Next Article in Journal
Galectin-3 Mediates Tumor Progression in Astrocytoma by Regulating Glycogen Synthase Kinase-3β Activity
Previous Article in Journal
Interstitial Cells of Cajal and Enteric Nervous System in Gastrointestinal and Neurological Pathology, Relation to Oxidative Stress
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Study on DNA Storage Encoding Based IAOA under Innovation Constraints

1
Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian 116622, China
2
School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland 1010, New Zealand
*
Author to whom correspondence should be addressed.
Curr. Issues Mol. Biol. 2023, 45(4), 3573-3590; https://doi.org/10.3390/cimb45040233
Submission received: 11 March 2023 / Revised: 9 April 2023 / Accepted: 13 April 2023 / Published: 18 April 2023
(This article belongs to the Section Bioinformatics and Systems Biology)

Abstract

:
With the informationization of social processes, the amount of related data has greatly increased, making traditional storage media unable to meet the current requirements for data storage. Due to its advantages of a high storage capacity and persistence, deoxyribonucleic acid (DNA) has been considered the most prospective storage media to solve the data storage problem. Synthesis is an important process for DNA storage, and low-quality DNA coding can increase errors during sequencing, which can affect the storage efficiency. To reduce errors caused by the poor stability of DNA sequences during storage, this paper proposes a method that uses the double-matching and error-pairing constraints to improve the quality of the DNA coding set. First, the double-matching and error-pairing constraints are defined to solve problems of sequences with self-complementary reactions in the solution that are prone to mismatch at the 3′ end. In addition, two strategies are introduced in the arithmetic optimization algorithm, including a random perturbation of the elementary function and a double adaptive weighting strategy. An improved arithmetic optimization algorithm (IAOA) is proposed to construct DNA coding sets. The experimental results of the IAOA on 13 benchmark functions show a significant improvement in its exploration and development capabilities over the existing algorithms. Moreover, the IAOA is used in the DNA encoding design under both traditional and new constraints. The DNA coding sets are tested to estimate their quality regarding the number of hairpins and melting temperature. The DNA storage coding sets constructed in this study are improved by 77.7% at the lower boundary compared to existing algorithms. The DNA sequences in the storage sets show a reduction of 9.7–84.1% in the melting temperature variance, and the hairpin structure ratio is reduced by 2.1–80%. The results indicate that the stability of the DNA coding sets is improved under the two proposed constraints compared to traditional constraints.

1. Introduction

From ancient stone inscriptions to current digital storage methods, such as USB flash drives and hard drives, storage is an indispensable way to preserve and record data. However, with global informatization, the proliferation of the data volume has posed difficulties for data storage. By 2025, the global data volume is expected to grow to 175 ZB [1], which is equivalent to 5.03 × 105 PE per day. The existing storage media will not be able to meet such a demand for data storage. Conventional storage media, such as CDs and floppy disks, have problems of high cost, short storage times, and difficulties in the data storing process [2]. Thus, there is an urgent need for the development of new storage media to solve these problems. Molecules of nucleic acids were first studied by Watson et al. [3] in 1953, and then, life forms were analyzed from the perspective of molecular biology, which opened up new horizons in research on biogenetics. Deoxyribonucleic acid (DNA) is a storage medium endowed by nature. Compared with conventional storage media, DNA storage has the advantages of a large storage capacity, long storable time, and easy storage, and thus, it has become a widely used storage tool [4]. Each gram of DNA can store 215 PE of data [5], and it takes only 2.34 × 103 g of DNA to store 5.03 × 105 PE of data, which is equivalent to 5.15 million 100 TB capacity hard drives. In addition, DNA is extremely stable and can survive for thousands of years under harsh conditions, thus far exceeding the survival time of silicon devices [4]. Since its discovery, DNA storage technology has been continuously applied to solve various problems in many fields, including archival data storage, data encryption, and DNA computing.
In 2012, Church and Kosuri et al. [6] successfully encoded and decoded digital information using next-generation DNA synthesis and sequencing techniques. Goldman et al. [7] stored a certain amount of data in DNA, solving the problem of previous DNA storage methods, which can encode only a small amount of information, and showed that the original data could be restored with perfect accuracy. In 2015, a DNA storage architecture proposed by Yazdi et al. [8] implemented random data reads and re-edited the stored data at all locations within the data blocks. Further, in 2017, Erlich et al. [5] introduced a data storage method known as the DNA fountain, where DNA oligonucleotides store data with a total length of 2.14 × 106 bytes, including a complete computer system, film and television productions, and other files, and the data can be successfully decoded. In 2019, Benner et al. [9] discovered four additional nucleotides, creating a breakthrough DNA molecule with eight letters. In the same year, Ping et al. [10] proposed a codec system called Yin-Yang that could successfully store files of different formats in a pool of synthetic DNA oligonucleotides. Choi et al. [11] proposed the use of simply merged bases as coding characters and experimentally obtained 3.37 bits/character, which more than doubled the original maximum information capacity. Anavy et al. [12] encoded 6.4 MB as composite DNA, using only 80% of the original synthesis cycle and distinguishable compositional media. In 2020, Zhang and Kong et al. [13] proposed an improved Base64 method and obtained a storage ratio of 1.77 bits/nucleotide in a single strand of DNA. Ping et al. [14] developed Chamaeleo, which is a scalable integration and evaluation platform for DNA storage codec methods, to perform a systematic quantitative analysis and evaluate existing codec methods in a modular integration manner. This platform supports the output of codec methods consisting of different types of files in a meritocratic manner. Cao and Li et al. [15,16] proposed new constraints for constructing DNA storage codebooks, which could effectively improve the quantity and quality of DNA storage sets. In 2021, Shomorony et al. [17] analyzed the DNA storage systems using a noisy shuffle sampling channel model. They showed that an index-based coding scheme could achieve the best results in many scenarios based on specific noise and sampling assumptions. According to Li et al. [18], this DNA storage system could self-interpret its stored data without using any external tools. Li et al. designed an index for random access to the stored files. For DNA storage systems, Schwarz et al. [19] proposed a software framework called NOREC4DNA, which can be used to test and improve near-optimal rate-free erasure codes (NORECs). Park et al. [20] presented a planning strategy that used a ravenous calculation to reduce the typical piece error rate by 2.3455 pieces brought about by a nucleotide blunder, which represented a reduction of 20.5% compared to the random mapping method. Zheng et al. and Wu et al. [21,22] developed methods for constructing well-performing DNA coding sets and introduced new constraints to construct more robust coding sets. In 2022, Li et al. [23] proposed an efficient method for constructing DNA coding sets, which can effectively improve the quantity and quality of DNA coding sets. Ren et al. [24] developed two highly reliable coding systems, named the RALR and the RABR, for four, six, and eight nucleotides. The typical coding steps of the RALR framework using four, six, and eight nucleotides obtained 1.27 bits/nucleotide, 1.61 bits/nucleotide, and 1.85 bits/nucleotide in the error-correctable and uncompressed cases, respectively. In contrast, the average coding rates of RABR systems using four, six, and eight nucleotides were 1.50 bits/nucleotide, 2.00 bits/nucleotide, and 2.35 bits/nucleotide, respectively.
To reduce the occurrence of non-specific hybridization reactions and thus the chance of errors in the DNA storage process, rational coding of DNA sequences is required. The DNA sequences are subject to their base complementary pairing reactions in solution, and this study used a double-matching constraint to reduce the probability of this situation occurring. The 3′ end is the focus of amplification, and its pairing affects the enzyme extension and determines the specificity and efficiency of synthesis. Only by strict restriction of the bases at the 3′ end can the desired amplification product be obtained. Therefore, this study introduced an error-pairing constraint to achieve such a restriction. In addition, this study improved the arithmetic optimization algorithm (AOA) and proposed the IAOA, which was combined with traditional constraints to construct DNA coding sets that comply with specific constraints and restrictions. The lower bounds of these coding sets were improved, but there were still undesirable secondary structures that affect the stability of DNA sequences. Therefore, to obtain high-quality DNA coding sets, this paper used the IAOA to construct coding sets under double-matching and error-pairing constraints. The effectiveness of the constraints and the quality of the coding set were evaluated by tests such as the concentration before and after entering the solution, the number of hairpin structures, and the melting temperature. The results show that the two proposed constraints can effectively improve the quality of the DNA coding sets.

