论文研究-Improved Taboo Search Algorithm for Designing DNA Words.pdf


-
DNA词设计的改进禁忌搜索算法,张凯,许进,DNA序列设计是DNA计算中现实而重要的研究课题之一。我们通过改进禁忌搜索算法来系统地设计等长DNA序列,该方法设计的DNA序列可以满足
山国武技记文在线 http://www.paper.edu.cn the Dimer structure, such subsequences AAAA,, TTTT, 'CCCC, 'GGGG,, ' CATG', TCGA, AGCT,GTAC are forbidden Hairpin Constraint: Hairpin is an undesirable structure, because it can hybridize itself. Hairpin structure consists of ring part and stem part. Stem is formed with basepairs hy bridization. Typical minimum stem length 3 Taboo Search Algorithm for DNA Encoding The taboo search has been successfully applied to a large number of combinatorial optimization problems. The algorithm is an enhancement of t he well-known hill climbing heuristic, which use a memory function to avoid being trapped at a locaI minimum Generate an initial DNA word. store it as the current seed solution and clear the taboo list. Is stop criterion satisfied? Output DNA words set Generate neighbors of the current seed solution by a ncighborhood structure Y Does the evaluate Store the neighbor solution constraints satisfy? as the new seed Add the neighbor solution to the taboo list. Fig. 1. Taboo search algorithm for DNA encoding The TS procedure is generally simple. The procedure starts with a feasible initial DNA word with required length and stores it as the current seed. Then neighbor DNa words of the current seed are produced by the ncighborhood structurc. Those arc candidate solutions. Thesc DNA words arc evaluated by ccrtain combinatorial constraints and thermodynamic constraints, and a candidate which satisfics thc aspiration critcrion is sclcctcd as new seed solution. This selection is called a move and added to taboo list. Iterations are repeated until a stop criterion is satisfied. Fig. 1 shows the procedure of taboo search algorithm 山国武技记又在线 http://www.paper:edu.cn 1. Initial solution The initial solution is a nucleotide word string which generated by random method. Then we use the GC content, forbidden subsequence and slide lllisIalches constraints to lest the initialize. If the initialize solution fits all these constraints it will be added to taboo list and stores it as the current seed solution 2. The neighborhood structure A neighborhood structure is a mechanism which can obtain a set of new neighbor solutions by applying a diversification strategy to a given solution. Each neighbor solution is reached immediately from a seed solution by a move. Neighborhood structure is directly effective on the efficiency of Ts algorithm In this paper. the neighborhood solutions are generated by exchanging sequences nucleotide alphabet. The wholc ncighborhood representation is about a permutation of all dna words fits hamming distance constraint This significantly facilitates the data structure, since every solution may be stored by means of a permutation of the nucleotide alphabet ( A, C, G, Tf which length is n For a given solution word W=(w1, W2, .. Wj,..., Wn), replace w; wiLh another nuclide alphabet ki. W2 A k,k;∈{A,CG,T}. The new word is w′=(1,2,……,k2,…,mn) and