Next Article in Journal
Stochastic Model of Block Segmentation Based on Improper Quadtree and Optimal Code under the Bayes Criterion
Next Article in Special Issue
Entropy and Fractal Techniques for Monitoring Fish Behaviour and Welfare in Aquacultural Precision Fish Farming—A Review
Previous Article in Journal
Heat Transfer Analysis between R744 and HFOs inside Plate Heat Exchangers
Previous Article in Special Issue
A Novel Method for Colorectal Cancer Screening Based on Circulating Tumor Cells and Machine Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Design of DNA Storage Coding with Enhanced Constraints

Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, Dalian University, Dalian 116622, China
*
Authors to whom correspondence should be addressed.
Submission received: 27 June 2022 / Revised: 9 August 2022 / Accepted: 17 August 2022 / Published: 19 August 2022

Abstract

:
Traditional storage media have been gradually unable to meet the needs of data storage around the world, and one solution to this problem is DNA storage. However, it is easy to make errors in the subsequent sequencing reading process of DNA storage coding. To reduces error rates, a method to enhance the robustness of the DNA storage coding set is proposed. Firstly, to reduce the likelihood of secondary structure in DNA coding sets, a repeat tandem sequence constraint is proposed. An improved DTW distance constraint is proposed to address the issue that the traditional distance constraint cannot accurately evaluate non-specific hybridization between DNA sequences. Secondly, an algorithm that combines random opposition-based learning and eddy jump strategy with Aquila Optimizer (AO) is proposed in this paper, which is called ROEAO. Finally, the ROEAO algorithm is used to construct the coding sets with traditional constraints and enhanced constraints, respectively. The quality of the two coding sets is evaluated by the test of the number of issuing card structures and the temperature stability of melting; the data show that the coding set constructed with ROEAO under enhanced constraints can obtain a larger lower bound while improving the coding quality.

1. Introduction

Storage is essential for the preservation of history and the dissemination of knowledge. With time, the data required to be stored is increasing, and the storage mode has undergone great changes. From the ancient knot storage of digital records to paper records to CD and hard disk storage technology, the storage density has also made a qualitative leap. In today’s big data era, the increasingly mature informatization in all walks of life has brought about not only the improvement of productivity but also the explosive growth of data volume. Soon, mainstream storage media may be unable to carry massive amounts of information. At the same time, the short storage life of the existing storage media will lead to high maintenance costs. Therefore, the discovery of new storage media is imminent [1]. DNA can reach 10 19   bit / cm 3 , which is 10 6 times that of hard disk in terms of storage density. In addition, as genetic material, DNA can ensure the accurate reproduction and inheritance of life, and samples of tens of thousands of years can still be restored to complete DNA fragments, indicating that it has strong stability. Therefore, in the mid-1960s, Neiman had a preliminary discussion on the concept of gene memory [2]. However, at that time, DNA sequencing and synthesis technology had just started, which technically limited the development of DNA storage. Thus, DNA data storage could not be realized. Davis [3] encodes DNA according to the molecular size of bases and successfully stores abiotic information in DNA. However, due to the defects in decoding, the original date cannot be accurately reconstructed.
In order to achieve efficient DNA storage, it is necessary to solve the deletion, insertion, replacement, and other errors that are prone to occur in the decoding process, which requires the use of coding methods suitable for DNA storage to construct high-quality DNA storage sets. To solve this problem, predecessors have made many explorations. To build a more reasonable DNA sequence library, Garzon et al. [4] proposed the corresponding combinatorial constraints during coding in 2004. In 2009, Ailenberg [5] applied an improved Huffman coding method to the plasmid-based DNA repository, making it have efficient and reliable information retrieval and assembly functions. In 2012, Church [6] and others proposed a method for storing DNA that encodes information in various ways to avoid errors when reading encoded DNA sequences. One year later, Goldman [7] and others proposed a DNA storage scheme that can restore 100% of the original information, storing a larger amount of information than before. In 2015, Grass et al. [8] translated 83 kB of information into 4991 DNA fragments and used error correction codes to correct errors in stored procedures. This study shows that information can be in long-term storage and accurately recovered. In 2016, Hong [9] et al. used algebraic number theory to construct DNA coding sets with larger length, more quantity, and GC content. In the same year, Blawat [10] and others developed a forward error correction scheme, which is powerful and efficient, and completed error-free storage and retrieval of 22 MB of data. Bornhol et al. [11] applied the key–value storage pattern to DNA storage systems and further formed a new coding scheme, which can provide controllable redundancy and make a trade-off between reliability and density. In 2017, Gabry et al. [12] constructed a series of DNA storage codes with asymmetric Lee distance on the basis of a quaternary alphabet, which can better overcome the errors such as pairing and replacement in coding. Erlich et al. [13] proposed a new coding method of DNA fountain; this method’s code density is close to what is theoretically optimal in this scheme, and the performance of retrieving experimental data is improved by order of magnitude compared with previous work. In 2018, Yazdi [14] introduced the concept of weak cross-correlation (WMU) sequence, in which the prefix and suffix of the coding are constrained and the Hamming distance is combined with the constraint set to avoid the production of homopolymers in the primer sequence. Organick et al. [15] stored up to 200 MB of data in DNA molecules, realized random access in large-scale systems, and tried to use single molecule sequencing (SMS) to read and recover data. Nguyen et al. [16] stored 2046 words in the plasmid-based text and proved through experiments that DNA storage is reliable even after a long period of preservation. In the same year, the Limbachiya team [17] obtained the lower bound of the coding sets stored in DNA through an altruistic algorithm under more stringent constraints, which better limited the generation of homopolymers. Song [18] established a mapping rule between binary coding and DNA sequences, and this rule requires DNA sequences to satisfy run-length and GC-content constraints. In this method, each wrong nucleotide will lead to a wrong sequence with a length of 2n. The error rate is much lower than that in the DNA fountain method, and the rate of 1.9 bits/nt is achieved, which effectively reduces the error propagation. In 2019, Choi [19] et al. realized the information capacity of 3.37 bits/character by using degenerate bases other than A, T, G, and C as coding characters, which can reach twice the highest information capacity in the past. Zhang et al. [20] used quaternion Huffman coding to compress original files to increase storage density and successfully encoded and decoded 5.2 kB files using low redundancy quaternion Hamming codes. Anavy et al. [21] found a DNA synthesis method that can significantly shorten the synthesis cycle. The core of the method is to mix nucleotides in a predetermined proportion. In order to ensure local and global stability while satisfying biochemical constraints, Wang team [22] proposed a coding construction method, which has a high bit rate and low coding complexity. There is a limit on the writing size of DNA molecules in DNA storage. In order to address this issue, Heckel et al. [23] quantitatively analyzed the lost and erroneous molecules in DNA data storage, which provides a new idea to remove this limitation.
With the substantial reduction of the cost of DNA sequencing, the encoded information density is gradually approaching the theoretical value, and the goal of making DNA storage a commercial storage method is about to be achieved. However, the problem of low sequencing accuracy still exists. Aiming at the insertion, deletion, and replacement errors that easily occur in stored procedures, the Press team [24] introduced the coding technology of the HEDGES error correction code in 2020. In 2021, Yin [25] proposed a new MPA algorithm, called QRSS-MPA, which can obtain high-quality and larger DNA coding sets, effectively reduce the error rate, and improve storage efficiency. Organick [26] studied the preservation method of synthetic DNA based on its short length and discussed the trade-off between stability and density. In 2022, in order to adapt to the characteristics of DNA synthesis and sequencing, Ren et al. [27] developed two highly reliable coding systems (RALR and RABR) suitable for tetranucleotide, hexanucleotide, and octanucleotide. The average coding efficiency reached 1.27 bits/nt, 1.61 bits/nt, and 1.85 bits/nt, respectively, without arithmetic compression but with error correction.
In order to reduce reading errors caused by low-quality DNA coding, it is necessary to improve the quantity and quality of coding sets. To keep the number of secondary structures as low as possible in the DNA coding sets, the repeated tandem sequence constraint is proposed in this research. To resolve the issue that the traditional distance constraint is not accurate in evaluating the overall similarity between sequences and cannot effectively limit the non-specific hybridization reaction between them, an improved DTW distance constraint is proposed in this research. In addition, based on the original algorithm of AO, the ROEAO algorithm is proposed. Combined with GC-content, No-runlength, and Hamming distance constraints, a DNA storage coding set with different lengths and specific constraints is constructed. This coding set has a certain error correction ability, but its nature is not very stable. In order to construct a higher-quality coding set, the ROEAO algorithm is used to construct the coding set with two enhanced constraints. Finally, in order to evaluate the stability of this coding set, this study compares the hairpin structure and melting temperature of the subset with different lengths and different distances. The results from the test show that the robustness of the DNA storage coding set is effectively improved under the two enhanced constraints.