2. Algorithm Description

2.1. Arithmetic Optimization Algorithm

In 2021, Abualigah et al. [25] proposed the AOA and used it to solve practical problems. The AOA uses four arithmetic operators: multiplication, division, subtraction, and addition.
The AOA search process can be divided into two main phases: the exploration phase and the development phase. Before the AOA starts the optimization process, it judges and selects the search phase (exploration or development). The arithmetic optimization acceleration function (Math Optimizer Accelerated) is an important factor that is used to control the exploration and development phases, and it is given by Equation (1). The AOA sets a random number r 1 after updating the M O A . If r 1 > M O A , the AOA executes the multiplication and division arithmetic operations (executes the exploration phase); otherwise, it executes the addition and subtraction arithmetic operations (executes the development phase).
M O A t = ( m a x m i n T ) × t + m i n
The minimum and maximum values of M O A are denoted by m i n and m a x , respectively, and they are set to 0.2 and 1, respectively; t and T denote the current and maximum number of iterations of the algorithm, respectively.
The exploration phase of the AOA focuses on random exploration over regions using two operators: the division operator and the multiplication operator. The development phase uses more concentrated addition and subtraction operators to explore several specified regions deeply to find an optimal solution. The location update equations of the two phases are expressed by Equations (2) and (4).
x i , j t + 1 = b e s t x j ÷ M O P + ε × V j    r 2 0.5 b e s t x j × M O P × V j    r 2 > 0.5
V j = U B j L B j × μ + L B j
x i , j t + 1 = b e s t x j M O P × V j    r 3 0.5 b e s t x j + M O P × V j    r 3 > 0.5
where V j is defined by Equation (3); x i , j t is the jth position of the ith solution in the current iteration;   b e s t ( x j ) is the jth position of the optimal solution in the current iteration; ε is defined as an integer; U B j and L B j denote the minimum and maximum values of the jth position, respectively; μ is a parameter that regulates the search phase of AOA, and it was set to 0.5 in [25]; M O P is the mathematical optimizer probability, which is an important coefficient affecting the position update, and it is given by Equation (5); and α is a sensitive parameter whose value is set to 5, and it defines the development accuracy of the iterative process of AOA.
M O P t = 1 t 1 / α T 1 / α

2.2. IAOA

Due to the advantages of having few parameters and a fast execution efficiency, the AOA has been widely used to solve many practical problems, such as engineering optimization and path planning. For instance, in [26], an improved adaptive arithmetic optimization algorithm using a dual-parallel communication technique was proposed and applied to solve the robot path planning problems. An improved arithmetic optimization approach for a mechanical engineering design was proposed in [27] and used with natural logarithms and exponential operators. In [28], an arithmetic optimization algorithm based on perturbations of primitive functions was proposed. By adding the perturbations produced by six primitive functions to each of the significant parameters, this algorithm can improve its performance in solving the economic load scheduling problem. Further, in [29], the authors proposed a method based on an evolutionary optimization algorithm and applied it to solve the multilevel thresholding problem, generating better solutions and segmented images.
The arithmetic optimization algorithm proposed in the literature has improved the solution accuracy and algorithm stability to a certain extent. However, the AOA can easily fall into a local optimum and slowly converge. This study proposes the IAOA based on two strategies to overcome these two drawbacks. In the IAOA, the perturbations generated by the elementary functions are added to M O A and M O P , respectively, and double adaptive weights are added to the position update formula. This enables the algorithm to perform an adequate global search, avoid falling into locally optimal solutions, and improve the convergence speed of AOA and the accuracy of the obtained solutions.

2.2.1. Elementary Function Perturbation

The AOA has two important factors, M O A and M O P , which greatly affect the exploration and development capability of the AOA. As the number of iterations increases, the original M O A increases, while the original M O P decreases. In this study, random perturbations generated by the primitive function are introduced to improve the two parameters. This can balance the exploration and exploitation performance of the algorithm, reduce the likelihood of the algorithm falling into a local optimum, and improve the convergence ability of the algorithm [28].
Further, the parameters M O P and M O A are multiplied by the coefficients g and h , respectively, to improve the parameters using the random fluctuations generated by the elementary function; the M O P and M O A are expressed by Equations (6) and (7), respectively.
M O P t = 1 t 1 α T 1 α × g
M O A t = m i n + m a x m i n × t 1 / 3 T 1 / 3 × h
g = m 1 × a c o s ( m 3 )
h = m 2 × a c o s ( m 3 )
The values of the coefficients g and h are calculated using Equations (8) and (9); m 1 and m 2 are both constant parameters, m 1 is set to 1.2, m 2 is set to 0.65, and m 3 is a random number between zero and one.

2.2.2. Double Adaptive Weighting Strategy

In the AOA, the globally explored and locally developed position update formulas are crucial in the search for an optimal solution. However, some solutions may fall into the local optimum because of the limited search area. In this study, a dual adaptive weighting strategy was introduced. The weight curve gradually reduces according to the level at which the algorithm falls into a local optimum [30]. Adaptive weight w 1 is used when the AOA performs division and subtraction operators, and adaptive weight w 2 is used when it performs multiplication and addition operators. This strategy avoids local optimal stagnation while improving the local search capability of IAOA and the accuracy of the solutions. The position update formulas for the two stages are given by Equations (10) and (11).
x i , j t + 1 = w 1 × b e s t x j ÷ M O P + ε × V j r 2 0.5 w 2 × b e s t x j × M O P × V j r 2 > 0.5
x i , j t + 1 = w 1 × b e s t x j M O P × V j r 3 0.5 w 2 × b e s t x j + M O P × V j r 3 > 0.5
w 1 = 1 t T 1 tan π × r a n d 0.5 × S T
w 2 = 2 2 t T 1 tan π × r a n d 0.5 × S T
The weight values w 1 and w 2 are given by Equations (12) and (13), where the current and maximum numbers of iterations are denoted by t and T , respectively; r a n d is a random number in the range between zero and one. The pseudo-code of the IAOA is shown in Algorithm 1.
Algorithm 1. Pseudo-code of the IAOA.
1: Initialization parameters and population location X i (i = 1,2...N)
2: While(t < T)
3: M O P t = 1 t 1 α T 1 α × g , M O A t = m i n + m a x m i n × t 1 / 3 T 1 / 3 × h
4: for i = 1 : N
5:  for j = 1 : N
6:   if r1 > MOA
7:    if r2 > 0.5 (exploration phase)
8:      x i , j t + 1 = w 1 × b e s t x j ÷ M O P + ε × V j
9:    else
10:      x i , j t + 1 = w 2 × b e s t x j × M O P × V j
11:    end if
12:    if r3 > 0.5 (development phase)
13:      x i , j t + 1 = w 1 × b e s t x j M O P × V j
14:    else
15:      x i , j t + 1 = w 2 × b e s t x j + M O P × V j
16:    end if
17:   end if
18:  end for
19: end for
20: end while
21: Return to the optimal solution
It shows how the IAOA finds an optimal solution.