the Hamming distance H(W,W")is1 If required Hamming distance is h, replace(ui1, wi2, .. win) with(ki1, ki2, .. kih) at different positions. the Hamming distance between two word I(W.w')is h If required DNA word length is m and required Hamming distance is h, we random change h different nuclide alphabet of seed word W, such neighborhood structure can construct Ch neighbor candidate solutions 3. Evaluating neighbor solution Each gencratcd dNa words must bc evaluated by combinatorial constraints and thcrmodynamic constraints If the word violates any of thosc constraints. thc word will bc added to taboo list For each solution W S,let fHmeasure(w, w:) be the H-measure constraint function, let fGc(wy be the GC content constraint function, let fs(w, w: be the Similarity constraint function, let frs(w) be the forbidden subsequence constrainT funcLion, and let / P(w) be Lhe Hairpin coustraint function. When loving from a soluTioN w lo another solulion W'EN(w). the new solution is evalualed by below functions (1)fr measuer(w)-2I measure(w Wi) compute all the II measure( w, Wi) values. If the function result don't satisfy target value, new DNA sequence w should be neglected and added to the taboo list table (2)fGa(w) calculate the GC content of the word W. If it is don't satisfy the required GC content, the tested sequence should be added to the tahoo list. (3)J5(w) S W, Wi)compute all the S(w, W.) values. If the function result don't satisfy target value, new DNA scqucncc W should be neglected and added to the taboo list table (4)fEs(w) scarch for all forbidden sequences. If it is don't satisfy thc rcquired GC content, the tested scqucncc should be added to the taboo list (5) fHp()test the Hairpin constraint. If it is don't satisfy the minimum stem length, the tested sequence should be added to the taboo list 山国武技记文在线 http://www.paper.edu.cn Because all these constraints are parallel, the five terms listed above are logical multiplication respectively Solutions are then evaluated using a funclion F(W)=fs(w) fH W)JFS(W)JHP(W) 4. Taboo list and Termination Criterion Because evaluating a neighbor solution will spend much time, if a neighbor solulion violate any combinatorial or thermodynamic constraint, il will be added into taboo list lo avoid repeat testing The algorithm stops when the number of iterations to a maximum value, or the solution DNA words set has got enough DNA words 4 Simulation results In the above section, the taboo search algorithm was improved to design good DNA sequences. The algorithm has been implemented on Pascal language compiler of Borland Delphi 7. In the simulation, DNA sequences of length 20-mer are considered. The neighborhood structure Hamming distance is 9. The subsequences 'AAA,,'CCC GGG, tTT' could guarantee that cach dNA scqucncc must satisfy the continuity constraint We choose a best DNA scqucncos sct generated by our algorithm and comparcd the rosults with Dcaton( 19 et al. and Soo-Yong Shin 20 et al. The comparison results are shown in Table 1. Our sequences show much lower similarity