2. Constraints on DNA Codes

2.1. Traditional Constraints

2.1.1. GC-Content Constraint

The four basic bases of DNA sequence are A, T, C, and G. Its GC content determines the thermal stability of the sequence [28]. For DNA sequences with length n, the GC content is calculated as follows:
G C ( n ) = | G | + | C | | n |

2.1.2. Hamming Distance Constraint

The probability of non-specific hybridization between DNA sequences is proportional to their similarity. In order to prevent the occurrence of non-specific hybridization in the coding process, a condition is required to restrict their similarity. In this research, Hamming distance is considered to be used to constrain the coding. For two DNA sequences u, v, the XOR of the i-th base is represented by h(ui,vi), and the calculation formula of Hamming distance H(u,v) is:
H ( u , v ) = i = 1 n h ( u i , v i ) , h ( u i , v i ) = { 0 , u i = v i 1 , u i v i

2.1.3. No-Runlength Constraint

When constructing the coding of DNA storage, it is required that no same consecutive base is allowed at any adjacent position. Otherwise, it is easy to cause errors in the process of sequencing and synthesis. Therefore, in the coding process, constraints should be used to avoid such homopolymers. Such constraint is called no No-runlength constraint (NL). For the sequence u(u1, u2, u3,…, un) with length n, the constraint is defined as follows:
u i u i 1 , i [ 1 , n ]

2.2. Enhanced Constraints

2.2.1. Repeated Tandem Sequence Constraint

When encoding information, the repeated occurrence of some information will cause the coding sequence to repeat continuously. In this research, such a sequence structure is called a repeated tandem sequence. The repeated tandem sequence is easy to fold back to form a secondary structure similar to that shown in Figure 1 due to some special base arrangement [29]. The three sequences are the repeated tandem sequences of TGTCATCACG, GCTATGCGTA, and GCATAGTCGT, respectively. However, random reading in the DNA storage process is realized by PCR amplification reaction [30]. In the PCR amplification reaction, if the single strand of the amplified template needs to be folded back, the structure formed by folding back is likely to compete with the combination of primer and template. Thus, high-efficiency reading cannot be realized [15].
Figure 1 is the structure analysis diagram obtained from the NUPACK simulation experiment. It proves that, in the two same subsequences L: TGTCATCACG and L′: TGTCATCACG of the repeated tandem sequence TGTCATCACGTGTCATCACG, the base fragment CG of L and the base fragment TG of L′ form a base combination of CGTG. This combination easily complements the inverse sequence of the CACG fragment in L′, resulting in a hairpin structure that is not conducive to PCR amplification and reading. In the course of multiple experiments, it was found that, when the base pairs of such complementary fragments in the repeated tandem sequence reached three or more pairs, the sequence was easy to fold back and self-complement to form the above secondary structure.
Therefore, in order to avoid secondary structure when the coding sequence appears continuously, the concept of repeated tandem sequence constraint (RTSC) is proposed in this research. For a sequence L(l1, l2, l3…, ln) with length N, the constraint is defined as follows: for two identical sequences L and L′, when they appear continuously in series, as shown in Figure 2, the three-base combination formed by the tail A of L and the head B of L′ is recorded as α; the formula is as follows:
A = { l n , i = 1 ( l n 1 , l n ) , i = 2 , B = { ( l 1 , l 2 ) , i = 1 l 1 , i = 2 , α = [ A i = 1 B i = 1 A i = 2 B i = 2 ]
In the remaining sequence, in which the head B and its last four bases (the ring region used to form the hairpin structure) are removed from L′, any combination of three consecutive bases is recorded as β; the formula is as follows:
β = [ l n 2 l n 1 l n l n 3 l n 2 l n 1 l 8 i l 9 i l 10 i ]
If any row of α is complementary to the reverse sequence of any row of β, the above-mentioned secondary structure is easily formed; thus, the sequence that meets the constraint of repeated tandem sequence should meet the following conditions:
i [ 1 , 2 ] , j = { [ 1 , n 8 ] , i = 1 [ 1 , n 7 ] , i = 2 , s .   t .   α ¯ ( i , : ) τ ( β ( j , : ) )
The DNA sequences that do not satisfy the RTSC constraints were screened out by MATLAB experiments, and NUPACK simulation experiments were performed on these sequences. The results show that the repeated tandem of these sequences will indeed generate such secondary structures, as shown in Figure 3:

