Pseudo DNA Sequence Generation of Non-Coding Distributions Using Variant Maps on Cellular Automata

Abstract

In a recent decade, many DNA sequencing projects are developed on cells, plants and animals over the world into huge DNA databases. Researchers notice that mammalian genomes encoding thousands of large noncoding RNAs (lncRNAs), interact with chromatin regulatory complexes, and are thought to play a role in localizing these complexes to target loci across the genome. It is a challenge target using higher dimensional tools to organize various complex interactive properties as visual maps. In this paper, a Pseudo DNA Variant MapPDVM is proposed following Cellular Automata to represent multiple maps that use four Meta symbols as well as DNA or RNA representations. The system architecture of key components and the core mechanism on the PDVM are described. Key modules, equations and their I/O parameters are discussed. Applying the PDVM, two sets of real DNA sequences from both the sample human (noncoding DNA) and corn (coding DNA) genomes are collected in comparison with two sets of pseudo DNA sequences generated by a stream cipher HC-256 under different modes to show their intrinsic properties in higher levels of similar relationships among relevant DNA sequences on 2D maps. Sample 2D maps are listed and their characteristics are illustrated under a controllable environment. Various distributions can be observed on both noncoding and coding conditions from their symmetric properties on 2D maps.

Share and Cite:

J. Zheng, J. Luo and W. Zhou, "Pseudo DNA Sequence Generation of Non-Coding Distributions Using Variant Maps on Cellular Automata," Applied Mathematics, Vol. 5 No. 1, 2014, pp. 153-174. doi: 10.4236/am.2014.51018.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] M. Santha and U. V. Vazirani, “Generating Quasi-Random Sequences from Slightly Random Sources,” Journal of Computer and System Sciences, Vol. 33, No. 1, 1986, pp. 75-87.
http://dx.doi.org/10.1016/0022-0000(86)90044-9
[2] G. B. Agnew, “Random Source for Cryptographic Systems,” Advanced in Cryptology—EUROCRYPT’87 Proceedings, SpringerVerlag, Berlin, 1988, pp. 77-81.
[3] M. Schooniger and A. von Haeseler, “Simulating Efficiently the Evolution of DNA Sequences,” Bioinformatics, Vol. 11, No. 1, 1995, pp. 111-115. http://dx.doi.org/10.1093/bioinformatics/11.1.111
[4] A. Gehani, T. LaBean and J. Reif, “DNA-Based Cryptography,” DIMACS Series in Discrete Mathematica and Theoretical Computer Science, Vol. 54, 2000, pp. 233-249.
http://www.cs.duke.edu/~reif/paper/DNAcrypt/DNA5.DNAcrypt.pdf
[5] eSTREAM Project, 2012. http://en.wikipedia.org/wiki/ESTREAM
[6] H. J. Wu, “Stream Cipher HC-256,” ESTREAM, 2004.
http://www.ecrypt.eu.org/stream/p3ciphers/hc/hc256_p3.pdf
[7] F. Piva and G. Principato, “RANDNA: A Random DNA Sequence Generator,” Silico Biology, Vol. 6, 0024, 2006.
http://www.bioinfo.de/isb/2006060024/
[8] E. Lieberman-Aiden, et al., “Comprehensive Mapping of Long-Range Interactions Reveals Folding Principles of the Human Genome,” Science, Vol. 326, No. 5950, 2009, pp. 289-293. http://dx.doi.org/10.1126/science.1181369
[9] A. Arneodo, C. Vaillant, B. Audit, F. Argoul. Y. d’Aubenton-Carafa and C. Thermes, “Multi-Scale Coding of Genomic Information: From DNA Sequence to Genome Structure and Function,” Physics Reports, Vol. 498, No. 2-3, 2011, pp. 45-188.
http://dx.doi.org/10.1016/j.physrep.2010.10.001
[10] S. Engela, A. Alemany, N. Forns, P. Maass and F. Ritort, “Folding and Unfolding of a Triple-Branch DNA Molecule with Four Conformational States,” Philosophical Magazine, Vol. 91, No. 13-15, 2011, pp. 2049-2065.
http://dx.doi.org/10.1080/14786435.2011.557671
[11] H. Y. Zhang and X. Y. Liu. “A CLIQUE Algorithm Using DNA Computing Techniques Based on Closed-Circle DNA Sequences,” Biosystems, Vol. 105, No. 1, 2011, pp. 73-82.
http://dx.doi.org/10.1016/j.biosystems.2011.03.004
[12] B. Banfai, H. Jia, J. Khatun, et al., “Long Noncoding RNAs Are Rarely Translated in Two Human Cell Lines,” Genome Research, Vol. 22, 2012, pp. 1646-1657. http://dx.doi.org/10.1101/gr.134767.111
[13] M. B. Gerstein, A. Kundaje, M. Hariharan, et al., “Architecture of the Human Regulatory Network Derived from ENCODE Data,” Nature, Vol. 489, No. 7414, 2012, pp. 91-100.
http://dx.doi.org/10.1038/nature11245
[14] B. E. Bernstein, E. Birney, I. Dunham, et al., “An Integrated Encyclopedia of DNA,” Nature, Vol. 489, No. 7414, 2012, pp. 57-74. http://dx.doi.org/10.1038/nature11247
[15] E. Pennisi, “Genomics. ENCODE Project Writes Eulogy for Junk DNA,” Science, Vol. 337, No. 6099, 2012, pp. 1159-1161.
http://dx.doi.org/10.1126/science.337.6099.1159
[16] W. F. Doolittle, “Is Junk DNA bunk? A Critique of ENCODE,” Proceedings of the National Academy of Sciences of the United States of America, Vol. 110, 2013, pp. 5294-5300.
[17] J. M. Engreitz, A. Pandya-Jones, P. McDonel, et al., “Large Noncoding RNAs can Localize to Regulatory DNA Targets by Exploriting the 3D Architecture of the Genome,” Cold Spring Harbor Laboratory Press, Proceedings of The Biology of Genomes, 2013, p. 122.
[18] J. S. Wang and M. Yan, “Numerical Methods in Bioinformatics,” Science Press, Beijing, 2013.
[19] C. M. Gearheart, B. Arazi and E. C. Rouchka, “DNA-Based Random Number Generation in Security Circuitry,” Biosystems, Vol. 100, No. 3, 2010, pp. 208-214.
http://dx.doi.org/10.1016/j.biosystems.2010.03.005
[20] O. Okunoye Babatunde. “On Pseudorandom Number Generation from Programmable and Computable Biomolecules: Deoxyribonucleic (DNA) as a Novel Pseudorandom Number Generator,” World Applied Programming, Vol. 1, No. 3, 2011, pp. 215-227.
[21] Y. P. Zhang, Y. Zhu, Z. Wang, R. O. Sinnott, “Index-Based Symmetric DNA Encryption Algorithm,” 4th International Congress on Image and Signal Processing (CSIP), Shanghai, 2011, pp. 2290-2294.
http://dtl.unimelb.edu.au/researchfile287042.pdf
[22] Y. P. Zhang and L. H. Bochen Fu (2012). “Research on DNA Cryptography,” In: J. Sen, Ed., Applied Cryptography and Network Security, InTech Press, Rijeka, Croatia, 2012, pp. 357-376
http://www.intechopen.com/books/applied-cryptography-and-network-security/research-on-dna-cryptography
[23] G. C. Sirakoulis. “Hybrid DNA Cellular Automata for Pseudorandom Number Generation,” 2012 International Conference on High Performance Computing and Simulation (HPCS), Madrid, 2-6 July 2012, pp. 238-244
[24] N. A. Tchurikov, O. V. Kretova, D. M. Fedoseeva, et al., “DNA Double-Strand Breaks Coupled with PARP1 and HNRNPA2B1 Binding Sites Flank Coordinately Expressed Domains in Human Chromosomes,” PLoS Genetics, Vol. 9, No. 4, 2013, Article ID: e1003429.
http://dx.doi.org/10.1371/journal.pgen.1003429
[25] J. Z. J. Zheng and C. H. Zheng, “A Framework to Express Variant and Invariant Functional Spaces for Binary Logic,” Frontiers of Electrical and Electronic Engineering in China, Vol. 5, No. 2, 2010, pp. 163-172.
http://www.springerlink.com/content/91474403127n446u/
[26] J. Zheng, C. Zheng and T. Kunii, “A Framework of Variant Logic Construction for Cellular Automata,” In: A. Salcido, Ed., Cellular Automata—Innovative Modelling for Science and Engineering, InTech Press, Rijeka, Croatia, 2011, pp. 325-352.
http://www.intechopen.com/chapters/20706
[27] Q. P. Li and J. Zheng, “2D Spatial Distributions for Measures of Random Sequences Using Conjugate Maps,” The Proceedings of the 11th Australian Information Warfare and Security Conference, Perth, 30 November-2 December 2010, pp. 1-9.
http://ro.ecu.edu.au/isw/34
[28] J. Zheng, C. Zheng and T, Kunii, “Interactive Maps on Variant Phase Spaces—From Measurements-Micro Ensembles to Ensemble Matrices on Statistical Mechanics of Particle Models,” In: A. Salcido, Ed., Emerging Application of Cellular Automata, InTech Press, Rijeka, Croatia, 2013, pp. 113-196. http://dx.doi.org/10.5772/51635
[29] J. Zheng, “Novel Pseudo-Random Number Generation Using Variant Logic Framework,” 2nd International Cyber Resilience Conference, 2011, pp. 100-104.
http://igneous.scis.ecu.edu.au/proceedings/2011/icr/zheng.pdf
[30] W. Z. Yang and J. Zheng, “Pseudo-Random Number Generator Based on Variant Logic Model,” ChinaCom 2012 Conference Proceedings, 2012.
[31] W. Z. Yang and J. Zheng, “Variant Pseudo-Random Number Generator,” Hakin9 Extra, Vol. 6, No. 13, 2012, pp. 28-31.
http://hakin9.org/hakin9-extra-62012/
[32] W. Q. Zhang and J. Zheng, “Randomness Measurement of Pseudorandom Sequence Using different Generation Mechanisms and DNA Sequence,” Journal of Chengdu University of Information Technology, Vol. 27, No. 6, 2012, pp. 548-555.
[33] J. Zheng, W. Q. Zhang, J. Luo, W. Zhou and R. Shen, “Variant Map System to Simulate Complex Properties of DNA Interactions Using Binary Sequences,” Advances in Pure Mathematics, Special Issue: Number Theory and Cryptology, Vol. 3, No. 7A, 2013, pp. 5-24.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.