2.3. Benchmark Function Comparison

To illustrate the performance of the IAOA better, 13 classical benchmark functions were used as evaluation criteria [31], where F1–F7 denote single-peaked functions and F8–F13 are multipeaked functions. Meanwhile, the original AOA [25] and several representative metaheuristic algorithms, including the multiverse algorithm (MVO) [32], the gravitational search algorithm (GSA) [33], the whale optimization algorithm (WOA) [34], the salp swarm algorithm (SSA) [35], the sine cosine algorithm (SCA) [36], the EAOA using only the primary function perturbation strategy, the DAOA using only the adaptive weighting strategy, and the pAOA [28], were compared with the IAOA. The performance results of the comparison algorithms were obtained from the studies of Hao et al. [28] and Zheng et al. [37]. In addition, the algorithm tests were performed in the same experimental environment. The maximum number of iterations, population size, and test dimension were set to 500, 30, and 30, respectively. By calculating the minimum, mean, and standard deviation values and executing each function 30 times independently, the randomness of the algorithm results was reduced. A lesser mean value and a lesser standard deviation value were associated with a better and steadier algorithm performance while solving the algorithm minimum problem. Thus, this study assessed the performance and stability of the algorithm based on the average value (AVE) and the standard deviation value (STD). The results are presented in Table 1 and Table 2, where the best results are presented in bold.
Because a single-peaked function only has a globally optimal solution, the development capability of optimization algorithms has usually been evaluated using the single-peaked functions F1–F7 [37]. They contain nice functions as well as malicious cases causing poor or slow convergence to a single global extremum [31]. As shown in Table 1, the IAOA achieved better results than the other metaheuristics; particularly, for the functions F1–F4, the mean and variance of the IAOA reached the global optimum, but the functions F6 and F7 did not reach the global optimum; this may be due to the large optimization interval of the functions, for which IAOA did not converge well in the early stage. However, the average values of functions F6 and F7 were improved compared to the original AOA. The mean values of four of the seven single-peaked test functions converge to zero, indicating that the IAOA converged to the global optimum in theory. Additionally, the variances were zero, indicating that the algorithm was highly stable. Compared with other optimization algorithms, the IAOA achieved a significant advantage in the development stage.
The exploratory power of the IAOA was evaluated using multipeaked functions F8–F13. The test functions contain a high number of locally optimal solutions, and the number of local optimal solutions increases exponentially as the number of dimensions in the problems increased. This adds difficulty to the solution. Therefore, they could provide reliable insights into the exploration ability of the IAOA. The AVE and STD of functions F9–F11 of the IAOA reached optimal values compared to the other algorithms. The test results of functions F8 and F13 of the IAOA were not the best compared to other algorithms; this may be due to the large exploration space of the functions, which our algorithm did not explore fully at a later stage. However, the mean values of these functions of the IAOA were better than those of the original AOA. The test results showed that the IAOA had a stronger exploration capability than the other algorithms.
To demonstrate the performance of IAOA more clearly, the convergence iteration curves of several test functions were chosen for comparison. To evaluate the general optimality of IAOA and enhance the persuasive power of data, the functions that did not reach optimal values were selected, including functions F6, F7, F8, and F12. Figure 1 shows that functions F6 and F7 did not fall into the original local optimum and converged to the global optimum after jumping out, while functions F8 and F12 rapidly converged to the optimal solution. The IAOA further improved the convergence speed and optimization capability compared to the original algorithm.

2.4. Wilcoxon Rank Sum Test

To assess the variability of the algorithm test results, this study performed a non-parametric Wilcoxon rank sum test [38], and the results are presented in Table 3. In the Wilcoxon test, the IAOA was used as a control algorithm. The obtained p-values were used to evaluate the test results; when p < 0.05 , there was a significant difference between the two algorithms. According to the results in Table 3, for all seven pairs of algorithm comparisons, the p-value was less than 0.05, indicating a significant difference between the IAOA and the other seven algorithms. This demonstrates that the proposed algorithm is highly competitive.

3. Construct DNA Storage Sets

Due to the diversity of DNA, nonspecific hybridization reactions may occur in DNA sequences. To avoid nonspecific hybridization reactions of DNA sequences during data storage, it is necessary to impose strict constraints on the DNA sequence design. Strict constraints are essential to construct high-quality DNA storage sets, which can enhance sequence robustness and reduce errors during DNA sequencing. The constraints used in sequence design are presented in the following text.

3.1. Double-Matching Constraint

To avoid undesired complementary reactions of DNA sequences in solution, a double-matching constraint is proposed in this paper. The simulation software NUPACK was used to design this constraint. NUPACK software is used by researchers in the life sciences to analyze and design nucleic acid structures. The DNA sequence is entered into NUPACK, and the status of the DNA sequence in solution is assessed by observing its change. In the NUPACK evaluation, ideally, DNA sequences should not react with each other or undergo their own base complementary pairing reactions, thus maintaining the maximum concentration in the solution. If the complementary base pairs in the solution react, the concentration of DNA sequences will be reduced, thus affecting the quality of the DNA storage sets [15]. The simulation evaluation result of sequences introduced into NUPACK is obtained by c = C o u t p u t / C i n p u t , where C i n p u t and C o u t p u t denote the DNA sequence concentrations before and after entering the solution, respectively. Thus, the DNA sequence quality can be evaluated based on the c-value; a large c-value indicates high quality.
When a DNA sequence is evaluated using NUPACK, a self-complementary reaction may occur when a DNA sequence is added to the solution, as shown in Figure 2. The sequence shown in Figure 2 was taken from the study of Chaves-González et al. [39], and it was obtained when a 1-μm sequence was fed to the NUPACK input. Figure 2a shows that there is a structural sequence A-A in the solution other than sequence A, and at this point, C o u t p u t = 0.37   μ m , C i n p u t = 1   μ m and c = 37 % . The concentration of sequence A in the solution is reduced, indicating that the quality of the sequence has decreased. Thus, the chance of errors in the reaction during DNA storage increases. The structure of sequence A-A is shown in Figure 2b, where it can be seen that the underlined six bases undergo complementary pairing reactions in the solution, forming a stable pairing structure. The pairing structure is not expected, and it makes the original sequence less concentrated, while the c-value decreases due to the presence of a stable and unavailable structure.
This paper proposes a double-matching constraint to reduce the generation of such unavailable structures, as shown in Figure 3. This constraint combines two consecutive bases and judges whether more than three of the combinations are complementary or identical base pairs. In the case where more than three combinations are perfectly complementary or identical, two different bases of one of the combinations are selected for the exchange. If the selected bases are complementary, the noncomplementary bases are selected for replacement. The results of the exchange are shown in Figure 4. After the double-matching constraint exchange has been completed, the sequence TCTGTACTGCTGACTCGGGC is obtained, and c = 100 % , as shown in Figure 4a. The indicator in the NUPACK shows that the concentration of sequence A is 1 μ m , and the concentration of sequence A-A is zero. The six bases in the sequence neither undergo complementary pairing reactions nor produce undesired pairing structures; thus, the sequence in the solution maintains its original state, which is the expected ideal state. Thus, the proposed constraint can effectively increase the concentration of sequence A involved in the reaction while reducing the error rate in the DNA sequence hybridization reaction [16]. The structure of sequence A is shown in Figure 4b, where the color of the paired bases changes; when the color tends toward the lower center of the right color bar, sequence A is likely to form an unstable available structure. The formula for selecting bases for exchange is given in Equation (14).
In Equation (14), x is a DNA sequence, n denotes the total number of bases in the sequence, x is a subsequence of x , and c o u n t is the number of subsequences identical or complementary to x , satisfying the condition x = ( x j , x j + 1 ) , j [ 1 , n 1 ] . The double-matching constraint is expressed as follows:
f d o u b l e x = f d o u b l e x c o u n t > 3 x    c o u n t 3

3.2. Error-Pairing Constraint

When a sequence is stored as a double strand, the A-T and G-C base pairs are connected by two and three hydrogen bonds, respectively, where the G-C base pairs are steadier than A-T base pairs [22]. The key to amplification is the 3′ end, whose pairing affects the enzyme extension and defines the specificity and efficiency of synthesis. The binding of the primer and template can be made more stable by using particular numbers of G and C bases. If the distribution of bases at the 3′ end is not reasonable, a mismatch situation may be caused. In the case of a mismatch, the synthesis of the strand can be triggered, and a nonideal amplification product can be obtained. In the primer design notes, it is stated that when the final base of the primer is A, strand synthesis can be initiated, even in the case of mismatches, but when it is T, the efficiency of mismatch initiation is significantly reduced [40].
To ensure the 3′ end of the sequence can be strictly paired and stabilized, this study introduces an error-pairing constraint to restrict the distribution of bases at the 3′ end. The proposed error-pairing constraint is shown in Figure 5. The error-pairing constraint in the DNA sequence amplification process indicates the possibility of mismatches at the 3′ end and the efficiency degree of mismatch initiation, which is expressed by M P L . The greater the value of MPL is, the higher the mismatch occurrence possibility and the mismatch initiation efficiency are. In sequence S , the rating number is one, two, or three when the last base is G (or C), T, or A, respectively. The error-pairing constraint is given in Equation (15).
S = S 1 S 2 S i 1 S i , S i = G / C M P L = 1 T M P L = 2 A M P L = 3