2.2.2. Improved DTW Distance Constraint

The NUPACK tool was used to simulate two DNA sequences A: ATCGTAGCTTGCATCATG (5′→3′) and B: TCATGATGCGCTACGATA (5′→3′) with a concentration of 1 μΜ. It was found that the reaction products of 1 μΜ were the secondary structure of the uplift shown in Figure 4. Obviously, the non-specific hybridization reaction can easily occur between the two sequences.
For two DNA sequences L1, L2, if there is enough “similarity” between sequence L1 and the complementary sequence L2′ of sequence L2, they are prone to non-specific hybridization under appropriate conditions, resulting in secondary structures such as uplift, shift pairing, and so on, thus reducing the efficiency of reading sequences in DNA storage. For example, the complementary order of B in the direction of 3′ to 5′ is listed as TATCGTAGCGCATCATGA, which is very similar to A: ATCGTAGCTTGCATCATG as a whole. However, if the traditional distance index is used to judge the similarity between A and B′, the probability of non-specific hybridization between A and B′ may be underestimated because the value is too large (for example, Hamming distance = 18). Therefore, in order to better limit the non-specific hybridization of this kind of sequence, it is necessary to use more flexible distance indicators.
Dynamic Time Warping (DTW) [31] is mainly proposed for sequence matching to find similarity. The DTW algorithm scales the series through warping distortion and then calculates the minimum distance between the two time series to get the maximum similarity between them. Traditional DTW generally uses Euclidean distance to calculate the shortest path, but, to judge the non-specific hybridization of DNA sequence, one only needs to consider whether the bases match. Therefore, the Hamming distance, which is used to represent the exclusive or relation, is used instead of the Euclidean distance. Consequently, the shorter the improved DTW distance between sequence L1 and the complementary sequence L2′ of L2, the higher the similarity between L1 and L2′; that is, the non-specific hybridization reaction is more likely to occur between L1 and L2. In order to express the distance between L1 and L2 as computing the distance between L1 and L2′, L1 and L2 are represented as the following time series:
L 1 = [ l 1 , l 2 , , l i , l n ] = { 0 , l i = A 1 , l i = T 2 , l i = C 3 , l i = G   ,   L 2 = [ l 1 , l 2 , , l j , l m ] = { 0 , l j = T 1 , l j = A 2 , l j = G 3 , l j = C
For two DNA sequences L1, L2, the improved DTW distance calculation formula between them is as follows:
d D T W ( L 1 , L 2 ) = { 0 ,   i f   L 1 = 0   a n d   L 2 = 0 ,   i f   L 1 = 0   o r   L 2 = 0 d D T W ( H ( L 1 ) , H ( L 2 ) ) + min { d D T W ( ( L 1 ) , R ( L 2 ) ) d D T W ( R ( L 1 ) , L 2 ) , o t h e r d D T W ( R ( L 1 ) , R ( L 2 ) )
H (L) represents the first base of the DNA sequence, R (L) denotes the subsequence except for the first base in the sequence, and dDTW(Li,Lj) represents the Hamming distance between Li and Lj.
The improved DTW algorithm was used to calculate the shortest distance between A: ATCGTAGCTTGCATCATG (5′→3′) and B: TCATGATGCGCTACGATA (5′→3′). The result was dDTW = 4, which is much smaller than the traditional Hamming distance (d = 18). In addition, it can be seen from the DTW images of the two sequences (the red line in Figure 5 indicates a and the blue indicates b) that the improved DTW algorithm can well predict the bulge structure generated between DNA sequences, which is consistent with the results of NUPACK simulation experiments. Therefore, using the improved DTW distance to constrain the DNA storage coding can more accurately limit the possibility of non-specific hybridization between two sequences, thus improving the efficiency of the DNA coding reading phase.

2.3. Fitness Function

The design of DNA coding needs to follow a fitness function, where the fitness function based on traditional constraints is represented by Formula (9), and the fitness function based on enhanced constraints is represented by Formula (10), wherein u and v represent two DNA sequences of length n.
F ( n ) = H ( u , v )   Subject   to   the   constraints :   GC - content = 50 % ,   No - runlength
F ( n ) = d D T W ( u , v )   Subject   to   the   constraints :   GC - content = 50 % ,   No - runlength ,   RTSC

3. Algorithm Description

An effective model that stores a large amount of data in a small amount of DNA is essential to improve storage efficiency; that is, the model can construct a larger number of coding sets within a certain base length, so this paper proposes an improved Aquila Optimizer algorithm. The algorithm can well jump out of the local optimum so as to search for codes that satisfy the constraints in a larger range.

3.1. Aquila Optimizer

In 2021, Abulaliga et al. [32] proposed a new swarm intelligence algorithm called Aquila Optimizer (AO). Aquila’s hunting method is flexible and can adopt corresponding hunting methods according to the behavior of different prey. It mainly uses four hunting methods: bending vertically and flying high to select the search space, in divergent searching space through contour flight of short gliding attack to explore, in convergent search space through the low-altitude flight of slow descent attack to develop, and swooping and catching prey on foot. If t 2 3 T (the maximum number of iterations and the current iteration are represented by T and t, respectively), the AO algorithm switches from exploration mode to development mode. The specific mathematical expressions of the four hunting behaviors are as follows:
X 1 ( t + 1 ) = X b e s t ( t ) × ( 1 t T ) + [ X M ( t ) X b e s t ( t ) × r ]  
X 2 ( t + 1 ) = X b e s t ( t ) × L e v y ( D ) + X R ( t ) + ( y x ) × r
X 3 ( t + 1 ) = [ X b e s t ( t ) X M ( t ) ] × α r + [ ( U B L B ) × r + L B ] × δ
X 4 ( t + 1 ) = Q F × X b e s t ( t ) [ G 1 × X ( t ) × r ] G 2 × L e v y ( D ) + r × G 1
where Xbest(t), XM(t), and XR(t) represent the best position obtained so far by Aquila, the current average position in the current iteration, and the random Aquila’s position, respectively. D is the size of dimension, the Levy flight function is represented by Levy(D), x and y describe the trajectory of Aquila during the search, and r and G1 are random numbers from 0 to 1. QF, α, and δ are fixed parameters. G2 is the slope of the flight when moving by Aquila.

3.2. The Improved Algorithm

The hunting behavior of AO in the exploration phase is aimed at simulating the fast- moving prey. Therefore, the AO algorithm has the characteristics of strong randomness and fast convergence at this stage. In Aquila’s second hunting mode, Aquila’s flight behavior is spiral. Although this spiral flight provides the AO algorithm with greater search coverage and the ability to search around the prey, this mode will make Aquila search many times in each local region. Therefore, it is easy to update the local optimal individual as the next generation individual. Because the update of Aquila’s position always depends on the current optimal individual, the result of the next iteration is also close to the local region. Eventually, the update ends at the local optimal value. In the final stage, the local development uses Levy flight because of its small search step, so the local development will fall into the local optimization because of the incomplete global search.
Therefore, the overall optimization performance of the AO algorithm is improved in this research. In order to speed up the convergence speed and enhance the ability to jump out of the local optimum while retaining the global search ability of the algorithm. Two improvement directions are considered to make up for the shortcomings of the algorithm: one is to adjust the search direction, and the other is to adjust the search step size.

3.2.1. Random Opposition-Based Learning

Due to the spiral search, the individual may be close to the globally optimal region or the locally optimal region. When entering the latter region, it is easy to make the AO stay at the local optimal. In order to leave the non-global optimal region, the direction of individual updates needs to be changed in time. In the development stage, the use of opposition-based learning [33] can provide a new direction for the update of individuals, thereby increasing the probability of individuals entering the global optimum and expanding the search space for individuals. The principle of opposition-based learning [33] is to produce a completely reversed solution according to the current solution, but when neither of these two individuals is close to the optimal region, it cannot effectively achieve the purpose of this improved scheme, and even an individual far from the global optimal solution may be generated. Therefore, in order to improve the efficiency of reverse learning and prevent the global search phase from ending prematurely, this research adopts random reverse learning, which is more random [34].
X ¯ = a + b r a n d × X
Among them, a and b are the lower and upper bounds of the problem, respectively, the rand is a random number from 0 to 1, X [ a , b ] , and the random opposition solution of ? X is X . This strategy generates a set of solutions that are not wholly opposed to the current solution, which can change the direction and jump out of the local optimal and effectively deal with the above extreme cases.

