Computational Intelligence - November 2012 - 39

exploration and validation. While we
utilized UCS in this study and focused on a
very specific data mining problem, this
pipeline could be expanded to knowledge
discovery in any M-LCS applied to a single
step data mining problem.

Our proposed analysis pipeline includes the following
steps: (1) run the M-LCS algorithm with ten-fold cross
validation (CV) on the dataset, (2) run a permutation
test with 1000 permutations, (3) confirm significance
of testing accuracy, (4) identify significant attributes
and significantly co-occurring pairs of attributes,
(5) train the M-LCS algorithm on the entire dataset,
(6) generate a clustered heat-map of the
rule-population, (7) generate a network depicting
attribute co-occurrence, and (8) combine statistical
results with visualizations to interpret and generate
hypothesis for further exploration and validation.
rule population evolved by UCS on the noisy target dataset
considered in this study. Table 1 displays the top 10 rules
identified by UCS after 200,000 learning iterations. This
rule population is the same one applied in section 3.0.3 for
visualization. Half the samples in the dataset were generated
with a predictive epistatic interaction between attributes
'X0' and 'X1,' while the other half were generated with a
different epistatic interaction between attributes 'X2' and
'X3.' All other attributes were randomly simulated as nonpredictive. Optimally generalized rules would strictly specify
one of these two pairs of attributes (i.e., X0, X1 or X2, X3),
but no others. Examining the top 10 rules in Table 1, we can
see that this is never the case. We do see that the correct
attribute pairs often occur together in these top rules, however one or two other non-predictive attributes tend to be
specified as well. Specification of these non-predictive attributes affords the rule higher accuracy in the training data
(all top rules in Table 1 have 100% accuracy). Scanning
down the complete ordered list of rules, we finally observed
an optimally generalized rule 43rd down on the list, however without already knowing the true association pattern we
would have no way of identifying that rule as optimal.
So how do we separate the attributes that are reliable, and
those which are the product of over-fitting in a noisy
environment?

3.0.1 Run the M-LCS

This section details steps 1 and 2. First we
employed a 10-fold CV strategy in order to
determine average testing accuracy and
account for over-fitting. The dataset is randomly partitioned into 10 equal parts and
UCS is run 10 separate times during which
9/10 of the data is used to train the algorithm, and a different 1/10 is set aside for
testing. We averaged training and testing
accuracies over these 10 runs. Next we set
up our per mutation test. A per mutation test involves
repeating the analysis on variations of the dataset (with class
status shuffled) in order to determine the likelihood that
the observed result could have occurred by chance. We
chose to use the permutation test since we do not know
the chance distribution of our statistics ahead of time. We
generated 1000 permuted versions of the original dataset
by randomly permuting the affection status (class) of all
samples, while preserving the number of cases and controls.
For each permuted dataset we ran UCS using 10-fold CV.
In total, permutation testing requires 10,000 runs of UCS.
We performed this analysis using "Discovery," a 1372 processor Linux cluster.
3.0.2 Significance Testing
of M-LCS Statistics

This section details steps 3 and 4. First, and foremost, we confirmed that our average testing accuracy from Step 1 is significantly higher than those obtained by random chance. We
utilized a typical one-tailed permutation test with a significance
threshold of p < 0.05. To determine p for a test statistic (in this
case average testing accuracy) calculate the test statistic for each
of the 1000 permuted, CV analyses. If the true test statistic from
Step 1 is greater than 95% of the 1000 permuted runs, you can
reject the null hypothesis at p < 0.05. Here, the null hypothesis
is: the observed value of the statistic could have likely occurred

3. Analysis Pipeline

Our proposed analysis pipeline includes the following steps:
(1) run the M-LCS algorithm with 10-fold cross validation
(CV) on the dataset, (2) run a permutation test with 1000
permutations, (3) confirm significance of testing accuracy,
(4) identify significant attributes and significantly co-occurring pairs of attributes, (5) train the M-LCS algorithm on
the entire dataset, (6) generate a clustered heat-map of the
rule-population, (7) generate a network depicting attribute
co-occurrence, and (8) combine statistical results with visualizations to interpret and generate hypothesis for further

