N | 10 | 100 | 250 | 500 | 750 | 1000 |
e(5)N | 0.10621 | 0.1319 | 0.13343 | 0.13388 | 0.13402 | 0.13409 |
e(10)N | 0.10621 | 0.13238 | 0.13422 | 0.13478 | 0.13497 | 0.13506 |
e(100)N | 0.10621 | 0.13238 | 0.13422 | 0.13478 | 0.13497 | 0.13506 |
For high-throughput research with biological data-sets generated sequentially or by transcriptional micro-arrays, proteomics or other means, analytic techniques that address their high dimensional aspects remain desirable. The computation part basically predicts the tendency towards mortality due to breast cancer (BC) by using several classification methods, i.e., Logistic Regression (LR), Random Forest (RF), Support Vector Machine (SVM), Linear Discriminant Analysis (LDA) and Decision Tree (DT), and compared the models' performances. We proceed with the RF method since it provides better results than any other underlying models based on accuracy. We have also demonstrated some traditional and competing risk models, illustrated the models with real data analysis, depicted their curves' natures and also compared their fits using prediction error curves and the concordance index. Furthermore, two different survival splitting rules are used by using separate Random Survival Forest (RSF) methods and also constructing the ranking of risk factors due to breast cancer. The results show that high-level grade and diameter are the most important predictors for mortality progression in the presence of competing events of death, and lymph nodes, age and angiography are other vital criteria for this purpose. We have also implemented RSF backward selection criteria, which enables top gene selection related to mortality progression due to breast cancer. This method identifies c-MYB, CDCA7, NUSAP1, BIRC5, ANGPTL4, JAG1, IL6ST, and remaining genes that are mainly responsible for mortality progression due to breast cancer. In this work, R software is used to obtain and evaluate the results.
Citation: Sarada Ghosh, Guruprasad Samanta, Manuel De la Sen. Predicting factors and top gene identification for survival data of breast cancer[J]. AIMS Biophysics, 2023, 10(1): 67-89. doi: 10.3934/biophy.2023006
[1] | Liping Yang, Hu Li . A hybrid algorithm based on parareal and Schwarz waveform relaxation. Electronic Research Archive, 2022, 30(11): 4086-4107. doi: 10.3934/era.2022207 |
[2] | Chunhua Chu, Yijun Chen, Qun Zhang, Ying Luo . Joint linear array structure and waveform design for MIMO radar under practical constraints. Electronic Research Archive, 2022, 30(9): 3249-3265. doi: 10.3934/era.2022165 |
[3] | Xuerong Hu, Yuxiang Han, Junyan Lu, Linxiang Wang . Modeling and experimental investigation of quasi-zero stiffness vibration isolator using shape memory alloy springs. Electronic Research Archive, 2025, 33(2): 768-790. doi: 10.3934/era.2025035 |
[4] | Qian He, Wenxin Du, Feng Shi, Jiaping Yu . A fast method for solving time-dependent nonlinear convection diffusion problems. Electronic Research Archive, 2022, 30(6): 2165-2182. doi: 10.3934/era.2022109 |
[5] | Li Tian, Ziqiang Wang, Junying Cao . A high-order numerical scheme for right Caputo fractional differential equations with uniform accuracy. Electronic Research Archive, 2022, 30(10): 3825-3854. doi: 10.3934/era.2022195 |
[6] | Yi Wei . The Riccati-Bernoulli subsidiary ordinary differential equation method to the coupled Higgs field equation. Electronic Research Archive, 2023, 31(11): 6790-6802. doi: 10.3934/era.2023342 |
[7] | Adrian Nicolae Branga . Some conditions for the existence and uniqueness of monotonic and positive solutions for nonlinear systems of ordinary differential equations. Electronic Research Archive, 2022, 30(6): 1999-2017. doi: 10.3934/era.2022101 |
[8] | Junseok Kim . Maximum principle preserving the unconditionally stable method for the Allen–Cahn equation with a high-order potential. Electronic Research Archive, 2025, 33(1): 433-446. doi: 10.3934/era.2025021 |
[9] | Martin Bohner, Alexander Domoshnitsky, Oleg Kupervasser, Alex Sitkin . Floquet theory for first-order delay equations and an application to height stabilization of a drone's flight. Electronic Research Archive, 2025, 33(5): 2840-2861. doi: 10.3934/era.2025125 |
[10] | David Cheban, Zhenxin Liu . Averaging principle on infinite intervals for stochastic ordinary differential equations. Electronic Research Archive, 2021, 29(4): 2791-2817. doi: 10.3934/era.2021014 |
For high-throughput research with biological data-sets generated sequentially or by transcriptional micro-arrays, proteomics or other means, analytic techniques that address their high dimensional aspects remain desirable. The computation part basically predicts the tendency towards mortality due to breast cancer (BC) by using several classification methods, i.e., Logistic Regression (LR), Random Forest (RF), Support Vector Machine (SVM), Linear Discriminant Analysis (LDA) and Decision Tree (DT), and compared the models' performances. We proceed with the RF method since it provides better results than any other underlying models based on accuracy. We have also demonstrated some traditional and competing risk models, illustrated the models with real data analysis, depicted their curves' natures and also compared their fits using prediction error curves and the concordance index. Furthermore, two different survival splitting rules are used by using separate Random Survival Forest (RSF) methods and also constructing the ranking of risk factors due to breast cancer. The results show that high-level grade and diameter are the most important predictors for mortality progression in the presence of competing events of death, and lymph nodes, age and angiography are other vital criteria for this purpose. We have also implemented RSF backward selection criteria, which enables top gene selection related to mortality progression due to breast cancer. This method identifies c-MYB, CDCA7, NUSAP1, BIRC5, ANGPTL4, JAG1, IL6ST, and remaining genes that are mainly responsible for mortality progression due to breast cancer. In this work, R software is used to obtain and evaluate the results.
Waveform relaxation (WR) is an iterative method for systems of ordinary differential equations (ODEs). It is introduced for the first time by Lelarasmee et al. [1] for the time domain analysis of large-scale nonlinear dynamical systems. A lot of studies have been done on WR methods and most of them focus on convergence (see [2,3,4,5,6,7,8,9]). Zero-stability is the basic property of numerical methods of ODEs[10]. However, to our best knowledge, so far there exists little work on zero-stability of WR methods.
We first of all propose two examples to show the fact that tiny perturbation may lead to huge change of WR approximation solutions, at the same time, to confirm that it is necessary to study zero-stability of WR methods. For this, it is enough to consider a simple method, and suppose only the initial value has tiny perturbations.
Example 1. Consider the WR method
x(k+1)n+2−(1+α)x(k+1)n+1+αx(k+1)n=−(1−α)h(x(k+1)n+x(k)n) | (1.1) |
of solving numerically the initial value problem
˙x(t)=−2x(t),t∈[0,T];x(0)=x0, |
which is gotten by applying the two step method
xn+2−(1+α)xn+1+αxn=−2(1−α)hxn |
that is consistent for any α and zero-stable for −1<α<1 to the iterative scheme
˙x(k+1)(t)=−x(k+1)(t)−x(k)(t). |
Suppose that
Nisapositiveintegerandh=TN, | (1.2) |
x(0)n=x0,n=0,1,⋯,N,x(k)0=x0,k=0,1,⋯ | (1.3) |
and
x(k+1)1=x(k+1)0−h(x(k+1)0+x(k)0),k=0,1,⋯. | (1.4) |
We can get the approximate solution {{x(k)n,n=0,1,⋯,N},k=0,1,⋯} by using Eqs (1.1)–(1.4). Suppose that tiny perturbations denoted by δ lead to the initial values become
˜x(0)n=x0+δ,n=0,1,⋯,N,˜x(k)0=x0+δ,k=0,1,⋯ | (1.5) |
and the resulting perturbed solution of Eq (1.1) is denoted by {˜x(k)n}. Let δ=1 for simplicity and denote ˜x(k)n−x(k)n with e(k)n. Then we have
e(k+1)n+2−(1+α)e(k+1)n+1+αe(k+1)n=−(1−α)h(e(k+1)n+e(k)n)(n=0,1,⋯,N−2,k=0,1,⋯),e(k+1)0=1,e(k+1)1=(1−2h)e(k+1)0(k=0,1,⋯),e(0)n=1(n=0,1,⋯,N). | (1.6) |
By virtue of Eq (1.6) the following numerical results are obtained.
The data in Tables 1 and 2 show that errors of the approximate solution of Eq (1.1) brought by perturbations of initial values are controllable for α=0.5, but they are unbounded for α=2 when h tends to zero.
N | 10 | 100 | 250 | 500 | 750 | 1000 |
e(5)N | 0.10621 | 0.1319 | 0.13343 | 0.13388 | 0.13402 | 0.13409 |
e(10)N | 0.10621 | 0.13238 | 0.13422 | 0.13478 | 0.13497 | 0.13506 |
e(100)N | 0.10621 | 0.13238 | 0.13422 | 0.13478 | 0.13497 | 0.13506 |
N | 10 | 100 | 250 | 500 | 1000 |
e(5)N | 268.74 | 6.2863e+028 | 3.7892e+073 | 3.4922e+148 | 5.7695e+298 |
e(10)N | 268.74 | 6.2867e+028 | 3.7897e+073 | 3.4927e+148 | 5.7704e+298 |
e(100)N | 268.74 | 6.2867e+028 | 3.7897e+073 | 3.4927e+148 | 5.7704e+298 |
In this numerical examples, taking δ=1 instead of tiny perturbations seem to be unreasonable. The main reason for this is that we are usually interested in the ratio e(k)Nδ instead of δ itself. In fact we have also performed some other experiments using smaller δ, in which the similar ratios are obtained for different δ.
Example 2. Consider the one-step WR method
x(k+1)n+1=x(k+1)n+h(500(x(k+1)n)1.001+500(x(k)n)1.001),n=0,1,⋯,2h,x(k+1)0=0; x(0)n=0,foralln, | (1.7) |
where 2/h is an integer. Suppose that the initial value 0 becomes δ by the influence of perturbations and the solution x(k)n becomes ˜x(k)n by the influence of δ, which satisfies
˜x(k+1)n+1=˜x(k+1)n+h(500(˜x(k+1)n)1.001+500(˜x(k)n)1.001),n=0,1,⋯,2h,˜x(k+1)0=δ; ˜x(0)n=δ,foralln. | (1.8) |
Clearly the numerical solution generated by Eq (1.7) is the constant zero and Eq (1.8) can be regarded as the WR method of solving the following initial value problem
˙x(t)=1000(x(t))1.001,t∈[0,2];x(0)=δ. | (1.9) |
It is easy to derive that t0=1δ0.001 is the blow-up time of the solution of Eq (1.9) and t0∈[0,2] whenever δ>10−301. Consequently, sup0<t<2x(t)=+∞ for any δ>10−301. If the "2" in Eqs (1.8) and (1.9) is replaced by t0−ε, where ε>0 is small enough, then Eq (1.8) converges to Eq (1.9), that is,
limh→0,k→∞sup0≤n≤t0−εh|˜x(k)n−x(nh)|=0, |
see [4]. Thus
limh→0,k→∞sup0≤n≤2h|˜x(k)n|=+∞,foranyδ>10−301, |
that is, the change of the solution of Eq (1.8) brought by the tiny change of initial values is unbounded as h tends to zero.
The above two examples show that tiny perturbations can lead to huge change of WR approximation solutions, although the methods used in the examples are too simple to be practically useful.
A numerical method is said to be zero-stable if the change of its solution brought by the tiny perturbations is controllable when h tends to zero (see [10]). In this paper we will explore what conditions guarantee the zero-stability of WR methods.
Consider the initial problem
˙x(t)=f(t,x(t)),t∈[0,T];x(0)=x0(x(t)∈Rd). |
Taking the splitting function F(t,x,x)=f(t,x) we can construct the iterative scheme
˙x(k+1)(t)=F(t,x(k+1)(t),x(k)(t)),t∈[0,T],k=0,1,⋯;x(0)(t)≡x0,x(k+1)(0)=x0. | (2.1) |
Using one-step methods with variable step-size to discrete Eq (2.1) one arrives at
x(k+1)n+1=x(k+1)n+hnΦ(tn,hn,x(k+1)n+1,x(k+1)n,x(k)n+1,x(k)n);x(k+1)0=x0, | (2.2) |
where n=0,1,⋯,N−1,k=0,1,⋯, N−1∑n=0hn=T and x(0)n=x0 for all n. Applying a class of multi-step methods with fixed step-size to Eq (2.1) we get
x(k+1)n+1=x(k+1)n+hΨ(tn,h,x(k+1)n+1,x(k+1)n,⋯,x(k+1)n−p,x(k)n+1,x(k)n,⋯,x(k)n−p), | (2.3) |
where n=p,p+1,⋯,N−1,k=0,1,⋯, h=T/N, the initial values except x(0)n(n=0,1,⋯,N) and x(k)0(k=0,1,⋯) are generated by a suitable one-step method. Here we take the initial values as
x(k)n=c(k)n,n=0,1,⋯,p,k=0,1,⋯(c(k)n=x0,ifn⋅k=0). | (2.4) |
A classical example of Eq (2.3) is Admas-type linear multi-step methods:
x(k+1)n+1=x(k+1)n+hp+1∑j=0βjF(tn+1−j,x(k+1)n+1−j,x(k)n+1−j),n=p,p+1,⋯,N−1, |
where βj,j=0,1,⋯,p+1 are constants. The linear multi-step methods use generally the fixed step-size and therefore we only consider the Eq (2.3) with the fixed step-size.
Let ix(k) denote the component of x(k) satisfying
x(k)=((1x(k))T,(2x(k))T,⋯,(mx(k))T)T, |
where ix(k)∈Rdi, x(k)∈Rd and d1+d2+⋯+dm=d. The Eq (2.1) can be rewritten as
i˙x(k+1)=Fi(t,x(k+1)1x(k+1),x(k+1)2x(k+1),⋯,x(k+1)mx(k+1),x(k)1x(k),x(k)2x(k),⋯,x(k)mx(k)), |
with i=1,2,⋯,m, that is, the large Eq (2.1) is divided into m subsystems. When taking
Fi(t,⋯)=fi(t,x(k)1x(k),⋯,x(k)i−1x(k),x(k+1)ix(k+1),x(k)i+1x(k),⋯,x(k)mx(k)),i=1,2,⋯,m |
one arrives at Guass-Jacobi WR method used frequently in actual computation, which consists of m independent subsystems and is hence parallel in nature(see [2,6,9]). In Eq (2.2) the unique mesh 0=t0<t1<⋯<tN=T is applied to all subsystems. However the subsystems of Gauss-Jocobi WR methods are independent and may have distinct behaviors, and consequently it is better to use different meshes for the subsystems with different behaviors. Applying the mesh
0=tit0<tit1<⋯<titNi=T,hihj=titj+1−titj,j=0,1,⋯,Ni−1 |
to ith subsystem yields the following multi-rate WR method
xix(k+1)n+1=xix(k+1)n+hihnΦi(titn,hihn,y1y(k)(titn+1),⋯,yi−1y(k)(titn+1),xix(k+1)n+1,yi+1y(k)(titn+1),⋯,ymy(k)(titn+1),y1y(k)(titn),⋯,yi−1y(k)(titn),xix(k+1)n,yi+1y(k)(titn),⋯,ymy(k)(titn)),n=0,1,⋯,Ni−1, | (2.5) |
where i=1,2,⋯,m,k=0,1,⋯. Here the initial values xix(k+1)0=xix(0)n=xix0 for all k and n, (x1x0T,x2x0T,⋯,xmx0T)T=x0 and yjy(k)(t) is the interpolation function satisfying yjy(k)(tjtn)=xjx(k)n for n=0,1,⋯,Nj.
Because of the presence of errors in actual computing, it is necessary to consider the following perturbed systems of Eqs (2.2), (2.3) and (2.5) generated by the perturbations {δ(k)n,n=0,1,⋯,N,k=0,1,⋯}
˜x(k+1)n+1=˜x(k+1)n+hnΦ(tn,hn,˜x(k+1)n+1,˜x(k+1)n,˜x(k)n+1,˜x(k)n)+hnδ(k+1)n+1,n=0,1,⋯,N−1;˜x(k+1)0=x0+δ(k+1)0,˜x(0)n=x0+δ(0)n(n=0,1,⋯,N), | (2.6) |
˜x(k+1)n+1=˜x(k+1)n+hΨ(tn,h,˜x(k+1)n+1,˜x(k+1)n,⋯,˜x(k+1)n−p,˜x(k)n+1,˜x(k)n,⋯,˜x(k)n−p)+hδ(k+1)n+1,n=p,p+1,⋯,N−1;˜x(k+1)n=c(k+1)n+δ(k+1)n,n=0,1,⋯,p,˜x(0)n=x0+δ(0)n(n=0,1,⋯,N), | (2.7) |
and
˜xi˜x(k+1)n+1=˜xi˜x(k+1)n+hihnΦi(titn,hihn,˜y1˜y(k)(titn+1),⋯,˜yi−1˜y(k)(titn+1),˜xi˜x(k+1)n+1,˜yi+1˜y(k)(titn+1),⋯,˜ym˜y(k)(titn+1),˜y1˜y(k)(titn),⋯,˜yi−1˜y(k)(titn),˜xi˜x(k+1)n,˜yi+1˜y(k)(titn),⋯,˜ym˜y(k)(titn))+hihn⋅δiδ(k+1)n+1,n=0,1,⋯,Ni−1;˜xi˜x(k+1)0=xix0+δiδ(k+1)0,˜xi˜x(0)n=xix0+δiδ(0)n(n=0,1,⋯,Ni), | (2.8) |
where i=1,2,⋯,m and ˜yj˜y(k)(t) is the interpolation function satisfying ˜yj˜y(k)(tjtn)=˜xj˜x(k)n for n=0,1,⋯,Nj,j=0,1,⋯,m.
Definition 2.1. (Page 32 of [10]) Let {δ(k)n,n=0,1,⋯,N,k=0,1,⋯} be any perturbation of Eq (2.2) or Eq (2.3) and Eq (2.4), and let {˜x(k)n,n=0,1,⋯,N,k=0,1,⋯} be the solution of the resulting perturbed system Eq (2.6) or Eq (2.7). Then if there exist constants C and h0 such that, for all h∈(0,h0](h=maxnhn for Eq (2.2))
max0≤k,0≤n≤N‖˜x(k)n−x(k)n‖≤Cε, |
whenever
max0≤k,0≤n≤N‖δ(k)n‖≤ε, |
we say that the Eq (2.2) or Eqs (2.3) and Eq (2.4) is zero-stable.
Here and hereafter ‖⋅‖ denotes any norm defined in Rd.
Definition 2.2. Let {iδ(k)n,i=1,2,⋯,m,n=0,1,⋯,N,k=0,1,⋯} be any perturbation of Eq (2.5), and let {i˜x(k)n,i=1,2,⋯,m,n=0,1,⋯,N,k=0,1,⋯} be the solution of the resulting perturbed Eq (2.8). Then if there exist constants h0 and Ck depended on k such that
max1≤i≤m0≤l≤kmax0≤n≤Ni‖i˜x(l)n−xix(l)n‖≤Ckε |
for all h=max1≤i≤mmax0≤n≤Nihihn∈(0,h0], whenever
max1≤i≤m0≤l≤kmax0≤n≤Ni‖iδ(l)n‖≤ε, |
we say that the Eq (2.5) is weakly zero-stable.
The following several lemmas are useful for studying zero-stability of the WR methods mentioned above.
Lemma 2.3. Let a,b and T be nonnegative constants, and N be a positive integer. Suppose that the sets {hn>0,n=0,1,⋯,N−1} and {un>0,n=0,1,⋯,N} satisfy
un+1≤(1+ahn)un+bhn,n=0,1,⋯,N−1. | (2.9) |
Then
max0≤n≤Nun≤eaTu0+ba(eaT−1) |
provided that N−1∑n=0hn=T.
Proof. By using Eq (2.9) repeatedly we have
un+1≤(1+ahn)(1+ahn−1)⋯(1+ah0)u0+(1+ahn)(1+ahn−1)⋯(1+ah1)bh0+(1+ahn)(1+ahn−1)⋯(1+ah2)bh1+⋯+(1+ahn)bhn−1+bhn, |
where n=0,1,⋯,N−1. Let t0=0,tn+1=tn+hn,n=0,1,⋯,N−1, then tN=T. Noting that 1+x<ex for x>0 we can derive easily from above inequality
un+1≤ea(tn+1−t0)u0+ea(tn+1−t1)b(t1−t0)+ea(tn+1−t2)b(t2−t1)+⋯+ea(tn+1−tn)b(tn−tn−1)+ea(tn+1−tn+1)b(tn+1−tn)≤ea(T−t0)u0+eaTb(e−at1(t1−t0)+⋯+e−atn(tn−tn−1)+⋯+e−atN(tN−tN−1)) |
for n=0,1,⋯,N−1. This together with monotonicity of the function e−at imply
un+1≤ea(T−t0)u0+eaTb∫Tt0e−atdt=eaTu0+ba(eaT−1) |
for all n=0,1,⋯,N−1.
Lemma 2.4. Let a,b,c,d and T be nonnegative constants, N be a positive integer and hn,n=0,1,⋯,N−1, be positive real numbers.
Suppose that the sequence of positive numbers {e(k)n>0,n=0,1,⋯N,k=0,1,⋯} satisfies
e(k+1)n+1≤(1+ahn)e(k+1)n+bhne(k)n+chne(k)n+1+dhn,n=0,1,⋯N−1. | (2.10) |
Then for any 0<h=max0≤n≤N−1hn<12c
max0≤k,0≤n≤Ne(k)n≤e2(a+b+c)Tmax{max0≤ke(k)0,max0≤n≤Ne(0)n}+da+b+c(e2(a+b+c)T−1) | (2.11) |
provided that N−1∑n=0hn=T.
Proof. By Eq (2.10) we have
max0≤ke(k+1)n+1≤(1+ahn)max0≤ke(k+1)n+bhnmax0≤ke(k)n+chnmax0≤ke(k)n+1+dhn | (2.12) |
for n=0,1,⋯,N−1. Let ε=max0≤n≤Ne(0)n and un=max{max0≤ke(k)n,ε},n=0,1,⋯,N. Clearly max{max0≤ke(k+1)n,ε}=un. Hence we can get by Eq (2.12)
un+1≤(1+ahn)un+bhnun+chnun+1+dhn≤1+ahn+bhn1−chnun+dhn1−chn,n=0,1,⋯,N−1. |
Suppose that 0<h<12c. Consequently, 11−chn<2 and the above inequality thus yield
un+1≤(1+2(a+b+c)hn)un+2dhn,n=0,1,⋯,N−1. |
This together with Lemma 2.3 yield
max0≤n≤Nun≤e2(a+b+c)Tu0+da+b+c(e2(a+b+c)T−1). |
Thus Eq (2.11) holds true. The proof is complete.
Lemma 2.5. Let aj,bj(j=0,1,⋯,p),c,d and T be nonnegative constants. Let N be a positive integer and h=T/N.Suppose that the sequence of positive numbers {e(k)n>0,n=0,1,⋯N,k=0,1,⋯} satisfies
e(k+1)n+1≤e(k+1)n+hp∑j=0(aje(k+1)n−j+bje(k)n−j)+che(k)n+1+dh,n=p,p+1,⋯,N−1. | (2.13) |
Then for any 0<h<12c
max0≤k,p+1≤n≤Ne(k)n≤e2(A+c)Tε+dA+c(e2(A+c)T−1), |
where ε=max{max0≤n≤Ne(0)n,max0≤k,0≤n≤pe(k)n}, A=p∑j=0(aj+bj).
Proof. Note that e(k)n≤ε for all n≤p and all k≥0. By using Eq (2.13) repeatedly we have
e(k+1)p+1≤(1+ch+⋯+(ch)k)(1+Ah)ε+(ch)k+1ε+(1+ch+⋯+(ch)k)dh,k=0,1,⋯. | (2.14) |
Let 0<h<12c. With the notation αh=1+Ah1−ch and βh=dh1−ch we can derive from Eq (2.14)
e(k)p+1≤αhε+βh,k=0,1,⋯. |
Noting that ε≤αhε+βh and therefore e(k)n≤αhε+βh for all n≤p+1 and all k≥0 we thus have by repeating the above process
e(k)p+2≤αh(αhε+βh)+βh=(αh)2ε+βh(1+αh),k=0,1,⋯. |
Consequently, we get
e(k)p+m≤(αh)mε+βh(1+αh+(αh)2+⋯+(αh)m−1),k=0,1,⋯ |
hold true for m=1,2,⋯,N−p. Note that αh≥1. Thus
e(k)n≤(αh)Nε+βh(1+αh+(αh)2+⋯+(αh)N−1) |
for k=0,1,⋯, n=0,1,⋯,N. This together with 0<ch<1/2 yield
e(k)n≤(αh)Nε+(αh)N−1αh−1βh≤(1+2(A+c)h)T/hε+dA+c((1+2(A+c)h)T/h−1)≤e2(A+c)Tε+dA+c(e2(A+c)T−1) |
for k=0,1,⋯,n=0,1,⋯,N. The proof is complete.
Theorem 3.1. Suppose that there exist constants L1, L2, L3 and L4 such that
‖Φ(t,h,x1,x2,x3,x4)−Φ(t,h,y1,y2,y3,y4)‖≤4∑i=1Li‖xi−yi‖ | (3.1) |
for any real numbers t,h∈R,xi,yi∈Rd,i=1,2,3,4. Then the WR Eq (2.2) is zero-stable.
Proof. Let ε(k)n=‖˜x(k)n−x(k)n‖ and for any ε>0 the perturbations in Eq (2.6) {δ(k)n,k=0,1,⋯,n=0,1,⋯,N} satisfies max0≤k,0≤n≤N‖δ(k)n‖<ε. Then by virtue of Eqs (2.2) and (2.6) and the condition (3.1) we have
ε(k+1)n+1≤ε(k+1)n+hn(L1ε(k+1)n+1+L2ε(k+1)n+L3ε(k)n+1+L4ε(k)n)+hnε | (3.2) |
for n=0,1,⋯,N−1,k=0,1,⋯ and
ε(k+1)0≤ε,k=0,1,⋯,ε(0)n≤ε,n=0,1,⋯,N. | (3.3) |
Let hn<12L1. Then 11−hnL1<2. We therefore derive from Eq (3.2)
ε(k+1)n+1≤(1+2hn(L1+L2))ε(k+1)n+2hnL3ε(k)n+1+2hnL4ε(k)n+2hnε | (3.4) |
for n=0,1,⋯,N−1,k=0,1,⋯. Consequently, by Eqa (3.3), (3.4) and Lemma 2.4 we have
ε(k)n≤e4(L1+L2+L3+L4)Tε+εL1+L2+L3+L4(e4(L1+L2+L3+L4)T−1) |
for any k=0,1,⋯,n=0,1,⋯,N if 0<h<min{12L1,14L3}. The proof is therefore complete.
Theorem 3.2. Suppose that there exist constants Li,i=1,2,⋯,2p+4 such that
‖Ψ(t,h,x1,x2,⋯,x2p+4)−Ψ(t,h,y1,y2,⋯,y2p+4)‖≤2p+4∑i=1Li‖xi−yi‖ | (3.5) |
for any real numbers t,h∈R,xi,yi∈Rd,i=1,2,⋯,2p+4. Then the WR Eq (2.3) and Eq (2.4) is zero-stable.
Proof. Let ε(k)n denote ‖˜x(k)n−x(k)n‖ and the perturbations {δ(k)n,k=0,1,⋯,n=0,1,⋯,N} in Eq (2.7) satisfy max0≤k,0≤n≤N‖δ(k)n‖<ε, where ε is any positive number. Then by virtue of Eqs (2.3), (2.4), (2.7) and the condition (3.5) we have
ε(k+1)n+1≤ε(k+1)n+h(L1ε(k+1)n+1+L2ε(k+1)n+⋯+Lp+2ε(k+1)n−p+Lp+3ε(k)n+1+Lp+4ε(k)n+⋯+L2p+4ε(k)n−p)+hε,n=p,p+1,⋯,N−1,ε(k+1)n≤ε,n=0,1,⋯,p,ε(0)n≤ε,n=0,1,⋯,N, | (3.6) |
where k=0,1,⋯. Let h<12L1. Consequently, 11−hL1<2. We therefore derive from Eq (3.6)
ε(k+1)n+1≤(1+2h(L1+L2))ε(k+1)n+2h(L3ε(k+1)n−1+⋯+Lp+2ε(k+1)n−p+Lp+3ε(k)n+1+Lp+4ε(k)n+⋯+L2p+4ε(k)n−p)+2hε,n=p,p+1,⋯,N−1,ε(k+1)n≤ε,n=0,1,⋯,p,ε(0)n≤ε,n=0,1,⋯,N | (3.7) |
for n=0,1,⋯,N−1,k=0,1,⋯. By Eq (3.7) and Lemma 2.5 we have
ε(k)n≤e4(L1+L2+⋯+L2p+4)Tε+εL1+L2+⋯+L2p+4(e4(L1+L2+⋯+L2p+4)T−1) |
for any k=0,1,⋯,n=0,1,⋯,N if 0<h<min{12L1,14Lp+3}. The proof is complete.
Theorem 3.3. For Eqs (2.5) and (2.8) let Φ=(ΦT1,ΦT2,⋯,ΦTm)T satisfy the Lipschitz condition:there exist constants L1 and L2 such that
‖Φ(t,h,x1,x2)−Φ(t,h,y1,y2)‖≤2∑i=1Li‖xi−yi‖,foranyx1,x2,y1,y2∈Rd, | (3.8) |
and the interpolation functions ˜yj˜y(k)(t) and yjy(k)(t) satisfy that
sup0≤t≤T‖˜yj˜y(k)(t)−yjy(k)(t)‖≤Cmax0≤n≤Nj‖˜xj˜x(k)n−xjx(k)n‖,j=1,2,⋯,m, | (3.9) |
where C is the positive constant. Then the multi-rate Eq (2.5) is weakly zero-stable.
Proof. Define ‖x‖a=max1≤i≤m‖ix‖, ‖x‖b=m∑i=1‖ix‖ for x=(x1xT,x2xT,⋯,xmxT)T∈Rd, where ix∈Rdi,i=1,2,⋯,m,d1+d2+⋯+dm=d. It is easy to prove that ‖⋅‖a and ‖⋅‖b are the norm. Consequently, there exist constants C1 and C2 such that
C1‖x‖a≤‖x‖≤C2‖x‖bforanyx∈Rd. | (3.10) |
Eqs (3.8) and (3.10) thus yield
C1‖Φ(t,h,x1,x2)−Φ(t,h,y1,y2)‖a≤‖Φ(t,h,x1,x2)−Φ(t,h,y1,y2)‖≤2∑j=1Lj‖xj−yj‖≤2∑j=1LjC2‖xj−yj‖b=2∑j=1LjC2m∑i=1‖ixj−yiyj‖ |
for any x1,x2,y1,y2∈Rd and therefore
‖Φi(t,h,x1,x2)−Φi(t,h,y1,y2)‖≤2∑j=1LjC2C1m∑i=1‖ixj−yiyj‖. | (3.11) |
With the notation ie(k)n=‖i˜x(k)n−xix(k)n‖ we can derive from Eqs (2.5), (2.8), (3.9) and (3.11)
ie(k+1)n+1≤eie(k+1)n+ihnL1C2CC1(max0≤j≤Ne1e(k)j+⋯+max0≤j≤Niei−1e(k)j+eie(k+1)n+1+max0≤j≤Niei+1e(k)j+⋯+max0≤j≤Nieme(k)j)+hihnL2C2CC1(max0≤j≤Nie1e(k)j+⋯+max0≤j≤Niei−1e(k)j+eie(k+1)n+max0≤j≤Niei+1e(k)j+⋯+max0≤j≤Nieme(k)j)+hihn‖δiδ(k+1)n+1‖. | (3.12) |
Let h=max1≤i≤mmax0≤n≤Nihihn<C12L1C2C. Consequently, ihnL1C2CC1<12<1−hihnL1C2CC1 which together with Eq (3.12) imply that
ie(k+1)n+1≤(1+ahihn)eie(k+1)n+(am∑l=1l≠imax0≤j≤Niele(k)j+2‖δiδ(k+1)n+1‖)hihn≤(1+ahihn)eie(k+1)n+(am∑i=1max0≤j≤Nieie(k)j+2max1≤i≤mmax0≤j≤Ni‖δiδ(k+1)j‖)hihn | (3.13) |
with a=2(L1+L2)C2CC1. By using Eq (3.13) with k=0 and Lemma 2.3 we get
ie(1)n≤eaTeie(1)0+1a(eaT−1)(am∑i=1max0≤j≤Nieie(0)j+2max1≤i≤mmax0≤j≤Ni‖δiδ(1)j‖). |
Thus
max1≤i≤mmax0≤n≤Nieie(1)n≤a1max(max1≤i≤meie(1)0,m∑i=1max0≤j≤Nieie(0)j,max1≤i≤mmax0≤j≤Ni‖δiδ(1)j‖) |
with a1=eaT+1a(eaT−1)(a+2). Similarly, using the above inequality, Eq (3.13) with k=1 and Lemma 2.3 we have
max1≤i≤mmax0≤n≤Nieie(2)n≤a2max(max1≤i≤m1≤l≤2eie(l)0,m∑i=1max0≤j≤Nieie(0)j,max1≤i≤m1≤l≤2max0≤j≤Ni‖δiδ(l)j‖) |
with a2=eaT+(eaT−1)(ma1+2a). Repeating the above process yields that for any k there exists the constant ak such that
max1≤i≤m0≤l≤kmax0≤n≤Ni‖˜xi˜x(l)n−xix(l)n‖≤akmax(max1≤i≤m0≤l≤k‖δiδ(l)0‖,m∑i=1max0≤n≤Ni‖δiδ(0)n‖,max1≤i≤m0≤l≤kmax0≤n≤Ni‖δiδ(l)n‖) |
for any mesh {itn,n=0,1,⋯,N,i=1,2,⋯,m}. The proof is therefore complete.
Remark 1. In the above discussions we assume that the perturbation at one step is δ(k)nh, which depends on step-size h. This assumption is necessary for the proof of the theorems mentioned above. However it seems to be more reasonable to regard δ(k)n, a small number, as the perturbation, if the step-size is very small. In this case the tiny perturbation at each step may bring out the huge change of the numerical solution. We will explore these in next section by some computer experiments.
Remark 2. Note that the convergence property of the WR methods is not be used in the proof of Theorem 3.1-3.3. Hence, a divergent WR method may be zero-stable. In other words, zero-stability does not imply convergence.
In this section some numerical experiments are performed to verify the theorems obtained in Section 3.
Consider the equation
x′=Ax=(T1I0IT2I0IT3)x,t∈[0,1],x(0)=x0, | (4.1) |
where x∈R15, Ti=(−2i11−2i⋱⋱⋱11−2i)∈R5×5 and I is the identity matrix. The special case of such system has been examined by Burrage [11], which is obtained by discretizing the heat equation in two variables.
Let A1=(T1T2T3) and A2=A−A1. First, choose the following WR methods of solving the Eq (4.1):
(i) Euler method with variable step-size
x(k+1)n+1=x(k+1)n+hn(A1x(k+1)n+A2x(k)n),n=0,1,⋯,N−1,k=0,1,⋯,x(k+1)0=x0forallk,x(0)n=x0foralln. |
(ii) Two step methods with fixed step-size
x(k+1)n+1=x(k+1)n+h2[3(A1x(k+1)n+A2x(k)n)−(A1x(k+1)n−1+A2x(k)n−1)],n=1,2,⋯,N−1,k=0,1,⋯,x(k+1)0=x0forallk,x(0)n=x0foralln, |
where x(k+1)1 is obtained by a suitable one-step method. Here let
x(k+1)1=x0+hAx0+h22A2x0. |
(iii) Multi-rate Jacobi methods based on Euler method
ix(k+1)n+1=xix(k+1)n+hihn(Ti⋅xix(k+1)n+1+xi−1x(k)n+1+xi+1x(k)n+1),n=0,1,⋯,Ni−1,xix(k+1)0=xix(0)n=xix0,x0x(k)n=x4x(k)n=(0,0,0,0,0)Tforallkandn}i=1,2,3. |
Second, assume the initial values and the approximation solution at each calculation step have tiny perturbations as in Eqs (2.6)–(2.8) and let δ(k)n≡Δ=δ⋅(1,1,⋯,1)T∈R15, iδ(k)n≡Δp=δ⋅(1,1,1,1,1)T∈R5, ˜x(k)n denote the resulting perturbed solution and u(k)n denote ˜x(k)n−x(k)n, which yields
u(k+1)n+1=u(k+1)n+hn(A1u(k+1)n+A2u(k)n)+hnΔ,n=0,1,⋯,N−1,k=0,1,⋯,u(k+1)0=Δforallk,u(0)n=Δforalln, | (4.2) |
u(k+1)n+1=u(k+1)n+h2[3(A1u(k+1)n+A2u(k)n)−(A1u(k+1)n−1+A2u(k)n−1)]+h2Δ,n=1,2,⋯,N−1,k=0,1,⋯,u(k+1)0=Δ,u(k+1)1=(I+hA+h22A2)Δ,forallk,u(0)n=Δforalln, | (4.3) |
and
iu(k+1)n+1=uiu(k+1)n+hihn(Ti⋅uiu(k+1)n+1+ui−1u(k)n+1+ui+1u(k)n+1+Δp),n=0,1,⋯,Ni−1,uiu(k+1)0=uiu(0)n=Δp,u0u(k)n=u4u(k)n=(0,0,0,0,0)T,∀k,∀n}i=1,2,3. | (4.4) |
Lastly, reach a reasonable conclusion by analysing data generated by Eqs (4.2)–(4.4).
We choose A, A1, A2 and δ(k)n as above to guarantee that u(k)n increase with k and n that is the worst case of error propagation.
In our experiments the step-sizes hn in Eq (4.2) and ihn in Eq (4.4) are taken as
hn=min{10h,max{0.1h,|ξn|h}} |
and
ihn=min{10ih,max{10i−2h,10i−1|ξn|h}}, |
where h>0, {ξ0,ξ1,⋯} is a sequence of independent and identically distributed random variables satisfying ξi∼N(0,1).
The data in Tables 3, 5 and 7 show clearly the errors resulted by the perturbations hnΔ(hΔ/2) in Eq (4.2) (Eq (4.3) are controllable as k and n tend to infinity which support the theorems developed in Section 3). However the data in Table 4 and 6 show that the errors increase with k and 1/h when the perturbations hnΔ(hΔ/2) are replaced by the constant perturbation Δ(Δ/2).
h | 0.1 | 0.001 | ||||
k | 5 | 10 | 10 | 15 | ||
ε | 3.1483e-04 | 3.1483e-04 | 3.1605e-04 | 3.1605e-04 | ||
h | 0.00001 | |||||
k | 10 | 15 | ||||
ε | 3.1606e-04 | 3.1606e-04 |
h | 0.1 | 0.001 | 0.00001 | |||||
k | 5 | 10 | 10 | 15 | 10 | 15 | ||
ε | 0.0018 | 0.0018 | 0.1824 | 0.1824 | 17.6723 | 17.6723 | ||
h | 0.000001 | |||||||
k | 10 | 15 | ||||||
ε | 176.8079 | 176.8079 |
h | 0.1 | 0.001 | ||||
k | 10 | 15 | 10 | 15 | ||
ε | 3.1568e-04 | 3.1568e-04 | 3.1606e-04 | 3.1606e-04 | ||
h | 0.00001 | |||||
k | 10 | 15 | ||||
ε | 3.1606e-04 | 3.1606e-04 |
h | 0.1 | 0.001 | 0.00001 | |||||
k | 10 | 15 | 10 | 15 | 10 | 15 | ||
ε | 0.1782 | 0.1782 | 0.1435 | 0.1435 | 14.1724 | 14.1724 | ||
h | 0.000001 | |||||||
k | 10 | 15 | ||||||
ε | 141.7252 | 141.7252 |
h | 0.1 | 0.001 | |||
k | 5 | 10 | 10 | 15 | |
ε | 3.1085e-04 | 3.1085e-04 | 3.1567e-04 | 3.1567e-04 | |
h | 0.00001 | ||||
k | 10 | 15 | |||
ε | 3.1606e-04 | 3.1606e-04 |
It is well known that a linear multi-step method with fixed step-size is convergent if, and only if, it is both consistent and zero-stable. In this paper we only present the sufficient conditions of zero-stability for some special methods. We will explore the relationship between convergence and zero-stability for WR methods based on general linear multi-step methods in the future. Moreover, we shall apply our methods to the numerical study of some inverse problems [12,13,14].
Research is supported by the Natural Science Foundation of Fujian Province, China (grant number 2021J011031).
The author declares that he has no conflicts of interest regarding the publication of this paper.
[1] |
Nicolau M, Levine AJ, Carlsson G (2011) Topology based data analysis identifies a subgroup of breast cancers with a unique mutational profile and excellent survival. Proceedings of the National Academy of Sciences of the United States of America 108: 7265-7270. https://doi.org/10.1073/pnas.1102826108 ![]() |
[2] |
Baur B, Bozdag S (2016) A feature selection algorithm to compute gene centric methylation from probe level methylation data. PLoS One 11: e0148977. https://doi.org/10.1371/journal.pone.0148977 ![]() |
[3] |
Trop I, Dugas A, David J, et al. (2011) Breast abscesses: evidence-based algorithms for diagnosis, management, and follow-up. Radiographics 31: 1683-1699. https://doi.org/10.1148/rg.316115521 ![]() |
[4] | NKI Breast Cancer Data, Data World (2016). Available from: https://data.world/deviramanan2016/nki-breast-cancer-data. |
[5] | Ghosh S, Samanta GP (2019) Statistical modeling for cancer mortality. Lett Biomath . https://doi.org/10.1080/23737867.2019.1581104 |
[6] |
Breiman L (2001) Random forests. Mach Learn 45: 5-32. https://doi.org/10.1023/A:1010933404324 ![]() |
[7] | Livingston F (2005) Implementation of Breiman's random forest machine learning algorithm. ECE591Q Mach Learn J Pap : 1-13. |
[8] | Cox DR (1972) Regression models and life-tables. J Roy Stat Soc: Ser B (Meth) 34: 187-202. https://doi.org/10.1111/j.2517-6161.1972.tb00899.x |
[9] |
Ishwaran H, Gerds TA, Kogalur UB, et al. (2014) Random survival forests for competing risks. Biostatistics 15: 757-773. https://doi.org/10.1093/biostatistics/kxu010 ![]() |
[10] |
Ishwaran H, Kogalur UB, Blackstone EH, et al. (2008) Random survival forests. Ann Appl Stat 2: 841-860. https://doi.org/10.1214/08-AOAS169 ![]() |
[11] |
Ishwaran H, Kogalur UB, Gorodeski EZ, et al. (2010) High-dimensional variable selection for survival data. J Am Stat Assoc 105: 205-217. https://doi.org/10.1198/jasa.2009.tm08622 ![]() |
[12] | Borgan Ø (2005) Nelson–Aalen Estimator. Encyclopedia of Biostatistics . https://doi.org/10.1002/0470011815.b2a11054 |
[13] |
Mogensen UB, Ishwaran H, Gerds TA (2012) Evaluating random forests for survival analysis using prediction error curves. J Stat Softw 50: 1-20. https://doi.org/10.18637/jss.v050.i11 ![]() |
[14] |
Strobl C, Boulesteix AL, Zeileis A, et al. (2007) Bias in random forest variable importance measures: illustrations, sources and a solution. BMC Bioinformatics 8: 25. https://doi.org/10.1186/1471-2105-8-25 ![]() |
[15] |
Ishwaran H, Kogalur UB, Chen X, et al. (2010) Random survival forests for high-dimensional data. Stat Anal Data Min ASA Data Sci J 4: 115-132. https://doi.org/10.1002/sam.10103 ![]() |
[16] |
Calle ML, Urrea V, Boulesteix AL, et al. (2011) Auc-rf: a new strategy for genomic profiling with random forest. Hum Hered 72: 121-132. https://doi.org/10.1159/000330778 ![]() |
[17] |
Steyerberg EW, Vickers AJ, Cook NR, et al. (2010) Assessing the performance of prediction models: a framework for traditional and novel measures. Epidemiology 21: 128-138. https://doi.org/10.1097/EDE.0b013e3181c30fb2 ![]() |
[18] |
Diaz-Uriarte R, Alvarez de Andrés S (2006) Gene selection and classification of microarray data using random forest. BMC Bioinformatics 7: 3. https://doi.org/10.1186/1471-2105-7-3 ![]() |
[19] |
Dietrich S, Floegel A, Troll M, et al. (2016) Random Survival Forest in practice: a method for modelling complex metabolomics data in time to event analysis. Int J Epidemiol 45: 1406-1420. https://doi.org/10.1093/ije/dyw145 ![]() |
[20] |
Ye L, Li F, Song Y, et al. (2018) Overexpression of CDCA7 predicts poor prognosis and induces EZH2-mediated progression of triple-negative breast cancer. Int J Cancer 143: 2602-2613. https://doi.org/10.1002/ijc.31766 ![]() |
[21] |
Chen L, Yang L, Qiao F, et al. (2015) High levels of nucleolar spindle-associated protein and reduced levels of BRCA1 expression predict poor prognosis in triple-negative breast cancer. PLoS One 10: e0140572. https://doi.org/10.1371/journal.pone.0140572 ![]() |
[22] |
Kuchenbaecker KB, Hopper JL, Barnes DR, et al. (2017) Risks of breast, ovarian, and contralateral breast cancer for BRCA1 and BRCA2 mutation carriers. Jama 317: 2402-2416. https://doi.org/10.1001/jama.2017.7112 ![]() |
[23] | Sušac I, Ozretić P, Gregorić M, et al. (2019) Polymorphisms in Survivin (BIRC5 Gene) are associated with age of onset in breast cancer patients. J Oncol 3483192. https://doi.org/10.1155/2019/3483192 |
[24] |
Cai YC, Yang H, Wang KF, et al. (2020) ANGPTL4 overexpression inhibits tumor cell adhesion and migration and predicts favorable prognosis of triple-negative breast cancer. BMC Cancer 20: 878. https://doi.org/10.1186/s12885-020-07343-w ![]() |
[25] |
Wang J, Xu B (2019) Targeted therapeutic options and future perspectives for HER2-positive breast cancer. Signal Transduct Tar 4: 34. https://doi.org/10.1038/s41392-019-0069-2 ![]() |
[26] |
Wilson BJ, Giguère V (2008) Meta-analysis of human cancer microarrays reveals GATA3 is integral to the estrogen receptor alpha pathway. Mol Cancer 7: 49. https://doi.org/10.1186/1476-4598-7-49 ![]() |
[27] |
Jiang J, Wang J, He X, et al. (2019) High expression of SPAG5 sustains the malignant growth and invasion of breast cancer cells through the activation of Wnt/β-catenin signalling. Clin Exp Pharmacol Physiol 46: 597-606. https://doi.org/10.1111/1440-1681.13082 ![]() |
[28] |
Weng TY, Wang CY, Hung YH, et al. (2016) Differential expression pattern of THBS1 and THBS2 in lung cancer: clinical outcome and a systematic-analysis of microarray databases. PLoS One 11: e0161007. https://doi.org/10.1371/journal.pone.0161007 ![]() |
[29] |
Weagel EG, Burrup W, Kovtun R, et al. (2018) Membrane expression of thymidine kinase 1 and potential clinical relevance in lung, breast, and colorectal malignancies. Cancer Cell Int 18: 135. https://doi.org/10.1186/s12935-018-0633-9 ![]() |
[30] |
Ahsan H, Halpern J, Kibriya MG, et al. (2014) A genome-wide association study of early-onset breast cancer identifies PFKM as a novel breast cancer gene and supports a common genetic spectrum for breast cancer at any age. Cancer Epidem Biomar 23: 658-669. https://doi.org/10.1158/1055-9965.EPI-13-0340 ![]() |
[31] |
Zancan P, Sola-Penna M, Furtado CM, et al. (2010) Differential expression of phosphofructokinase-1 isoforms correlates with the glycolytic efficiency of breast cancer cells. Mol Genet Metab 100: 372-378. https://doi.org/10.1016/j.ymgme.2010.04.006 ![]() |
[32] |
Smerc A, Sodja E, Legisa M (2011) Posttranslational modification of 6-phosphofructo-1-kinase as an important feature of cancer metabolism. PloS One 6: e19645. https://doi.org/10.1371/journal.pone.0019645 ![]() |
[33] |
Danilova N, Kumagai A, Lin J (2010) p53 upregulation is a frequent response to deficiency of cellessential genes. PloS One 5: e15938. https://doi.org/10.1371/journal.pone.0015938 ![]() |
[34] |
Marangoni E, Laurent C, Coussy F, et al. (2018) Capecitabine efficacy is correlated with TYMP and RB1 expression in PDX established from triple-negative breast cancers. Clin Cancer Res 24: 2605-2615. https://doi.org/10.1158/1078-0432.CCR-17-3490 ![]() |
[35] |
Wu J, Hicks C (2021) Breast cancer type classification using machine learning. J Pers Med 11: 61. https://doi.org/10.3390/jpm11020061 ![]() |
[36] |
Lu Y, Han J (2003) Cancer classification using gene expression data. Inf Syst 28: 243-268. https://doi.org/10.1016/S0306-4379(02)00072-8 ![]() |
[37] |
Guyon I, Weston J, Barnhill S, et al. (2002) Gene selection for cancer classification using support vector machines. Mach Learn 46: 389-422. https://doi.org/10.1023/A:1012487302797 ![]() |
[38] |
Hernandez Hernandez JC, Duval B, Hao JK (2007) A genetic embedded approach for gene selection and classification of microarray data. Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics: 5th European Conference . Springer Berlin Heidelberg 90-101. ![]() |
[39] | Dai B, Chen RC, Zhu SZ, et al. (2018) Using random forest algorithm for breast cancer diagnosis, 2018 International Symposium on Computer, Consumer and Control (IS3C). IEEE : 449-452. https://doi.org/10.1109/IS3C.2018.00119 |
[40] | Goldberg DE Genetic algorithms in search, optimization, and machine learning, Addison-Wesley, 36 (1989). |
N | 10 | 100 | 250 | 500 | 750 | 1000 |
e(5)N | 0.10621 | 0.1319 | 0.13343 | 0.13388 | 0.13402 | 0.13409 |
e(10)N | 0.10621 | 0.13238 | 0.13422 | 0.13478 | 0.13497 | 0.13506 |
e(100)N | 0.10621 | 0.13238 | 0.13422 | 0.13478 | 0.13497 | 0.13506 |
N | 10 | 100 | 250 | 500 | 1000 |
e(5)N | 268.74 | 6.2863e+028 | 3.7892e+073 | 3.4922e+148 | 5.7695e+298 |
e(10)N | 268.74 | 6.2867e+028 | 3.7897e+073 | 3.4927e+148 | 5.7704e+298 |
e(100)N | 268.74 | 6.2867e+028 | 3.7897e+073 | 3.4927e+148 | 5.7704e+298 |
h | 0.1 | 0.001 | ||||
k | 5 | 10 | 10 | 15 | ||
ε | 3.1483e-04 | 3.1483e-04 | 3.1605e-04 | 3.1605e-04 | ||
h | 0.00001 | |||||
k | 10 | 15 | ||||
ε | 3.1606e-04 | 3.1606e-04 |
h | 0.1 | 0.001 | 0.00001 | |||||
k | 5 | 10 | 10 | 15 | 10 | 15 | ||
ε | 0.0018 | 0.0018 | 0.1824 | 0.1824 | 17.6723 | 17.6723 | ||
h | 0.000001 | |||||||
k | 10 | 15 | ||||||
ε | 176.8079 | 176.8079 |
h | 0.1 | 0.001 | ||||
k | 10 | 15 | 10 | 15 | ||
ε | 3.1568e-04 | 3.1568e-04 | 3.1606e-04 | 3.1606e-04 | ||
h | 0.00001 | |||||
k | 10 | 15 | ||||
ε | 3.1606e-04 | 3.1606e-04 |
h | 0.1 | 0.001 | 0.00001 | |||||
k | 10 | 15 | 10 | 15 | 10 | 15 | ||
ε | 0.1782 | 0.1782 | 0.1435 | 0.1435 | 14.1724 | 14.1724 | ||
h | 0.000001 | |||||||
k | 10 | 15 | ||||||
ε | 141.7252 | 141.7252 |
h | 0.1 | 0.001 | |||
k | 5 | 10 | 10 | 15 | |
ε | 3.1085e-04 | 3.1085e-04 | 3.1567e-04 | 3.1567e-04 | |
h | 0.00001 | ||||
k | 10 | 15 | |||
ε | 3.1606e-04 | 3.1606e-04 |
N | 10 | 100 | 250 | 500 | 750 | 1000 |
e(5)N | 0.10621 | 0.1319 | 0.13343 | 0.13388 | 0.13402 | 0.13409 |
e(10)N | 0.10621 | 0.13238 | 0.13422 | 0.13478 | 0.13497 | 0.13506 |
e(100)N | 0.10621 | 0.13238 | 0.13422 | 0.13478 | 0.13497 | 0.13506 |
N | 10 | 100 | 250 | 500 | 1000 |
e(5)N | 268.74 | 6.2863e+028 | 3.7892e+073 | 3.4922e+148 | 5.7695e+298 |
e(10)N | 268.74 | 6.2867e+028 | 3.7897e+073 | 3.4927e+148 | 5.7704e+298 |
e(100)N | 268.74 | 6.2867e+028 | 3.7897e+073 | 3.4927e+148 | 5.7704e+298 |
h | 0.1 | 0.001 | ||||
k | 5 | 10 | 10 | 15 | ||
ε | 3.1483e-04 | 3.1483e-04 | 3.1605e-04 | 3.1605e-04 | ||
h | 0.00001 | |||||
k | 10 | 15 | ||||
ε | 3.1606e-04 | 3.1606e-04 |
h | 0.1 | 0.001 | 0.00001 | |||||
k | 5 | 10 | 10 | 15 | 10 | 15 | ||
ε | 0.0018 | 0.0018 | 0.1824 | 0.1824 | 17.6723 | 17.6723 | ||
h | 0.000001 | |||||||
k | 10 | 15 | ||||||
ε | 176.8079 | 176.8079 |
h | 0.1 | 0.001 | ||||
k | 10 | 15 | 10 | 15 | ||
ε | 3.1568e-04 | 3.1568e-04 | 3.1606e-04 | 3.1606e-04 | ||
h | 0.00001 | |||||
k | 10 | 15 | ||||
ε | 3.1606e-04 | 3.1606e-04 |
h | 0.1 | 0.001 | 0.00001 | |||||
k | 10 | 15 | 10 | 15 | 10 | 15 | ||
ε | 0.1782 | 0.1782 | 0.1435 | 0.1435 | 14.1724 | 14.1724 | ||
h | 0.000001 | |||||||
k | 10 | 15 | ||||||
ε | 141.7252 | 141.7252 |
h | 0.1 | 0.001 | |||
k | 5 | 10 | 10 | 15 | |
ε | 3.1085e-04 | 3.1085e-04 | 3.1567e-04 | 3.1567e-04 | |
h | 0.00001 | ||||
k | 10 | 15 | |||
ε | 3.1606e-04 | 3.1606e-04 |