Next Article in Journal
Solvent Extraction and Identification of Active Anticariogenic Metabolites in Piper cubeba L. through 1H-NMR-Based Metabolomics Approach
Next Article in Special Issue
The Cartesian Product and Join Graphs on Edge-Version Atom-Bond Connectivity and Geometric Arithmetic Indices
Previous Article in Journal
Development of Conjugate Addition of Lithium Dialkylcuprates to Thiochromones: Synthesis of 2-Alkylthiochroman-4-ones and Additional Synthetic Applications
Previous Article in Special Issue
Scoring Amino Acid Mutations to Predict Avian-to-Human Transmission of Avian Influenza Viruses
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Causal Discovery Combining K2 with Brain Storm Optimization Algorithm

1
School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China
2
School of Physics and Electronic Engineering, Hanshan Normal University, Chaozhou 521041, China
3
School of Mathematics and Big Data, Foshan University, Foshan 528000, China
4
School of Software Engineering, South China University of Technology, Guangzhou 510006, China
5
School of Computing Science and Engineering, Vellore Institute of Technology, Vellore-632014, Tamil Nadu, India
*
Author to whom correspondence should be addressed.
Molecules 2018, 23(7), 1729; https://doi.org/10.3390/molecules23071729
Submission received: 12 May 2018 / Revised: 7 July 2018 / Accepted: 9 July 2018 / Published: 16 July 2018
(This article belongs to the Special Issue Molecular Computing and Bioinformatics)

Abstract

:
Exploring and detecting the causal relations among variables have shown huge practical values in recent years, with numerous opportunities for scientific discovery, and have been commonly seen as the core of data science. Among all possible causal discovery methods, causal discovery based on a constraint approach could recover the causal structures from passive observational data in general cases, and had shown extensive prospects in numerous real world applications. However, when the graph was sufficiently large, it did not work well. To alleviate this problem, an improved causal structure learning algorithm named brain storm optimization (BSO), is presented in this paper, combining K2 with brain storm optimization (K2-BSO). Here BSO is used to search optimal topological order of nodes instead of graph space. This paper assumes that dataset is generated by conforming to a causal diagram in which each variable is generated from its parent based on a causal mechanism. We designed an elaborate distance function for clustering step in BSO according to the mechanism of K2. The graph space therefore was reduced to a smaller topological order space and the order space can be further reduced by an efficient clustering method. The experimental results on various real-world datasets showed our methods outperformed the traditional search and score methods and the state-of-the-art genetic algorithm-based methods.

1. Introduction

In recent years, the application of causal inference in bioinformatics has become more extensive, and plays a very important role in the development of this field. For instance, it is used for the discovery of the causal relationships between genes and the development of symptoms [1], and how to analyze the phenomenon of synthetic lethality [2,3] in biomedicine, which arises when a combination of mutations in two or more genes leads to cell death. Causal inference is different from the traditional statistical learning methods. The causal inference is the internal generative mechanism of the research data and the traditional statistical learning is the joint distribution of observation variables. The most significant difference between causality and relevance is whether or not to reflect the intrinsic relationship between the data. In scientific research, understanding the causal relationship of objects is crucial to predicting the laws of objects. Causal inference has already been applied in many fields, such as gene therapy, economic prediction, etc.
The problem of causal discovery or causal inference is generally formulated by a probabilistic graphical model where causal directions are represented by the directed edges [4]. In the causal inference algorithm, the techniques commonly used in local causality are conditional independent test (CI) method [5] and score & search method [4].
For example, Peter-Clack algorithms (PC algorithms) [5] determine causal relationships by finding out all the CIs in the given dataset, and the K2 algorithm [1] obtains the maximum score by searching for an optimal structure to discover causal relationships.
In general, a CI test method is used to detect the V-structure, and we can even infer the directed acyclic graph (DAG) [6] by the extension of the partial directed acyclic graph (PDAG). The accuracy of the above methods in causal inference is highly impacted by the number of the detected V-structures. In special cases, for example, without detecting the V-structure, the effect is poor. Therefore, the method cannot completely determine all edges and cannot distinguish the Markov equivalence classes, therefore often fails to uncover the true causal relationships contained in the given dataset if the number of equivalence classes is sufficiently large.
To distinguish causal direction in a non-experimental setting, some researchers recently resorted to using asymmetric relationships among variables under various hypothetical conditions. The additive noise model (ANM) proposed by Shimizu [7,8] is proved to be effective if the given data is generated by following linear non-Gaussian structural equation model. This method was later extended to nonlinear cases for continuous cases [9,10] as well as discrete cases [11,12].
Concretely, the existing ANM-based algorithms can be formulated as follows: assume there are two variables x and y satisfying a causal functional model y = f(x) + ε, where f(*) is an arbitrary square-integrable function and ε is an independent noise of x. If the joint distribution P(x,y) allows an ANM for one (forward) direction rather than the other one (backward), i.e., x cannot be obtained by a function of y plus an independent noise term, then the forward causal direction xy is accepted as the true causal direction. The Post-Nonlinear (PNL) model [13] further extends ANM by making an additional function on the function f(*) such that y = g(f(x) + ε) with a bijective function g: RR. More recently, some researchers have aimed to detect the asymmetry from an information-geometric perspective [14,15,16]. We can see that these methods assume that reversible and deterministic mappings can get the random variables independently. According to the previous works, these methods are used to examine the asymmetry causality by different techniques, and effect in the low dimension is very good, but poor in the nonlinear high dimensional causal inference between variables.
There are also some hybrid algorithms such as the hybrid algorithm (HYA) [1] and three phases causal discovery method (TPCDM) algorithm [17], to some extent, are able to find the causal relationships of multidimensional networks. The additive noise method (ANM) differentiates the parent nodes and the child nodes in the HYA algorithm and also detects the relationship between the neighbor sets and the sink nodes in the TPCDM algorithm. However, the experimental results show that the effect of the methods above are not very accurate, because it is difficult to detect a one-to-many network structure by ANM methods [10,18,19,20,21,22,23,24,25,26,27].
We can see that all these methods for learning causal structure are unreliable, or the time complexity is so very high that we often cannot get the result in an acceptable time. In this situation, we resort to optimization algorithms.
Then, we study the optimization algorithms. Problems existing in many real worlds can be classified as optimization problems. The traditional optimization algorithm is based on a single point, such as gradient descent algorithm, which is a point that moves in the opposite direction of the gradient function. The traditional optimization algorithm mainly solves the problem of a single peak; it is easy to obtain the local optimal solution in the case of complex multiple modes and nonlinear problems.
In recent years, the swarm intelligence (SI) algorithm has been a topical research topic in solving the problem of multiple peaks. Swarm intelligence algorithms are used to solve problems by learning some life phenomena or natural phenomena in nature, which includes the characteristics of self-organization, self-learning and adaptability of natural life phenomena. Especially in 2011, a new SI algorithm [28] called “Brain Storm Optimization” (also known as Brainstorm optimization, BSO) was proposed, which was inspired by human brainstorming activities. The paper demonstrates the ability of BSO to solve optimization problems by testing two basic functions. Based on the idea of human creative problem-solving, a new swarm intelligence algorithm, Shi’s [9] optimization algorithm, was proposed. Unlike traditional swarm intelligence algorithms, such as ant colony optimization (ACO) and artificial bee colony (ABC), the BSO algorithm is the first one to solve the problem based on human creative thinking. Humans are the smartest animals in the world, and the BSO algorithm, which is inspired by their social behavior, is considered a promising method [9]. Shi [9,10] elaborated the thought and implementation process of BSO algorithm, and used the classical test function to simulate the BSO algorithm, and the results showed the effectiveness of BSO algorithm. However, there is still a problem of precocious maturity, and it is necessary to further study to optimize the algorithm itself, improve the effect of BSO algorithm [11].
In this study, we design an efficient method to support causal discovery by combining K2 with Brain Storm Optimization Algorithm (K2-BSO). We use the score returned by the K2 algorithm as the fitness function, and design an elaborate distance function for the clustering step in the BSO according to the mechanisms of K2. The graph space therefore was reduced to a smaller topological order space and the order space can be further reduced by an efficient clustering method. After a optimal causal order is returned by BSO, we run K2 to search for the optimal causal structure, and output the causal skeleton. In the case of high dimensions, the following methods are first used to process the skeleton. We split the causal skeleton into n (the number of variables in the skeleton) smaller sub-skeleton, and employ ANM to detect the causal directions between the target variables and all its parents from each causal skeleton. Consequently, we obtain a partial DAG (PDAG) w.r.t. each sub-skeleton. By merging all the PDAGs, the whole structure corresponding to the high dimensional causal network w.r.t. the given dataset is finally reconstructed. K2-BSO is designed for a certain problem, and the most different thing from other BSO methods should be the clustering procedure, since in the our design, we need to measure the distance between two node sequences in term of the corresponding orders instead of two sequences perset, therefore the existing clustering methodologies used in other BSO methods like those mentioned in [29,30,31] are not applicable for our case.
The rest of this paper is organized as follows: Section 2 briefly summarizes these definitions. Then we focus on the introduction to the basic concepts, algorithm flow and advantages and disadvantages of K2 and BSO algorithms in Section 3. The details of Causal Discovery combining K2 with Brain Storm Optimization Algorithm are discussed in Section 4. The correctness and performance characteristics of three algorithms are shown in the Section 5. Section 6 gives detailed experimental results. Finally, the conclusions are drawn in Section 7.

2. Definitions

In this section, we will introduce several basic definitions applied in our method. The concepts of the D-separation, V-structure and Additive noise model, which is described as follows:
A causal network can be expressed as a directed acyclic graph (DAG) GN = {VN,EN}, in which EN = {e1,e2,…,en} and VN = {x1,x2,…,xn} denote the sets of edges and nodes in GN.
A. D-separation
Definition 1.
(d-Separation). Assume L is a path from xi to xj, and is blocked by a set of variables Z if one of the following conditions holds:
(1)
L either contains a chain, xixkxj, and xkZ,
(2)
or a fork, xixkxj, and xkZ,
(3)
or a collider, xixkxj, and xkZ, and no descendent of xk is contained in Z.
We say a set Z separates two disjointed sets Xi and Xj (Xi, XjVD) if Z blocks each path between Xi and Xj.
B. V-structure
Definition 2.
(V-Structure). Given three variables x, y, and z. If x and z are the parent nodes of y, and no other edge is existing between x and z, then x, z and y together form a V-structure. As shown in Figure 1.
C. Additive noise model
Definition 3.
(Additive noise model (ANM for short)) ANM is represented by a collection of n equations S = {S1,S2,…Sn}: Si:xi = fi( x p a ( i ) ) + εi, i = {1,2,…,n}, where x p a ( i ) is the direct parent set of xi, the noise terms εi are jointly independent, and are independent from xi.
It can be seen that the data-generating processes of X can be expressed as:
S i :   x i = ε i , i = { 1 ,   2 ,   ,   k }   ( the   root   nodes )
S j :   x j = f j ( x p a ( j ) ) + ε j ,   j = { 1 ,   2 ,   ,   n k }   ( the   other   nodes )
As shown aforementioned ANM provides a way for finding casualties by using the assumption of additional noise data generation process rather than satisfying Markov conditions.

3. The K2 and Brain Storm Optimization

In this section, we first introduce the K2 algorithm. Then, the basic concepts, algorithm flow and advantages and disadvantages of BSO algorithm are introduced in detail. All in all, the whole process of the K2 and Brain Storm Optimization can be described as follows.

3.1. The K2 Algorithm

K2 Algorithm, developed by Cooper and Herskovits in 1992, is a Bayesian Network Structure learning algorithm based on the score search method. It is a classical algorithm in the Bayesian Network Structure field with excellent learning performance [32].
As we all know, Bayesian Network Structure Learning aims to find the Bayesian Network Structure BS which best connects with D through the analysis of data set D. That is the Bayesian Network Structure BS with maximum posterior probability P(BS|D). Because P(BS|D) = P(BS|D)/P(D) in which P(D) is a constant, what we find is the network structure BS that maximizes the probability P(BS|D), that is:
max [ P ( B S , D ) ] = c i = 1 n max [ j = 1 q 1 ( r i 1 ) ! ( N i j + r i 1 ) ! k = 1 r i N i j k ! ] ,
where c is the a priori probability P(BS|D) of each network structure, which is meant to be a constant because in the algorithm of K2, it is assumed that every network structure BS has the same probability; n is the number of nodes; ri is the number of values of node Xi; πi is parent nodes set of node Xi; qi is the number of configurations of πi; Nijk is the sample number of node Xi, which takes the value of k, and its parent set is the jth configuration in data set D; N i j = k = 1 r i N i j k .
As is showing above, K2 Algorithm uses Equation (1) as a score function to learn the Bayesian Network Structure. From Equation (1), the score function can be decomposed, that is, it can be seen as products of n local structures, which is made up of each node Xi, i = 1 , 2 , , n and its corresponding parent nodes set. Then the following equation is derived:
g ( X i , π i ) = j = 1 q i ( r i 1 ) ! ( N i j + r i 1 ) ! k = 1 r i N i j k !
G ( B S , D ) = i = 1 n g ( X i , π i )
so we can maximize G(Bs,D) if we maximize every local structure’s scores g(Xi,πi), inevitably also maximizing the scores of the whole Bayesian Network Structure (Equation (1)). According to this idea, given nodes order ρ and the upper limits μ of each node’s parent nodes, the K2 algorithm can use Greedy Searching to find each node’s parent nodes in turn so as to finally construct a whole complete Bayesian Network. The concrete method is as follows: firstly, for every node Xi, i = 1,2,…,n, constantly choose the former nodes in former nodes’ set from nodes order into parent set πi of node Xi, making the score function g(Xi,πi) of πi and Xi continuously increase. The above process cannot stop until function g(Xi,πi) does not increase any more when adding nodes. In that process, we need to limit that the parent node’s number should be under μ.
As is known to all that the K2 algorithm has two prerequisites, given nodes order ρ and the upper limits μ of each node’s parent nodes. With these two prerequisites, it can obtain a very good learning performance, but in most situations, we can’t always meet the above prerequisites, causing difficulties in the application of the K2 algorithm.

3.2. Brain Storm Optimization

3.2.1. Brainstorming Algorithm Principle

Inspired by human behavior patterns, in 2011, a human brainstorming process was proposed for the first time by Shi et al., called Brainstorming Optimization Algorithm (BSO). Shi’s article expounds the thought and realization process of BSO in detail, and simulates the BSO algorithm with classical test function, and the experimental results show that the BSO algorithm is effective. However, there are some deficiencies in the new algorithm, such as easily falling into local optima, resulting in premature convergence. Therefore, it is necessary to improve the BSO algorithm and optimize the algorithm so as to improve its effect [33,34,35,36,37,38].
The concept and theory of the basic BSO algorithm is derived from the simulation of the human brainstorming process. A brainstorming meeting needs a moderator, a number of owners to solve problems, and a group of parliamentarians with different backgrounds. Since parliamentarians have different backgrounds, different experiences and different ways of thinking, one problem will get different solutions. The moderator, in accordance with the four Rules of the Conference (see Table 1), presides over the meeting and gets solutions from as many as possible [38,39,40,41,42,43]. The algorithm needs a skilled host, with no or almost no problem-solving knowledge, so as not to lead host into bias, and also the host cannot engage in new ideas until all ideas are proposed. The host can divide it into K classes, and for each class, people can diversify their thinking and propose better solutions until they get the best solution. The BSO algorithm gets its inspiration from this model and then simulates the process. In the BSO algorithm, the feasible solution of each optimization problem is a quantity of information in the search space, all the information has an adaptive value which is determined by the function of optimization, and then the optimal information is iterated by clustering and learning all kinds of excellent information.
The brainstorming session procedure is as follows:
(A)
Assemble as many parliamentarians with different backgrounds as possible;
(B)
Get the solutions based on the brainstorming rules in Table 1;
(C)
Choose a scheme as the best solution for the current problem from each of the problem-solving owners;
(D)
Generate new schemes from the schemes selected in C according to the rules in Table 1
(E)
Choose a solution from the idea of each problem-solving owner in D as the best solution for the current problem
(F)
Randomly select a scheme as a clue to generate new schemes in the case of meeting the Rules in Table 1;
(G)
Each problem-solving owner chooses a scheme from F to be the best solution for the current problem;
(H)
Get the best solution that is desired by considering merging these programs.

3.2.2. BSO Algorithm Steps

The brainstorming algorithm is mainly composed of two modules: a clustering module and a learning module. In the clustering module, the algorithm uses the clustering method to gather the information into K classes, and the cluster center in each class is the optimal value. The algorithm is optimized by learning, also the information in each class is in parallel. Similarly the local search is promoted, and the algorithm jumps out of the local optimization through the cooperation between classes and the mutation operation, which promotes the global search. The convergence of the algorithm is ensured by the optimization process of cluster center, and the process of optimizing the information variation in the class ensures the diversity of the algorithm population. Each individual in the BSO algorithm represents a potential problem solution that is updated by the individual’s evolution and fusion, a process similar to that of the human brainstorming process [44,45,46].
The implementation of BSO algorithm is simpler:
(1)
Obtain the solution of n potential problems, then divide n individuals into M class by K-means method, the individual in each class is sorted by evaluating these n individuals, and the optimal individual is selected as the central point of the class;
(2)
Randomly select the central individual of a class and determine whether it is replaced by a randomly generated individual according to the probability;
(3)
to update the individual, the way is updated by the following four ways: (a) randomly select a class (the probability of selection is proportional to the number of individuals within the class), the random perturbation is added to the class center to produce a new individual; (b) randomly select a class (the probability of selection is proportional to the number of individuals within the class) and randomly select an individual in the selected class, plus a random perturbation to produce a new individual; (c) randomly selected two classes, the fusion of the class center and the random perturbation to produce a new individual; (d) randomly select two classes, randomly select an individual in each class, and then add a random perturbation to create a new individual. By adjusting the parameters to control the proportion of the above four ways to produce new individuals. After the new individual generation, compared with the original individual, the final selection of the best one to retain to a new generation of individuals, repeat the above operation, the n individual to update each one, produced a new generation of n individuals.
This loops until the upper limit of the preset individual update algebra is reached. In the third step, the update of the individual has four ways to produce a new individual process; the selected amount of information plus a Gaussian random is worth the new amount of information, such as the following Equation (4):
X n e w d = X s e l e c t e d d + ε × n ( μ , σ ) ,
where X n e w d is the d dimension of the new information, X s e l e c t e d d is the d dimension of the selected information, n ( μ , σ ) is the Gaussian function whose mean value is μ and variance is σ; ε is a weight coefficient which is described by Equation (5):
ξ = log s i g ( ( 0.5 × max _ i t e r a t i o n c u r r e n t _ i t e r a t i o n ) / k ) × r a n d ( ) ,
where logsig() is a s-type logarithmic transfer function, and max_iteration is the maximum number of iterations, while current_iteration means the current number of iterations; k can change the slope of the function logsig(), rand() is the random value between (0,1).

4. The K2-BSO Method

In this section, the details of the K2-BSO method are given, we show that this method is able to discover causation combining K2 with the Brain Storm Optimization algorithm. All in all, the whole process of causality is deduced, which is described as follows:

4.1. Skeleton Learning Phase Based on K2-BSO

The Additive Noise Model (ANM) could find out the causal relationships correctly between variables in sparse causal networks, but this model would encounter multiple challenges when applied to high-dimensional complex network structures [12]. First of all, high-dimensional causal networks contain a large number of variables, and the causal relationships between them are very complex, so the algorithm requires the ability to quickly search. Causal relationship references based on the traversal method will face all possible network structures, which leads directly to the insufferable computational complexity, the storage space overflow and other problems. The K2 algorithm needs to satisfy two prerequisites, given nodes order and the upper limits of each node’s parent nodes. However, it is difficult to make it in fact. What’s more, the K2 algorithm is easy to fall into the local optimal solutions while the BSO algorithm could get rid of local optimizations. Therefore, the combination of the algorithm K2 and BSO can effectively solve the structural learning problem of causal network structure. As discussed in the previous section, there are three points we need to note:
(1)
What needs to be optimized is the causal order that will highly affect the accuracy of K2. Generally, an input order approaching the actual topological order of the underling causal network will return the highest score and most similar causal structure.
(2)
The fitness function is easy to be chosen, that is the score return by K2.
(2)
The clustering method of BSO should be redesigned; all the distance function likes [46] cannot be directly applied to this case, as what we consider is the topological order. We design a new distance function like this:
Step I. Given two orders R 1 and R 2 , for each variable in R 1 , we find the same variable in R 2 , assume it is v 1 .
Step II. Consider n variables in front of v 1 in R 1 , and m variables in front of v 1 in R 2 , we calculate the number of the repeated variables in n + m variables.
Step III. By literately sum up the repeated variables w.r.t. every variable in R 1 (or R 2 ), we get a number, and let this number as the distance between R 1 and R 2 .
We note that, the clustering step is crucial to the BSO, as shown before, our distance function is designed based on the mechanism of K2, which will highly improve the clustering performance in BSO.

4.2. Direction Learning Phase

Algorithm 1 can obtain the skeleton of network returned by K2-BSO. Because the K2 can only examine a set of Markov equivalence classes rather than the realistic causal structure, we aim to detect the remaining directions of the output skeleton for distinguishing this equivalence in this section. Because of the existence of Markov equivalence classes, the structural learning methods are generally difficult to infer all causal direction. On the other hand, the ANM provides an effective way to learn causal direction in low-dimensional cases. Note that, we get the causal skeleton, then we can separate the causal skeleton S into n sub-skeletons (Si,…,Sn) which contain a target node Xi and all its neighbor nodes Ni according to S. In general, these sub-skeletons are generally low-dimensional and therefore can be solved by using ANM. The way to orient the edges of a skeleton in ANM method is described as follows:
Algorithm 1. Skeleton learning based on K2-BSO.
Input: dataset X, population size | V | .
Output: the skeleton w.r.t. X.
1: Randomly generate n potential causal order R = R 1 R n ;
2: Cluster R into m clusters C = C 1 ~ C m ;
3: For each R i
Scorei = K2( R i );
4: End For
5: Score = Score1 ~ Scoren;
6: Roptimal = BSO (X, R, Score, C);
7: Goptimal = K2(Roptimal);
8: X = Goptimal;
9: return the causal skeleton X.
Firstly, consider a given dataset X = {X1,X2,…,Xn} with index V = {1,2,…,n}. X corresponds to an n-dimensional DAG G = {V,E}, where E represents the edges of V. Assume that X is generated by the following way: each variable XiX corresponds to one node iV in G, and is determined by a causal function X i = f i ( x p a ( i ) ) + ε i in which fi is nonlinear, x p a ( i ) is the parent of xi. The noise terms εi have a non-Gaussian distribution and are jointly independent.
In the issue of seeking out the causal direction, we aim to seek out all the parent nodes (contained in Ni) amount to each target Xi from Si. On the basis of the mechanism of ANM, we denote the homologous remains between Xi and each candidate parent set Cik as Xi = f(Cik) + εi by using GPR, and we test whether Cik and ε are statistically independent. If they are independent we accept the model CikXi; if not, we deny it. In this phase, we measure the independence by using the kernel-based conditional independence (KCI) test. The details of causal directions inference from a output causal skeleton is presented in Algorithm 2.
Algorithm 2. Learning causal direction from a sub-skeleton.
Input: sub-skeleton S i and the corresponding target node X i with all its neighbors N i .
Output: the direction between X i and (partial) N i .
1: For each candidate parent set C i k ;
2: fit X i and C i k to ANM;
3: if ε is independent of C i k then
4: accept C i k X i ;
5: end if
6: end for

4.3. K2-BSO Framework (Algorithm 3)

We first present the details of the K2-BSO method:
  • Step 1. Learning the causal skeleton S by algorithm 1.
  • Step 2. Split S into n sub-skeleton S 1 , , S n according to each node Xi contained in S.
  • Step 3. Perform Algorithm 2 for each sub-skeleton Si.
  • Step 4. Merge all the partial results and output the final causal structure.
Algorithm 3. K2-BSO framework.
Input: Dataset X, threshold k
Output: Causal structure G.
1. Set Dimension X to n;
2. if (n < k) then
3. S = A l g o r i t h m   1 ( X ) ; G = A l g o r i t h m   2 ( X ,   S ) ;
4. else
5. Split S into n sub-skeleton S 1 , , S n according to each node X i contained in S;
6. For each S i in S
7. S i = A l g o r i t h m   1 ( X i ) ; P D A G i = A l g o r i t h m   2 ( X i ,   S i ) ;
8. Merge all P D A G i to G;
9. End for
10. end if
11. return the final causal structure G.

5. The Correctness and Performance of the Algorithms

In this part, we analyze theoretically about the respective characteristics of the correctness and performance with the three algorithms (K2-Random, K2-BSO, K2-GA).
First, we discuss the K2-Random algorithm. It is a traditional method, and there is not much optimization process. The main process is: first step, randomly obtain p data sort, then sort the score from the top to the bottom and select the highest score. The second step is to continue to randomly obtain p data sort, found the highest score Tscore, until 10 consecutive times are the same highest score, and end the program; this method is very easy to enter the local optimization state, but the experimental result is unstable.
Second, we discuss the K2-BSO algorithm, which is the method proposed in this paper. It is better to avoid local optimization problems. The main process is: first step, randomly obtain p data sort, then sort the score from the top to the bottom and obtained m data sort by clustering method. The second step is to obtain m new subclasses by random perturbation about m subclasses by the BSO algorithm. Then we reevaluate the score until the score converges.
Third, we discuss the K2-GA algorithm. The main process is: The main process is: first step, randomly obtain p data sort, Then sort the score from the top to the bottom and select the highest score until the score converges. The second step is to obtain p new data sort by means of Genetic Algorithm (GA) method with randomly perturbation the highest ranking data. Then sort the score from the top to the bottom to obtain the highest score Tscore.
In summary, the first algorithm in time complexity is the best, but the accuracy rate is the lowest and unstable; the second algorithm and the third algorithm’s time complexity are the same, especially with the increase of network dimensions, second algorithms tend to advance convergence faster than the third algorithms, and the accuracy of the second algorithms is better than the third algorithm. Next, we’ll use real data to validate three algorithms in the next chapter.

6. Experiments

In this section, we evaluate our proposal on eight real-world datasets that cover a variety of applications including Small Networks (Asia, Sachs), Medium Networks (Child, Alarm), Large Networks (Barley, Win95pts), and Very Large Networks (Pigs, MINUN) that cover a variety of applications, including, medicine (ASIA, SACHS, CHILD and ALARM), agricultural industry (BARLEY), system troubleshooting (WIN95PTS) and bioinformatics (PIGS and MUMIN) are available at “http://archive.ics.uci.edu/ml/datasets.html”. The structural statistics of the eight networks are summarized in Table 2.
In this group of experiments, our proposed method is compared with other two mainstream causal discovery methods—K2-Random (Causal Discovery combining K2 with Random) method and K2-GA (Causal Discovery combining K2 with Genetic Algorithm) method. We evaluate these methods by different sample size at 250, 500, 1000, 2000, respectively. We use three criteria, Recall, Precision, and F1 to evaluate these methods, which are defined as follows:
Recall = ( Inferred   directions Actual   directions ) / ( Actual   directions ) ,
Precision = ( Inferred   directions Actual   directions ) / ( Inferred   directions ) ,
F 1 = ( 2 × Recall × Precision ) / ( Recall + Precision ) ,
Obviously Precision is the actual fraction of inferred causality with respect to a true graph. Similarly, Recall is the part of actual causality found by the algorithm. F1 is the organic combination of Precision and Recall which can serve as the accuracy standard for our algorithms.
The experimental environment is as follows:
(1)
CPU of the physical host: CPU E5-2640 v3, 2.60 GHz (2-way 8-core);
(2)
Platform belongs to the cloud platform version from Bingo Cloud: v6.2.4.161205143;
(3)
Memory is 24 G.
As shown in Table 3, we can see that the K2-Random runs much faster than the other two algorithms. However, as showed in Figure 2, the accuracy of K2-Random is lowest, this means K2-Random easily falls into a local optimum. One can imagine that if we use K2-Random to test all possible causal orders detailed we can obtain the best score, but we usually cannot get the final result in an acceptable time, because the time complexity of such an exhaustive algorithm reaches the upper limit.
On the other hand, we can see that in the small networks, K2-GA runs faster than K2-BSO. However, as the size of the networks grows, the running time of K2-BSO increases slower than that consumed by K2-BSO, and the running time of the two methods tend to be very close. We can see that in the case of WIN95PTS, K2-BSO runs much faster than K2-GA. What is the most different between K2-BSO and K2-GA in the task is that K2-BSO performs a clustering step, which can greatly reduce the convergence time. Recall that, the clustering step in K2-BSO also costs time. Therefore, when the causal network spends more time in clustering step, K2-BSO is probably slower than K2-GA, while for a network to spend less time in the clustering step, theoretically K2-BSO runs much faster than K2-GA. Accordingly, the specific structure of a certain causal network weighs heavily on total time.
As shown in Figure 2, K2-BSO achieves the better score in the majority of cases, which means that the clustering step can not only improve the convergence speed on the basis of the number of iterations, but also prevent K2-BSO from falling into local optima. Even the largest network PIGS shows that the F1 score is 2% better than K2-GA.
Figure 2 also shows the main trends of the indexes (Recall (R), Precision (P), and F1) of the three algorithms (K2-R, K2-BSO, K2-GA), with different samples [250,500,1000,2000] in eight datasets, including ASIA, ALARM, SACHS, BARLEY, CHILD, Win95pt, PIGS and MINUN. The blue line ‘o:’ represents the numerical trend of the Recall of K2-Random; the blue line ‘o--’ indicates the numerical trend of the Precision of K2- Random; the blue line ‘*—’ indicates the numerical trend of the F1 of K2-Random; The red line ‘o:’ represents the numerical trend of the Recall of K2-BSO; the red line ‘o--’ indicates the numerical trend of Precision of K2-BSO; the red line ‘*—’ indicates the numerical trend of F1 of K2-BSO; The green line ‘o:’ represents numerical trend of the Recall of K2-GA; the green line “o--” indicates the numerical trend of the Precision of K2-GA, and the blue line “*—” indicates the numerical trend of the F1 of K2-GA.
Figure 2a shows the curves of the three methods (K2-R, K2-BSO, K2-GA) with different samples in the data set ASIA. It can be seen that the red curve basically goes above the green one and the blue one, which means that K2-BSO’s indexes R, P, F1 are higher than that of K2-R and K2-GA, thus proves that K2-BSO algorithm is better than K2-R algorithm and K2-GA algorithm.
Figure 2b–e show the curves of the three algorithms (K2-R, K2-BSO, K2-GA) with different samples in data sets SACHS, CHILD, ALARM and BARLEY. It can be observed that the results are similar to that in Figure 2a, that K2- BSO’s indexes R,P,F1 are higher than that of K2-R and K2- GA, thus also proves that K2-BSO algorithm is better than K2-R algorithm and K2-GA algorithm. Figure 2f–g shows the curves of the three methods (K2-R, K2-BSO, K2-GA) with different samples in data set WIN95PTS, PIGS and MINUN. WIN95PTS is a 76-dimensional network, PIGS is a 441-dimensional network and MINUN is a 1041-dimensional network, so they belongs to the high dimensional networks. We can see from Figure 2f that the curve of the blue value is the lowest; with sample 500 and 2000, the value of the green curve is slightly higher than that of the red curve, while on the whole, the red curve goes above the green. However, when we refer to Table 3, it is obvious that the execution time of K2-BSO is much less than that of K2-GA, which means the K2-BSO is better than the other algorithms in this network. On the other hand, Figure 2g shows that the curves are slightly different from the form’s results, the Recall of the three methods grows with the increase of sample size while the Precision reduces with the increase of sample size.
The reason for such a difference is that PIGS is a genetic network, that is, PIGS has a very complex structure where some nodes connect with many neighboring nodes, for example, the maximum degree is 41 (maximum in-degree is 2). Accordingly it is difficult for the subroutine K2 to remove these in-direct causal relationships. Even so, it can be seen that the F1 score of K2-BSO is still 2% better than those of K2-R and K2-GA. Figure 2h shows that even in the case of MINUN network of more than 1000 dimensionality, K2-BSO works much better than K2-GA and K2-R. These results demonstrate that our method K2-BSO is much reliable than the counterparts in more complexity and higher-dimensional cases, and also shows that K2-BSO is able to learn the causal structure from a dataset with hundreds of variables. In summary, K2-BSO performs better than K2-GA if the accuracy and execution time are combined, so in our future work, we will continue to perfect the K2-BSO algorithm, making it adapt to high-dimensional network accuracy problems at the cost of some appropriate execution time.

7. Conclusions

To reduce the search space of graphs is important in causal relationship discovery; however, the existing methods show inefficiency for large scale causal networks. In this work, an improved causal structure learning algorithm combining K2 with brain storm optimization (BSO) called K2-BSO is presented to alleviate this problem. In contrast to other evolutionary algorithms based on the search and score methods, K2-BSO has two significant advantages, (1) K2-BSO searches optimal topological order of nodes instead of graph space. The order space should be much smaller than the whole graph space. In this phase, an elaborate distance function is introduced for clustering nodes’ orders in BSO based on the mechanism of K2. The graph space therefore is reduced to a smaller topological order space that can be further reduced by an efficient clustering method. (2) Our method is designed through the following split and merge strategy, the original dataset is split into a set of subdata sets in the first place. The BSO will run on these subdata sets to recover the corresponding substructures. Here we further use additive noise model approach to rectify the direction of the erroneous orientation or the side without direction. We eventually merge all these substructures and obtain the entire structure of the graph. The experimental results on various causal networks showed our method could outperform the traditional search and score method and the state-of-the-art genetic algorithm-based method.

Author Contributions

Y.H. and Z.H. designed the study. Y.H., Z.H., G.M., H.H. and A.K.S. performed the study. Y.H. and G.M. wrote the manuscript. G.M. was the principal investigator and corresponding author.

Funding

This research was supported in part by NSFC-Guangdong Joint Found (U1501254), Natural Science Foundation of China (61472089), (61473331), (61502108), Science and Technology Planning Project of Guangdong Province, China (2015A030401101), (2015B090922014), (2017A040405063), (2017B030307002), Guangdong High-level personnel of special support program (2014TQ01X664) and International Cooperation Project of Guangzhou (201807010047).

Conflicts of Interest

The authors declare that they have no competing interests.

References

  1. Hao, Z.; Huang, J.; Cai, R.; Wen, W. A hybrid approach for large scale causality discovery. In Emerging Intelligent Computing Technology and Applications, Proceedings of the 8th International Conference, ICIC 2012, Huangshan, China, 25–29 July 2012; Springer: Berlin, Germany, 2013; Volume 375, pp. 1–6. [Google Scholar]
  2. Li, X.J.; Mishra, S.K.; Wu, M.; Zhang, F.; Zheng, J. Syn-lethality: An integrative knowledge base of synthetic lethality towards discovery of selective anticancer therapies. BioMed Res. Int. 2014, 2014, 196034. [Google Scholar] [CrossRef] [PubMed]
  3. Wu, M.; Li, X.; Zhang, F.; Li, X.; Kwoh, C.K.; Zheng, J. In silico prediction of synthetic lethality by meta-analysis of genetic interactions, functions, and pathways in yeast and human cancer. Cancer Inform. 2014, 13, 71–80. [Google Scholar] [CrossRef] [PubMed]
  4. Pearl, J. Causality; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar]
  5. Spirtes, P.; Glymour, C.N.; Scheines, R.; Heckerman, D.; Meek, C.; Cooper, G.; Richardson, T. Causation, Prediction, and Search; Springer: New York, NY, USA, 1993; pp. 272–273. [Google Scholar]
  6. Chickering, D.M. Learning equivalence classes of bayesian-network structures. J. Mach. Learn. Res. 2002, 2, 150–157. [Google Scholar]
  7. Shimizu, S.; Hoyer, P.O.; Hyvärinen, A.; Kerminen, A. A linear non-gaussian acyclic model for causal discovery. J. Mach. Learn. Res. 2006, 7, 2003–2030. [Google Scholar]
  8. Shimizu, S.; Inazumi, T.; Sogawa, Y.; Hyvärinen, A.; Kawahara, Y.; Washio, T.; Hoyer, P.O.; Bollen, K. Directlingam: A direct method for learning a linear non-gaussian structural equation model. J. Mach. Learn. Res. 2011, 2, 1225–1248. [Google Scholar]
  9. Hoyer, P.O.; Janzing, D.; Mooij, J.M.; Peters, J.; Schölkopf, B. Nonlinear causal discovery with additive noise models. In Proceedings of the International Conference on Neural Information Processing Systems, Vancouver, BC, Canada, 8–10 December 2008; pp. 689–696. [Google Scholar]
  10. Peters, J.; Mooij, J.M.; Janzing, D.; Schölkopf, B. Causal discovery with continuous additive noise models. J. Mach. Learn. Res. 2013, 15, 2009–2053. [Google Scholar]
  11. Peters, J.; Janzing, D.; Scholkopf, B.; Teh, Y.W.; Titterington, M. Identifying cause and effect on discrete data using additive noise models. In Proceedings of the International Conference on Artificial Intelligence and Statistics, Sardinia, Italy, 13–15 May 2010; pp. 597–604. [Google Scholar]
  12. Peters, J.; Janzing, D.; Scholkopf, B. Causal inference on discrete data using additive noise models. IEEE Trans. Pattern Anal. Mach. Intell. 2011, 33, 2436–2450. [Google Scholar] [CrossRef] [PubMed]
  13. Zhang, K.; Hyvärinen, A. Distinguishing causes from effects using nonlinear acyclic causal models. In Proceedings of the 2008th International Conference on Causality: Objectives and Assessment, Vancouver, BC, Canada, 8–10 December 2008; Volume 6, pp. 157–164. [Google Scholar]
  14. Daniusis, P.; Janzing, D.; Mooij, J.; Zscheischler, J.; Steudel, B.; Zhang, K.; Schölkopf, B. Inferring deterministic causal relations. In Proceedings of the Conference on UAI, Catalina Island, CA, USA, 8–11 July 2010; pp. 143–150. [Google Scholar]
  15. Janzing, D.; Mooij, J.; Zhang, K.; Lemeire, J.; Zscheischler, J.; Daniušis, P.; Steudel, B.; Scholkopf, B. Information-geometric approach to inferring causal directions. Artif. Intell. 2012, 182–183, 1–31. [Google Scholar] [CrossRef]
  16. Janzing, D.; Steudel, B.; Shajarisales, N.; Scholkopf, B. Justifying information-geometric causal inference. In Measures of Complexity; Springer: Cham, Switzerland, 2015; pp. 253–265. [Google Scholar]
  17. Chen, W.; Hao, Z.; Cai, R.; Zhang, X.; Hu, Y.; Liu, M. Multiple-cause discovery combined with structure learning for high-dimensional discrete data and application to stock prediction. Soft Comput. 2016, 20, 4575–4588. [Google Scholar] [CrossRef]
  18. Cai, R.; Zhang, Z.; Hao, Z. Causal gene identification using combinatorial v-structure search. Neural Netw. 2013, 43, 63–71. [Google Scholar] [CrossRef] [PubMed]
  19. Cai, R.; Zhang, Z.; Hao, Z. SADA: A General Framework to Support Robust Causation Discovery. In Proceedings of the 30th International Conference on Machine Learning (ICML), Atlanta, GA, USA, 16–21 June 2013; Volume 28, pp. 208–216. [Google Scholar]
  20. Cai, R.; Zhang, Z.; Hao, Z.; Winslett, M. Understanding Social Causalities Behind Human Action Sequences. IEEE Trans. Neural Netw. Learn. Syst. 2016, 28, 1801–1813. [Google Scholar] [CrossRef] [PubMed]
  21. Cai, R.; Zhang, Z.; Hao, Z. BASSUM: A Bayesian semi-supervised method for classification feature selection. Pattern Recognit. 2011, 44, 811–820. [Google Scholar] [CrossRef] [Green Version]
  22. Mooij, J.; Janzing, D.; Peters, J.; Scholkopf, B. Regression by dependence minimization and its application to causal inference in additive noise models. In Proceedings of the 26th Annual International Conference on Machine Learning, Montreal, QC, Canada, 14–18 June 2009; pp. 745–752. [Google Scholar]
  23. Zhang, K.; Peters, J.; Janzing, D.; Scholkopf, B. Kernel-based conditional independence test and application in causal discovery. Comput. Sci. 2012, 6, 895–907. [Google Scholar]
  24. Cheng, S.; Qin, Q.; Chen, J.; Shi, Y. Brain storm optimization algorithm: A review. Artif. Intell. Rev. 2016, 46, 445–458. [Google Scholar] [CrossRef]
  25. Hong, Y.H.; Liu, Z.S.; Mai, G.Z. An efficient algorithm for large-scale causal discovery. Soft Comput. 2016, 21, 7381–7391. [Google Scholar] [CrossRef]
  26. Hong, Y.H. Fast causal network skeleton learning algorithm. J. Nanjing Univ. Sci. Technol. 2016, 40, 315–321. [Google Scholar]
  27. Hong, Y.H.; Mai, G.Z.; Liu, Z.S. Learning tree network based on mutual information. Metall. Min. Ind. 2015, 12, 146–151. [Google Scholar]
  28. Duan, H.; Li, S.; Shi, Y. Predator–prey brain storm optimization for DC brushless motor. IEEE Trans. Mag. 2013, 49, 5336–5340. [Google Scholar] [CrossRef]
  29. Shi, Y. Brain storm optimization algorithm. In Proceedings of the International Conference in Swarm Intelligence, Chongqing, China, 12–15 June 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 303–309. [Google Scholar]
  30. Zhan, Z.H.; Zhang, J.; Shi, Y.H.; Liu, H.L. A modified brain storm optimization. In Proceedings of the 2012 IEEE Congress on Evolutionary Computation, Brisbane, QLD, Australia, 10–15 June 2012; pp. 1–8. [Google Scholar]
  31. Xue, J.; Wu, Y.; Shi, Y.; Cheng, S. Brain storm optimization algorithm for multi-objective optimization problems. In Advances in Swarm Intelligence; Springer: Berlin/Heidelberg, Germany, 2012; pp. 513–519. [Google Scholar]
  32. Cooper, G.F.; Herskovits, E. A bayesian method for the induction of probabilistic networks from data. Mach. Learn. 1992, 9, 309–347. [Google Scholar] [CrossRef]
  33. Shi, Y. An optimization algorithm based on brainstorming process. In Emerging Research on Swarm Intelligence and Algorithm Optimization; Information Science Reference: Hershey, Pennsylvania, 2015; pp. 1–35. [Google Scholar]
  34. Zhou, D.; Shi, Y.; Cheng, S. Brain storm optimization algorithm with modified step-size and individual generation. Adv. Swarm Intell. 2012, 7331, 243–252. [Google Scholar]
  35. Sun, C.; Duan, H.; Shi, Y. Optimal satellite formation reconfiguration based on closed-loop brain storm optimization. IEEE Comput. Intell. Mag. 2013, 8, 39–51. [Google Scholar] [CrossRef]
  36. Jadhav, H.T.; Sharma, U.; Patel, J.; Roy, R. Brain storm optimization algorithm based economic dispatch considering wind power. In Proceedings of the 2012 IEEE International Conference on Power and Energy (PECon), Parit Raja, Malaysia, 2–5 December 2012; pp. 588–593. [Google Scholar]
  37. Qiu, H.; Duan, H. Receding horizon control for multiple UAV formation flight based on modified brain storm optimization. Nonlinear Dyn. 2014, 78, 1973–1988. [Google Scholar] [CrossRef]
  38. Shi, Y.; Xue, J.; Wu, Y. Multi-objective optimization based on brain storm optimization algorithm. Int. J. Swarm Intell. Res. 2013, 4, 1–21. [Google Scholar] [CrossRef]
  39. Shi, Y. Brain storm optimization algorithm in objective space. In Proceedings of the 2015 IEEE Congress on Evolutionary Computation (CEC), Sendai, Japan, 25–28 May 2015; pp. 1227–1234. [Google Scholar]
  40. Yang, Z.; Shi, Y. Brain storm optimization with chaotic operation. In Proceedings of the 2015 Seventh International Conference on Advanced Computational Intelligence (ICACI), Wuyi, China, 27–29 March 2015; pp. 111–115. [Google Scholar]
  41. Yang, Y.; Shi, Y.; Xia, S. Advanced discussion mechanism-based brain storm optimization algorithm. Soft Comput. 2015, 19, 2997–3007. [Google Scholar] [CrossRef]
  42. Jia, Z.; Duan, H.; Shi, Y. Hybrid brain storm optimisation and simulated annealing algorithm for continuous optimisation problems. Int. J. Bio-Inspired Comput. 2016, 8, 109–121. [Google Scholar] [CrossRef]
  43. Cheng, S.; Shi, Y.; Qin, Q.; Gao, S. Solution clustering analysis in brain storm optimization algorithm. In Proceedings of the 2013 IEEE Symposium on Swarm Intelligence (SIS), Singapore, 16–19 April 2013; pp. 111–118. [Google Scholar]
  44. Cheng, S.; Shi, Y.; Qin, Q.; Zhang, Q.; Bai, R. Population diversity maintenance in brain storm optimization algorithm. J. Artif. Intell. Soft Comput. Res. 2014, 4, 83–97. [Google Scholar] [CrossRef]
  45. Cheng, S.; Shi, Y.; Qin, Q.; Ting, T.O.; Bai, R. Maintaining population diversity in brain storm optimization algorithm. In Proceedings of the 2014 IEEE Congress on Evolutionary Computation (CEC), Beijing, China, 6–11 July 2014; pp. 3230–3237. [Google Scholar]
  46. Georgiou, D.N.; Karakasidis, T.E.; Nieto, J.J.; Torres, A. A study of entropy/clarity of genetic sequences using metric spaces and fuzzy sets. J. Theor. Biol. 2010, 267, 95–105. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Sample Availability: Samples of the compounds are not available from the authors.
Figure 1. Illustration of a V-structure.
Figure 1. Illustration of a V-structure.
Molecules 23 01729 g001
Figure 2. R, p & F1 of the K2-R, K2-BSO and K2-GA with eight dataset: (a) ASIA dataset; (b) SACHS dataset; (c) CHILD dataset; (d) ALARM dataset; (e) BARLEY dataset; (f) Win95pt dataset; (g) PIGS dataset; (h) MINUN dataset.
Figure 2. R, p & F1 of the K2-R, K2-BSO and K2-GA with eight dataset: (a) ASIA dataset; (b) SACHS dataset; (c) CHILD dataset; (d) ALARM dataset; (e) BARLEY dataset; (f) Win95pt dataset; (g) PIGS dataset; (h) MINUN dataset.
Molecules 23 01729 g002aMolecules 23 01729 g002b
Table 1. Osborn’s Original Rules for Idea Generation in a Brainstorming Process.
Table 1. Osborn’s Original Rules for Idea Generation in a Brainstorming Process.
Rule 1 No bad ideas, every thought is good
Rule 2 Every thought has to be shared and recorded
Rule 3 Most ideas are based on existing ideas, and some ideas can and should be raised to generate new ideas
Rule 4 Try to produce more ideas
Table 2. Statistics on the network.
Table 2. Statistics on the network.
NetworkNodesEdgesAvg DegreeMaximum in-Degree
ASIA8822
SACHS11173.093
CHILD20251.252
ALARM37462.494
BARLEY48843.54
WIN95PTS761122.957
PIGS4415922.682
MUMIN104113972.683
Table 3. Comparisons between three algorithms on execution time.
Table 3. Comparisons between three algorithms on execution time.
DatasetSampleK2-RandomK2-BSOK2-GA
BestMeanWorstBestMeanWorstBestMeanWorst
ASIA2501.25551.7492.61573.01854.55855.85432.83674.25045.5427
ASIA5001.0851.46561.92243.20434.37536.33922.11254.89256.4698
ASIA10001.51041.79942.20994.70375.04725.34913.10555.11468.2191
ASIA20002.26762.49932.66293.38153.97744.38234.18785.5068.1496
SACHS2504.52485.0255.31966.22666.49636.67933.024.64327.501
SACHS5002.40843.67465.24338.781911.210715.68795.51988.16968.6039
SACHS10002.70623.57594.01978.359111.796215.35625.43568.612812.8977
SACHS20003.49664.67896.46499.367710.780711.51736.10856.15166.1762
CHILD2507.70929.11712.563128.013329.96131.32521.145525.98630.974
CHILD5008.941411.892414.106217.766528.929241.26530.248434.169638.9523
CHILD100010.05917.506928.266933.495738.450543.959723.672324.60825.3404
CHILD200010.70913.889818.350830.131758.690178.392921.334338.46547.0478
ALARM25046.64771.988886.3291217.3178266.3269355.1756147.9969283.8744371.7365
ALARM50094.125103.2041119.5914227.3739293.7428377.54133.6973388.0371519.749
ALARM100062.14092.5241125.1668157.303247.1288294.8618144.2063316.8503475.2459
ALARM200095.002159.3802232.1197323.0716394.6686496.8733219.1187275.1111345.3221
BARLEY25066.37891.2914136.5331198.4244325.1975400.4625160.181205.9434233.3933
BARLEY50075.05799.7028138.1832304.5911364.1937368.7941194.9004358.4717567.8317
BARLEY100086.012100.4193116.8377326.8585370.2588404.4023255.2328396.0264505.5334
BARLEY200096.159103.1696116.3037478.3594525.7576549.7203368.8762810.59051.48 × 103
WIN95PTS250649.751.10 × 1031.52 × 1031.81 × 1034.44 × 1037.16 × 1031.60 × 1042.06 × 1042.31 × 104
WIN95PTS500555.26727.4609819.27162.33 × 1034.76 × 1036.67 × 1036.23 × 1031.83 × 1042.48 × 104
WIN95PTS1000693.01746.7864827.46842.73 × 1034.38 × 1036.00 × 1032.01 × 1042.57 × 1043.19 × 104
WIN95PTS2000715.721.43 × 1031.85 × 1032.25 × 1037.04 × 1031.50 × 1042.13 × 1043.44 × 1044.98 × 104
PIGS2501.87 × 1042.52× 1043.96 × 1042.60 × 1053.89 × 1054.85 × 1051.45 × 1052.48 × 1053.77 × 105
PIGS5005.35 × 1046.84 × 1048.53 × 1043.09 × 1054.03 × 1055.24 × 1051.58 × 1052.56 × 1053.03 × 105
PIGS10007.12 × 1048.64 × 1049.71 × 1042.92 × 1054.14 × 1054.59 × 1051.85 × 1052.70 × 1053.57 × 105
PIGS20006.17 × 1049.00 × 1041.09 × 1054.26 × 1055.26 × 1057.05 × 1051.98 × 1052.74 × 1053.33 × 105
MINUN2501.98 × 1052.70 × 1054.33 × 1051.71 × 1062.70 × 1063.46 × 1064.54 × 1057.74 × 1051.09 × 106
MINUN5003.10 × 1054.05 × 1054.98 × 1052.52 × 1063.24 × 1064.17 × 1065.45 × 1059.00 × 1051.07 × 106
MINUN10003.39 × 1054.14 × 1054.72 × 1052.43 × 1063.41 × 1063.88 × 1068.19 × 1051.17 × 1061.57 × 106
MINUN20002.93 × 1054.23 × 1055.06 × 1052.93 × 1063.67 × 1064.99 × 1069.81 × 1051.35 × 1061.65 × 106

Share and Cite

MDPI and ACS Style

Hong, Y.; Hao, Z.; Mai, G.; Huang, H.; Kumar Sangaiah, A. Causal Discovery Combining K2 with Brain Storm Optimization Algorithm. Molecules 2018, 23, 1729. https://doi.org/10.3390/molecules23071729

AMA Style

Hong Y, Hao Z, Mai G, Huang H, Kumar Sangaiah A. Causal Discovery Combining K2 with Brain Storm Optimization Algorithm. Molecules. 2018; 23(7):1729. https://doi.org/10.3390/molecules23071729

Chicago/Turabian Style

Hong, Yinghan, Zhifeng Hao, Guizhen Mai, Han Huang, and Arun Kumar Sangaiah. 2018. "Causal Discovery Combining K2 with Brain Storm Optimization Algorithm" Molecules 23, no. 7: 1729. https://doi.org/10.3390/molecules23071729

Article Metrics

Back to TopTop