Table 2 Example calculation of SpS and AWSpS within
unordered hypothetical rules.
x1

x2

x3

x4

ClaSS NumeroSiTy aCCuraCy

R1

2

#

#

1

0

5

0.73

R2

#

0

#

2

1

1

0.51

R3

2

0

#

1

0

2

0.88

R4

#

0

1

#

1

1

0.62

SpS

7

4

1

8

AWSpS

5.41 2.89 0.62 5.92

NOVEMBER 2012 | IEEE COMputatIONal INtEllIgENCE MagazINE

39



Table of Contents for the Digital Edition of Computational Intelligence - November 2012

Computational Intelligence - November 2012 - Cover1
Computational Intelligence - November 2012 - Cover2
Computational Intelligence - November 2012 - 1
Computational Intelligence - November 2012 - 2
Computational Intelligence - November 2012 - 3
Computational Intelligence - November 2012 - 4
Computational Intelligence - November 2012 - 5
Computational Intelligence - November 2012 - 6
Computational Intelligence - November 2012 - 7
Computational Intelligence - November 2012 - 8
Computational Intelligence - November 2012 - 9
Computational Intelligence - November 2012 - 10
Computational Intelligence - November 2012 - 11
Computational Intelligence - November 2012 - 12
Computational Intelligence - November 2012 - 13
Computational Intelligence - November 2012 - 14
Computational Intelligence - November 2012 - 15
Computational Intelligence - November 2012 - 16
Computational Intelligence - November 2012 - 17
Computational Intelligence - November 2012 - 18
Computational Intelligence - November 2012 - 19
Computational Intelligence - November 2012 - 20
Computational Intelligence - November 2012 - 21
Computational Intelligence - November 2012 - 22
Computational Intelligence - November 2012 - 23
Computational Intelligence - November 2012 - 24
Computational Intelligence - November 2012 - 25
Computational Intelligence - November 2012 - 26
Computational Intelligence - November 2012 - 27
Computational Intelligence - November 2012 - 28
Computational Intelligence - November 2012 - 29
Computational Intelligence - November 2012 - 30
Computational Intelligence - November 2012 - 31
Computational Intelligence - November 2012 - 32
Computational Intelligence - November 2012 - 33
Computational Intelligence - November 2012 - 34
Computational Intelligence - November 2012 - 35
Computational Intelligence - November 2012 - 36
Computational Intelligence - November 2012 - 37
Computational Intelligence - November 2012 - 38
Computational Intelligence - November 2012 - 39
Computational Intelligence - November 2012 - 40
Computational Intelligence - November 2012 - 41
Computational Intelligence - November 2012 - 42
Computational Intelligence - November 2012 - 43
Computational Intelligence - November 2012 - 44
Computational Intelligence - November 2012 - 45
Computational Intelligence - November 2012 - 46
Computational Intelligence - November 2012 - 47
Computational Intelligence - November 2012 - 48
Computational Intelligence - November 2012 - 49
Computational Intelligence - November 2012 - 50
Computational Intelligence - November 2012 - 51
Computational Intelligence - November 2012 - 52
Computational Intelligence - November 2012 - 53
Computational Intelligence - November 2012 - 54
Computational Intelligence - November 2012 - 55
Computational Intelligence - November 2012 - 56
Computational Intelligence - November 2012 - 57
Computational Intelligence - November 2012 - 58
Computational Intelligence - November 2012 - 59
Computational Intelligence - November 2012 - 60
Computational Intelligence - November 2012 - 61
Computational Intelligence - November 2012 - 62
Computational Intelligence - November 2012 - 63
Computational Intelligence - November 2012 - 64
Computational Intelligence - November 2012 - 65
Computational Intelligence - November 2012 - 66
Computational Intelligence - November 2012 - 67
Computational Intelligence - November 2012 - 68
Computational Intelligence - November 2012 - 69
Computational Intelligence - November 2012 - 70
Computational Intelligence - November 2012 - 71
Computational Intelligence - November 2012 - 72
Computational Intelligence - November 2012 - 73
Computational Intelligence - November 2012 - 74
Computational Intelligence - November 2012 - 75
Computational Intelligence - November 2012 - 76
Computational Intelligence - November 2012 - 77
Computational Intelligence - November 2012 - 78
Computational Intelligence - November 2012 - 79
Computational Intelligence - November 2012 - 80
Computational Intelligence - November 2012 - Cover3
Computational Intelligence - November 2012 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com