3.2.2. Eddy Jump

The step size of the individual position movement is very critical to the optimization of the algorithm. If the same step size is maintained, it is easy to jump over the global optimal region or be unable to reach the global optimal region before the end of the update. In the process of AO updating individual positions, because the step length of Levy flight is short, the updating effect is relatively weak, and it is difficult to escape from the local optimal area, so a scheme with a longer moving step length is needed. In the Marine Predators Algorithm [35], eddy usually changes the foraging trajectory of marine predators. In order to avoid this eddy, marine predators usually use a long jump to avoid local optimization stagnation. At the same time, the step size of such jumps has certain randomness and can balance search and local development. Inspired by this, this large step jump is used to improve the development stage of AO to avoid optimization stagnation.
X = X + ( F × ( 1 r ) + r ) × ( X i X j )
where F equals 0.2, Xi and Xj are two random solution vectors of X, and r is a random number from 0 to 1.
The AO algorithm that combines the above two strategies is called the ROEAO algorithm.

3.2.3. ROEAO Algorithm Description

Algorithm 1 shows the pseudo-code of the ROEAO algorithm.
Algorithm 1 ROEAO algorithm pseudo code.
Set a series of initial parameters
Randomly set the initial individual Xi(i = 1,2,…,N)
 While (t T)
Compute the fitness value and update Xbest
  for I from 1 to N
  update parameters and XM(t)
   if t ( 2 3 ) T
if rand 0.5
update the position with Equation (11) and Xbest
else
update the position with Equation (12) and Xbest
end if
else
if rand 0.5
update the position with Equation (13) and Xbest
else
update the position with Equation (14) and Xbest
end if
   end if
  end for
 Execute Random Opposition-Based Learning based on Equation (15)
 Execute Eddy Jump based on Equation (16)
end while
Return the best solution Xbest

3.3. Experiment Environment and Symbol

We ran various simulation experiments with MATLAB 2018 on Intel Core i73.6-GHz CPU. Table 1 explains the meaning of each superscript in this research. Bold data in the remaining tables indicate better results.

3.4. Benchmark Function Comparison

Benchmark function is a simulation of practical problems; this research used mainstream benchmark function to verify the performance of the ROEAO algorithm on different functions [36]. In this research, a total of 13 benchmark functions, including unimodal and multimodal functions, are selected to show the test results. This series of test functions contains most types of optimization problems. Thus, these test functions are well representative. The effectiveness of this algorithm is verified by comparing the ROEAO algorithm with the original algorithm AO [32] and some other classical swarm intelligence algorithms, among which Particle Swarm Optimization (PSO) [37] is a long-tested and widely used algorithm. Differential Evolution (DE) [38] is a stochastic model that simulates biological evolution. Through repeated iterations, individuals who are adapted to the environment are preserved. Grey Wolf Optimizer (GWO) [39] and Whale Optimization Algorithm (WOA) [40] are classic meta-heuristic algorithms, Marine Predators Algorithm (MPA) [35] and Harris Hawks Optimization (HHO) [41] are excellent meta-heuristic algorithms proposed in the past three years. In this round of experiments, the parameters of each algorithm were set: the dimension of the non-fixed dimension test function is 30, the maximum number of iterations is 500, and the population size of each algorithm is 30.
Unimodal benchmark function (F1–F7) tests the basic development ability of the main algorithms [42]. It can be seen from Table 2 that the standard deviation and accuracy of ROEAO were obviously better than those of other algorithms. Not only did the mean and variance results of function F1~F4 reach the optimal value but also the accuracy of F5 and F6 were higher than that of other algorithms by 12 to 33 orders of magnitude; in addition, its stability performance was much better than other algorithms. Thus, this shows that ROEAO’s benchmark development capability is stronger. Because a great many local optimal solutions exist in multimodal functions (F8~F13), the algorithm that can perform well in this kind of function can better prove its superiority in development ability [35]. In the multi-peak function test, such as Table 3, the standard deviation and average value of F9~F11 reached the optimal value. At the same time, the accuracy and stability of F12 and F13 were much better than other algorithms. In particular, it is 24~37 orders of magnitude better than other algorithms in terms of average value, which can better reflect the good performance of ROEAO jumping out of the local optimization and the fast speed of optimization.
Wilcoxon signed rank test [43] is used for statistical analysis of the above comparison results. The results are shown in Table 4, where s/e/w indicates that ROEAO is superior to, equal to, and worse than the algorithm used for comparison. The p-values of these seven results are all less than 0.05, which indicates that ROEAO is significantly different from other algorithms, and the number of functions in which ROEAO is dominant is 69~100%. It can be seen that ROEAO is obviously superior to other algorithms.
Showing the convergence of each algorithm as a visual image can compare their optimization performance more intuitively. In Figure 6, several convergence curves of AO, HHO, MPA, WOA, GWO, PSO, DE, and ROEAO were given. From the visual image, the ability to jump out of the local optimum and the convergence speed can be directly compared; it can be seen that these two capabilities of ROEAO have great advantages over other algorithms. In the graph in F2, ROEAO had always maintained an efficient development state. In F5 and F6, ROEAO demonstrated a strong exploration ability, the convergence speed was extremely fast, and it did not fall into local optimum, which may be affected by the strategy of increasing the search step size. In F9, it converges significantly faster than other algorithms. In F12 and F13, it was observed that ROEAO still maintains an efficient development state when other algorithms have fallen into local optimization. Generally speaking, the convergence and speed of ROEAO have always been among the best algorithms.