values and H-measure. This implies the sequences made by our algorithm have much higher probability lo hy bridize with the its conpleinentary sequences. Moreover, the secondary structure is more prohibited due Lo the very low continuity and hairpin. GC conlent assure these DNA sequences have sinilar thermodynamic characteristics 5 Conclusion A new algorithm of DNA sequence design for DNA computing is proposed. Because the neighbor structure in t his algorithm can overlap whole the solution space, the dNA sequence set is one of greatest sets which satisfy the constraints. Due to all the constraints in our algorithm are parallel, additional constraints are supported by the algorithm and can be integrated into our model in a straightforward way Acknowledgements The projcct was supported by the National Natural Scicncc Foundation of China(grant Nos. 60373089, 60674106 30570431, 60703047, and 60533010), the Program for New Century Exccllent Talents in University(NCET-05 0612), the Ph.D. Programs Foundation of Ministry of Education of China(20060487014)), and the Chenguang Program of Wuhan(200750731262) 山国武技记又在线 http://www.paper:edu.cn Table 1. Comparison results of the sequences by our algorithm, and the sequences in [19] and [20] equence(5′-3) Continuity Hairpin( Similariy H-measureGC% Our Algorithn CCACCACCAATGATGTTAGG 53 62 50 ACCTTAGAACAGACGCTTGC 0000000 60 CACCTAACTAATCGGCTGGA AACITGATGAGCGAIGGACO CTCCAATGTGAACCTGTGTC CGCCATAGATAGATACCGTC ATAGGCGTTACTGAGCATCC 000000n 60 50 53 50 66 50 53 60 50 Deaton et al ATAGAGTGGATAGTTOTGGG 9 55 CATIGGCGGCGCGIAGGOII 6i9 CTTGTGACCGCTTCTGGGGA 16 60 GAAAAAGGACCAAAAGAGAG 41 45 58 40 GATGGTGCTTAGAGAAGTGG 0 GTATCTCGIITTAACATCO 000043 50 35 TTGTAAGCCTACTGCGTGAC 55 75 50 Soo-Yong Shin et al CTCTTCATCCACCTCTTCTC 43 50 CTCTCATCTCTCCGTTCTTC 00000 00000 50 TATCCTGTGGTGTCCTTCCT 57 45 AlTCIGTCOGI'TGCGTGTC 2 50 TCTCTTACGTTGGTTGGOTG 50 GTATTCCAAGCGTCCGTGTT 0 50 AAACCTCCACCAACACACCA 9 5 50 References 1. L M. Adelman: Molecular computation of solutions to combinatorial problems. Science, 266(5187),(1994), 102-1024 2. A. Brennerman and A. E Condon: Strand Design for Bio-Molecular Computation. Theoretical Computer Science, 287 (201),39-58 3. A. Marathe, A. Condon, and R. M. Corn. Condon: On Combinatorial DNA Word Design. Journal of Computational Biology,8,(2001),201-219 4. R. Dealoll, M. Garzon. R. Murphy, D. Franceschetti, and S Stevens: Genetic Search of Reliable Encodings for DNA Based Computation. in Proceedings of the 1st Annual Conference on Genetic Programming, 21,(1996),9-15 5. D. D. Shoemaker, D. A. Lashkari, D. Morris, M. Mittmann, and R. w. Davis: Quantitative Phenotypic Analysis of Yeast Deletion Mutants Using a Highly Parallel Molecular Bar-coding Strategy. Nature, 16,(1996), 450-456 6. A. G. FrutosL. M. Smith, and R. M. Corn: Enzymatic ligation reactions of DNA "Word"on surfaces for DNA compuling. Journal of the American Chemical Society, 120(40), 1998, 10277-10282 7. A.G. ITutos, Qinghua liu, A 'I'. 'Thiel, A. W. Scanner, A. E Condon, I M. Smith, and R. M. Corn: Demonstration of a word design strategy for DNA computing on surface. Nucleic Acids Research, 25,(1997),4748-4757 8. U. Feldkamp, W. Banzhaf, and H. Rauhe. A DNA sequence compiler. In: Proceedings of 6th DIMACs Workshop on DNA Based Computers, 2000 9. R. DealOll, M. Garzon, R. C. Murphy, J. A. Rose, D. R. FrancescheTti, and S.E. Stevens. Genetic Search of reliable Encodings for DNA-Based Computation. In: 15I Genetic Pro-gramming Conference, 1996 10. R. Deaton, R C. Murphy, M. Garzon, D. R Franceschetti, and S. E. Stevens. Good encod-ings for DNA-based solutions to combinatorial problems. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 11,(1999) 247258 11. R. Deaton, R. C. Murphy. J. A Rose, M. Garzon, D. R Franceschetti, and S.E. Stevens. A DNA Based Implementation of an Evolutionary Computation. In: Proceedings IEEE Con-ference on Evolutionary Computation, Indians, 1997, 267 271 12. F. Glover: Tabu searchPart I ORSA Journal on Computing 1,(1989), 190-206 13. F. Glover: Tabu searchPart II. ORSA Journal on Computing 2,(1990), 4-32 14. Alain Hertz and Marino Widmer: An improved ta bu search approach for solving the job shop scheduling problem with tooling constraints Discrete Applied Mathematics, 65(3);(1996), 319-345 15. Ivo Blochligera, Nicolas Zuffereyb: A graph coloring heuristic using partial solutions and a reactive tabu scheme Computers and Operations Research, 11(5).(2006), 1-16 6 山国武技记文在线 http:/www.paper.edu.cn 16. M. P. Hansen: Tabu search for multiobjective optimization: MOTS. Paper Presented at the 13th International Con ference on Mulli Criteria DecisiOn Making(MCDMA97),(1997) 17. S. Kulturel-Konak, D). W. Coit and A. E. Smit h: Efficiently solving the redundancy a. I location problem using tabul search. IIE Transactions, 35(6),(2003), 515-520 18. C. Friden, A. Hertz and d. de Werra: An exact algorithm based on tabu search for finding a maximum independent set in a graph Computers and Operations Research, 17(5),(1990), 437-445 19. R. DealOll, R. C. Murphy, M. Garzon, D. R. FranceschetTi, anld S.E. Stevens, Jr. Goud encodings for DNA-base solutions to combinatorial problems. in Proc. 2nd Annu. Meeting I)\A Based Comput, 1996, 247-258 20. Soo-Yong Shin, In-Hee Lee, Dongmin Kim, and Byoung-Tak Zhang Multiobjective Evolutionary Optimization of DNA Sequences for Reliable DNA Computing. IEEE Trans on Evolutionary Computation, 2005, 9(2): 113-158 7

-
2019-08-23
386KB
论文研究-An improved CABS capture algorithm for PAM-UWB.pdf
2019-08-15一种针对脉冲幅度调制超宽带捕获CABS改进算法,陈显明,宋正勋,目前同步在超宽带无线通信系统中是具有挑战性的一项技术。传统的全数字同步方法在实现上是非常困难的。例如,高速的数据采样率和
2.46MB
An improved ant colony algorithm for robot path planning.pdf
2020-03-16关于蚁群算法的机器人路径规划SCI期刊论文,融合了人工势场法,及几何法,对新手有帮助,结合经典的蚁群算法和人工势场法,
131KB
论文研究-A New Improved Algorithm for Secure Outsourcing of Modular Exponentiations.pdf
2019-08-15一种新的改进的安全模指数外包方案,叶俊,陈晓峰,外包计算允许资源受限的用户将繁琐的计算任务转交给计算功能强大但不一定可信的服务器来做。用户预先做一些预计算,对所需要外包��
277KB
论文研究-An Improved Unsupervised Phenotypes Structure Discovery Algorithm for Gene Expression Data.pdf
2019-08-16一种用于基因表达数据的改进无监督表型结构发现算法,赵宇海,李源,表型结构发现是生物信息中的一个重要问题,但受到的关注却相对较少。本文提出了一种无监督的表型结构发现算法UPID,从基因表达数��
