Background

Determining the interaction topology in large-scale biological systems has been an active area of research for some time now. Most methodologies that deal with high-throughput experimental data make use of information about the behavior of the system locally around the steady-state [13]. For example, a class of techniques that fall under the rubric of 'stationary state Jacobian Matrix Elements' analyzes the system behavior when it is perturbed locally from steady-state and looks at whether the concentration of one species is increased or decreased when another species' concentration is increased. In [4] and [5], the authors have built on this approach and determined the functional interactions in cellular signaling and gene networks by taking into account the 'modular' structure of the networks in question. Alternatively, inferences about the topology of the network can be made by introducing pulse changes in concentration of a chemical species in the network, and observing the network's response, concluding causal chemical connectivities [6]. In [3], a linear dynamical system was considered to represent a gene regulatory network, and an approach, based on Linear Programming, was proposed in order to obtain the sparsest network structure from genetic perturbation experiments.

However, most information of the system dynamics is in its transient behavior and, more importantly, many reactions that the living cell requires are actually for most of the time far from steady state [7]. The problem of determining the network structure in the case where transient time-series data for non-equilibrium behavior are available is much harder and this has been an active area of research for over a decade. The reason is that while such data are often abundant due to the development of high-throughput, effective experimental techniques, at the same time, a high computational effort is required to extract information about the network structure using traditional techniques. A recent review of available techniques can be found in [8] or [9], but earlier articles, such as [10], also list several approaches to this network identification problem.

In actual fact, identifying the interconnection topology in biological and biochemical systems is of greater importance than extracting the parameters (the rates of the various reactions) that best fit the particular time series data. There are several reasons for this: first, the parameters are often collected under noisy experimental conditions and are sensitive to the laboratory environment. Second, as is often the case with large networks, persistence of observed phenomena is robust to a large range of most parameter values and therefore identifying these parameters exactly is not of great interest. Indeed, chemical reaction networks often have the same functionality in the neighborhood of most of the nominal reaction rates. But most importantly, networks are rarely robust to the random rewiring of the underlying interconnection structure and hence determining the network connectivity is much more important than determining the kinetic parameters that fit the particular data.

In this paper, we first consider chemical reaction networks with mass action kinetics (see references [11] and [12]) and seek to identify the chemical pathways and mechanisms, that is, how the chemical complexes interact within the chemical network. Chemical reaction networks are dynamical systems of the form

x ˙ = A f ( x ) , x n , A n × m , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaiaacqGH9aqpcqWGbbqqcqWGMbGzcqGGOaakcqWG4baEcqGGPaqkcqGGSaalcaaMc8UaemiEaGNaeyicI48efv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacqWFDeIudaahaaWcbeqaaiabd6gaUbaakiabcYcaSiaaykW7cqWGbbqqcqGHiiIZcqWFDeIudaahaaWcbeqaaiabd6gaUjabgEna0kabd2gaTbaakiabcYcaSaaa@51F6@
(1)

where the unknown matrix encompassing the connectivity structure is A and the vector of functions f: ℝn→ ℝm(which need to satisfy appropriate smoothness conditions to ensure local existence and uniqueness of solutions) is known. This makes (1) linear in the unknown parameters. Our main objective is to provide a procedure to identify the interconnection topology that is encapsulated in A, given experimental time-series data.

An important property of the network given by A is sparseness, i.e., it has much less edges than the full graph with the same vertex set. In this paper, we extend the results in [13] that focus on obtaining sparse interconnection networks from experimental data to general and large-scale networks. We apply the presented methodology in order to reconstruct a biochemical network from mock-up experimental data obtained through simulations. More importantly, we show its validity in determining the glycolytic pathway of Lactococcus lactis from real experimental data. Although this pathway has been investigated in great detail (see for example, [1416]) and is the test object of many system identification approaches as a recent paper fittingly notes in its title, it is 'an unfinished systems biological case study' [14].

Finally, we suggest how the method of identifying connectivity for systems of the form (1) can be adjusted to determine the structure of gene regulatory networks, in which the unknown parameters do not enter the system dynamics in an affine way. We then apply the methodology in order to reconstruct a gene regulatory network from mock-up experimental data obtained through simulations.

Notation

ℝ, ℝn, ℝm × nis the set of all real numbers, real vectors of length n, m × n real matrices

A ij (i, j)th is the (i, j) entry of matrix A ∈ ℝm × n

+ n , ¯ + n MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWefv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacqWFDeIudaqhaaWcbaGaey4kaScabaGaemOBa4gaaOGaeiilaWIaf8xhHiLbaebadaqhaaWcbaGaey4kaScabaGaemOBa4gaaaaa@3D8B@ :{x ∈ ℝn: x i > 0, i = 1, ..., n}, {x ∈ ℝn: x i ≥ 0, i = 1, ..., n}

vec(A) is a vector which contains the columns of A stacked one below each other

e =[1, 1, ⋯, 1]T

diag(A), A ∈ ℝn × nis a vector of length n, where (diag(A)) i = A ii

diag(x), x ∈ ℝnis a matrix in ℝn × n, where (diag(x)) ii = x i and (diag(x)) ij = 0 if ji

Methods

Chemical reaction networks

Chemical reaction networks are used to describe and understand biological processes. An illustrative example is the following reaction network proposed by Michaelis and Menten for chemical reactions involving enzymes,

E + S k 1 k 1 E S k 2 k 2 E + P . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemyrauKaey4kaSIaem4uam1aa4qdaSqaaiabdUgaRnaaBaaameaacqaIXaqmaeqaaaWcbaGaem4AaS2aaSbaaWqaaiabgkHiTiabigdaXaqabaaakiaawkzicaGLqgcacqWGfbqrcqWGtbWudaGdnaWcbaGaem4AaS2aaSbaaWqaaiabikdaYaqabaaaleaacqWGRbWAdaWgaaadbaGaeyOeI0IaeGOmaidabeaaaOGaayPKHiaawcziaiabdweafjabgUcaRiabdcfaqjabc6caUaaa@4701@
(2)

Here, S denotes the substrate, E the enzyme, ES the enzyme-substrate complex and P the final product. They are the so called species that participate in the reactions. The positive constants k1, k-1, k2 and k-2 are the reaction rate constants, edges represent reactions and vertices represent complexes (the objects that appear before and after the reaction arrows).

In chemical kinetics, it is common to assume that the dynamics of the chemical reaction network (such as the one given by (2)) can be described by the following set of nonlinear ODEs [17]:

d x d t x ˙ = N v ( x ) , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaqcfa4aaSaaaeaacqWGKbazcqWG4baEaeaacqWGKbazcqWG0baDaaGccqWICjcqcuWG4baEgaGaaiabg2da9iabd6eaojabdAha2jabcIcaOiabdIha4jabcMcaPiabcYcaSaaa@3CD3@
(3)

where v(x) is the rate vector (or flux vector), x is the concentration vector of the different species and N is the stoichiometric matrix. If p molecules of species i appear before the reaction arrow in reaction j then N ij = -p and if they appear after then N ij = p.