4. Experimental Results and Analysis

4.1. Lower Bound of Coding Set with Traditional Constraints

In order to improve the storage efficiency, it is necessary to construct a larger number of codes that meet the constraints. This paper combines traditional constraints with the ROEAO algorithm with excellent performance to construct a large-scale DNA storage code set design model. The model uses the traditional combinatorial-constrained objective function, Equation (9), as the fitness function and encodes the letters of each gene with quaternions, with 0, 1, 2, and 3 representing the bases T, C, G, and A, respectively. The specific steps of the model construction and coding are as follows:
Step 1: Initialize the parameters required by ROEAO algorithm, for example, the maximum count of iterations, the number of populations, etc.;
Step 2: Randomly generate a set of DNA sequences, and put the sequences that meet the combinatorial constraints into the initial sequence set as the first candidate sequence set to start updating;
Step 3: Start using Aquila’s four hunting methods to calculate the fitness of candidate sequences, and update the candidate sequence set;
Step 4: Perform random reverse learning on the updated set of candidate sequences to calculate the fitness of the candidate sequences, and then replace the sequences that meet the constraints of sorting according to fitness, and then replace the poor sequences in the original set;
Step 5: Perform a vortex jump operation on the candidate sequence set. The sequences that meet the combinatorial constraints are added to the candidate set;
Step 6: Judging the termination condition, if the count of iterations reaches the maximum value, the result is calculated and summarized, and the output sequence set and the maximum number of sequences are output. Otherwise, return to step 3.
The set of DNA sequences satisfying the No-runlength constraint, GC-content constraint, sequence length equal to n, and Hamming distance equal to d is represented by SGC,NL(n,d). In order to prove that the coding set constructed by the ROEAO algorithm can effectively reduce the errors in actual storage, this research compared it with the lower bound of 4 ≤ n ≤ 10 and 3 ≤ d < n in the coding results of the EORS algorithm [44] and altruistic algorithm of Limbachiya [17]. As shown in Table 5, ROEAO can obtain the optimal DNA coding set compared with previous work. For example, when n = 6 and d = 4, the code set constructed by ROEAO is 69% and 28% larger than the previous results, respectively.
The encoding rate is one of the factors that determines the efficiency of DNA storage, and the encoding rate depends on the number of encoding sets and the length of the encoding. The calculation formula is R = 1 n log 4 M , where n is the length of the DNA sequence and M is the DNA code number of sets. For example, in the study of Limbachiya [17], when n = 7 and d = 3, R = 0.4844, and when n = 7 and d = 4, R = 0.3693. Using the method in this paper, the same encoding rate can be achieved with a shorter sequence, when n = 6 and d = 3, R = 0.4922, and when n = 6 and d = 4, R = 0.3962. This shows that the DNA storage coding set design model in this paper has better storage performance.

4.2. Lower Bound of Coding Set with Enhanced Constraints

In order to enhance the robustness of DNA storage coding set, this research combines enhanced constraints (RTSC, improved DTW distance) and traditional constraints (GC, NL) as new combined constraints; that is, Equation (10) is used to calculate the fitness function and constructs a new coding set according to the above construction steps. The set of DNA sequences whose length is n and the improved DTW distance is dDTW is represented by SGC,NL,RTSC(n,dDTW), and the number of coding sets constructed by ROEAO with the above constraints is represented in Table 6.
In order to verify that the coding quality of SGC,NL,RTSC(n,dDTW) is improved with enhanced constraints, the chemical and physical properties of SGC,NL(n,d) and SGC,NL,RTSC(n,dDTW) were compared. The number of hairpin structures is one of the criteria for judging the stability of physical properties of a sequence. The melting temperature (Tm) refers to the temperature when the ultraviolet absorption of denatured nucleic acid reaches half of the maximum, and it is the main index to judge the chemical properties of DNA [45]. Therefore, this research used these two indicators to verify whether the quality of SGC,NL,RTSC(n,dDTW) is enhanced.

4.3. Comparison Results of Set Quality

4.3.1. Hairpin Structures

Table 7 shows a comparison of the number of hairpin structures in the SGC,NL(n,d) and SGC,NL,RTSC(n,dDTW) collections. It can be seen from Table 7 that SGC,NL,RTSC(n,dDTW) had a smaller number of hairpins under different sequence lengths and different Hamming distances, indicating that the physical properties of the coding in SGC,NL,RTSC(n,dDTW) was improved.
Table 8 shows the comparison of the ratio of the number of hairpin structures to the number of DNA sequences in SGC,NL(n,d) and SGC,NL,RTSC(n,dDTW). The smaller the ratio is, the more stable the physical properties of the sequences are. The data in the table show that when the ratio was 8, the ratio was reduced by 1~41%; when the ratio was 9, the ratio was reduced by 2~23%; and when the ratio was 10, the ratio was reduced by 4~9%. It can be seen that the ratio of card issuing structure decreases in varying degrees, which proves that the enhanced constraint can bring more stable physical properties to the coding of DNA sequences.

4.3.2. Melting Temperature

The comparison results of the Tm variances of SGC,NL(n,d) and SGC,NL,RTSC,DTW(n,d) are shown in Table 9. From the data in the table, when n equaled 8, 9, and 10, respectively, the variance of Tm decreased by 3~25%, 6~36%, and 3~68%, respectively; that is, each subset of SGC,NL,RTSC,DTW(n,d) had a more stable Tm performance. It is proved that the enhanced constraint can provide a more stable Tm value for DNA storage coding.
In summary, the DNA storage sets that meet the enhanced constraints have better data performance in the evaluation of the number of hairpin structures and the evaluation of the melting temperature, indicating that RTSC and improved DTW distance constraints bring better physical and chemical stability to DNA coding storage sets, which can effectively reduce the number of DNA secondary structures in the coding set, thus as to ensure the smooth progress of the reading phase in DNA storage.

5. Conclusions

To avoid errors in the reading phase while raising the lower bound of DNA storage coding sets, a method of building more stable DNA storage sets was proposed in this research. Firstly, in order to solve the issue of secondary structure caused by the tandem repetition of DNA sequences in the process of information coding, a repeated tandem sequence constraint was proposed. In order to address the issue that the traditional distance constraint is not accurate in evaluating the overall similarity between sequences, which cannot effectively limit the occurrence of non-specific hybridization reactions between them, an improved DTW distance constraint was proposed in this research, and through the comparison of biological simulation experiments and improved DTW analysis map, it was proved that the enhanced constraint could predict and limit the occurrence of a non-specific hybridization reaction. Secondly, on the basis of the AO algorithm, we adjusted its search direction and step size, and obtained a ROEAO algorithm with good optimization performance. Further, the mainstream benchmark function was used by this research to test and compare the ROEAO algorithm with seven other meta-heuristic algorithms to verify the optimization ability of the improved ROEAO algorithm. The comparison results show that ROEAO had advantages in accuracy and stability in the test results of 13 functions, the theoretical optimal value was reached in the test of 7 functions, the optimal value was reached in almost every test function, and the accuracy was 12~37 orders of magnitude higher than that of other algorithms in F5, F6, F12, and F13 tests, reflecting the fast optimization speed of ROEAO and good performance of jumping out of local optimization.
Finally, the ROEAO algorithm with excellent development and exploration ability was combined with traditional constraints and obtained the DNA storage coding set, which is 9~28% higher than the lower bound of the previous research set, which shows that the code set constructed by ROEAO has the ability to store more information at the same length. Further, in order to prove that the robustness of DNA storage coding sets is improved with enhanced constraints, the physical and chemical stability was evaluated by testing the number of hairpin structures and the stability of the melting temperature. With the enhanced constraint, the ratio generated by the hairpin structure of the sets was reduced by 1~41% compared with the coding set without enhanced constraint, and the variance of the melting temperature was reduced by 3~68%, indicating that higher robustness of DNA storage coding sets can be obtained with the enhanced constraint.
In the experiment, the improved DTW distance can calculate the distance more in line with the biological properties of DNA by warping the DNA sequence and then aligning it, thus more truly measuring the possibility of non-specific hybridization between sequences. However, in some special cases, when calculating the DTW distance, pathological alignment will occur between some sequences, resulting in a smaller distance than the actual distance. Therefore, in the next work, we will try to further optimize the improved DTW distance formula to propose a distance with a wider range of constraints and apply it to the design of DNA storage coding.

