Confident Identification of Relevant Objects Based on Nonlinear Rescaling Method and Transductive Inference Shen-Shyang Ho Department of Computer Science George Mason University 4400 University Dr., Fairfax, VA 22030 [email protected]

Abstract We present a novel machine learning algorithm to identify relevant objects from a large amount of data. This approach is driven by linear discrimination based on Nonlinear Rescaling (NR) method and transductive inference. The NR algorithm for linear discrimination (NRLD) computes both the primal and the dual approximation at each step. The dual variables associated with the given labeled dataset provide important information about the objects in the data-set and play the key role in ordering these objects. A confidence score based on a transductive inference procedure using NRLD is used to rank and identify the relevant objects from a pool of unlabeled data. Experimental results on an unbalanced protein data-set for the drug target prioritization and identification problem are used to illustrate the feasibility of the proposed identification algorithm.

1. Introduction The goal of the ranking problem is to learn an ordering over objects. Based on the ordering, one can identify the most relevant objects from a large amount of data. The ranking problem occurs in many real-life problems. In particular, the ranking problem is the core problem in search engine construction. The objective is to order web-pages that are most likely to be the ones a user is searching. Another real-life problem is label-ranking. For such a problem, given a predefined set of labels, one attempts to order the labels for a given object given some criteria. The most relevant objects will be ranked among the highest for easy identification. In the drug discovery problem, one attempts to order the large number of proteins according to their potential to be an approved drug. The objective is to reduce the time needed during the drug identification stage

Roman Polyak Department of SEOR and Department of Mathematical Sciences George Mason University 4400 University Dr., Fairfax, VA 22030 [email protected]

in a wet-lab, i.e., speedup the drug discovery process. In this paper, we proposed a methodology to rank and identify relevant objects based on the nonlinear rescaling (NR) method [3, 4] and transductive inference [5]. The NR method has been applied to problems that required extremely precise and accurate solutions such as the radiotherapy treatment planning for cancer treatment [1]. Our proposed methodology characterizes ranking and identification as a classification problem. Given a training data-set consisting of both positive and negative examples, a discriminating hyperplane constructed attempts to separate the positive and negative examples. The linear discriminating function based on NR method called NRLD is motivated by the support vector machine (SVM) [5]. It follows from NRLD that each example in the training data-set is associated with a unique Lagrange multiplier. Its value characterizes the “cost” of its “non-separability” from the discriminating hyperplane. The two distinct differences between the NRLD and the classical SVM is that (i) the Lagrange multipliers of the classical soft-margin SVM is upper-bound by the predefined penalty C while the Lagrange multipliers of NRLD are unbounded positive values, and (ii) the Lagrange multiplier of each example computed from NRLD is unique. The Lagrange multiplier from NRLD can be used to order the examples in the data-set. The main contributions of this paper are (i) the introduction of the recently developed Nonlinear Rescaling (NR) method in Optimization Theory to the data mining community, (ii) linear discriminant function based on NR method (NRLD), and (iii) the confidence score based on NRLD and transductive inference for ranking, and in particular to the identification of relevant objects from a large pool of data. The paper is organized as follows. In Section 2, we describe the NR method and review the basic convergence results. In Section 3, we derived the NR solution (NRLD) for the linear discrimination problem. In Section 4, we

described our proposed confidence score for the ranking problem based on a transductive inference procedure using NRLD. In Section 5, we apply the proposed confidence score to a drug target prioritization problem to show its feasibility.

2. Nonlinear Rescaling Method

between an unconstrained minimization L(x, λ, k) in
In this section, we briefly introduce the nonlinear rescaling (NR) method and the basic convergence results. Let −∞ < t0 < 0 < t1 < ∞. We consider a class Ψ of twice continuously differentiable functions ψ : (t0 , t1 ) → <, which satisfy the following properties:

λs+1 = ψ 0 (kci (xs+1 ))λsi , i = 1, · · · , n. i

2. ψ 0 (t) > 0;

(5)

From (4)–(5), we have

3. ψ 00 (t) < 0. The function ψ ∈ Ψ is used to transform the constraints of a given constrained optimization problem into an equivalent set of constraints. Let f :
(1)

∇x L(xs+1 , λs , k) = ∇x L(xs+1 , λs+1 ) = 0 (6) P where L(x, λ) = f (x) − λi ci (x) is the classical Lagrangian for the original problem (1). Therefore, xs+1 = arg min{L(x, λs+1 )|x ∈
m

where Ω = {x ∈ < : ci (x) ≥ 0, i = 1, · · · , n}. It follows from properties 1.–3. that for any given scaling parameter k > 0, we have Ω = {x : k −1 ψ(kci (x)) ≥ 0, i = 1, · · · , n}

d(λs+1 ) = L(xs+1 , λs+1 ) where d(λ) = inf x∈
Therefore, for any k > 0, the following problem ∗

0

and updating the Lagrange multipliers by the formula:

ψ 0 (0) = 1;

1. ψ(0) = 0,

i=1

=



x ∈ X = arg min{f (x)|k

−1

ψ(kci (x)) ≥ 0, i = 1, · · · , n}

d(λ∗ ) = arg max{d(λ)|λ ∈
is equivalent to the original convex optimization problem (1). The classical Lagrangian L :
n X

λi ψ(kci (x)),

(3)

i=1

which corresponds to problem (2) is the main tool in developing NR methods for solving the constrained optimization problem 1 . We use the shifted logarithmic barrier function ψ(t) = ln(t + 1), which leads to the modified barrier functions theory and methods [3]. Each step of the NR method alternates 1 Throughout this paper, < means non-negative real number, i.e. r ≥ + 0 and <++ means strictly positive real number, i.e. r > 0.

(7)

The following theorems establish the convergence properties of the NR method (4)–(5). Theorem 1 [3] If the standard second order optimality conditions are satisfied and f , ci , i = 1, · · · , n are smooth enough then there is k0 > 0 large enough that for any k ≥ k0 , the following bounds hold a) b)

||xs+1 − x∗ || ≤ ck −1 ||λs − λ∗ || ||λs+1 − λ∗ || ≤ ck −1 ||λs − λ∗ ||

(8)

and the constant c > 0 is independent of k. Theorem 2 [4] If (2) is a convex programming problem, Slater’s conditions are satisfied and X ∗ is a bounded set, then for any k > 0 the NR method (4)–(5) generates the primal-dual sequence {xs , λs } such that: 1. lims→∞ λs = λ∗ ,

2. lims→∞ f (xs ) = lims→∞ d(λs ) = f (x∗ ) = d(λ∗ ), 3. for any converging subsequence {xse }, lim xse = x∗ ∈ X ∗ .

se →∞

The NR method (4)–(5) requires finding an unconstrained minimizer xs+1 of L(x, λs , k) at each step which is generally speaking an infinite procedure. In [3] a stopping criteria was introduced that allows replacing xs+1 in (5) by an approximation x ¯s+1 , which does not require infinite procedure and maintains the convergence properties of the NR method.

3. Linear Discrimination via Nonlinear Rescaling (NRLD) For a given set of labeled data points {(ai , yi ) ∈
∆ =

max

min d(ai , h)

||w||2 =1,b i∈I

By introducing ∆ = mini∈I d(ai , h), one can rewrite the problem of finding ∆∗ as follows: ∆ → max

(9)

subject to ci (x) ≡ = ci (x) ≡ = 2 ||w|| =

ci (w, b, ∆) (w, ai ) − b − ∆ ≥ 0, i ∈ I+ ci (w, b, ∆) −(w, ai ) + b − ∆ ≥ 0, i ∈ I− 1

(10) (11) (12)

where I+ and I− consist of positively and negatively labeled data points respectively. To describe the NR method for solving the problem (9)– (12), we consider an equivalent problem. For any given positive parameters k > 0, τ > 0 and a transformation ψ ∈ Ψ, the following problem: −τ ∆ → min

(13)

subject to k −1 ψ(·) = k −1 ψ(kci (x)) ≥ 0, k −1 ψ(·) = k −1 ψ(kci (x)) ≥ 0,  1 ||w||2 − 1 = 0 2

i ∈ I+ i ∈ I−

(14) (15) (16)

is equivalent to (9)–(12). The classical Lagrangian L(·)

= L(w, b, ∆, λ, γ, τ ) = −τ ∆ − k −1 Σi∈I+ λi ψ(kci (x)) −k −1 Σi∈I− λi ψ(kci (x))  1 +γ ||w||2 − 1 2