3.3. Hamming Distance Constraint

The Hamming distance constraint [41] of sequences x and y with a length of n satisfies the condition D x , y d , where D x , y represents the number of positions in sequence x that are different from the ith position in sequence y , i [ 1 , n ] . The Hamming distance ( D x , y ) is given by
D x , y = i = 1 n h x i , y i , h x j , y j = 0 , x i = y i 1 , x j y j

3.4. GC Content Constraint

GC content [42] represents the ratio of the number of bases C and G to the total number of bases in a DNA sequence. The GC content constraint is an indispensable DNA sequence that can directly influence the performance of DNA sequence and is generally set to approximately 50% to ensure robustness against errors. It is assumed that, in a DNA sequence, the total number of bases is n , the number of bases G is denoted by x , and the number of bases C is denoted by y . Then, the GC content represents the percentage of the ratio of the sum of x plus y to n. The GC content ( c ) of a sequence is given by
c = x + y n × 100 %

3.5. No-Runlength Constraint

The no-runlength constraint [5] requires DNA sequences to not contain consecutive repeating bases, and long runs of identical nucleotides can prompt errors in DNA coding. For instance, in the sequence TAAAACG, since base A is repeated consecutively, the repeating base TAAAACG could be misread as TAAACG or TAACG during sequencing, leading to the loss of DNA information. Meanwhile, contiguous bases may lead to decoding errors during the decoding process, resulting in uncontrollable hybridization reactions throughout the sequence. Therefore, the no-runlength constraint is used to prevent the occurrence of consecutive identical bases. The no-runlength constraint is given by
x i x i + 1 i 1 , n 1

3.6. DNA Storage Sets Constructed Using Traditional Combinatorial Constraints

In this study, the IAOA is used to construct DNA storage coding sets to improve the lower bound and quality of storage sets. The results of the entire simulation experiment are run on a desktop computer with an Intel Core i5 2.30-GHZ processor and 8 GB storage space, and MATLAB R2018b is used.
The specific steps are as follows:
Step 1: Initialize algorithm parameters, generate sets of candidate solutions satisfying the combinatorial constraints, and integrate them into the initial sequence sets;
Step 2: Generate parameters of adaptive weights and primitive function perturbations;
Step 3: Update the sequence candidate sets using the four operation operators of AOA;
Step 4: Update the candidate solution sets by performing the adaptive weight and elementary function perturbation strategies on the sequence candidate solution set;
Step 5: Add the sequences satisfying the combination constraint to the candidate sets;
Step 6: Judge whether the maximum iteration number is reached; if so, the candidate sets satisfying the combination constraint are retained and computed; otherwise, return to Step 3.
It is assumed that A G C , N L ( n , d ) denotes the sets of DNA sequences that meet the constraints of the GC content, Hamming distance, and no-runlength, where n and d denote the sequence length and Hamming distance, respectively. The IAOA results are compared with the results obtained by the Altruistic [43] and NOL-HHO [44] algorithms proposed by Limbachiya et al. and Yin et al., respectively. Table 4 compares the IAOA results with the lower bounds of the storage sets obtained by the two comparison algorithms, satisfying the conditions 4 n 10   and   3 d n ; the best results are presented in bold. As shown in Table 4, the number of DNA coding sets can be significantly increased using the IAOA. The lower bound of the coding sets obtained by the IAOA is 25–77.7% and 5.6–23.1% higher than those of the Altruistic and NOL-HHO algorithms, respectively, when the condition of n = 8 is satisfied.
In summary, by raising the lower bound of the DNA coding sets, the IAOA can ensure the storage of large amounts of data. In addition, using the IAOA, the coding rate is increased due to the increase in the number of coding sets. The coding rate [45] is defined as R = l o g 4 M / n , where n and M denote the codeword length and coding-set size, respectively. For instance, in [44], for n = 9   and   d = 4 , R = l o g 4 216 / 9 0.43 , and when n = 8   and   d = 4 , the coding rate obtained by the IAOA reaches 0.43, indicating that shorter sequences can achieve the same performance.

3.7. Encoding Sets Constructed Using Double-Matching and Error-Pairing Constraints

In this study, double-matching and error-pairing constraints were added to the traditional constraint combinations to obtain high-quality DNA storage sets. It is assumed that A G C , N L , D M ( n , d ) denotes the DNA coding sets, satisfying the constraints of the GC content, Hamming distance, no-runlength, and double-matching; then, the results of the lower bounds are presented as shown in Table 5. It is assumed that A G C , N L , E P ( n , d ) denotes the DNA coding sets, satisfying the constraints of the GC content, Hamming distance, no-runlength, and error-pairing; then, the results of lower bounds are as presented in Table 6. It is assumed that A G C , N L , D M , E P ( n , d ) denotes the DNA coding sets, satisfying the constraints of the GC content, Hamming distance, no-runlength, double-matching, and error-pairing; then, the results of lower bounds are as presented in Table 7.

3.8. Storage Set Quality Comparison

The melting temperature represents the temperature at which the DNA is changed from double-strand to single-strand [46]. It is an influential parameter in determining the reaction efficiency and a relatively stable melting temperature facilitates the reaction. The hairpin structure [47] is a secondary structure that is created by stacking the DNA sequence. If the hairpin structure is formed during storage, the physical structure of the sequence is unstable. The melting temperature of the DNA sequences was calculated using the Integrated DNA Technologies (IDT) platform, and then its variance and the hairpin structure were calculated by Equation (19).
f h a i r p i n X = r ( n 2 × p l e n ) i = p l e n + [ r 2 ] ( n p l e n [ r 2 ] ) h a i r p i n ( X , i )
where r and plen stand for the smallest subsequence lengths required to form, respectively, a hairpin ring and a hairpin stem. When a hairpin structure forms at the ith base of a sequence, the value of hairpin(X, i) is 1; otherwise it is 0, depending on whether the number of complementary bases in the stem of a hairpin is greater than half the length of the stem.
The variance of the melting temperature and the number of hairpin structures of A G C , N L ( n , d ) and A G C , N L , D M , E P ( n , d ) are compared. The comparison results show that the quality of the DNA sequence constructed under the double-matching and error-pairing constraints is improved.
Table 8 compares the melting temperature variance of A G C , N L ( n , d ) and A G C , N L , D M ( n , d ) . Table 9 compares the melting temperature variance of A G C , N L ( n , d ) and A G C , N L , E P ( n , d ) . Table 10 compares the melting temperature variance of A G C , N L ( n , d ) and A G C , N L , D M , E P ( n , d ) . Table 10 shows that the melting temperature variance of DNA sequences was significantly reduced after adding the double-matching and error-pairing constraints. For example, for n = 8 , 9 , and 10, the melting temperature variance of A G C , N L , D M , E P ( n , d ) reduced by 15.8–42.5%, 26.3–74.5%, and 9.7–84.1%, respectively, compared with that of A G C , N L ( n , d ) , demonstrating that the DNA sequences constructed using new constraints almost all have the same melting temperature.
The comparison results of the hairpin structure number and hairpin structure ratio (i.e., the ratio of the number of hairpin structures to the number of DNA sequences) of A G C , N L , D M ( n , d ) and A G C , N L , E P ( n , d ) are shown in Table 11 and Table 12, respectively. The comparison results of the hairpin structure number and hairpin structure ratio of A G C , N L ( n , d ) and A G C , N L , D M , E P ( n , d ) are shown in Table 13 and Table 14, respectively. Table 14 shows that adding the new constraints significantly reduces the number of hairpin structures in DNA sequences. For example, for n = 8 , 9 , and 10, the ratio of the number of hairpin structures to the number of DNA sequences of A G C , N L , D M , E P ( n , d ) reduced by 2.1–50%, 4.2–23.1%, and 6.4–80%, respectively, compared to that of A G C , N L ( n , d ) , demonstrating that the DNA sequences constructed using the proposed constraints can reduce the probability of hairpin structures occurring and enhance the stability of DNA sequences.
By evaluating the hairpin structure and melting temperature, it is evident that the physical and thermodynamic properties of the DNA storage sets using the double-matching and error-pairing constraints are more stable. In addition, sequences that have fewer hairpin structures can effectively avoid the occurrence of nonspecific hybridization reactions. Moreover, a stable melting temperature enhances the stability of storage in the DNA strand, which ensures a smooth hybridization reaction during DNA storage, improving the DNA sequence quality.

4. Conclusions

Aiming to decrease the occurrence of non-specific hybridization reactions during DNA storage and reduce the error rate of DNA storage, this paper proposed a method to improve the DNA coding set quality by introducing the double-matching and error-pairing constraints. DNA sequences may undergo complementary pairing reactions after entering the solution, thus reducing the concentration of DNA sequences and affecting the coding quality. First, a double-matching constraint was proposed to solve this problem. The comparative results of the NUPACK simulations demonstrate that this constraint can effectively increase the concentration of sequences. Further, the error-pairing constraint was proposed for the situation where the base distribution is not reasonable, thus causing mismatches, and the mismatch may trigger the synthesis of the strand and obtain nonideal amplification products. This constraint restricts the base distribution at the 3′ end and evaluates the mismatch level. In addition, this study proposed the IAOA, which adopts two main strategies, namely the elementary function random perturbation and the dual adaptive weighting strategy. To visualize the optimization performance of the IAOA, it was compared with seven other metaheuristics, including the AOA, using 13 different test functions to evaluate the IAOA. Based on the test results, the IAOA achieves the ideal value on almost all tested functions and theoretical optimal values on seven tested functions. The experimental results show that the IAOA has a more competitive performance than the other algorithms. Finally, this paper combined the IAOA with traditional constraints to construct DNA storage sets. Compared to previous studies, the lower limit of the DNA coding set obtained in this study was increased by 77.7%, indicating that the IAOA has powerful development and exploration capabilities to construct many DNA storage sets and increase the coding rate. To further test the validity of the proposed constraints and the quality of the code set, the melting temperature and hairpin structure number were evaluated and compared. The comparison results show that the melting temperature variance of the DNA sequence obtained using the new constraints was reduced by 9.7–84.1%, and the hairpin structure ratio was reduced by 2.1–80%. It was demonstrated that, compared to traditional constraints, the sequences obtained under the proposed constraints have superior physical and thermodynamic properties, maintaining a relatively stable state and reducing nonspecific hybridization.
This study introduced the double-matching and error-pairing constraints, which can effectively improve the performance of storage sets. However, as for the problem of the hairpin structure generation in DNA sequences, this problem can only be addressed to a certain extent by using the proposed constraints but cannot be completely solved. In [23], Li et al. proposed a repeat tandem sequence constraint and improved the DTW distance constraint. The repeat tandem sequence constraint was used to address the problem of the secondary structure arising from successively repeated occurrences of coding sequences, and the improved DTW distance constraint was used to address the problem of inaccurate assessment of the overall similarity between sequences obtained under the traditional distance constraint. Their proposed constraints mainly made restrictions and adjustments for a sequence as a whole, which had good advantages for constraining DNA sequences but could not restrict the local bases of DNA sequences and might not be as effective for short DNA sequences. In this paper, the proposed double-matching and error-pairing constraints are mainly used to avoid complementary reactions of sequences and restrict the bases at the 3′ ends of sequences. The focus is on solving the problem of local base appearance. This study compared the lower bound data from the coding set with the results presented in [23] and found that the results presented in [23] show a good advantage in terms of finding the lower bounds of the coding sets of long sequences. However, for the lower bounds of the coding sets of shorter sequences, the results presented in this study are better than the results in [23] and [45], and some of the data presented in the study conducted by Li et al. are inferior to those presented in [45]. Because the constraints proposed in this paper and those proposed by Li et al. [45] are different, the performance of the data in long and short sequences differs, which is also due to the different focus of algorithms, i.e., the IAOA proposed in this study and the ROEAO proposed by Li et al.
In future studies, the characteristic that the constraint in [23] has a better limiting effect on long sequences could be combined with the proposed constraints to compensate for the shortcomings of this study. In addition, the algorithm in [23] has a good global search performance, and this advantage could be used to obtain more optimal solutions. Both of the mentioned aspects are crucial for constructing a large number of high-quality coding sets. In addition, the other methods could be further explored to improve the encoding efficiency and save storage costs, in addition to constructing large codebooks.

Author Contributions

Conceptualization, H.D. and S.Z.; methodology, H.D., S.W. and S.Z.; software, H.D.; validation, H.D., S.W. and S.Z.; formal analysis, H.D.; investigation, H.D.; resources, H.D.; data curation, H.D.; writing—original draft preparation, H.D.; writing—review and editing, H.D., W.Y. and S.Z.; visualization, H.D. and S.Z.; supervision, H.D.; project administration, H.D., W.Y. and S.Z.; funding acquisition, S.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the 111 Project (No.D23006), the National Natural Science Foundation of China (Nos. 62272079, 61972266), the Liaoning Revitalization Talents Program (No. XLYC2008017), the Natural Science Foundation of Liaoning Province (Nos. 2021-MS-344, 2021-KF-11-03, 2022-KF-12-14), the Postgraduate Education Reform Project of Liaoning Province (No. LNYJG2022493), and the Dalian Outstanding Young Science and Technology Talent Support Program (No. 2022RJ08).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from UCI Machine Learning Repository. Restrictions apply to the availability of these data, which were used under license for this study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Dong, Y.; Sun, F.; Ping, Z.; Ouyang, Q.; Qian, L. DNA storage: Research landscape and future prospects. Natl. Sci. Rev. 2020, 7, 1092–1107. [Google Scholar] [CrossRef] [PubMed]
  2. Ceze, L.; Nivala, J.; Strauss, K. Molecular digital data storage using DNA. Nat. Rev. Genet. 2019, 20, 456–466. [Google Scholar] [CrossRef] [PubMed]
  3. Wilkins, M.H.F.; STOKES, A.R.; Wilson, H.R. Molecular structure of deoxypentose nucleic acids. Nature 1953, 171, 738–740. [Google Scholar] [CrossRef] [PubMed]
  4. Ping, Z.; Ma, D.; Huang, X.; Chen, S.; Liu, L.; Guo, F.; Zhu, S.J.; Shen, Y. Carbon-based archiving: Current progress and future prospects of DNA-based data storage. GigaScience 2019, 8, giz075. [Google Scholar] [CrossRef]
  5. Erlich, Y.; Zielinski, D. DNA Fountain enables a robust and efficient storage architecture. Science 2017, 355, 950–954. [Google Scholar] [CrossRef]
  6. Church, G.M.; Gao, Y.; Kosuri, S. Next-generation digital information storage in DNA. Science 2012, 337, 1628. [Google Scholar] [CrossRef]
  7. Goldman, N.; Bertone, P.; Chen, S.; Dessimoz, C.; LeProust, E.M.; Sipos, B.; Birney, E. Towards practical, high-capacity, low-maintenance information storage in synthesized DNA. Nature 2013, 494, 77–80. [Google Scholar] [CrossRef]
  8. Tabatabaei Yazdi, S.; Yuan, Y.; Ma, J.; Zhao, H.; Milenkovic, O. A rewritable, random-access DNA-based storage system. Sci. Rep. 2015, 5, 1–10. [Google Scholar] [CrossRef]
  9. Hoshika, S.; Leal, N.A.; Kim, M.-J.; Kim, M.-S.; Karalkar, N.B.; Kim, H.-J.; Bates, A.M.; Watkins, N.E., Jr.; SantaLucia, H.A.; Meyer, A.J. Hachimoji DNA and RNA: A genetic system with eight building blocks. Science 2019, 363, 884–887. [Google Scholar] [CrossRef]
  10. Ping, Z.; Chen, S.; Zhou, G.; Huang, X.; Zhu, S.J.; Zhang, H.; Lee, H.H.; Lan, Z.; Cui, J.; Chen, T. Towards practical and robust DNA-based data archiving using the yin–yang codec system. Nat. Comput. Sci. 2022, 2, 234–242. [Google Scholar] [CrossRef]
  11. Choi, Y.; Ryu, T.; Lee, A.C.; Choi, H.; Lee, H.; Park, J.; Song, S.-H.; Kim, S.; Kim, H.; Park, W. High information capacity DNA-based data storage with augmented encoding characters using degenerate bases. Sci. Rep. 2019, 9, 6582. [Google Scholar] [CrossRef] [PubMed]
  12. Anavy, L.; Vaknin, I.; Atar, O.; Amit, R.; Yakhini, Z. Data storage in DNA with fewer synthesis cycles using composite DNA letters. Nat. Biotechnol. 2019, 37, 1229–1236. [Google Scholar] [CrossRef] [PubMed]
  13. Zhang, Y.; Kong, L.; Wang, F.; Li, B.; Ma, C.; Chen, D.; Liu, K.; Fan, C.; Zhang, H. Information stored in nanoscale: Encoding data in a single DNA strand with Base64. Nano Today 2020, 33, 100871. [Google Scholar] [CrossRef]
  14. Ping, Z.; Zhang, H.; Chen, S.; Zhuang, Q.; Zhu, S.J.; Shen, Y. Chamaeleo: A robust library for DNA storage coding schemes. bioRxiv 2020, 2020, 892588. [Google Scholar]
  15. Cao, B.; Li, X.; Zhang, X.; Wang, B.; Zhang, Q.; Wei, X. Designing uncorrelated address constrain for DNA storage by DMVO algorithm. IEEE/ACM Trans. Comput. Biol. Bioinform. 2020, 19, 866–877. [Google Scholar] [CrossRef] [PubMed]
  16. Li, X.; Wang, B.; Lv, H.; Yin, Q.; Zhang, Q.; Wei, X. Constraining DNA Sequences with a Triplet-Bases Unpaired. IEEE Trans. Nanobiosci. 2020, 19, 299–307. [Google Scholar] [CrossRef] [PubMed]
  17. Shomorony, I.; Heckel, R. DNA-Based Storage: Models and Fundamental Limits. IEEE Trans. Inf. Theory 2021, 67, 3675–3689. [Google Scholar] [CrossRef]
  18. Li, M.; Wu, J.; Dai, J.; Jiang, Q.; Qu, Q.; Huang, X.; Wang, Y. A self-contained and self-explanatory DNA storage system. Sci. Rep. 2021, 11, 1–15. [Google Scholar] [CrossRef]
  19. Schwarz, P.M.; Freisleben, B. NOREC4DNA: Using near-optimal rateless erasure codes for DNA storage. BMC Bioinform. 2021, 22, 406. [Google Scholar] [CrossRef]
  20. Park, S.-J.; Lee, Y.; No, J.-S. Iterative DNA Coding Scheme with GC Balance and Run-Length Constraints Using a Greedy Algorithm. arXiv 2021, preprint. arXiv:2103.03540. [Google Scholar]
  21. Zheng, Y.; Wu, J.; Wang, B. CLGBO: An algorithm for constructing highly robust coding sets for DNA storage. Front. Genet. 2021, 12, 644945. [Google Scholar] [CrossRef] [PubMed]
  22. Wu, J.; Zheng, Y.; Wang, B.; Zhang, Q. Enhancing Physical and Thermodynamic Properties of DNA Storage Sets with End-Constraint. IEEE Trans. NanoBiosci. 2021, 21, 184–193. [Google Scholar] [CrossRef] [PubMed]
  23. Li, X.; Zhou, S.; Zou, L. Design of DNA Storage Coding with Enhanced Constraints. Entropy 2022, 24, 1151. [Google Scholar] [CrossRef] [PubMed]
  24. Ren, Y.; Zhang, Y.; Liu, Y.; Wu, Q.; Su, J.; Wang, F.; Chen, D.; Fan, C.; Liu, K.; Zhang, H. DNA-Based Concatenated Encoding System for High-Reliability and High-Density Data Storage. Small Methods 2022, 6, 2101335. [Google Scholar] [CrossRef] [PubMed]
  25. Abualigah, L.; Diabat, A.; Mirjalili, S.; Abd Elaziz, M.; Gandomi, A.H. The arithmetic optimization algorithm. Comput. Methods Appl. Mech. Eng. 2021, 376, 113609. [Google Scholar] [CrossRef]
  26. Wang, R.-B.; Wang, W.-F.; Xu, L.; Pan, J.-S.; Chu, S.-C. An adaptive parallel arithmetic optimization algorithm for robot path planning. J. Adv. Transp. 2021, 2021, 3606895. [Google Scholar] [CrossRef]
  27. Agushaka, J.O.; Ezugwu, A.E. Advanced arithmetic optimization algorithm for solving mechanical engineering design problems. PLoS ONE 2021, 16, e0255703. [Google Scholar] [CrossRef]
  28. Hao, W.-K.; Wang, J.-S.; Li, X.-D.; Wang, M.; Zhang, M. Arithmetic optimization algorithm based on elementary function disturbance for solving economic load dispatch problem in power system. Appl. Intell. 2022, 52, 11846–11872. [Google Scholar] [CrossRef]
  29. Abualigah, L.; Diabat, A.; Sumari, P.; Gandomi, A.H. A novel evolutionary arithmetic optimization algorithm for multilevel thresholding segmentation of COVID-19 ct images. Processes 2021, 9, 1155. [Google Scholar] [CrossRef]
  30. Shan, W.; Qiao, Z.; Heidari, A.A.; Chen, H.; Turabieh, H.; Teng, Y. Double adaptive weights for stabilization of moth flame optimizer: Balance analysis, engineering cases, and medical diagnosis. Knowl. Based Syst. 2021, 214, 106728. [Google Scholar] [CrossRef]
  31. Molga, M.; Smutnicki, C. Test functions for optimization needs. Test Funct. Optim. Needs 2005, 101, 48. [Google Scholar]
  32. Mirjalili, S.; Mirjalili, S.M.; Hatamlou, A. Multi-verse optimizer: A nature-inspired algorithm for global optimization. Neural Comput. Appl. 2016, 27, 495–513. [Google Scholar] [CrossRef]
  33. Rashedi, E.; Nezamabadi-Pour, H.; Saryazdi, S. GSA: A gravitational search algorithm. Inf. Sci. 2009, 179, 2232–2248. [Google Scholar] [CrossRef]
  34. Mirjalili, S.; Lewis, A. The Whale Optimization Algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  35. Mirjalili, S.; Gandomi, A.H.; Mirjalili, S.Z.; Saremi, S.; Faris, H.; Mirjalili, S.M. Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 2017, 114, 163–191. [Google Scholar] [CrossRef]
  36. Mirjalili, S. SCA: A sine cosine algorithm for solving optimization problems. Knowl. Based Syst. 2016, 96, 120–133. [Google Scholar] [CrossRef]
  37. Zheng, R.; Jia, H.; Abualigah, L.; Liu, Q.; Wang, S. Deep ensemble of slime mold algorithm and arithmetic optimization algorithm for global optimization. Processes 2021, 9, 1774. [Google Scholar] [CrossRef]
  38. Derrac, J.; García, S.; Molina, D.; Herrera, F. A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol. Comput. 2011, 1, 3–18. [Google Scholar] [CrossRef]
  39. Chaves-González, J.M.; Martínez-Gil, J. An efficient design for a multi-objective evolutionary algorithm to generate DNA libraries suitable for computation. Interdiscip. Sci. Comput. Life Sci. 2019, 11, 542–558. [Google Scholar] [CrossRef]
  40. Kwok, S.; Kellogg, D.; McKinney, N.; Spasic, D.; Goda, L.; Levenson, C.; Sninsky, J. Effects of primer-template mismatches on the polymerase chain reaction: Human immunodeficiency virus type 1 model studies. Nucleic Acids Res. 1990, 18, 999–1005. [Google Scholar] [CrossRef]
  41. Aboluion, N.; Smith, D.H.; Perkins, S. Linear and nonlinear constructions of DNA codes with Hamming distance d, constant GC-content and a reverse-complement constraint. Discret. Math. 2012, 312, 1062–1075. [Google Scholar] [CrossRef]
  42. Wang, B.; Zhang, Q.; Wei, X. Tabu variable neighborhood search for designing DNA barcodes. IEEE Trans. NanoBiosci. 2019, 19, 127–131. [Google Scholar] [CrossRef] [PubMed]
  43. Limbachiya, D.; Gupta, M.K.; Aggarwal, V. Family of constrained codes for archival DNA data storage. IEEE Commun. Lett. 2018, 22, 1972–1975. [Google Scholar] [CrossRef]
  44. Yin, Q.; Cao, B.; Li, X.; Wang, B.; Zhang, Q.; Wei, X. An intelligent optimization algorithm for constructing a DNA storage code: NOL-HHO. Int. J. Mol. Sci. 2020, 21, 2191. [Google Scholar] [CrossRef] [PubMed]
  45. Xiaoru, L.; Ling, G. Combinatorial constraint coding based on the EORS algorithm in DNA storage. PLoS ONE 2021, 16, e0255376. [Google Scholar] [CrossRef] [PubMed]
  46. Sager, J.; Stefanovic, D. Designing nucleotide sequences for computation: A survey of constraints. Lect. Notes Comput. Sci. 2006, 3892, 275–289. [Google Scholar]
  47. Yang, G.; Wang, B.; Zheng, X.; Zhou, C.; Zhang, Q. IWO algorithm based on niche crowding for DNA sequence design. Interdiscip. Sci. Comput. Life Sci. 2017, 9, 341–349. [Google Scholar] [CrossRef]
Figure 1. Convergence curves of functions F6, F7, F8, and F12. The blue and red curves represent the convergence curves of the AOA and IAOA, respectively; the horizontal axis denotes the number of iterations, where the maximum number of iterations is 500; the vertical axis presents the optimal value of the objective function.
Figure 1. Convergence curves of functions F6, F7, F8, and F12. The blue and red curves represent the convergence curves of the AOA and IAOA, respectively; the horizontal axis denotes the number of iterations, where the maximum number of iterations is 500; the vertical axis presents the optimal value of the objective function.
Cimb 45 00233 g001
Figure 2. Analysis results of sequence TCTGTACTGCTGACTCGAGT. (a) Sequence species and concentration after the sequence enters the solution; sequences A and A-A obtained by the complementary pairing reaction after the analyzed sequence enters the solution; (b) the secondary structure diagram of sequence A-A.
Figure 2. Analysis results of sequence TCTGTACTGCTGACTCGAGT. (a) Sequence species and concentration after the sequence enters the solution; sequences A and A-A obtained by the complementary pairing reaction after the analyzed sequence enters the solution; (b) the secondary structure diagram of sequence A-A.
Cimb 45 00233 g002
Figure 3. Double-matching constraint. The bases are connected according to the 5′ -> 3′ end arrangement. The first line of data in the figure denotes sequence x with a base number n ; two consecutive bases are a combination, divided into n / 2 base combinations, such as ( x 1 , x 2 ) , assuming that ( x 1 , x 2 ) is the original base combination and looking for the base combination associated with it in the sequence. The second row of data indicates the relationships between the current base combination and ( x 1 , x 2 ) ; “identical” means the two combinations are identical, and “complementary” means the two combinations are complementary. The third row of data denotes the number of combinations in the sequence that are identical or complementary to ( x 1 , x 2 ) , that is, the c o u n t in Equation (14). There are four combinations that are related, including the combination ( x 1 , x 2 ) . Therefore, the bases of one of the combinations ( x 3 , x 4 ) , ( x j , x j + 1 ) , and ( x n 1 , x n ) are selected for replacement, and then it is re-judged c o u n t > 3 ; if so, then the base replacement continues; otherwise, the next base combination is selected as the original base combination, scanning continues, and the above steps are repeated.
Figure 3. Double-matching constraint. The bases are connected according to the 5′ -> 3′ end arrangement. The first line of data in the figure denotes sequence x with a base number n ; two consecutive bases are a combination, divided into n / 2 base combinations, such as ( x 1 , x 2 ) , assuming that ( x 1 , x 2 ) is the original base combination and looking for the base combination associated with it in the sequence. The second row of data indicates the relationships between the current base combination and ( x 1 , x 2 ) ; “identical” means the two combinations are identical, and “complementary” means the two combinations are complementary. The third row of data denotes the number of combinations in the sequence that are identical or complementary to ( x 1 , x 2 ) , that is, the c o u n t in Equation (14). There are four combinations that are related, including the combination ( x 1 , x 2 ) . Therefore, the bases of one of the combinations ( x 3 , x 4 ) , ( x j , x j + 1 ) , and ( x n 1 , x n ) are selected for replacement, and then it is re-judged c o u n t > 3 ; if so, then the base replacement continues; otherwise, the next base combination is selected as the original base combination, scanning continues, and the above steps are repeated.
Cimb 45 00233 g003
Figure 4. Analysis of the sequence TCTGTACTGCTGACTCGGGC. (a) Sequence species and concentration present after the sequence enters the solution, including sequence A and sequence A-A obtained by the complementary pairing reaction after it enters the solution; (b) shows the secondary structure diagram of sequence A.
Figure 4. Analysis of the sequence TCTGTACTGCTGACTCGGGC. (a) Sequence species and concentration present after the sequence enters the solution, including sequence A and sequence A-A obtained by the complementary pairing reaction after it enters the solution; (b) shows the secondary structure diagram of sequence A.
Cimb 45 00233 g004
Figure 5. Error-pairing constraint. The figure shows sequence S   of   i   bases , where the bases are connected according to the 5′ -> 3′ end arrangement, and this constraint is mainly enforced by judging the last base  S i . When S i is base G or C, the mismatch level ( M P L ) is set to one; when S i is base T, the M P L is set to two; and finally, when S i is base A, the M P L is set to three.
Figure 5. Error-pairing constraint. The figure shows sequence S   of   i   bases , where the bases are connected according to the 5′ -> 3′ end arrangement, and this constraint is mainly enforced by judging the last base  S i . When S i is base G or C, the mismatch level ( M P L ) is set to one; when S i is base T, the M P L is set to two; and finally, when S i is base A, the M P L is set to three.
Cimb 45 00233 g005
Table 1. Results of the single-peak function test with 30 dimensions.
Table 1. Results of the single-peak function test with 30 dimensions.
IDMetricIAOAEAOADAOApAOAAOASCASSAWOAGSAMVO