Author Contributions

Conceptualization, X.L. and S.Z.; methodology, X.L., L.Z. and S.Z.; software, X.L. and L.Z.; validation, X.L., L.Z. and S.Z.; formal analysis, X.L.; investigation, X.L.; resources, X.L.; data curation, X.L.; writing—original draft preparation, X.L. and S.Z.; writing—review and editing, X.L. and S.Z.; visualization, X.L. and L.Z.; supervision, X.L.; project administration, X.L. and S.Z.; funding acquisition, S.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Key Technology R&D Program of China (No. 2018YFC0910500), the National Natural Science Foundation of China (Nos. 61425002, 61751203, 61772100, 61972266, 61802040), the Liao Ning Revitalization Talents Program (No. XLYC2008017), the Innovation and Entrepreneurship Team of Dalian University (No. XQN202008), the Natural Science Foundation of Liaoning Province (Nos. 2021-MS-344, 2021-KF-11-03), the Scientific Research Fund of Liaoning Provincial Education Department (No. LJKZ1186), and the Dalian University Scientific Research Platform Program (No. 202101YB02).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from UCI Machine Learning Repository. Restrictions apply to the availability of these data, which were used under license for this study.

Conflicts of Interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

References

  1. De Silva, P.Y.; Ganegoda, G.U. New Trends of Digital Data Storage in DNA. BioMed Res. Int. 2016, 2016, 8072463. [Google Scholar] [CrossRef] [PubMed]
  2. Neiman, M.S. On the molecular memory systems and the directed mutations. Radiotekhnika 1965, 6, 1–8. [Google Scholar]
  3. Davis, J. Microvenus. Art J. 1996, 55, 70–74. [Google Scholar] [CrossRef]
  4. Garzon, M.H.; Bobba, K.V.; Hyde, B.P. Digital information encoding on DNA. In Aspects of Molecular Computing; Jonoska, N., Paun, G., Rozenberg, G., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 152–166. [Google Scholar]
  5. Ailenberg, M.; Rotstein, O.D. An improved Huffman coding method for archiving text, images, and music characters in DNA. Biotechniques 2009, 47, 747–751. [Google Scholar] [CrossRef]
  6. Church, G.M.; Gao, Y.; Kosuri, S. Next-Generation Digital Information Storage in DNA. Science 2012, 337, 1628. [Google Scholar] [CrossRef]
  7. Goldman, N.; Bertone, P.; Chen, S. Towards practical, high-capacity, low-maintenance information storage in synthesized DNA. Nature 2013, 494, 77–80. [Google Scholar] [CrossRef]
  8. Grass, R.N.; Heckel, R.; Puddu, M. Robust Chemical Preservation of Digital Information on DNA in Silica with Error-Correcting Codes. Angew. Chem.-Int. Ed. 2015, 54, 2552–2555. [Google Scholar] [CrossRef]
  9. Hong, H.; Wang, L.; Ahmad, H. Construction of DNA codes by using algebraic number theory. Finite Fields Appl. 2016, 37, 328–343. [Google Scholar] [CrossRef]
  10. Blawat, M.; Gaedke, K.; Huetter, I. Forward Error Correction for DNA Data Storage. Procedia Comput. Sci. 2016, 80, 1011–1022. [Google Scholar] [CrossRef]
  11. Bornhol, J.; Lopez, R.; Carmean, D.M. A DNA-Based Archival Storage System. In Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, Atlanta, GA, USA, 2–6 April 2016. [Google Scholar]
  12. Gabrys, R.; Kiah, H.M.; Milenkovic, O. Asymmetric Lee Distance Codes for DNA-Based Storage. IEEE Trans. Inf. Theory 2017, 63, 4982–4995. [Google Scholar] [CrossRef]
  13. Erlich, Y.; Zielinski, D. DNA Fountain enables a robust and efficient storage architecture. Science 2017, 355, 950–953. [Google Scholar] [CrossRef] [PubMed]
  14. Yazdi, S.M.H.T.; Kiah, H.M.; Gabrys, R. Mutually Uncorrelated Primers for DNA-Based Data Storage. IEEE Trans. Inf. Theory 2018, 64, 6283–6296. [Google Scholar] [CrossRef]
  15. Organick, L.; Ang, S.D.; Chen, Y.-J. Random access in large-scale DNA data storage. Nat. Biotechnol. 2018, 36, 242–248. [Google Scholar] [CrossRef]
  16. Nguyen, H.H.; Park, J.; Park, S.J. Long-Term Stability and Integrity of Plasmid-Based DNA Data Storage. Polymers 2018, 10, 28. [Google Scholar] [CrossRef]
  17. Limbachiya, D.; Gupta, M.K.; Aggarwal, V. Family of Constrained Codes for Archival DNA Data Storage. IEEE Commun. Lett. 2018, 22, 1972–1975. [Google Scholar] [CrossRef]
  18. Song, W.; Cai, K.; Zhang, M. Codes With Run-Length and GC-Content Constraints for DNA-Based Data Storage. IEEE Commun. Lett. 2018, 22, 2004–2007. [Google Scholar] [CrossRef]
  19. Choi, Y.; Ryu, T.; Lee, A.C. High information capacity DNA-based data storage with augmented encoding characters using degenerate bases. Sci. Rep. 2019, 9, 6582. [Google Scholar] [CrossRef]
  20. Zhang, S.; Huang, B.; Song, X. A high storage density strategy for digital information based on synthetic DNA. 3 Biotech. 2019, 9, 342. [Google Scholar] [CrossRef]
  21. Anavy, L.; Vaknin, I.; Atar, O. Data storage in DNA with fewer synthesis cycles using composite DNA letters. Nat. Biotechnol. 2019, 37, 1229–1236. [Google Scholar] [CrossRef]
  22. Wang, Y.; Noor-A-Rahim, M.; Gunawan, E. Construction of Bio-Constrained Code for DNA Data Storage. IEEE Commun. Lett. 2019, 23, 963–966. [Google Scholar] [CrossRef]
  23. Heckel, R.; Mikutis, G.; Grass, R.N. A Characterization of the DNA Data Storage Channel. Sci. Rep. 2019, 9, 9663. [Google Scholar] [CrossRef] [PubMed]
