Skip to main content

ORIGINAL RESEARCH article

Front. Genet., 20 March 2023
Sec. Computational Genomics

Evolutionary approach to construct robust codes for DNA-based data storage

Abdur Rasool,Abdur Rasool1,2Qingshan Jiang
Qingshan Jiang1*Yang WangYang Wang1Xiaoluo HuangXiaoluo Huang1Qiang QuQiang Qu1Junbiao DaiJunbiao Dai1
  • 1Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China
  • 2Shenzhen College of Advanced Technology, University of Chinese Academy of Sciences, Beijing, China

DNA is a practical storage medium with high density, durability, and capacity to accommodate exponentially growing data volumes. A DNA sequence structure is a biocomputing problem that requires satisfying bioconstraints to design robust sequences. Existing evolutionary approaches to DNA sequences result in errors during the encoding process that reduces the lower bounds of DNA coding sets used for molecular hybridization. Additionally, the disordered DNA strand forms a secondary structure, which is susceptible to errors during decoding. This paper proposes a computational evolutionary approach based on a synergistic moth-flame optimizer by Levy flight and opposition-based learning mutation strategies to optimize these problems by constructing reverse-complement constraints. The MFOS aims to attain optimal global solutions with robust convergence and balanced search capabilities to improve DNA code lower bounds and coding rates for DNA storage. The ability of the MFOS to construct DNA coding sets is demonstrated through various experiments that use 19 state-of-the-art functions. Compared with the existing studies, the proposed approach with three different bioconstraints substantially improves the lower bounds of the DNA codes by 12–28% and significantly reduces errors.

1 Introduction

The natural objective of DNA-encoding methods is to provide high-density, error-free, and stable DNA codes by dynamic programming (Yim et al., 2014; Erlich and Zielinski, 2017; Organick et al., 2018; Lu et al., 2023). However, the computational capacity of dynamic programming remains infeasible with big digital data and biological sequences. Consequently, substantial efforts have been invested in finding efficient heuristic/optimization algorithms to tackle this feasibility (Cao et al., 2020a). These algorithms produce upper and lower bounds in DNA sequence data by dynamic programming. A sequence ank, if all its terms are greater than or equal to a number, k, is called the lower bound of the sequence, while a sequence ank, if all its terms are less than or equal to a number, k, is called the upper bound of the sequence (Chee and Ling, 2008). The accuracy of both the upper and lower bounds is measured concurrently by comparing them. No matter how strong an upper bound is, comparing it to a weak lower bound does not prove that it is close to the optimum. Therefore, it is essential to make lower-bound improvements. However, let us ask a more modest question. How can the improvement in the lower bounds of DNA sequence data enable the achievement of the objectives of DNA-encoding methods? A precise answer negates the accomplishment of all objectives except the stable DNA codes by reducing the non-specific hybridization errors. However, the task of constructing robust DNA-coding sets is still challenging due to sequence errors. Molecular-based computation delivers a set of sequences with the corrupt version of DNA codes, including symbol deletion or substitution and high-magnitude errors in the code words, which lose the sequences during the hybridization process (Yim et al., 2014; Li et al., 2021a). These massive errors decrease the lower bounds between the different numbers of sequences. Consequently, the DNA synthesis process becomes noisy. It is more expensive to synthesize and relatively reduces the stability of DNA data storage, which can be biotechnologically quantified, controlled, and engineered (Song et al., 2021; Song et al., 2022).

Biotechnology and bioengineering recently played a vital role in DNA computation as nanobiotechnology synthesizes DNA. Research communities are still combating errors in DNA-coding sets with different computational methods (Grass et al., 2015; Yazdi et al., 2017; Deng et al., 2019). One of the computational methods is evolutionary computation, which comprises a set of biologically inspired algorithms. For example, the author showed the chaos whale optimization with sine and cosine functions to construct the DNA sequence set (Li et al., 2021b). Similarly, Xiaoru and Ling (2021) delivered an evolutionary-based equilibrium optimization with a random search model to overcome the error rate in DNA-coding sets. These studies contributed significantly to advancing evolutionary approaches in DNA storage. However, the results still lacked an improvement in the diversity of the sampled population.

For this purpose, the effectiveness of the optimization algorithm will have to increase by designing the mutation strategies. Wang et al. (2020) considered the differential evaluation algorithm with a two-level local search strategy to improve convergence. The general purpose of such strategies is to avoid the local minima and prevent the population from being similar. The improvement in evolutionary algorithms by mutation strategies also significantly impacts the improvement of the lower bounds of DNA-coding sets. A multi-verse optimizer (MVO) was made synergistic by damping the strategy to gain a stable state in global search, and it also reported 4–16% of improved DNA-coding sets (Cao et al., 2020b). Rasool et al. (2022a) used the opposition-based learning (OBL) mutation strategy (Dong et al., 2017) for three-dimensional search space with a meta-heuristic algorithm (Mirjalili, 2015) to generate the DNA-coding sets for data storage. The codes generated by the improved algorithm (MFOL) enhanced the DNA-coding sets over the altruistic algorithm (Limbachiya et al., 2018).