The description given by (3) hides the underlying chemical network structure, which we aim to determine in this paper. Hence, in the following, we introduce the notation used in chemical reaction network theory, which decomposes N and v(x) into: the so called bookkeeping matrix Y, which maps the space of complexes into the space of species; the concentration vector of the different complexes Ψ(x); and matrix A κ , which defines the network structure. For the Michaelis-Menten reaction, the vectors of species and complexes are given by

x = [ [ E ] [ S ] [ E S ] [ P ] ]  and  Ψ ( x ) = [ [ E ] [ S ] [ E S ] [ E ] [ P ] ] , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemiEaGNaeyypa0ZaamWaaeaafaqabeabbaaaaeaacqGGBbWwcqWGfbqrcqGGDbqxaeaacqGGBbWwcqWGtbWucqGGDbqxaeaacqGGBbWwcqWGfbqrcqWGtbWucqGGDbqxaeaacqGGBbWwcqWGqbaucqGGDbqxaaaacaGLBbGaayzxaaGaeeiiaaIaeeyyaeMaeeOBa4MaeeizaqMaeeiiaaIaeuiQdKLaeiikaGIaemiEaGNaeiykaKIaeyypa0ZaamWaaeaafaqabeWabaaabaGaei4waSLaemyrauKaeiyxa0Laei4waSLaem4uamLaeiyxa0fabaGaei4waSLaemyrauKaem4uamLaeiyxa0fabaGaei4waSLaemyrauKaeiyxa0Laei4waSLaemiuaaLaeiyxa0faaaGaay5waiaaw2faaiabcYcaSaaa@61BC@

respectively. The elements of the i th row of matrix Y tell us in which complexes species i appears and how often; or, equivalently, the entries to the j th column tell us of how much of each species complex j is made of. For (2),

Y = [ 1 0 1 1 0 0 0 1 0 0 0 1 ] . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemywaKLaeyypa0ZaamWaaeaafaqabeabdaaaaeaacqaIXaqmaeaacqaIWaamaeaacqaIXaqmaeaacqaIXaqmaeaacqaIWaamaeaacqaIWaamaeaacqaIWaamaeaacqaIXaqmaeaacqaIWaamaeaacqaIWaamaeaacqaIWaamaeaacqaIXaqmaaaacaGLBbGaayzxaaGaeiOla4caaa@3C87@

Matrix K is the transpose of the weighted adjacency matrix of the digraph representing the chemical reaction network; that is, entry K ij is nonnegative and corresponds to the rate constant associated with the reaction from complex j to i. The so called kinetic matrix A κ is given by A κ = K - diag(KTe). For (2),

K = [ 0 k 1 0 k 1 0 k 2 0 k 2 0 ]  and  A κ = [ k 1 k 1 0 k 1 ( k 1 + k 2 ) k 2 0 k 2 k 2 ] . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@6C3D@

In chemical reaction network theory, it is common to assume mass action kinetics. The law of mass action assumes that if reactions take place at constant temperature in a homogenous and well mixed solution then the probability of a collision between molecules is proportional to the product of their concentrations. This means that ln Ψ(x) = YT ln x, and one reformulates the set of nonlinear ODEs given by (3) as [18]:

x ˙ = Y A κ Ψ ( x ) . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaiaacqGH9aqpcqWGzbqwcqWGbbqqdaWgaaWcbaGaeqOUdSgabeaakiabfI6azjabcIcaOiabdIha4jabcMcaPiabc6caUaaa@3877@
(4)

In general, we assume that a chemical reaction network has n species and m complexes. Thus, in (4): x ¯ + n MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWefv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacuWFDeIugaqeamaaDaaaleaacqGHRaWkaeaacqWGUbGBaaaaaa@3918@ , Ψ(x) ∈ ¯ + m MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWefv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacuWFDeIugaqeamaaDaaaleaacqGHRaWkaeaacqWGTbqBaaaaaa@3916@ , A κ ∈ ℝm × m, and Y ¯ + n × m MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemywaKLaeyicI48efv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacuWFDeIugaqeamaaDaaaleaacqGHRaWkaeaacqWGUbGBcqGHxdaTcqWGTbqBaaaaaa@3F51@ . Experimental data is stacked in vector Ψ(x) and often matrix Y is known such that we can explicitly search for the network structure given by A κ . Finally, for clarity, we provide the expanded ODE representation of the Michaelis-Menten reaction given by (2):

[ E ˙ ] = k 1 [ E ] [ S ] + ( k 1 + k 2 ) [ E S ] k 2 [ E ] [ P ] , [ S ˙ ] = k 1 [ E ] [ S ] + k 1 [ E S ] , [ E ˙ S ] = k 1 [ E ] [ S ] ( k 1 + k 2 ) [ E S ] + k 2 [ E ] [ P ] , [ P ˙ ] = k 2 [ E S ] k 2 [ E ] [ P ] . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGceaabbeaacqGGBbWwcuWGfbqrgaGaaiabc2faDjabg2da9iabgkHiTiabdUgaRnaaBaaaleaacqaIXaqmaeqaaOGaei4waSLaemyrauKaeiyxa0Laei4waSLaem4uamLaeiyxa0Laey4kaSIaeiikaGIaem4AaS2aaSbaaSqaaiabgkHiTiabigdaXaqabaGccqGHRaWkcqWGRbWAdaWgaaWcbaGaeGOmaidabeaakiabcMcaPiabcUfaBjabdweafjabdofatjabc2faDjabgkHiTiabdUgaRnaaBaaaleaacqGHsislcqaIYaGmaeqaaOGaei4waSLaemyrauKaeiyxa0Laei4waSLaemiuaaLaeiyxa0LaeiilaWcabaGaei4waSLafm4uamLbaiaacqGGDbqxcqGH9aqpcqGHsislcqWGRbWAdaWgaaWcbaGaeGymaedabeaakiabcUfaBjabdweafjabc2faDjabcUfaBjabdofatjabc2faDjabgUcaRiabdUgaRnaaBaaaleaacqGHsislcqaIXaqmaeqaaOGaei4waSLaemyrauKaem4uamLaeiyxa0LaeiilaWcabaGaei4waSLafmyrauKbaiaacqWGtbWucqGGDbqxcqGH9aqpcqWGRbWAdaWgaaWcbaGaeGymaedabeaakiabcUfaBjabdweafjabc2faDjabcUfaBjabdofatjabc2faDjabgkHiTiabcIcaOiabdUgaRnaaBaaaleaacqGHsislcqaIXaqmaeqaaOGaey4kaSIaem4AaS2aaSbaaSqaaiabikdaYaqabaGccqGGPaqkcqGGBbWwcqWGfbqrcqWGtbWucqGGDbqxcqGHRaWkcqWGRbWAdaWgaaWcbaGaeyOeI0IaeGOmaidabeaakiabcUfaBjabdweafjabc2faDjabcUfaBjabdcfaqjabc2faDjabcYcaSaqaaiabcUfaBjqbdcfaqzaacaGaeiyxa0Laeyypa0Jaem4AaS2aaSbaaSqaaiabikdaYaqabaGccqGGBbWwcqWGfbqrcqWGtbWucqGGDbqxcqGHsislcqWGRbWAdaWgaaWcbaGaeyOeI0IaeGOmaidabeaakiabcUfaBjabdweafjabc2faDjabcUfaBjabdcfaqjabc2faDjabc6caUaaaaa@B263@
(5)

Determining affine and sparse interconnections in dynamical systems

Consider a dynamical system of the following form:

x ˙ = A f ( x ) , x n , A n × m , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaiaacqGH9aqpcqWGbbqqcqWGMbGzcqGGOaakcqWG4baEcqGGPaqkcqGGSaalcaaMc8UaemiEaGNaeyicI48efv3ySLgznfgDOjdaryqr1ngBPrginfgDObcv39gaiqaacqWFDeIudaahaaWcbeqaaiabd6gaUbaakiabcYcaSiaaykW7cqWGbbqqcqGHiiIZcqWFDeIudaahaaWcbeqaaiabd6gaUjabgEna0kabd2gaTbaakiabcYcaSaaa@51F6@
(6)

where f(·) ∈ ℝmis a vector of known functions, which satisfy appropriate smoothness conditions to ensure local existence and uniqueness of solutions. With A = Y A κ and f (x) = Ψ(x), the above description results in a dynamical system of the form given by (6). Note that the unknown parameters (which also encode the network structure) are in A, which enters the system dynamics linearly. Let neither the value of the entries nor the structure of matrix A be known. What we wish to find is the structure and entries in matrix A, given experimental data.

For this purpose, we consider the following discrete-time system:

x(tk + 1) = x(t k ) + (tk + 1- t k ) Af(x(t k )),

which is the Euler discretization of (6).

Now, the set of measurements, which we denote by x ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaKaaaaa@2D5E@ , can be used to fit the unknown entries to A such as to minimize the error between the data and the model predictions, which are given by (7). It is popular to solve the minimization problem which results in the least 2-norm of the error between x i (tk+1) and x ^ i ( t k + 1 ) MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaKaadaWgaaWcbaGaemyAaKgabeaakiabcIcaOiabdsha0naaBaaaleaacqWGRbWAcqGHRaWkcqaIXaqmaeqaaOGaeiykaKcaaa@3579@ (least squares minimization problem). We can write such an error metric as:

min||Ma - b||2

where a ∈ ℝnmis a vector containing A ij , which we treat as decision variables, and M ∈ ℝ((p-1) × n) × nmand b ∈ ℝ(p-1) × nare defined by 'stacking' all such conditions obtained by manipulating the data as per (7). Here p corresponds to the number of measurements. This problem has the following analytical solution:

a* = Mb ≜ (MT M)-1MTb

There are a few drawbacks of the above least-squares approach. In the presence of extra constraints on the variables A ij (constrained regression), the problem does not have a closed-form solution, in general. Such constrained minimizations, the simplest of which is a Second Order Cone Problem (SOCP) [19], may carry a significant computational cost for large problems. The same is true if the data are contaminated with error which needs to be taken into account when producing Aleast-squares [20]. Furthermore, the solution to a least-squares problem will not be sparse in general; it will rather result in a full matrix.

In [19] and more recently in [21], the fact was mentioned that a large number of elements of the solution z of a Linear Program (LP) such as

min ||z||1,

are zero, that is, (10) produces sparse solutions. For this reason, this is the approach we follow in the paper. In particular, if A is sparse then the following program seeks explicitly to minimize the entries to matrix A and, thus, tries to recover this property of the matrix:

min | | vec ( A ) | | 1 s . t . μ k x ^ ( t k + 1 ) + x ^ ( t k ) + ( t k + 1 t k ) A f ( x ^ ( t k ) ) μ k + , μ k + 0 , μ k 0 , k , k = 1 , ... , p 1. MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@9BD1@
(11)

By making μ k + MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaeqiVd02aa0baaSqaaiabdUgaRbqaaiabgUcaRaaaaaa@2FF9@ and μ k MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaeqiVd02aa0baaSqaaiabdUgaRbqaaiabgkHiTaaaaaa@3004@ as small as possible for all k, we can ensure that the data are in close Euler-fit with the model making the approximation error as small as possible. The advantage of solving LPs is that the task can be performed using fast, efficient and readily available algorithms. Note also that the number of decision variables in (11) relates directly to the size of A and not of the data, which makes it suitable for the identification of large-scale systems. Support for the validity of above heuristic to obtain a sparse interconnection matrix A are also Theorem 1.1 of [22] and the work presented in [23].

An additional advantage of our approach is also that we may incorporate uncertainties in the measurements with little additional computational complexity. If we model the uncertainty in the measurements as

x ˜ ( t k ) ϵ ( k ) x ^ ( t k ) x ˜ ( t k ) + ϵ ( k ) , f ˜ ( t k ) δ ( k ) f ( x ^ ( t k ) ) f ˜ ( t k ) + δ ( k ) , ϵ ( k ) , δ ( k ) 0 , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaGaacqGGOaakcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabgkHiTmbvLH1qn1uy0Hws0fgBPngaryWyT1wAXadaiqGacqWF1pGScqGGOaakcqWGRbWAcqGGPaqkcqGHKjYOcuWG4baEgaqcaiabcIcaOiabdsha0naaBaaaleaacqWGRbWAaeqaaOGaeiykaKIaeyizImQafmiEaGNbaGaacqGGOaakcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabgUcaRiab=v=aYkabcIcaOiabdUgaRjabcMcaPiabcYcaSiaaykW7cuWGMbGzgaacaiabcIcaOiabdsha0naaBaaaleaacqWGRbWAaeqaaOGaeiykaKIaeyOeI0IaeqiTdqMaeiikaGIaem4AaSMaeiykaKIaeyizImQaemOzayMaeiikaGIafmiEaGNbaKaacqGGOaakcqWG0baDdaWgaaWcbaGaem4AaSgabeaakiabcMcaPiabcMcaPiabgsMiJkqbdAgaMzaaiaGaeiikaGIaemiDaq3aaSbaaSqaaiabdUgaRbqabaGccqGGPaqkcqGHRaWkcqaH0oazcqGGOaakcqWGRbWAcqGGPaqkcqGGSaalcaaMc8Uae8x9diRaeiikaGIaem4AaSMaeiykaKIaeiilaWIaeqiTdqMaeiikaGIaem4AaSMaeiykaKIaeyyzImRaeGimaaJaeiilaWcaaa@8DC2@
(12)

x ˜ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaGaaaaa@2D5D@ (t k ) ≥ 0, f ˜ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmOzayMbaGaaaaa@2D39@ (t k ) ≥ 0, for all k, and A ij ≥ 0 then we can formulate the robust counterpart to (11) that is still an LP (see also [24, 25]). The following LP is a robust formulation of program (11):

min | | vec ( A ) | | 1 s . t . μ k x ˜ ( t k + 1 ) ϵ ( k + 1 ) + x ˜ ( t k ) ϵ ( k ) + ( t k + 1 t k ) A ( f ˜ ( t k ) δ ( k ) ) , x ˜ ( t k + 1 ) + ϵ ( k + 1 ) + x ˜ ( t k ) + ϵ ( k ) + ( t k + 1 t k ) A ( f ˜ ( t k ) + δ ( k ) ) μ k + , A i j 0 , i , j , x ˜ ( t k ) , f ˜ ( t k ) , ϵ ( k ) , δ ( k ) , μ k + , μ k 0 , k , k = 1 , ... , p 1. MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@15D3@
(13)

In summary, using the above ideas, we aim to extract from data the sparsity pattern in matrix A, which is related to the connectivity of the underlying graph structure, drawing conclusions on the network interaction topology.

Finally, note that if data points are rare, that is pm, and there are not any constraints on matrix A then the error between the data and the model predictions can be made zero and (9) does not have a unique solution. However, the following LP can be used to try to recover the sparsity structure of the matrix:

min | | vec ( A ) | | 1 s . t . x ^ ( t k + 1 ) = x ^ ( t k ) + ( t k + 1 t k ) A f ( x ^ ( t k ) ) , k , k = 1 , ... , p 1. MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@7BAD@
(14)

Obtaining the structure of a gene regulatory network

Using the same ideas, another class of a networks that can be determined are gene regulatory networks given microarray time-series data. We first briefly explain the function of gene regulatory networks and DNA microarray time-series.

A gene encodes the information necessary to produce a specific protein. The process, in which the information is used to synthesize a protein, is highly controlled and this control allows the cell to vary the level of a particular protein in the cell depending on the cell's need for this protein. The first step of synthesizing a protein from a gene is RNA polymerase transcribing gene information from DNA to mRNA (see Figure 1a). This mRNA is then translated into synthesized proteins by ribosomes. Control can occur at a number of stages including the synthesis of mRNA, subsequent processing of the mRNA, control of the ribosome and control of mRNA stability. Some proteins, called transcription factors, are responsible for the regulation of the initiation of transcription. A transcription factor binds to the DNA, at the promoter site, in order to either inhibit or activate (or alternatively increase the rate of) the transcription of mRNA that is responsible for the synthesis of a specific protein (see Figure 1b). (Note that self regulation is also possible.) The collection of DNA segments which interact with each other in the manner described is called the gene regulatory network.

Figure 1
figure 1

Diagram showing the process of transcription. a) The RNA polymerase binds to the promoter sequence on the DNA and transcribes a gene. b) Transcription can be controlled by inhibitors or activators acting at the promoter sequence.

In order to understand the dynamics and behavior of a gene regulatory network, three levels of information are required:

1. The network interconnection in the form of a directed graph;

2. Whether an edge from node i to node j means that transcription factor i is activating (denoted by arrow) or repressing (denoted by 'hammer') j;

3. The activation/repression rates for the transcription factors.

Time-series obtained from DNA microarrays [26, 27] are extremely helpful to obtain the structure of gene regulatory networks. This is because DNA microarrays allow observation of the presence of specific mRNA within the cell and in particular, time-series data allow measurements on how these change over time after a perturbation, or when following the cell cycle.

Now, consider the model of a gene regulatory network as described in [28] and [29], where nodes represent genes. Knowledge of the three hierarchal levels of information mentioned previously is necessary to describe the network. The first level determines whether there is an interaction between proteins X1 and X2. An interaction of the form 'X1X2' means that protein X1 activates the production of protein X2 and 'X1X2' that X1 inhibits it. This information belongs to the second level. The activation and repression Hill input functions are given mathematically by (see [28]):

k x 1 n 1 + k x 1 n ,  and  1 1 + k x 1 n , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaqcfa4aaSaaaeaacqWGRbWAcqWG4baEdaqhaaqaaiabigdaXaqaaiabd6gaUbaaaeaacqaIXaqmcqGHRaWkcqWGRbWAcqWG4baEdaqhaaqaaiabigdaXaqaaiabd6gaUbaaaaGccqGGSaalcqqGGaaicqqGHbqycqqGUbGBcqqGKbazcqqGGaaijuaGdaWcaaqaaiabigdaXaqaaiabigdaXiabgUcaRiabdUgaRjabdIha4naaDaaabaGaeGymaedabaGaemOBa4gaaaaakiabcYcaSaaa@493D@
(15)

respectively, where x1 is the concentration of X1. (In [29], the notation 1 K MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaqcfa4aaSaaaeaacqaIXaqmaeaacqWGlbWsaaaaaa@2E82@ is used instead of k. For clarity, we have adopted a 'simpler' notation.) Knowledge about the magnitude of activation or repression coefficient k, k > 0, and exponent n, n > 0, is part of the third level of information.

If there exists more than one connection to a particular gene/node then all transcription factors associated with the connections could be necessary to fulfill a specific task (activation or inhibition) or it might be that any of them is sufficient to have an effect on the transcription process; more complex combinations are also possible. In [28, 30], a generalized input function of the following form is presented, which takes the possible interplay of different transcription factors into account:

f i ( x ) = j b i j x j n i j 1 + j k i j x j m i j . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemOzay2aaSbaaSqaaiabdMgaPbqabaGccqGGOaakcqWG4baEcqGGPaqkcqGH9aqpjuaGdaWcaaqaamaaqababaGaemOyai2aaSbaaeaacqWGPbqAcqWGQbGAaeqaaiabdIha4naaDaaabaGaemOAaOgabaGaemOBa42aaSbaaeaacqWGPbqAcqWGQbGAaeqaaaaaaeaacqWGQbGAaeqacqGHris5aaqaaiabigdaXiabgUcaRmaaqababaGaem4AaS2aaSbaaeaacqWGPbqAcqWGQbGAaeqaaiabdIha4naaDaaabaGaemOAaOgabaGaemyBa02aaSbaaeaacqWGPbqAcqWGQbGAaeqaaaaaaeaacqWGQbGAaeqacqGHris5aaaakiabc6caUaaa@53B0@
(16)

Here, activation of protein X i by protein X j is represented by n ij = m ij > 0, and repression by n ij = 0, m ij > 0. The contribution of the different transcription factors on the transcription rate is denoted by b ij . Putting everything together, the mathematical description of the dynamics of the concentrations of protein X i of an arbitrarily large gene regulatory network is as follows:

x ˙ i = γ i + f i ( x ) d i x i , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaiaadaWgaaWcbaGaemyAaKgabeaakiabg2da9iabeo7aNnaaBaaaleaacqWGPbqAaeqaaOGaey4kaSIaemOzay2aaSbaaSqaaiabdMgaPbqabaGccqGGOaakcqWG4baEcqGGPaqkcqGHsislcqWGKbazdaWgaaWcbaGaemyAaKgabeaakiabdIha4naaBaaaleaacqWGPbqAaeqaaOGaeiilaWcaaa@4220@
(17)

where γ i > 0 is the basal transcription production rate and d i > 0 is the degradation/dilution rate. In the above model, however, the vector field (right hand side of Equation (17)) is not affine in the unknown parameters and therefore one may think that the method proposed in the previous section can not be extended for this case; we show here how the above can be reformulated and cast in a form that allows identification using Linear Programming.

Let Δt = tℓ+1 - t. A discrete-time system that approximates (17) is:

x i (tℓ+1) = x i (t) + Δt(γ i + f i (x i (t)) - d i x i (t)).

Indeed, if b ij , k ij and m ij are unknown then (18) is not affine in the unknown parameters as is the case in (7). We rewrite (18) as follows:

( x i ( t ) ( 1 Δ t d i ) x i ( t + 1 ) + Δ t γ i ) ( 1 + j k i j x j m i j ) + Δ t j b i j x j n ˜ i j + Δ t b i = 0. MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@7EEE@
(19)

In (19), if n ij = 0 then we denote it by n ¯ i j MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmOBa4MbaebadaWgaaWcbaGaemyAaKMaemOAaOgabeaaaaa@3036@ and let b i = j b i j x j n ¯ i j = j b i j MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemOyai2aaSbaaSqaaiabdMgaPbqabaGccqGH9aqpdaaeqaqaaiabdkgaInaaBaaaleaacqWGPbqAcqWGQbGAaeqaaOGaemiEaG3aa0baaSqaaiabdQgaQbqaaiqbd6gaUzaaraWaaSbaaWqaaiabdMgaPjabdQgaQbqabaaaaaWcbaGaemOAaOgabeqdcqGHris5aOGaeyypa0ZaaabeaeaacqWGIbGydaWgaaWcbaGaemyAaKMaemOAaOgabeaaaeaacqWGQbGAaeqaniabggHiLdaaaa@470F@ . If n ij > 0 then we denote it by n ˜ i j MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmOBa4MbaGaadaWgaaWcbaGaemyAaKMaemOAaOgabeaaaaa@302D@ . For all i, j, let an entry to matrix B be b ij for which n ij > 0, and let an entry of matrix K be k ij . As before, given a set of measurements, which we denote by x ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaKaaaaa@2D5E@ , this set can be used to approximate the structure of the gene regulatory network determined by b ij , b i and k ij if the Hill coefficients m ij (and, thus, n ij ) are known and the basal production and degradation rates are known or considered uncertain but within a known range. For instance, we can try to recover B, K through a LP. The following LP puts emphasis on minimizing the 1-norm of vec(B), b, and vec(K), which are independent of each other, while we keep the Euler discretisation error, μ, as small as possible.

min | | vec ( [ B b K ] ) | | 1 s . t . μ < ( x ^ i ( t ) ( 1 Δ t d i ) x ^ i ( t + 1 ) + Δ t γ i ) ( 1 + j k i j x ^ j n i j + Δ t j b i j x ^ j n i j + Δ t b i < μ , μ > 0 , b i j 0 , k i j 0 , b i 0 , i , j , ( 0 ϵ 1 i γ i ϵ 2 i , 0 ε 1 i d i ε 2 i , i ) . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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v=aYoaaBaaaleaacqaIYaGmcqWGPbqAaeqaaOGaeiilaWIaeGimaaJaeyizImQaeqyTdu2aaSbaaSqaaiabigdaXiabdMgaPbqabaGccqGHKjYOcqWGKbazdaWgaaWcbaGaemyAaKgabeaakiabgsMiJkabew7aLnaaBaaaleaacqaIYaGmcqWGPbqAaeqaaOGaeiilaWIaeyiaIiIaemyAaKMaeiykaKIaeiOla4caaaaa@FBB6@
(20)

(The latter requirements in brackets correspond to the case of uncertain production and degradation rates.) Note that as per (16)

k ij = 0 if and only if b ij = 0 or b i = 0, ∀i, j.

The following remark deals with the case when the solution of (20) violates (21). The rationale behind the idea is that by following these rules we can determine unambiguously whether activation or repression takes place.

Remark 1 Since requirement (21) cannot be implemented in a LP, we deduce the following from the solution of (20) about the connectivity of the network when (21) is violated:

- if k ij ≠ 0, b ij = 0 and b i = 0 then the production of X i is not affected by X j ; that is, it is the same case as when k ij = 0,

- if b ij ≠ 0 and k ij = 0 then X j enhances the production of X i ; i. e., it is the same case as when k ij ≠ 0,

- if b i ≠ 0 and k ij = 0 for all i then the production of X i is not affected by X j ; that is, it is the same case as when b i = 0.

Results and discussion

Numerical experiments

An artificial chemical reaction network

Consider the network with 5 species S MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWenfgDOvwBHrxAJfwnHbqeg0uy0HwzTfgDPnwy1aaceaGae8NeXpfaaa@376D@ = {A, B, C, D, E} and 5 complexes, C MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWenfgDOvwBHrxAJfwnHbqeg0uy0HwzTfgDPnwy1aaceaGae8NaXpeaaa@374D@ = {A, 2B, A + C, D, B + E} in Figure 2. Suppose we are given time series data for all the species in this system, but we do not know the topology of the interconnection. The first experiment examines the recovered interconnection diagram using the (non-robust) LP (11). Later on, we will consider the same problem with missing data on one species and a robust network determination problem.

Figure 2
figure 2

A chemical reaction network.

We have implemented the network shown in Figure 2 with a K matrix of the form:

K = [ 0 0 0 0 0.8492 0.3386 0 0 0 0.4290 0.8244 0 0 0.0563 0 0 0 0 0 0 0 0 0.7364 0 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@6427@
(22)

and have simulated the system with uniformly distributed initial conditions. The data sets were obtained by simulating the above set of nonlinear equations using SIMULINK. Ten such data sets were generated and incorporated in the LP.

Since we do not know how the chemical network is connected, and we cannot even speculate how parts of it may be connected, we need to assume a general structure for it and write the dynamics for the complete network. A least-squares approach, would yield the following structure in matrix K, where non-zero entries denote the fractional occurrences of non-zero k ij 's for the 10 data sets:

[ 0 0.1 1 0.1 1 1 0 0.8 0.2 1 1 0.6 0 1 0.9 0.1 0.8 0.9 0 0 1 0.9 1 0.9 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@5A12@

Essentially the only zero element predicted is k45. Note that the diagonal of this matrix does not enter into our optimization. We write these entries as zero, but this is merely a convenient notational place holder. The resulting structure of the K matrix from our linear programming approach is given by

[ 0 0 1 0 1 1 0 0.5 0.4 0.9 1 0 0 1 0.2 0 0 0.8 0 0 0.1 0 1 0.2 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWaamWaaeaafaqabeqbfaaaaaqaaiabicdaWaqaaiabicdaWaqaaiabigdaXaqaaiabicdaWaqaaiabigdaXaqaaiabigdaXaqaaiabicdaWaqaaiabicdaWiabc6caUiabiwda1aqaaiabicdaWiabc6caUiabisda0aqaaiabicdaWiabc6caUiabiMda5aqaaiabigdaXaqaaiabicdaWaqaaiabicdaWaqaaiabigdaXaqaaiabicdaWiabc6caUiabikdaYaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabiIda4aqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabigdaXaqaaiabicdaWaqaaiabigdaXaqaaiabicdaWiabc6caUiabikdaYaqaaiabicdaWaaaaiaawUfacaGLDbaaaaa@5286@

where again non-zero entries denote the fractional occurrences of non-zero entries for the 10 data sets tested. Observe that the second column is equal to zero which implies that the second complex is not the product of any reaction. Having determined this sparse structure for the system, we can repeat the same LP optimization, but now impose the new information about the sparse structure obtained in the new linear program, i.e. that k12 = 0 etc. Iterating once on this data, we get the following results:

[ 0 0 1 0 1 1 0 0.5 0.3 0.7 1 0 0 1 0 0 0 0.8 0 0 0 0 0.8 0 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWaamWaaeaafaqabeqbfaaaaaqaaiabicdaWaqaaiabicdaWaqaaiabigdaXaqaaiabicdaWaqaaiabigdaXaqaaiabigdaXaqaaiabicdaWaqaaiabicdaWiabc6caUiabiwda1aqaaiabicdaWiabc6caUiabiodaZaqaaiabicdaWiabc6caUiabiEda3aqaaiabigdaXaqaaiabicdaWaqaaiabicdaWaqaaiabigdaXaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabiIda4aqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabiIda4aqaaiabicdaWaqaaiabicdaWaaaaiaawUfacaGLDbaaaaa@4EE0@

This experiment reveals that the sparsity structure can be further reduced by an iterative procedure. One could also use the above as a 'probability' lookup table, and investigate sparsity structures, such as setting k23 and k24 equal to zero. Indeed this solution is also feasible, which reveals additional structure in the matrix K. Working this way, we have found that the following non-zero matrix results in feasible LPs:

K nom = [ 0 0 k 13 0 k 15 k 21 0 0 0 k 25 k 31 0 0 k 34 0 0 0 0 0 0 0 0 k 53 0 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaem4saS0aaSbaaSqaaiabb6gaUjabb+gaVjabb2gaTbqabaGccqGH9aqpdaWadaqaauaabeqafuaaaaaabaGaeGimaadabaGaeGimaadabaGaem4AaS2aaSbaaSqaaiabigdaXiabiodaZaqabaaakeaacqaIWaamaeaacqWGRbWAdaWgaaWcbaGaeGymaeJaeGynaudabeaaaOqaaiabdUgaRnaaBaaaleaacqaIYaGmcqaIXaqmaeqaaaGcbaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaem4AaS2aaSbaaSqaaiabikdaYiabiwda1aqabaaakeaacqWGRbWAdaWgaaWcbaGaeG4mamJaeGymaedabeaaaOqaaiabicdaWaqaaiabicdaWaqaaiabdUgaRnaaBaaaleaacqaIZaWmcqaI0aanaeqaaaGcbaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaem4AaS2aaSbaaSqaaiabiwda1iabiodaZaqabaaakeaacqaIWaamaeaacqaIWaamaaaacaGLBbGaayzxaaaaaa@5DE5@

which is the same as the network shown in Figure 2, but for a link between complex 1 and complex 3. Of course, this is not surprising: there is no unique reaction mechanism that can fit a data set; rather, there can be many networks which with some kinetic parameters can represent the same data within experimental error. In fact, we can only hope to invalidate a postulated reaction mechanism using data, a point we will return to in the concluding section.

The next experiment we performed was to assume that some of the species could not be observed in the experiments for technical reasons. In particular, we assumed that the concentration of species A could not be measured. This does not pose significant problems, as we can replace the occurrences of the terms in the vector field involving the variable x1 with a vector of new variables q which we also ask to be 'sparse', through minimization of the sum of q i . Eight such substitutions need to be made; the result is a matrix of the form:

K miss = [ 0 0 0 0 0 k 21 0 k 23 0 k 25 0 0 0 0 0 0 0 k 43 0 0 0 0 k 53 k 54 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaem4saS0aaSbaaSqaaiabb2gaTjabbMgaPjabbohaZjabbohaZbqabaGccqGH9aqpdaWadaqaauaabeqafuaaaaaabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaem4AaS2aaSbaaSqaaiabikdaYiabigdaXaqabaaakeaacqaIWaamaeaacqWGRbWAdaWgaaWcbaGaeGOmaiJaeG4mamdabeaaaOqaaiabicdaWaqaaiabdUgaRnaaBaaaleaacqaIYaGmcqaI1aqnaeqaaaGcbaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaeGimaadabaGaem4AaS2aaSbaaSqaaiabisda0iabiodaZaqabaaakeaacqaIWaamaeaacqaIWaamaeaacqaIWaamaeaacqaIWaamaeaacqWGRbWAdaWgaaWcbaGaeGynauJaeG4mamdabeaaaOqaaiabdUgaRnaaBaaaleaacqaI1aqncqaI0aanaeqaaaGcbaGaeGimaadaaaGaay5waiaaw2faaaaa@5CCD@

and a q = [q1, ..., q8] which corresponds to nonzero entries for k31, k34, k35 k13 and k15. Therefore in this case too, a sparse topology interconnection is obtained, but the matrix in this case is not as sparse as before.

Suppose now that data are uncertain, and we want to search for robust sparse structures for the K matrix. We set ϵ i + MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWeuvgwd1utHrhAjrxySL2yaeHbJ1wBPfdmaGabciab=v=aYoaaDaaaleaacqWGPbqAaeaacqGHRaWkaaaaaa@382E@ = ϵ i MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWeuvgwd1utHrhAjrxySL2yaeHbJ1wBPfdmaGabciab=v=aYoaaDaaaleaacqWGPbqAaeaacqGHsislaaaaaa@3839@ = 0.0004 for i = 1, ..., 5 and all data points – such uncertainty could be due to roundoff errors (see Equation (12)). A robust LP can be formulated, as discussed earlier, and the obtained optimization results in a network with a richer sparsity structure:

K rob = [ 0 0 k 13 0 k 15 k 21 0 k 23 0 k 25 k 31 0 0 k 34 0 0 0 k 43 0 0 0 0 k 53 0 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@62F5@

Finally, we note that once a candidate network is determined, we can perform a least-squares minimization to obtain the best k values for a particular sparsity structure. For example, if we choose Knom as the sparsity structure and fit the least squares error over all 10 experiments, we get the following K matrix:

K = [ 0 0 0.0364 0 0.7721 0.3295 0 0 0 0.3999 0.7804 0 0 0.0553 0 0 0 0 0 0 0 0 0.6668 0 0 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaem4saSKaeyypa0ZaamWaaeaafaqabeqbfaaaaaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabicdaWiabiodaZiabiAda2iabisda0aqaaiabicdaWaqaaiabicdaWiabc6caUiabiEda3iabiEda3iabikdaYiabigdaXaqaaiabicdaWiabc6caUiabiodaZiabikdaYiabiMda5iabiwda1aqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabiodaZiabiMda5iabiMda5iabiMda5aqaaiabicdaWiabc6caUiabiEda3iabiIda4iabicdaWiabisda0aqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabicdaWiabiwda1iabiwda1iabiodaZaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWaqaaiabicdaWiabc6caUiabiAda2iabiAda2iabiAda2iabiIda4aqaaiabicdaWaqaaiabicdaWaaaaiaawUfacaGLDbaaaaa@68F9@
(23)

In figures 3A and 3B we show how the nominal system, with the K matrix given by Equation (22) compares in simulation with the K matrix given by Equation (23) for different initial conditions. We see that some initial conditions have better behavior for the two parameter sets than others. There is hope, however, that using other methods and through choice of a particular initial condition we can distinguish between the two network structures; the initial condition in Figure 3B shows some deviation in the dynamics of x1, and designing an experiment that would yield 'maximum' deviation would allow for differentiability between various models that can explain the same data. More details about this approach can be found in [31].

Figure 3
figure 3

Simulation of chemical reaction networks. Simulation of the network with reaction rates (22) (solid line) and with reaction rates given by (23) (dashed line) from two initial conditions.

A sample gene regulatory network

Consider the artificial gene regulatory network modeled through

x ˙ 1 = γ 1 d 1 x 1 , x ˙ 2 = γ 2 + b 12 x 1 1 + k 12 x 1 d 2 x 2 , x ˙ 3 = γ 3 + b 43 x 4 + b 13 x 1 + b 3 1 + k 43 x 4 + k 13 x 1 + k 53 x 5 d 3 x 3 , x ˙ 4 = γ 4 + b 54 x 5 1 + k 54 x 5 d 4 x 4 , x ˙ 5 = γ 5 + b 15 x 1 + b 5 1 + k 15 x 1 + k 25 x 2 d 5 x 5 , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGceaabbeaacuWG4baEgaGaamaaBaaaleaacqaIXaqmaeqaaOGaeyypa0Jaeq4SdC2aaSbaaSqaaiabigdaXaqabaGccqGHsislcqWGKbazdaWgaaWcbaGaeGymaedabeaakiabdIha4naaBaaaleaacqaIXaqmaeqaaOGaeiilaWcabaGafmiEaGNbaiaadaWgaaWcbaGaeGOmaidabeaakiabg2da9iabeo7aNnaaBaaaleaacqaIYaGmaeqaaOGaey4kaSscfa4aaSaaaeaacqWGIbGydaWgaaqaaiabigdaXiabikdaYaqabaGaemiEaG3aaSbaaeaacqaIXaqmaeqaaaqaaiabigdaXiabgUcaRiabdUgaRnaaBaaabaGaeGymaeJaeGOmaidabeaacqWG4baEdaWgaaqaaiabigdaXaqabaaaaOGaeyOeI0Iaemizaq2aaSbaaSqaaiabikdaYaqabaGccqWG4baEdaWgaaWcbaGaeGOmaidabeaakiabcYcaSaqaaiqbdIha4zaacaWaaSbaaSqaaiabiodaZaqabaGccqGH9aqpcqaHZoWzdaWgaaWcbaGaeG4mamdabeaakiabgUcaRKqbaoaalaaabaGaemOyai2aaSbaaeaacqaI0aancqaIZaWmaeqaaiabdIha4naaBaaabaGaeGinaqdabeaacqGHRaWkcqWGIbGydaWgaaqaaiabigdaXiabiodaZaqabaGaemiEaG3aaSbaaeaacqaIXaqmaeqaaiabgUcaRiabdkgaInaaBaaabaGaeG4mamdabeaaaeaacqaIXaqmcqGHRaWkcqWGRbWAdaWgaaqaaiabisda0iabiodaZaqabaGaemiEaG3aaSbaaeaacqaI0aanaeqaaiabgUcaRiabdUgaRnaaBaaabaGaeGymaeJaeG4mamdabeaacqWG4baEdaWgaaqaaiabigdaXaqabaGaey4kaSIaem4AaS2aaSbaaeaacqaI1aqncqaIZaWmaeqaaiabdIha4naaBaaabaGaeGynaudabeaaaaGccqGHsislcqWGKbazdaWgaaWcbaGaeG4mamdabeaakiabdIha4naaBaaaleaacqaIZaWmaeqaaOGaeiilaWcabaGafmiEaGNbaiaadaWgaaWcbaGaeGinaqdabeaakiabg2da9iabeo7aNnaaBaaaleaacqaI0aanaeqaaOGaey4kaSscfa4aaSaaaeaacqWGIbGydaWgaaqaaiabiwda1iabisda0aqabaGaemiEaG3aaSbaaeaacqaI1aqnaeqaaaqaaiabigdaXiabgUcaRiabdUgaRnaaBaaabaGaeGynauJaeGinaqdabeaacqWG4baEdaWgaaqaaiabiwda1aqabaaaaOGaeyOeI0Iaemizaq2aaSbaaSqaaiabisda0aqabaGccqWG4baEdaWgaaWcbaGaeGinaqdabeaakiabcYcaSaqaaiqbdIha4zaacaWaaSbaaSqaaiabiwda1aqabaGccqGH9aqpcqaHZoWzdaWgaaWcbaGaeGynaudabeaakiabgUcaRKqbaoaalaaabaGaemOyai2aaSbaaeaacqaIXaqmcqaI1aqnaeqaaiabdIha4naaBaaabaGaeGymaedabeaacqGHRaWkcqWGIbGydaWgaaqaaiabiwda1aqabaaabaGaeGymaeJaey4kaSIaem4AaS2aaSbaaeaacqaIXaqmcqaI1aqnaeqaaiabdIha4naaBaaabaGaeGymaedabeaacqGHRaWkcqWGRbWAdaWgaaqaaiabikdaYiabiwda1aqabaGaemiEaG3aaSbaaeaacqaIYaGmaeqaaaaakiabgkHiTiabdsgaKnaaBaaaleaacqaI1aqnaeqaaOGaemiEaG3aaSbaaSqaaiabiwda1aqabaGccqGGSaalaaaa@CE00@
(24)

where

B = [ 0 0.51 0.87 0 0.80 0 0 0 0 0 0 0 0 0 0 0 0 0.20 0 0 0 0 0 0.22 0 ] , K = [ 0 0.31 0.87 0 0.15 0 0 0 0 0.77 0 0 0 0 0 0 0 0.97 0 0 0 0 0.79 0.44 0 ] , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@86B5@

b3 = 0.71, b5 = 0.80, γ i = 0.1 and d i = 1. The network is depicted in Figure 4, where solid lines with an arrow head denote activation and dash pointed lines with a hammer head denote inhibition.

Figure 4
figure 4

The artificial gene regulatory network modeled through (24). Solid lines with an arrow head denote activation and dash pointed lines with a hammer head denote inhibition.

We assume that d i is known and γ i = γ for all i, where 0.095 ≤ γ ≤ 0.105. We take 'measurements' every Δt = 0.05 between t = 0 and t = 5 (time is in arbitrary units) from four different random initial conditions between 0 and 1 in order to obtain mock-up data. Solving (20) using the solver SeDuMi [32], we obtain the following results for matrices B and K:

B = [ 0 0.48 0.22 0 1.15 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0.11 0 ] , K = [ 0 0 0 0 0.61 0 0 0 0 0.75 0 0 0 0 0 0 0 0.32 0 0 0 0 0.35 0 0 ] ; MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@7B61@

b3 = 0.64, b5 = 0.80, and all other b i = 0. Following the rules given by Remark 1, we are able to reconstruct the network shown in Figure 4. As the example shows, we are able to determine the interaction network given by (24) through the LP (20) even when degradation rates are considered uncertain.

Reconstructing the glycolytic pathway of Lactococcus lactis

Lactococcus lactis is a bacterium used in the industrial production of cheese and buttermilk as it converts more than 90% of lactose (milk sugar) to lactic acid [14]. In general, the glycolytic pathway (or glycolysis) consists of chemical reactions that convert glucose into pyruvate. In the first step, glucose is converted into glucose-6-phosphate (G6P). A conversion of G6P into fructose-1,6-bisphosphate (FBP) follows, which is then converted sequentially to glyceraldehyde-3-phosphate (Ga3P), 3-phosphoglyceric acid (3-PGA) and PEP [16]. Additionally, Glucose and PEP are converted directly to pyruvate and G6P. Note that since measurement data for the intermediate Ga3P were unavailable, we include an additional rate denoting depletion of FBP. A simplified description of the pathway from reference [33] is depicted in Figure 5. The relative simplicity of this metabolic network makes L. lactis an attractive model for biological systems approaches [14]. A recent paper which presents an approach to determine the connectivity of this system and puts some emphasis on its sparsity is [16]. However, this approach does not take into account the characteristic particulars that make up a chemical reaction network. Here, we first use LP (11) to try to elucidate the glycolytic pathway of L. lactis using the same experimental data from [33].

Figure 5
figure 5

The glycolytic pathway of Lactococcus lactis.

Particularly, we wish to elucidate the glycolytic pathway of L. lactis under the assumption that the following complexes participate in the chemical reaction network: Glu, G6P, FBP, 2 × 3PGA, 2 × PEP, 2 × Pyru and Lact. In other words, we wish to obtain interaction topology of the chemical reaction network given by x ˙ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafmiEaGNbaiaaaaa@2D57@ = Y A κ f (x), where

Y = [ 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 1 ] , x = [ [ Glu ] [ G6P ] [ FBP ] [ 3 PGA ] [ PEP ] [ Pyru ] [ Lact ] ] , f ( x ) = [ [ Glu ] [ G6P ] [ FBP ] [ 3 PGA ] 2 [ PEP ] 2 [ Pyru ] 2 [ Lact ] ] . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@CC97@

Note that the network topology is completely determined by A κ . Recall that

A κ = K - diag(KTe), K ij ≥ 0 ∀i, j.

Now, by solving (11) we indeed obtain a sparse chemical reaction topology (Figure 6(a)). However, the error between the model dynamics and experimental data is unreasonably large (Figure 6(b)). Therefore, it is not surprising that this configuration differs greatly from the the proposed pathway of Figure 5.

Figure 6
figure 6

Reaction pathway obtained through (11). a) The reaction pathway obtained through (11). b) The simulated model dynamics defined through the reaction network shown in (a) are shown in dashed lines and solid lines correspond to experimental data.

The ℓ1 regularized least squares problem, which is called Lasso is statistics, considers an objective function to minimize, which consists of the sum of the 1-norm of the vector of unknowns and the least squares of the error:

given Y min [ x ^ ( t 1 ) x ^ ( t 2 ) + ( t 2 t 1 ) A f ( x ^ ( t 1 ) ) x ^ ( t p 1 ) x ^ ( t p ) + ( t p t p 1 ) A f ( x ^ ( t p 1 ) ) ] 2 + α | | vec( A ) | | 1 s . t . A = Y A k , A κ i , j 0 , i j , i , j , e T A κ = 0 ( this follows from  ( 25 ) ) , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@DE4E@
(26)

where α is a nonnegative constant that allows us to regulate the weight we put on the sparsity of A explicitly. Note that for α = 0, program (26) minimizes the the error between data and model dynamics solely (Figure 7(b)). This time, the error between the model dynamics and experimental data is considerably smaller. The connection topology is shown in Figure 7(a). Now, we increase α to see whether or which interconnections disappear without altering the system dynamics significantly. This pathway, which remains unaltered for 2 ≤ α ≤ 10, is shown in Figure 7(a). The dynamic behavior of this system is indistinguishable from the one shown in Figure 7(b) and, thus, is not shown.

Figure 7
figure 7

Reaction pathway obtained through (26). a) Reaction pathway obtained through (26) for α = 0 and α = 2. All reactions participate in both pathways except for two which are marked accordingly. The one reaction that was obtained for α = 0 but not for α = 2 is marked with α0 and the one that appears only for α = 2 is marked with α2. b) Here, solid lines correspond to experimental data and dashed lines to the model with the interaction matrix obtained by solving (26) with α = 0.

Further increase of α results first in the disappearance of the links between G6P and FBP, and sequential changes do not result in 'sensible' connection topologies. Of course, this is something that in general the investigator does not know. While the pathway depicted in Figure 6(a) might be dismissed because the resulting model behavior compares badly with data, this argument does not hold for the pathway in Figure 7(a).

Now, we exploit the following related approach to try to deduce the interactions of the system by solving the following LP:

given Y min [ x ^ ( t 1 ) x ^ ( t 2 ) + ( t 2 t 1 ) A f ( x ^ ( t 1 ) ) x ^ ( t p 1 ) x ^ ( t p ) + ( t p t p 1 ) A f ( x ^ ( t p 1 ) ) ] 1 + α | | vec( A ) | | 1 s . t . A = Y A k , A κ i , j 0 , i j , i , j , e T A κ = 0 ( follows from  ( 25 ) ) , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@D7F9@
(27)

We solve (27) for α = 0, α = 2 and α = 3, and obtain the reaction pathway shown in Figure 8(a) which results in a model with the dynamics depicted in Figure 8(b). (Note that for 0 <α ≤ 75, the model dynamics are indistinguishable from the ones shown in Figure 8(b) and are not shown.)

Figure 8
figure 8

Reaction pathway obtained through (27). a) All reactions participate in both pathways except for four which are marked accordingly. Two reactions that were obtained for α = 0 and α = 2 but not for α = 3 are marked with α0 and α2, one that appears only for α = 0 is marked with α0, and one that appears only for α = 3 is marked with α3. (Note that a gradual increase of α, for 3 ≤ α ≤ 75, did not change the network structure.) b) Here, solid lines correspond to experimental data and dashed lines to the model dynamics defined through the reaction network shown in Figure 8(a) for α = 0.

The error between the model dynamics and experimental data is again considerably smaller than the error shown in Figure 6(b). As we can see from Figure 8(a), a relatively sparse reaction topology was obtained.

The pathway x1 → ... → x7 was almost reconstructed. A sensible assumption to make is that the degradation of G6P which appears at α = 3 corresponds to the conversion into FBP suggested at α = 2.

Also, the direct link between glucose and pyruvate was discovered. Finally, with

A κ = [ 0.3452 0 0 0 0 0 0 0.0185 0.4105 0 0 0 0 0 0.2431 0.4105 0.3735 0 0 0.0350 0 0 0 0.0009 0.0008 0 0 0.0237 0 0 0 0.0008 0.0106 0 0.0079 0.0835 0 0 0 0 0.0377 0 0 0 0.1551 0 0.0105 0.0027 0.0393 ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@BFA8@

our approach provides a meaningful chemical reaction network of the form (4). (This matrix corresponds to the case when α = 2.) Nevertheless, without biochemical information the superiority of this pathway to the pathway in Figure 7(a) cannot be established and it follows that experiments have to be designed to discriminate between several competing models.

Conclusion

We have presented a methodology for determining the interaction topology of biological networks, that are either affine in the unknown parameters or can be transformed to have this property, using time series data collected from experiments. We demonstrated the ability of our method to identify a chemical reaction network structure through several numerical examples. We have also tested our approach by elucidating the glycolytic pathway of the bacterium Lactococcus lactis. Our method respects the structural properties that chemical reaction network dynamics should have [11, 12].

In the case of gene regulatory networks, more realistic models could be used, but those would include additional parameters, first, by making the Hill coefficient in the activation and repression terms a free variable; and second, encoding the fact that when two transcription factors act on DNA, either both are required (AND) or any of them is sufficient (OR) for action. Thus, a valuable research direction is to investigate this case and establish whether similar analysis techniques to the ones presented in this paper can be used.

In (27) we introduced a free variable α whose value can change the solution considerably. Hence, it is worthwhile to explore different possible heuristics how to choose the value of this variable. (Here, we kept the balance between increasing α and keeping the model dynamics that followed from the solution of (27) relatively close to experimental data.) An iterative method can also be used, which uses 'live' information from simulations and then iterates with a simple Linear Program to find the network structure that fits best the parameters.

Finally, as shown, different methods or the same one with different constraints provide different models that represent the same data, which is an expected feature of such methods. It follows that experiments have to be designed to discriminate between competing models, in a way that 'closes the loop' between modelling and experiment (see for example [31]).