  24. Press, W.H.; Hawkins, J.A.; Jones, S.K. HEDGES error-correcting code for DNA storage corrects indels and allows sequence constraints. Proc. Natl. Acad. Sci. USA 2020, 117, 18489–18496. [Google Scholar] [CrossRef] [PubMed]
  25. Yin, Q.; Zheng, Y.; Wang, B. Design of Constraint Coding Sets for Archive DNA Storage. IEEE/ACM Trans. Comput. Biol. Bioinform. 2021. [Google Scholar] [CrossRef] [PubMed]
  26. Organick, L.; Nguyen, B.H.; McAmis, R. An Empirical Comparison of Preservation Methods for Synthetic DNA Data Storage. Small Methods 2021, 5, 2001094. [Google Scholar] [CrossRef] [PubMed]
  27. Ren, Y.; Zhang, Y.; Liu, Y. DNA-Based Concatenated Encoding System for High-Reliability and High-Density Data Storage. Small Methods 2022, 6, 2101335. [Google Scholar] [CrossRef]
  28. Cao, B.; Li, X.; Zhang, X. Designing Uncorrelated Address Constrain for DNA Storage by DMVO Algorithm. IEEE/ACM Trans. Comput. Biol. Bioinform. 2020, 19, 866–877. [Google Scholar] [CrossRef]
  29. Tabor, S.; Richardson, C.C. DNA sequence analysis with a modified bacteriophage T7 DNA polymerase. Proc. Natl. Acad. Sci. USA 1987, 84, 4767–4771. [Google Scholar] [CrossRef]
  30. Tabatabaei Yazdi, S.M.H.; Yuan, Y.; Ma, J. A Rewritable, Random-Access DNA-Based Storage System. Sci. Rep. 2015, 5, 14138. [Google Scholar] [CrossRef]
  31. Li, J.K.; Wang, Y.Z. Early Abandon to Accelerate Exact Dynamic Time Warping. Int. Arab. J. Inf. Technol. 2009, 6, 144–152. [Google Scholar]
  32. Abualigah, L.; Yousri, D.; Abd Elaziz, M. Aquila Optimizer: A novel meta-heuristic optimization algorithm. Comput. Ind. Eng. 2021, 157, 107250. [Google Scholar] [CrossRef]
  33. Tizhoosh, H.R. Opposition-Based Learning: A New Scheme for Machine Intelligence. In Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC’06), Vienna, Austria, 28–30 November 2005. [Google Scholar]
  34. Yan, W. Computational Methods for Deep Learning: Theoretic, Practice and Applications; Springer: Berlin/Heidelberg, Germany, 2021; pp. XVII, 134. [Google Scholar]
  35. Faramarzi, A.; Heidarinejad, M.; Mirjalili, S. Marine Predators Algorithm: A Nature-inspired Metaheuristic. Expert Syst. Appl. 2020, 152, 113377. [Google Scholar] [CrossRef]
  36. Chen, P.; Zhou, S.; Zhang, Q. A meta-inspired termite queen algorithm for global optimization and engineering design problems. Eng. Appl. Artif. Intell. 2022, 111, 104805. [Google Scholar] [CrossRef]
  37. Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the ICNN’95—International Conference on Neural Networks, Perth, WA, Australia, 27 November–1 December 1995. [Google Scholar]
  38. Storn, R.; Price, K. Differential Evolution—A Simple and Efficient Heuristic for global Optimization over Continuous Spaces. J. Glob. Optim. 1997, 11, 341–359. [Google Scholar] [CrossRef]
  39. Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey Wolf Optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef]
  40. Mirjalili, S.; Lewis, A. The Whale Optimization Algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  41. Heidari, A.A.; Mirjalili, S.; Faris, H. Harris hawks optimization: Algorithm and applications. Future Gener. Comput. Syst.-Int. J. Esci. 2019, 97, 849–872. [Google Scholar] [CrossRef]
  42. Khishe, M.; Mosavi, M.R. Chimp optimization algorithm. Expert Syst. Appl. 2020, 149, 113338. [Google Scholar] [CrossRef]
  43. Derrac, J.; García, S.; Molina, D. A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol. Comput. 2011, 1, 3–18. [Google Scholar] [CrossRef]
  44. Li, X.; Guo, L. Combinatorial constraint coding based on the EORS algorithm in DNA storage. PLoS ONE 2021, 16, e0255376. [Google Scholar]
  45. Wu, J.; Zheng, Y.; Wang, B. Enhancing Physical and Thermodynamic Properties of DNA Storage Sets With End-Constraint. IEEE Trans. NanoBiosci. 2022, 21, 184–193. [Google Scholar] [CrossRef]
Figure 1. Secondary structure formed by sequence repeat tandem.
Figure 1. Secondary structure formed by sequence repeat tandem.
Entropy 24 01151 g001
Figure 2. Repeat tandem structure.
Figure 2. Repeat tandem structure.
Entropy 24 01151 g002
Figure 3. Sequences that do not satisfy RTSC constraints.
Figure 3. Sequences that do not satisfy RTSC constraints.
Entropy 24 01151 g003
Figure 4. Sequence A and B hybridize to form the secondary structure of uplift.
Figure 4. Sequence A and B hybridize to form the secondary structure of uplift.
Entropy 24 01151 g004
Figure 5. DTW analysis image of sequence A and B.
Figure 5. DTW analysis image of sequence A and B.
Entropy 24 01151 g005
Figure 6. Convergence iteration curves of several benchmarks.
Figure 6. Convergence iteration curves of several benchmarks.
Entropy 24 01151 g006
Table 1. The meaning of superscript.
Table 1. The meaning of superscript.
SuperscriptMeaning
RThe result from ROEAO
EOThe result from EORS
AThe result from Altruistic
TThe result from ROEAO with Traditional constraints
EThe result from ROEAO with Enhanced constraints
Table 2. Unimodal test results, dimension = 30.
Table 2. Unimodal test results, dimension = 30.
IDMetricROEAOAOGWOWOAHHOMPAPSODE
F1AVG0.00 × 1002.32 × 10−1121.25 × 10−285.67 × 10−751.88 × 10−983.45 × 10−231.43 × 1041.26 × 10−4
STD0.00 × 1001.48 × 10−1142.01 × 10−281.67 × 10−741.98 × 10−984.54 × 10−232.01 × 1032.92 × 10−5
F2AVG0.00 × 1006.44 × 10−546.71 × 10−174.78 × 10−493.44 × 10−482.646 × 10−133.38 × 1024.83 × 10−4
