also help under- [14] Ben-Dor A and Yakhini Z. (1999). Clustering Gene
Expression Patterns. In Proc. of the 3rd International standing the structure of the underlying gene regulatory net- Conference on Computational Molecular Biology, 33- works and ultimately the mechanism responsible for various [15] Brown, M.P.S.; Grundy, W.N.; Lin, D.; Cristianini, N.;
Sugnet, C.; Ares, M.; and Haussler, D. (1999). Support 5 Acknowledgments
Vector Machine Classification of Microarray Gene Special thanks go to the Whitehead Institute team, Jill Expression Data, University of California Technical Mesirov, Donna Slonim, and Pablo Tamayo for the Gene Report USCC-CRL-99-09. Available at: http:// Expression datasets. We also thank Ajay Royyuru, Reece www.cse.ucsc.edu/research/compbio/genex.
[16] D’haeseller, P.; Wen X.; Fuhrman, S.; and Somogyi, R.
(1998). Mining the Gene Expression Matrix: InferringGene Relationships from Large Scale Gene ExpressionData. In Information Processes in Cells and Tissues,203-212, Paton, R.C. and Holcombe, M. Eds., PlenumPublishing.
[17] Califano, A. (1999), SPLASH: Structural Pattern
Localization Algorithm by Sequential Histograming.
Bioinformatics, in press. Preprints available at http://www.research.ibm.com/topics/popups/deep/math/html/splashexternal.PDF.
[18] Chvatal, V. (1979) . A greedy heuristics for the set cov-
ering problem. Math. Oper. Res. 4:233-235.
[19] Welch, B.L. (1939). Note on Discriminant Functions.
[20] Lehmann, E.L. (1986). Testing Statistical Hypotheses.
[21] Weinstein, J. N.; Myers, T. G.; et al. (1997). An infor-
mation-intensive approach to the molecular pharmacol-ogy of cancer. Science 275:343-349.
[22] Various activity data for Chlorambucil on the NCI-60
cell lines can be found by using NSC access number3088 on site http://dtp.nci.nih.gov.
  • Fig. 9: Normalized probability density: log- expression of the nonbasal activity for all genes.
  • Source: ftp://ftp.npaci.edu/pub/sdsc/biology/ISMB00/154.pdf

    2tunnel.ch

    Utente e-GdP: camera - Data e ora della consultazione: 2 febbraio 2011 11:13 GIORNALEdelPOPOLO G.D.P. DEL 02.02.2011 NEWS CANTONE SAN GOTTARDO Formigoni esprime solidarietà al Consiglio di Stato 2010 Tribunale penale Più processi «Senza raddoppio rimane per i reati isolata anche la Lombardia» contro la vita L’incontro di ieri Anche nel 2010 non è mancato il lavoro

    Microsoft word - form6 application form complete.doc

    Poisons Act 1971 Section 27 Poisons Regulation 2002 62(2)(a) APPLICATION FOR A LICENCE TO SELL OR SUPPLY CERTAIN SUBSTANCES To the Minister for Health and Health Services I, . (name, address and nature of business) hereby apply for a licence/renewal of licence to sell or supply the following substances to which Section 27 of the Poisons Act 1971 applies: SCH

    Copyright © 2011-2018 Health Abstracts