504KB
论文研究-An improved two-stage Detector for Traffic-lights.pdf
2019-08-18一种改进的两阶段交通灯检测器,陈飘依,戚琦,对于自动驾驶来说,感知汽车周围的环境是最基本的先决条件之一。其中,视觉环境感知是一个极其重要的组成部分。交通信号灯是汽车
164KB
论文研究-An Improved Redirection Solution for P2P Service.pdf
2019-08-18一种P2P业务重定向策略的改进,张楠,,为有效承载P2P型业务,面向PON接入网应用的基于线速报文深度识别和P2P协议报文控制的P2P业务重定向策略(IC-P2PTRD)已提出,但IC-P2PTRD策
783KB
论文研究-An Improved Distributed Energy Efficient Clustering Algorithm for IP-based WSNs in Smart Grid.pdf
2019-08-16一种适用于智能电网IP化无线传感网的改进型能量有效成簇算法研究,谢本银,王朝炜,智能电网作为下一代电网可以大大提高传统电网的性能。而无线传感网络作为一种无缝的、能量有效的、可靠的以及低成本的通信网络被
128KB
论文研究-Improved Proportional Fairness Resource Allocation Schemes for LTE Uplink SC-FDMA System.pdf
2019-08-15一种改进的用于LTE上行SC-FDMA系统的比例公平调度方案,陆兆新,,3GPP在过去的几年中开展了LTE系统的标准化工作。LTE上行系统采用峰均比较低的SC-FDMA作为多址接入方式。SC-FDMA
609KB
论文研究-基于.pdf
2019-09-20论文研究-基于.pdf, 协同过滤是目前个性化推荐系统中广泛使用和最成功的推荐算法,但在用户评分极端稀疏的情况下将面临冷启动问题, 具体包括新用户问题和新项目问题.针对新用户问题,提出了一种基于n序
282KB
论文研究-Improved DCT-domain Color Image Enhancement through Anisotropic Diffusion.pdf
2019-08-14Improved DCT-domain Color Image Enhancement through Anisotropic Diffusion,万毅,马亚峰,Color image enhance
554KB
论文研究-An Improved Key Distribution Scheme with Self-healing and Revocation Property for Wireless Sensor Network.pdf
2019-08-20一个改进的传感器网络自治愈组密钥分配方案,郑燕飞,温蜜,传感器网络在军事和民用领域都有着广泛的应用,因此安全的组通信是无线传感器网络应用中重要安全服务之一。在传感器网络中假设组
140KB
论文研究-An Improved Method for Solving Equal Weights Sub-Paths Problem in K Shortest Path Algorithm.pdf
2019-08-16一种在KSP算法中解决权重和相等子路径问题的改进方法,李玉萍,王大江,本文介绍了一种修改的KSP算法。当网络很大,并且链路权重都相等时,用传统的KSP算法算出来的路径并不一定都是正确的。因此,本文提
219KB
论文研究-Multi-model Predictive Control of Nonlinear System based on Improved Cloud C-means Clustering Algorithm.pdf
2019-08-16基于改进云聚类的多模型非线性预测控制,张伟,常俊林,多模型预测控制是解决非线性对象控制问题的重要方法,现场采集的数据由于噪声等因素的干扰往往具有很大的不确定性,直接针对不确
486KB
论文研究-The registration algorithm of nonlinear scale and improved ORB.pdf
2019-08-15非线性尺度和改进ORB的配准方法,董浩,吕东岳,对于ORB算法尺度不变性较差,SIFT算法时间复杂度高和没有充分保持图像边缘细节的问题,提出一种基于非线性尺度空间和改进ORB的图像��
220KB
论文研究-Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency.pdf
2019-08-15高传输率、低修改率分级EMD改进密写算法,瞿治国,钮心忻,本文提出了一种高传输率、低修改率分级EMD改进密写算法。这一算法充分利用了EMD密写算法在信息传输率高、密写嵌入效率高和修改率低
351KB
论文研究-Research on Assembly Sequence Planning Based on Improved Slope One Algorithm.pdf
2019-08-15基于改进Slope One算法的装配序列规划研究,靳宇,侯文君,根据复杂产品装配序列规划的特点和要求,提出一个基于改进的Slope One算法的装配序列求解方法。在对产品装配模型进行充分定义的基础
442KB
论文研究-Design for Motor Speed Fractional Order Controller Based on Improved Artificial Bee Colony Algorithm.pdf
2019-08-16基于改进人工蜂群的伺服电机分数阶速度控制器的设计,黄梁松,李玉霞,分数阶PID控制器比传统PID控制器有着更优异的控制性能,特别适合对动态性能要求较高的伺服电机控制系统,但分数阶控制器参数整定需要�
434KB
论文研究-An Improved Infrared and Visible Images Registration Based on SURF Algorithm.pdf
2019-08-18一种改进的SURF算法的红外和可见光图像的配准,邓集萱,程永强,图像配准是图像处理的基础。针对Harris角度不具有尺度不变性和SIFT算法依赖于硬件的问题,提出了SURF(Speeded Up Ro
401KB
论文研究-A De-noise Prototype Research Based on Improved LMS Algorithm.pdf
2019-08-20基于优化的LMS算法的去噪原型研究,褚卫艳,杨文川,如何解决由噪声引起的问题已经变得越来越重要。在实际的通信信息处理过程中,由环境引起的巨大噪声已经严重影响了通信质量。线性
4.14MB
CCleaner v4.01.4093
2013-04-29CCleaner is the number-one tool for cleaning your Windows PC. It protects your privacy online and ma
180KB
论文研究-An improved event-triggered mechanism for networked cascade control system with stochastic nonlinearities.pdf
2019-08-16一种改进的随机非线性网络串级控制系统事件触发机制,顾洲,赵欢,本文提出了一种改进的事件触发机制的网络化串级控制系统的网络诱导时延和随机非线性。首先,不同于传统的预设一个固定的触发参数��
314.40MB
- ISSCC 2014 所有
2020-06-29---- ISSCC2014 - Digest ISSCC2014 - Demo Sessions.pdf Session 01 - Plenary.pdf Session 02 - Ultra-Hi
666KB
论文研究-An Improved ORNAM Representation of Gray Images.pdf
2019-08-17一种改进的ORNAM灰度图像表示,郑运平,Mudar Sarem,有效的图像表示方法不仅能节约存储空间,而且还能方便图像的操作。最近,通过使用可重叠矩形非对称逆布局模型和扩展的Gouraud阴影��
333.62MB
ISSCC 2013 所有
2020-06-29ISSCC2013 - Digest.docx ISSCC2013 - Digest.pdf SC 1 - RF Blocks for Wireless Transceivers.pdf SC 2 -
172KB
论文研究-Design of LNA and improved active dual balanced mixer for 802.11a WLAN.pdf
2019-08-16基于802.11a协议的无线局域网低噪声放大器和改进的有源双平衡混频器,吴忠洁,赵亮,本文提出了采用0.18um CMOS工艺,应用于802.11a协议的无线局域网接受机的低噪声放大器和改进的有源双平
336KB
论文研究-A Superconducting Wide-Band Filter Subsystem with Improved Out-of-Band Performance.pdf
2019-08-16宽带高温超导滤波子系统带外抑制特性提高方法研究,陈炜,陈毅东,由高性能超导滤波器和低温低噪声放大器组成的超导滤波子系统是提高无线通信接收机灵敏度和抗干扰能力的重要手段。本文采用阻抗阶
2.58MB
vimbook-OPL-Vi iMproved (VIM).pdf
2008-01-05vimbook-OPL-Vi iMproved (VIM).pdf
125KB
论文研究-An improved event-handling model of event-driven SOC platform.pdf
2019-08-17一种基于面向服务计算平台的事件处理模型,倪明智,高强,基于请求/响应模型的面向服务体系架构(Service-Oriented Architecture,SOA)的实现缺乏一定的耦合性和协作能力。事件驱
479KB
Dynamic Meta-Embeddings for Improved Sentence Representations.pdf
2020-03-29While one of the first steps in many NLP systems is selecting what pre-trained word embeddings to us
840KB
论文研究-网络化制造模式下基于改进蚁群算法的供应链调度优化研究.pdf
2019-09-20论文研究-网络化制造模式下基于改进蚁群算法的供应链调度优化研究.pdf, 为制定网络化制造(networked manufacturing,NM)模式下供应链合作成员间的动态调度策略,构建了由制造商
-
学院
MMM 集群部署实现 MySQL 高可用和读写分离
MMM 集群部署实现 MySQL 高可用和读写分离
-
下载
小红书图片去水印(免费版).rar
小红书图片去水印(免费版).rar
-
博客
应届生与IT培训生,就业谁更占优势?
应届生与IT培训生,就业谁更占优势?
-
博客
2021周记07:新的一年正式开始
2021周记07:新的一年正式开始
-
下载
Java核心技术面试题.zip
Java核心技术面试题.zip
-
学院
用Go语言来写区块链(一)
用Go语言来写区块链(一)
-
博客
windows下编译调试PostgreSQL
windows下编译调试PostgreSQL
-
学院
PowerBI重要外部工具详解
PowerBI重要外部工具详解
-
博客
想月薪过万?这些面试准备你做好了吗?
想月薪过万?这些面试准备你做好了吗?
-
学院
MySQL 四类管理日志(详解及高阶配置)
MySQL 四类管理日志(详解及高阶配置)
-
下载
EaUS Video Editor(视频剪辑软件)官方中文版V1.6.8.53
EaUS Video Editor(视频剪辑软件)官方中文版V1.6.8.53
-
博客
C#--PictureBox绘制自动换行的文字
C#--PictureBox绘制自动换行的文字
-
下载
Androidesk-release-androidesk.zip
Androidesk-release-androidesk.zip
-
下载
Arduino舵机风扇.zip
Arduino舵机风扇.zip
-
下载
BGLight.zip
BGLight.zip
-
博客
JS面向对象编程及ES6新特性(更新中)
JS面向对象编程及ES6新特性(更新中)
-
学院
MySQL 备份与恢复详解(高低版本 迁移;不同字符集 相互转换;表
MySQL 备份与恢复详解(高低版本 迁移;不同字符集 相互转换;表
-
博客
SaltStack Shell注入漏洞 CVE-2020-16846 漏洞复现
SaltStack Shell注入漏洞 CVE-2020-16846 漏洞复现
-
下载
SnapGene 3.2.1 Win安装.rar
SnapGene 3.2.1 Win安装.rar
-
博客
微服务运行在docker上
微服务运行在docker上
-
学院
【布道者】Linux极速入门
【布道者】Linux极速入门
-
博客
入门算法:小和问题 之归并排序思想 java语言
入门算法:小和问题 之归并排序思想 java语言
-
学院
MHA 高可用 MySQL 架构与 Altas 读写分离
MHA 高可用 MySQL 架构与 Altas 读写分离
-
下载
python课件.rar
python课件.rar
-
博客
希望一辈子只做一个专业
希望一辈子只做一个专业
-
下载
机器学习可视化软件机器学习可视化软件
机器学习可视化软件机器学习可视化软件
-
下载
gexin-rp-sdk-http-4.1.1.0.rar
gexin-rp-sdk-http-4.1.1.0.rar
-
博客
初探并发编程:秒杀系统
初探并发编程:秒杀系统
-
下载
马士兵老师HashMap学习笔记
马士兵老师HashMap学习笔记
-
下载
12. 最大值.cpp
12. 最大值.cpp