F1AVG08.06 × 10−607.17 × 10−78.65 × 10−267.67761.58 × 10−71.41 × 10−302.53 × 10−161.34 × 100
STD02.88 × 10−501.87 × 10−64.74 × 10−2512.30191.71 × 10−74.91 × 10−309.67 × 10−175.38 × 10−1
F2AVG09.93 × 10−9807.74 × 10−70 00.018062.662931.06 × 10−210.0556552.20 × 100
STD05.44 × 10−9704.24 × 10−69 00.024571.668022.39 × 10−210.1940747.31 × 100
F3AVG00.00225700.002124 0.0080149961.4531709.945.39 × 10−7896.53472.04 × 102
STD00.00229100.00177 0.011926699.97911242.32.93 × 10−6318.95596.63 × 101
F4AVG00.01230900.008175 0.0266736.794111.67410.0725817.354872.16 × 100
STD00.00438600.003422 0.0202113.14144.17920.397471.7414528.66 × 10−1
F5AVG27.704128.590928.086328.5339 28.394627188.68296.12527.865582.84 × 1017.89 × 102
STD0.279020.296150.342320.135850.330172171.04508.8630.7636262.00 × 10−18.74 × 102
F6AVG1.9372.41264.86771.5769 3.231621.9981.80 × 10−73.1162662.50 × 10−161.34 × 100
STD0.381530.444940.505840.2591 0.245527.83523.00 × 10−70.5324291.74 × 10−163.43 × 10−1
F7AVG5.42 × 10−56.25 × 10−57.40 × 10−54.51 × 10−55.45 × 10−50.084580.17570.0014250.0894413.21 × 10−2
STD7.85 × 10−58.45 × 10−58.20 × 10−53.70 × 10−55.15 × 10−50.097980.06290.0011490.043391.32 × 10−2
Table 2. Results of the multipeak function test with 30 dimensions.
Table 2. Results of the multipeak function test with 30 dimensions.
IDMetricIAOAEAOADAOApAOAAOASCASSAWOAGSAMVO
F8AVG−6717.1783−6021.7325−4156.4559−6953.88 −5395.427 −3771.665 −7455.8 −5080.76 −2821.07−7550
STD580.0765698.8845599.9788424.3747 436.8011293.4553772.811695.7968493.03756.27 × 102
F9AVG0000041.651958.3708025.968411.20 × 102
STD0000044.331220.01607.4700683.29 × 101
F10AVG8.88 × 10−168.88 × 10−168.88 × 10−168.88 × 10−168.88 × 10−1614.28572.67967.40430.0620872.03 × 100
STD000008.59290.82759.8975720.236285.47 × 10−1
F11AVG00.00406301.31 × 10−5 0.16890.86650.0160.00028927.701548.60 × 10−1
STD00.00962808.60 × 10−6 0.13470.39570.01120.0015865.0403438.21 × 10−2
F12AVG0.204330.50040.700280.2241 0.5195183961.26.99150.3396761.7996172.43 × 100
STD0.0341990.0438320.0667110.0416 0.04741841708.74.41750.2148640.951141.39 × 100
F13AVG2.26632.72692.76432.7669 2.8475109173.315.87571.8890158.8990841.96 × 10−1
STD0.246110.301810.2987240.1274 0.07852266184.216.14620.2660887.1262411.26 × 10−1
Table 3. Wilcoxon statistical test result.
Table 3. Wilcoxon statistical test result.
Comparisonp-Value
IAOA-AOA0.005847
IAOA-pAOA0.028056
IAOA-SCA0.001474
IAOA-SSA0.039243
IAOA-WOA0.026231
IAOA-GSA0.009633
IAOA-MVO0.008775
Table 4. Lower bounds of A G C , N L ( n , d ) , where the best results are bolded to indicate.
Table 4. Lower bounds of A G C , N L ( n , d ) , where the best results are bolded to indicate.
n\d 3456789
Altruistic11
4NOL-HHO12
IAOA12
Altruistic177
5NOL-HHO208
IAOA208
Altruistic44166
6NOL-HHO55238
IAOA61248
Altruistic11036114
7NOL-HHO12142147
IAOA13646167
Altruistic289862994
8NOL-HHO33910835135
IAOA37311439165
Altruistic662199591584
9NOL-HHO7052166922114
IAOA7892317127115
Altruistic181052514143754
10NOL-HHO1796546148 51 20 9 4
IAOA19455491565622105
Table 5. Lower bounds for A G C , N L , D M ( n , d ) .
Table 5. Lower bounds for A G C , N L , D M ( n , d ) .
n\d3456789
412
5208
658228
712542176
83229629135
9587194501896
101206398117461684
Table 6. Lower bounds for A G C , N L , E P ( n , d ) .
Table 6. Lower bounds for A G C , N L , E P ( n , d ) .
n\d3456789
412
5208
660238
712643186
833811933145
95982015821117
101391408126491884
Table 7. Lower bounds for A G C , N L , D M , E P ( n , d ) .
Table 7. Lower bounds for A G C , N L , D M , E P ( n , d ) .
n\d3456789
412
5208
645177
712442156
82457928115
9577178541994
101073374110391584
Table 8. Comparison results of the melting temperature variance, where the best results are bolded to indicate.
Table 8. Comparison results of the melting temperature variance, where the best results are bolded to indicate.
n\d 3456789
8 A G C , N L 3.55384.04776.09295.47604.6825
A G C , N L , D M 3.09683.31645.38735.14294.3069
9 A G C , N L 3.35852.60205.66884.61724.51964.8333
A G C , N L , D M 2.79692.50614.35124.10704.29804.7471
10 A G C , N L 6.89842.92663.38433.24264.32862.62573.0167
A G C , N L , D M 5.92912.76992.74842.84923.26022.55962.8941
Table 9. Comparison results of the melting temperature variance, where the best results are bolded to indicate.
Table 9. Comparison results of the melting temperature variance, where the best results are bolded to indicate.
n\d 3456789
8 A G C , N L 3.55384.04776.09295.47604.6825
A G C , N L , E P 3.07753.26025.19594.76333.9234
9 A G C , N L 3.35852.60205.66884.61724.51964.8333
A G C , N L , E P 2.75021.96504.06183.63143.93914.0712
10 A G C , N L 6.89842.92663.38433.24264.32862.62573.0167
A G C , N L , E P 5.19162.74842.47912.75023.37562.38922.8166
Table 10. Comparison results of the melting temperature variance, where the best results are bolded to indicate.
Table 10. Comparison results of the melting temperature variance, where the best results are bolded to indicate.
n\d 3456789
8 A G C , N L 3.55384.04776.09295.47604.6825
A G C , N L , D M , E P 2.64993.49634.74984.48453.2870
9 A G C , N L 3.35852.60205.66884.61724.51964.8333
A G C , N L , D M , E P 2.50671.49093.91423.19423.50793.8270
10 A G C , N L 6.89842.92663.38433.24264.32862.62573.0167
A G C , N L , D M , E P 4.00362.25101.83842.50983.00632.27952.7492
Table 11. Comparison results for the hairpin structure number.
Table 11. Comparison results for the hairpin structure number.
n\d 3456789
8 A G C , N L , D M 134381452
A G C , N L , E P 141481662
9 A G C , N L , D M 7512516825137
A G C , N L , E P 7762588129168
10 A G C , N L , D M 33521064335128461918
A G C , N L , E P 3832108936713757208
Table 12. Comparison results for the hairpin structure ratio.
Table 12. Comparison results for the hairpin structure ratio.
n\d 3456789
8 A G C , N L , D M 0.41620.39580.48280.38460.4
A G C , N L , E P 0.41720.40340.48480.42860.4
9 A G C , N L , D M 1.27941.29381.361.38891.44441.1667
A G C , N L , E P 1.29771.28351.39661.38101.45451.1429
10 A G C , N L , D M 2.77942.67342.86322.78262.8752.3752.25
A G C , N L , E P 2.75492.66912.91272.79593.16672.52.75
Table 13. Comparison results for the hairpin structure number, where the best results are bolded to indicate.
Table 13. Comparison results for the hairpin structure number, where the best results are bolded to indicate.
n\d 3456789
8 A G C , N L 156471983
A G C , N L , D M , E P 127371542
9 A G C , N L 102430810038176
A G C , N L , D M , E P 6832227324124
10 A G C , N L 54121482460158762518
A G C , N L , D M , E P 2815103332712540178
Table 14. Comparison results for the hairpin structure ratio, where the best results are bolded to indicate.
Table 14. Comparison results for the hairpin structure ratio, where the best results are bolded to indicate.
n\d 3456789
8 A G C , N L 0.41820.41230.48720.50.6
A G C , N L , D M , E P 0.40970.38950.46880.36360.4
9 A G C , N L 1.29781.33331.40851.40741.54551.2
A G C , N L , D M , E P 1.18371.24721.35191.14291.33331
10 A G C , N L 2.78252.69952.94872.82143.45452.53.6
A G C , N L , D M , E P 2.35762.46542.77122.77782.52.1252
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Du, H.; Zhou, S.; Yan, W.; Wang, S. Study on DNA Storage Encoding Based IAOA under Innovation Constraints. Curr. Issues Mol. Biol. 2023, 45, 3573-3590. https://doi.org/10.3390/cimb45040233

AMA Style

Du H, Zhou S, Yan W, Wang S. Study on DNA Storage Encoding Based IAOA under Innovation Constraints. Current Issues in Molecular Biology. 2023; 45(4):3573-3590. https://doi.org/10.3390/cimb45040233

Chicago/Turabian Style

Du, Haigui, Shihua Zhou, WeiQi Yan, and Sijie Wang. 2023. "Study on DNA Storage Encoding Based IAOA under Innovation Constraints" Current Issues in Molecular Biology 45, no. 4: 3573-3590. https://doi.org/10.3390/cimb45040233

APA Style

Du, H., Zhou, S., Yan, W., & Wang, S. (2023). Study on DNA Storage Encoding Based IAOA under Innovation Constraints. Current Issues in Molecular Biology, 45(4), 3573-3590. https://doi.org/10.3390/cimb45040233

Article Metrics

Back to TopTop