STD0.00 × 1004.13 × 10−534.63 × 10−173.56 × 10−482.63 × 10−482.36 × 10−131.33 × 1036.06 × 10−4
F3AVG0.00 × 1004.35 × 10−1015.23 × 10−064.57 × 1043.36 × 10−681.74 × 10−43.25 × 1043.46 × 104
STD0.00 × 1009.90 × 10−1011.58 × 10−62.02 × 1042.41 × 10−671.26 × 10−48.91 × 1035.57 × 103
F4AVG0.00 × 1001.06 × 10−531.23 × 10−63.72 × 1012.23 × 10−472.84 × 10−95.31 × 1011.33 × 101
STD0.00 × 1003.90 × 10−528.32 × 10−73.38 × 1015.24 × 10−472.27 × 10−92.75 × 1002.65 × 100
F5AVG2.63 × 10−154.45 × 10−32.64 × 1013.01 × 1011.01 × 10−225.32 × 1002.96 × 1071.44 × 102
STD1.41 × 10−145.58 × 10−37.53 × 10−12.97 × 10−11.19 × 10−26.74 × 10−16.83 × 1061.78 × 102
F6AVG1.72 × 10−291.62 × 10−47.42 × 10−12.41 × 10−11.48 × 10−42.81 × 10−81.88 × 1047.24 × 10−4
STD5.84 × 10−291.53 × 10−43.48 × 10−11.74 × 10−11.42 × 10−41.66 × 10−82.89 × 1035.36 × 10−4
F7AVG1.55 × 10−49.67 × 10−51.68 × 10−31.75 × 10−31.31 × 10−41.33 × 10−31.27 × 1015.56 × 10−2
STD4.24 × 10−41.57 × 10−41.16 × 10−31.52 × 10−31.62 × 10−45.36 × 10−43.45 × 1001.84 × 10−2
Table 3. Multi-modal test results, dimension = 30.
Table 3. Multi-modal test results, dimension = 30.
IDMetricROEAOAOGWOWOAHHOMPAPSODE
F8AVG−1.29 × 104−6.69 × 103−5.58 × 103−1.23 × 104−1.26 × 104−8.34 × 103−2.86 × 103−5.47 × 103
STD6.27 × 1033.53 × 1037.10 × 1021.67 × 1031.83 × 1025.38 × 1022.79 × 1022.73 × 102
F9AVG0.00 × 1000.00 × 1002.12 × 1001.36 × 10−150.00 × 1000.00 × 1001.87 × 1021.92 × 102
STD0.00 × 1000.00 × 1003.09 × 1001.01 × 10−140.00 × 1000.00 × 1001.15 × 1011.94 × 101
F10AVG8.88 × 10−168.88 × 10−161.23 × 10−133.57 × 10−158.88 × 10−162.95 × 10−121.71 × 1011.41 × 10−2
STD0.00 × 1000.00 × 1001.82 × 10−142.32 × 10−153.41 × 10−311.57 × 10−123.62 × 10−13.45 × 10−3
F11AVG0.00 × 1000.00 × 1002.56 × 10−35.56 × 10−30.00 × 1000.00 × 1001.72 × 1024.58 × 10−2
STD0.00 × 1000.00 × 1008.77 × 10−33.74 × 10−20.00 × 1000.00 × 1003.27 × 1017.12 × 10−2
F12AVG1.41 × 10−305.31 × 10−63.84 × 10−22.36 × 10−28.23 × 10−61.26 × 10−51.54 × 1071.35 × 10−3
STD6.08 × 10−307.26 × 10−61.92 × 10−22.65 × 10−21.72 × 10−56.68 × 10−59.78 × 1062.72 × 10−3
F13AVG2.76 × 10−292.53 × 10−56.16 × 10−15.76 × 10−12.11 × 10−41.66− × 10−25.53 × 1078.12 × 10−3
STD1.13 × 10−284.66 × 10−52.73 × 10−12.15 × 10−12.27 × 10−45.46 × 10−23.08 × 1072.74 × 10−2
Table 4. Wilcoxon statistical test results.
Table 4. Wilcoxon statistical test results.
Comparisons/e/wp-Value
AO vs. ROEAO9/3/13.6658 × 10−2
GWO vs. ROEAO13/0/01.4740 × 10−3
WOA vs. ROEAO13/0/01.4740 × 10−3
HHO vs. ROEAO9/3/12.8417 × 10−2
MPA vs. ROEAO11/2/03.3460 × 10−3
PSO vs. ROEAO13/0/01.4740 × 10−3
DE vs. ROEAO13/0/01.4740 × 10−3
Table 5. Lower bounds for SGC,NL(n,d).
Table 5. Lower bounds for SGC,NL(n,d).
n\d3456789
411 A
12 EO
12 R
517 A7 A
20 EO8 EO
20 R8 R
644 A16 A6 A
55 EO21 EO8 EO
60 R27 R8 R
7110 A36 A11A4 A
125 EO46 EO16 EO6 EO
127 R47 R17 R7 R
8289 A86 A29 A9 A4 A
326 EO110 EO38 EO15 EO5 EO
327 R110 R36 R14 R5 R
9662 A199 A59 A15 A8 A
737 EO226 EO71 EO26 EO11 EO5 EO
786R228R71R27 R11R5 R
101810 A525 A141 A43 A7 A5 A4 A
1856 EO546 EO153 EO53 EO22 EO9 EO5 EO
1964 R581R157 R57 R21R10 R5 R
Table 6. Lower bounds for SGC,NL,RTSC(n,dDTW).
Table 6. Lower bounds for SGC,NL,RTSC(n,dDTW).
n/dDTW3456789
8170 E40 E14 E5 E3 E
9314 E83 E21 E8 E4 E2 E
10607 E155 E34 E11 E6 E3 E1 E
Table 7. Comparison of the number of hairpin structures between SGC,NL(n,d) and SGC,NL,RTSC(n,dDTW).
Table 7. Comparison of the number of hairpin structures between SGC,NL(n,d) and SGC,NL,RTSC(n,dDTW).
n/d3456789
8170 T40 T14 T5 T3 T
67 E16 E5 E2 E1 E
9403 T112 T32 T11 T6 T4 T
314 E83 E21 E8 E4 E2 E
101776 T442 T100 T33 T14 T8 T2 T
607 E155 E34 E11 E6 E3 E1E
Table 8. Comparison of the ratio of hairpin structure between SGC,NL(n,d) and SGC,NL,RTSC(n,dDTW).
Table 8. Comparison of the ratio of hairpin structure between SGC,NL(n,d) and SGC,NL,RTSC(n,dDTW).
n/d3456789
80.4709 T0.4273 T0.3611 T0.5714 T0.4000 T
0.3941 E0.4000 E0.3571 E0.3333 E0.3333 E
91.4389 T1.4430 T1.5775 T1.4074 T1.5455 T2.6000 T
1.2834 E1.3494 E1.5238 E1.3750 E1.5000 E2.0000 E
103.0351 T3.0637 T3.1210 T3.2807 T2.4762 T2.8000 T2.0000 T
2.9259 E2.8516 E2.9412 E3.0000 E2.3333 E2.6667 E2.0000 E
Table 9. Comparison of Tm variance between SGC,NL(n,d) and SGC,NL,RTSC(n,ddtw).
Table 9. Comparison of Tm variance between SGC,NL(n,d) and SGC,NL,RTSC(n,ddtw).
n/d3456789
85.913 T6.5933 T6.1047 T3.7399 T3.0728 T
5.6656 E6.4030 E4.5663 E3.5999 E2.3000 E
95.1303 T5.0506 T5.1692 T6.2964 T2.9481 T3.5663 T
4.8113 E4.4362 E4.3375 E4.0537 E2.5743 E2.3743 E
104.7194 T4.5276 T5.1658 T4.7232 T3.5348 T3.3421 T1.6232 T
4.5559 E4.3101 E4.3337 E3.5932 E2.8485 E2.9237 E0.5121 E
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, X.; Zhou, S.; Zou, L. Design of DNA Storage Coding with Enhanced Constraints. Entropy 2022, 24, 1151. https://0-doi-org.brum.beds.ac.uk/10.3390/e24081151

AMA Style

Li X, Zhou S, Zou L. Design of DNA Storage Coding with Enhanced Constraints. Entropy. 2022; 24(8):1151. https://0-doi-org.brum.beds.ac.uk/10.3390/e24081151

Chicago/Turabian Style

Li, Xiangjun, Shihua Zhou, and Lewang Zou. 2022. "Design of DNA Storage Coding with Enhanced Constraints" Entropy 24, no. 8: 1151. https://0-doi-org.brum.beds.ac.uk/10.3390/e24081151

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop