Computational Intelligence - November 2012 - 38

4 predictive attributes, where only two
attributes were predictive within a respective subset of the data. Additionally, each
data set contained 16 randomly generated,
non-predictive attributes, with minor allele
frequencies randomly selected from a uniform distribution ranging from 0.05 to 0.5.
In this study we demonstrated the efficacy of our analysis
pipeline using one of these aforementioned datasets that concurrently models epistasis and heterogeneity. Minor allele frequencies of all 4 predictive attributes were 0.2, heritabilities for
both underlying models were 0.4, relative model architecture
difficulty was "Easy," the ratio of samples representative of
either model was 50:50, and the dataset sample size was 1600.
The heritability of a model indicates the proportion of variation that can be attributed to the attributes in the model. Any
model heritability less than 1 indicates the presence of noise
(i.e., lower heritability corresponds to greater noise). This dataset offers a reasonable approximation of how a complex disease
association pattern might appear within a balanced dataset
comprised of sick and healthy subjects. Evaluation of this dataset in [12], with an implementation of the UCS algorithm,
yielded significant power to detect the underlying predictive
attributes. This dataset was chosen to provide a clear example of
this pipeline analysis. If this were a real biological investigation,
our goal would be the identification of predictive attributes,
without making any assumptions about the number of attributes involved or knowing whether their association followed
patterns of epistasis or heterogeneity. Genetic or environmental
attributes identified in this manner would be investigated further to determine whether they are causal variants or merely
markers of disease.
As a negative control for this study, we repeated the pipeline
analysis on a second dataset within which all attributes were
non-predictive. Specifically, this dataset is a class-permuted
version of the dataset described above.

All datasets were generated using a pair of distinct,
two-locus epistatic interaction models, both utilized to
generate instances (i.e., case and control individuals)
within a respective subset of each data set.
drive the discovery of better rules. For a complete LCS introduction and review, see [1].
UCS, or the sUpervised Classifier System [28], is based
largely on the very successful XCS algorithm [17], but replaces
reinforcement learning with supervised learning, encouraging
the formation of best action maps and altering the way in
which accuracy, and thus fitness, is computed. UCS was
designed specifically to address single-step problem domains
such as classification and data mining, where delayed reward is
not a concern. The implementation of UCS applied in this
study is the same as the one used in [12] upon which we had
previously performed a parameter sweep in an attempt to optimize major run parameters. With this as our basis, we adopted
mostly default parameters with the exception of 200,000 learning iterations, a population size of 2000, tournament selection,
uniform crossover, subsumption, and a v of 1. v has been
described as a "constant set by the user that determines the
strength [of ] pressure toward accurate classifiers'' [29], and is
typically set to 10 by default. A low v was used to place less
emphasis on high accuracy in this type of noisy problem
domain, where 100% accuracy is only indicative of over-fitting.
Also, as in [12], we employ a quaternary rule representation,
where for each SNP attribute, a rule can specify genotype as (0,
1, or 2), or instead generalize with "#," a character that implies
that the rule does not care about the state of that particular
attribute. Note that when evaluating UCS over the entire
training or testing datasets, discovery mechanisms were disabled
such that the rule population remained constant.
2.2 Simulated Dataset

In both [12] and [13], datasets were generated that concur2.3 Manual Inspection
rently modeled epistasis and heterogeneity as they might
To highlight the need for our proposed analysis pipeline we
simultaneously occur in a single nucleotide polymorphism
began with an example of manual inspection within the
(SNP) genetic association
study. All datasets were
Table 1 Manual rule inspection of our UCS rule population trained on the entire simulated dataset.
generated using a pair of
Rules (R's) are ordered by numerosity (Num.). To save space we have left out SNPs (X's) which were
distinct, two-locus epistatic
generalized over these top 10 rules. The accuracy of each rule listed in the table was 100%.
interaction models, both
utilized to generate
x0
x1
x2
x3
x4
x6
x7
x8
x10
x11
x15
x18
ClaSS
Num.
R1
#
#
0
1
#
#
1
#
#
#
#
1
1
10
instances (i.e., case and
R2
1
0
1
0
#
#
#
#
#
#
#
#
1
9
control individuals) within
R3
#
0
1
1
#
#
#
#
0
#
1
#
0
9
a respective subset of each
R4
2
1
#
#
#
#
1
#
#
#
#
#
1
6
data set. Two-locus epistatR5
1
1
#
#
2
#
#
#
#
0
#
#
0
6
ic models were simulated
R6
0
1
0
1
#
#
#
#
#
#
#
#
1
6
without Mendelian/main
R7
#
#
1
0
#
0
#
#
0
#
1
#
1
6
effects, as penetrance
R8
1
0
#
#
#
#
#
2
#
#
#
#
1
5
R9
#
#
1
1
#
0
#
#
0
#
#
1
0
5
tables. In total, each simuR10 #
#
1
1
#
#
#
#
0
#
2
#
0
5
lated data set contained

38

IEEE ComputatIonal IntEllIgEnCE magazInE | noVEmBER 2012



Table of Contents for the Digital Edition of Computational Intelligence - November 2012

Computational Intelligence - November 2012 - Cover1
Computational Intelligence - November 2012 - Cover2
Computational Intelligence - November 2012 - 1
Computational Intelligence - November 2012 - 2
Computational Intelligence - November 2012 - 3
Computational Intelligence - November 2012 - 4
Computational Intelligence - November 2012 - 5
Computational Intelligence - November 2012 - 6
Computational Intelligence - November 2012 - 7
Computational Intelligence - November 2012 - 8
Computational Intelligence - November 2012 - 9
Computational Intelligence - November 2012 - 10
Computational Intelligence - November 2012 - 11
Computational Intelligence - November 2012 - 12
Computational Intelligence - November 2012 - 13
Computational Intelligence - November 2012 - 14
Computational Intelligence - November 2012 - 15
Computational Intelligence - November 2012 - 16
Computational Intelligence - November 2012 - 17
Computational Intelligence - November 2012 - 18
Computational Intelligence - November 2012 - 19
Computational Intelligence - November 2012 - 20
Computational Intelligence - November 2012 - 21
Computational Intelligence - November 2012 - 22
Computational Intelligence - November 2012 - 23
Computational Intelligence - November 2012 - 24
Computational Intelligence - November 2012 - 25
Computational Intelligence - November 2012 - 26
Computational Intelligence - November 2012 - 27
Computational Intelligence - November 2012 - 28
Computational Intelligence - November 2012 - 29
Computational Intelligence - November 2012 - 30
Computational Intelligence - November 2012 - 31
Computational Intelligence - November 2012 - 32
Computational Intelligence - November 2012 - 33
Computational Intelligence - November 2012 - 34
Computational Intelligence - November 2012 - 35
Computational Intelligence - November 2012 - 36
Computational Intelligence - November 2012 - 37
Computational Intelligence - November 2012 - 38
Computational Intelligence - November 2012 - 39
Computational Intelligence - November 2012 - 40
Computational Intelligence - November 2012 - 41
Computational Intelligence - November 2012 - 42
Computational Intelligence - November 2012 - 43
Computational Intelligence - November 2012 - 44
Computational Intelligence - November 2012 - 45
Computational Intelligence - November 2012 - 46
Computational Intelligence - November 2012 - 47
Computational Intelligence - November 2012 - 48
Computational Intelligence - November 2012 - 49
Computational Intelligence - November 2012 - 50
Computational Intelligence - November 2012 - 51
Computational Intelligence - November 2012 - 52
Computational Intelligence - November 2012 - 53
Computational Intelligence - November 2012 - 54
Computational Intelligence - November 2012 - 55
Computational Intelligence - November 2012 - 56
Computational Intelligence - November 2012 - 57
Computational Intelligence - November 2012 - 58
Computational Intelligence - November 2012 - 59
Computational Intelligence - November 2012 - 60
Computational Intelligence - November 2012 - 61
Computational Intelligence - November 2012 - 62
Computational Intelligence - November 2012 - 63
Computational Intelligence - November 2012 - 64
Computational Intelligence - November 2012 - 65
Computational Intelligence - November 2012 - 66
Computational Intelligence - November 2012 - 67
Computational Intelligence - November 2012 - 68
Computational Intelligence - November 2012 - 69
Computational Intelligence - November 2012 - 70
Computational Intelligence - November 2012 - 71
Computational Intelligence - November 2012 - 72
Computational Intelligence - November 2012 - 73
Computational Intelligence - November 2012 - 74
Computational Intelligence - November 2012 - 75
Computational Intelligence - November 2012 - 76
Computational Intelligence - November 2012 - 77
Computational Intelligence - November 2012 - 78
Computational Intelligence - November 2012 - 79
Computational Intelligence - November 2012 - 80
Computational Intelligence - November 2012 - Cover3
Computational Intelligence - November 2012 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com