(17)

for the problem (13)–(16) is our basic tool. We use the Lagrangian L(·) to describe the Nonlinear Rescaling Linear Discrimination (NRLD). NRLD solves the problem (13)–(16) which consists of finding the minimum of the Lagrangian (17) for the equivalent problem in x = (w, b, ∆), and then updating the Lagrange multipliers λ = (λ1 , · · · , λn ) and τ . The scaling parameter k can be fixed or updated at any iteration. Let  > 0 be small enough. We describe the NR method for solving (13)–(16) given a fixed positive scaling parameter k as follows: 1. Find x b = arg min{L(x, λ, γ, τ, k)|x ∈
(18)

which is equivalent to solving the following system of equations: = −Σi∈I+ λi ψ 0 (·)ai +Σi∈I− λi ψ 0 (·)ai + γw = 0 ∇∆ L(·) = −τ + Σi∈I+ λi ψ 0 (·) +Σi∈I− λi ψ 0 (·) = 0 ∇b L(·) = Σi∈I+ yi λi ψ 0 (·) +Σi∈I− yi λi ψ 0 (·) = 0 ∇w L(·)

(19)

(20)

(21)

2. Update the Lagrange multipliers by the formula: [ bi = λi ψ 0 (·), i ∈ I+ I− λ (22) 3. Find γ b from ||w|| b 2 = 1 where   bi ai − Σi∈I λ ba w b = γ −1 Σi∈I+ λ − i i

(23)

4. Compute τb =

bi + Σi∈I λ b Σi∈I+ λ − i

(24)

bi τb−1 , i = 1, · · · , n) (λ

(25)

5. Set b λ

:=

b > , then set (x, λ, γ, τ ) := If ||λ − λ|| b (b x, λ, γ b, τb) and go to step 1. Else x∗ = x, λ∗ = λ. To make the NRLD practical we replace x ˆ by an approximation using a stopping criteria established in Lemma 2 in [3].

4. Confidence Score for Ranking and Identification via NRLD and Transductive Inference It follows from NRLD that each data vector in the training data-set is associated with a unique Lagrange multiplier. Its value characterizes the “cost” of the “non-separability” from the discriminating hyperplane. The Lagrange multiplier plays an important role in our proposed confidence score. Let X be the set of objects that one would like to have the objects ranked or ordered. First, we describe the transductive inference step used in our confidence score (assuming a binary-class data-set): Transductive Inference Procedure using NRLD (TNRLD) : Given x ∈ X. One labels x as a positive vector and performs the NRLD to obtain a Lagrange multiplier λxp for x. Then one labels x as a negative vector and performs the NRLD again to obtain a new Lagrange multiplier λxn for x. When the true identity of x is positive, λxp is most likely to be small while λxn is most likely to be big, and vice versa when x is, in fact, negative. If the training data-set is balanced, i.e. both the number of positive and negative data vectors are (nearly) equal, then by performing the above procedure only once, one can rank the objects in X according to λxp and λxn of each x ∈ X. On the other hand, when the training data-set is highly unbalanced, we repeat the procedure a number of times for an object to get a confidence score for ranking. The algorithm that computes a confidence score Sx for an object x based on TNRLD when the training set is unbalanced is described in Algorithm 1. The confidence scores computed using Algorithm 1 for the set of objects are used to establish order among the objects.

The following indicator function is used to identify an object based on a fixed threshold θ:  1, Sx > θ; D(Sx , θ) = (26) 0, otherwise. i.e. an object x is likely to have positive identity when Sx > θ. Suppose we have two objects p1 and p2 with confidence scores Sp1 and Sp2 respectively. Assuming that Sp1 > Sp2 > θ, then p1 is more relevant than p2 . Hence, p1 has a higher priority than p2 . Algorithm 1 : Confidence score based on TNRLD Input : Training set T = {(a1 , y1 ), · · · , (an , yn )} where yi ∈ {+1, −1} with T highly unbalanced, i.e. without loss of generality, |I+ | << |I− |, and an object x ∈ X. Output: A confidence score Sx . Set: cp := 0 and number of trials, t := t0 ; 1: for i = 1 to t do 2: Construct a new negative set consisting of |I+ | data vectors by randomly sampling |I+ | data vectors from the set {(ai , −1)|i ∈ I− }; 3: Perform TNRLD; 4: if λxp < λxn then 5: cp = cp + 1; 6: end if 7: end for cp 8: Sx := t In the next section, we apply the confidence score computed by Algorithm 1 to a highly unbalanced protein dataset to show its feasibility to identify drug targets.

5. Application: Prioritizing and Identifying Drug Targets First we describe the protein data-set. Then the experimental design is described. Finally, the experimental results are discussed.

5.1. Protein Data-Set Description. The data-set consists of 13305 human proteins extracted from UniProt/Swiss-Prot. The UniProtKB/Swiss-Prot Protein Knowledgebase is a curated protein sequence database that provides a high level of annotation, a minimal level of redundancy and a high level of integration with other databases. The features of each protein consist of length, molecular weight and the amino acids composition (a 20component vector c such that ci ∈ (0, 1), i = 1, · · · , 20.). 299 proteins are known targets of approved drugs, i.e. FDA

approved small molecule drugs and biotech drugs. 724 proteins are known targets of experimental drugs, i.e. unapproved drugs, de-listed drugs, illicit drugs, enzyme inhibitors and potential toxins. 90 of the 299 approved drugs are also found in the set of targets of experimental drugs. The remaining 12372 proteins are considered negative samples where a small number of them may be unknown drug targets.

than using confidence score based on kernel SVM, which is, in turn, larger than using confidence score based on linear SVM. This implies that identification of drug targets using (26) with confidence score based on NR-method has better average (classification) performance than using confidence score based on linear SVM or kernel SVM.

5.2. Experimental Design. 209 known targets of the approved drugs, not in the set of targets of experimental drugs, are included into the positive training set. The 12372 negative proteins are included into the negative training set. The 90 targets of approved drugs also found in the set of targets of experimental drugs are used as positive test examples. 90 negative proteins are used as negative test examples. Hence, we have a total of 180 test examples. The 90 negative proteins are excluded from the sampling process in Step 2 of Algorithm 1. In the experiment, t = 100. For comparison purposes, we replace TNRLD in Algorithm 1 with the transductive inference procedure either using linear SVM or kernel SVM. When linear SVM is used, C = 10000. When kernel SVM is used, Gaussian kernel is used with σ = 1 and C = 1000000. These parameters are chosen to minimize the number of support vectors and to achieve best classification performance (on the training set) within reasonable computational time.

5.3. Experimental Results. In the experiment, confidence scores of the 90 positive and 90 negative test proteins are computed using Algorithm 1 with the number of trials t = 100. Then the confidence scores are computed again with the NRLD in TNRLD replaced by the linear SVM and the kernel SVM. The confidence score Sx is used to make decision on whether a protein is a drug target that is likely to become an approved drug (i.e. positive) based on a pre-defined threshold θ, i.e. a protein x is positive when Sx > θ; otherwise, x is negative. We vary this threshold θ from 0 to 1 to construct a Receiver Operating Characteristics (ROC) graph [2] (see Figure 1). One observes from Figure 1 that the identification of drug target using (26) with confidence scores based on NR method, linear SVM, or kernel SVM is unlikely to give a false alarm that a negative test protein is a drug target. However, in terms of identifying positive test proteins as drug targets, confidence scores based on NR method outperforms confidence score based on the other two methods. One observes that the Area under an ROC curve (AUC) for using confidence score based on NR method is larger

Figure 1. Receiver Operating Characteristics (ROC) graphs for identification of drug targets using (26) with confidence scores based on NR method, linear SVM and kernel SVM.

From Figure 2 (Top), one can see that for any threshold θ ∈ [0, 1], the true positive rate for identifying the drug target is always higher using the confidence scores based on NR method than using the confidence score based on either linear SVM or kernel SVM. It follows from Figure 2 (Bottom) that the false positive rate is about the same for the three methods when θ varies from 0 to 1. The slightly higher false positive rate of NR method is compensated by its consistently higher true positive for θ ∈ [0, 1]. From Figure 2, one can choose θ = 0.1 when the confidence scores based on NR method is used for identifying drug targets such that the true positive rate is about 0.8 and false positive rate is less than 0.05. The numbers of positive and negative test proteins in confidence score intervals [0.1(i − 1), 0.1i], i = 1, · · · , 10 are shown in the top and bottom histograms in Figure 3 for TNRLD. One notes that the confidence score Sx is meaningful as a positive protein has larger Sx (> 0.1), i.e. a protein with larger Sx is likely to be a drug target of an approved drug. When NRLD in the transductive inference procedure in Algorithm 1 is replaced by linear SVM, the confidence scores are not useful in identifying potential drug targets. More than 60 of the 90 positive test proteins have confidence scores less than 0.1. Also, all the negative test proteins have confidence scores less than 0.1. It is hard to discriminate between negative and positive proteins. When

Figure 3. Confidence scores computed using Algorithm 1: Histogram shows the proportion of test proteins (positive and negative) in different confidence score intervals.

score of between 0.4 and 0.5 (the exact score is 0.47). This negative test protein may be a potential approved drug that deserves further investigation.

Acknowledgement Figure 2. True positive rate (Top) and false positive rate (Bottom) of drug targets identification using (26) with confidence scores based on NR method, linear SVM and kernel SVM when θ varies from 0 to 1.

NRLD in the transductive inference procedure in Algorithm 1 is replaced by kernel SVM, it performs slightly better than linear SVM. However, still about half of the positive test proteins and about 85 of the 90 negative test drug targets have confidence scores less than 0.1. The ability to identify the potential drug targets is still relatively weak. Hence, the confidence score computed using TNRLD identifies potential drug targets much better than the other two confidence scores based on linear SVM and kernel SVM. The main problem using the Lagrange multipliers from linear SVM or kernel SVM to compute confidence scores lies in the fact that for many x ∈ X, λxp = λxn . One suggestion to overcome this problem for SVM is to use (w, x) − b for an object x instead of the Lagrange multiplier. Finally, we note that a small number of the negative samples may actually be drug targets that are likely to be approved drugs unknown to us. From Figure 3, we observe that one negative protein stands out and has a confidence

The authors thank Professor Jeffrey Skolnick and his research group from the Center for the Study of Systems Biology at Georgia Institute of Technology for the protein dataset. In particular, the data-set was prepared by Dr. Ying Huang. The research was supported by NSF Grant CCF0324999. The first author was also supported by the graduate research assistantship from the Volgenau School of Information Technology and Engineering at George Mason University.

References [1] M. Alber and R. Reemtsen. Intensity modulated radiotherapy treatment planning by use of a barrier-penalty multiplier method. Optimization Method and Software, 22(3):391–411, 2007. [2] T. Fawcett. Roc graphs: Notes and practical considerations for researchers. Technical Report HPL-2003-4, HP Labs, 2003. [3] R. Polyak. Modified barrier functions (theory and methods). Mathematical Programming, 54:177–222, 1992. [4] R. Polyak and M. Teboulle. Nonlinear rescaling and proximal-like methods in convex optimization. Mathematical Programming, 76:265–284, 1997. [5] V. N. Vapnik. The nature of statistical learning theory. Springer, 2nd edition, 2000.

Confident Identification of Relevant Objects Based on ...

in a wet-lab, i.e., speedup the drug discovery process. In this paper, we ... NR method has been applied to problems that required ex- tremely precise and ...

406KB Sizes 0 Downloads 198 Views

Recommend Documents

Identification of Time-Varying Objects on the Web
sonal names account for 5 to 10% of all Web queries[11]. General-purpose search engines .... ing social networks among persons [2]. However, in previous.

Person Identification based on Palm and Hand ... - Semantic Scholar
using Pieas hand database is 96.4%. 1. ... The images in this database are captured using a simple .... Each feature is normalized before matching score to.

Methods and compositions for phenotype identification based on ...
Jul 9, 2004 - ing Analytical Data,” J. Chem. Inf. Comput. Sci. 38: 1161-1170. (1998). Caldwell and Joyce, PCR Methods and Applications 2:28-33 (1992).

Polony Identification Using the EM Algorithm Based on ...
Wei Li∗, Paul M. Ruegger†, James Borneman† and Tao Jiang∗. ∗Department of ..... stochastic linear system with the em algorithm and its application to.

A Lane Departure eparture eparture Identification based on PLSF ...
Abstract. In this paper, a technique for identification of unwanted lane departure of a travelling vehicle on a road is proposed. The piecewise linear stretching function (PLSF) is used to improve the contrast level of the region of interest (ROI). L

Person Re-identification Based on Global Color Context
which is of great interest in applications such as long term activity analysis [4] and continuously ..... self-similarities w.r.t. color word occurred by soft assignment.

A Lane Departure eparture eparture Identification based on ... - IJRIT
Self-clustering algorithm, fuzzy C-mean and fuzzy rules were used to ..... linear regression, Computer Vision and Image Understanding 99 (2005) 359–383.

Off-line Chinese Handwriting Identification Based on ... - IEEE Xplore
method for off-line Chinese handwriting identification based on stroke shape and structure. To extract the features embed- ded in Chinese handwriting character, ...

Person Identification based on Palm and Hand ... - Semantic Scholar
amount of variance among the images and the last dimension of this subspace ... A covariance matrix is created by multiplying the data matrix with its transpose.

Rotation Invariant Retina Identification Based on the ...
Department of Computer, University of Kurdistan, Sanandaj, Iran ... Biometric is the science of recognizing the identity of a person based .... degree of closeness.

Chinese Writer Identification Based on the Distribution ...
which it's one of the global features, and compared the discriminability with ..... [4] G. Leedham and S. Chachra, “Writer identification using innovative binarised ...

Methods and compositions for phenotype identification based on ...
Jul 9, 2004 - http://www.mjresearch.com/html/consumables/ealing/ sealinggproductshtml. ...... Cleavage product characterization legend: MAIN = regular ...

Comment on ``Identification of Nonseparable ...
Jun 25, 2015 - In all other cases, the results in Torgovitsky (2015) are ei- ther not covered by those in D'Haultfœuille and Février (2015), or are obtained under.

A Novel Technique of Fingerprint Identification Based ...
Dr. H. B. Kekre is with Department of Computer Science, MPSTME,. NMIMS University ..... Int. Journal of Computer Science and Information Technology (IJC-. SIT) Vol. 01, No. ... M.E.(Computer Engineering) degree from. Mumbai University in ...

Knowledge-based parameter identification of TSK fuzzy ...
Available online 3 September 2009. Keywords: ... identification of consequent parameters in order to have a good .... signifies the degree of closeness of the rth rule center to the center ..... quadratic programming to obtain optimal values of mr.

Identification of putative trait based markers for ... - Semantic Scholar
low productivity of Eucalyptus plantations in India, ... at http://dendrome.ucdavis.edu/ index.php. In eucalypts ... The present paper highlights the development of.

Knowledge-based parameter identification of TSK fuzzy ...
nonlinear input to output mapping is achieved by quantifying a domain expert's ... form that makes the identification of TSK models from historical process data far ... define the characteristics of these fuzzy sets such as their shapes and spread.

Audio-based video genre identification
The genre is one of these metadata that could help organize videos in large categories. ...... degrees in computer science from the University of Avignon, Avignon ... 10 years, he was a research staff, then project man- ager at the IBM France ...

ICA-based Identification of Overlapping Spatial Clusters ...
determine the influence of each IC on the observed signal at each electrode, thus allowing electrodes (and the .... an action verb (e.g., 'apple' → 'eat'). ECoG is ...

A Novel Technique of Fingerprint Identification Based ...
Department, MPSTME, NMIMS University, Mumbai India. I. Fig. 1. Different .... ternational Conference on Computer Networks and Security. (ICCNS08) held at ...

Identification of putative trait based markers for Genetic ... - CiteSeerX
carbon neutral renewable energy and raw material for paper and solid ... on further validation can provide resources for identification of ... (Table 2). Template DNA (50 ng) was amplified in a reaction volume of 10µL containing 1.0 L 10X PCR.

On Identification of Hierarchical Structure of Fuzzy ...
Definition 2.2 (Choquet integral). For every measurable function f on X, can be writ- ten as a simple function f = n. ∑ i=1. (ai − ai−1)1Ai + m. ∑ i=1. (bi − bi−1)1Bi ,.

Retrieval of 3D Articulated Objects using a graph-based representation
called protrusion function, pf() [APP. ∗ ... the minimum cost paths between the representative salient .... The optimal cost of the optimization process is the EMD.