Nevertheless, these evolutionary studies have performed well by enhancing the efficiency of optimization algorithms by the mutation strategies, but they focus on particular biological coding constraints. The satisfaction of these constraints controls the oligonucleotide errors in the DNA sequences (Sager and Stefanovic, 2006; Song et al., 2018; Li et al., 2021b; Cao et al., 2022). For instance, the GC-content and Hamming distance constraints were considered for the oligonucleotide libraries construction by reducing the hybridization errors (Aboluion et al., 2012; Organick et al., 2018; Yang et al., 2020; Rasool et al., 2022b). However, the current approaches and algorithms of DNA code construction by the lower-bound computation do not satisfy the reverse-complement (RC) constraints. However, unsatisfactory reverse-complement constraints are relatively crucial in DNA codes with a high rate of errors, which cause the DNA stability for storage (Sager and Stefanovic, 2006; Yin et al., 2010).

In short, the conventional optimization algorithms have evolved for lower-bound improvements. Still, various functions’ convergence abilities have declined, which was improved by different mutation strategies with different purposes. However, the lower bounds of DNA-coding sets were insufficient for robust DNA storage due to non-specific hybridization errors (Cao et al., 2020b). Although these errors have been tackled by a few biological coding constraints, the extent of error avoidance was low because DNA sequences overlapped, creating non-specific hybridization that formed the secondary structure. DNA sequences with such a structure make the chemical reaction unstable and inactivate DNA synthesis and sequencing (Song et al., 2021). Thus, the coding sets of DNA storage are still facing the lowest global optimal performance with different evolutionary algorithms and mutation strategies to store more information in a shorter sequence with a minimum error.

Thus, in this paper, a bioengineering-based evolutionary approach has been proposed to solve the aforementioned problems. This approach integrates the MFO (Mirjalili, 2015) with two customized mutation strategies (MFOS) and practically applies it to construct DNA-coding sets. We customized the original mutation strategies for compatibility with the optimization algorithms to improve the lower bounds for the DNA code construction. Then, as the main objective of this study, MFOS is used with combinatorial constraints (GC-content, Hamming distance, no-runlength, and RC constraints) to construct DNA-coding sets. The computational RC constraint significantly increases the number of DNA strands (codes) and avoids further non-specific hybridization. The experiments are performed on 19 benchmark functions, and the Wilcoxon rank-sum test is used to evaluate the improved algorithm’s quality. The performance is compared with six existing evolutionary algorithms. The overall contribution of the proposed approach produced DNA-coding sets with improved lower bounds and coding rates compared to previous studies. It is a collaborative effort of information technology and biotechnology domains to solve a bioinformatics-based computational problem for DNA data storage. The following are the noteworthy contributions of this study:

• A novel evolutionary approach is proposed to construct DNA-coding sets by using the MFOS algorithm with two customized mutation strategies for speedy convergence and powerful exploration and exploitation capabilities.

• The novelty of this study is the practical implication of the MFOS algorithm with DNA coding constraints to improve the lower bounds and coding rates of the DNA codes by storing larger data files in the shorter sequence of DNA, and the results are compared with the existing literature.

• Computational RC constraints are satisfied to generate stable DNA codes with our two theorems by eliminating the undesired non-specific hybridization errors due to the secondary structure in DNA sequences. Additionally, an empirical thermodynamic analysis is performed on the RC constraints to validate the DNA coding sets and compare them with the prior constraints.

The rest of this paper is organized as follows. Section 2 briefs the existing DNA coding constraints. Section 3 introduces the evolutionary approach. Section 4 describes the experimental procedure, Section 5 provides result evaluation, and Section 6 reports the conclusion and future work.

2 DNA coding constraints

The crucial part of DNA data storage is to construct DNA sequences with minimum errors during the synthesis and sequencing processes. These complicated processes are prone to insertion, substitution, and deletion errors (Yim et al., 2014; Wang et al., 2022). These errors with each nucleotide occur due to the consecutive repetitive subsequences, homopolymers, and GC-content with the minimum and maximum bases. The prior benchmark coding constraints (Cao et al., 2020b), including GC-content, no-runlength (NL), and Hamming distance, have also been used to construct DNA sequences by avoiding those errors. Additionally, this study introduces computation reverse-complement constraints to overcome further non-specific hybridization errors and the secondary structure during the DNA synthesis and sequences with the following mechanism.

A DNA code with length n will be a set of codes (x1x2x3...xn), while the quaternary alphabets xiA,C,G,T represent the four DNA nucleotides that form a DNA sequence. For a DNA sequence x=x1x2x3...xn, the reverse sequence xr=xnxn1...x1, complement sequence xc=x1cx2cx3c...xnc, and reverse-complement sequence xrc=xncxn1c...x1c were used. We applied the c mark to indicate the Watson–Crick complement of DNA nucleotide, thus Tc=A,Ac=T,Gc=C and Cc=G (Aboluion et al., 2012). For instance, the DNA sequences AAGGTACT, AGTACCTT, and TGAAGCAT are the reverse, complement, and reverse-complement sequences for the TCATGGAA.

In retrospective studies (Cao et al., 2020b; Rasool et al., 2022a), some sequences were similar among the set of DNA sequences, including reverse or reverse-complement, and then non-specific hybridization occurred, which caused errors by forming the secondary structure (SS). A sequence structure in which a set of pairs of nucleotides support a secondary structure is known as the stem, while the number of repeated nucleotides is known as the stem length. The secondary structure is a result of similar sequences with base-pairing connections in which one sequence folds back to itself (Heckel et al., 2019). DNA sequence with a secondary structure makes chemical reaction less active, which causes the redundancy of that DNA sequence during the synthesis and sequencing process. Thus, the secondary structure must be unfolded before reading such sequences in the wet lab. Constructing robust DNA codes with fewer resources and errors will be helpful. This problem motivated us to put forward a novel solution that must deliver sufficiently different DNA sequences among a set of sequences by evading the secondary structure.

To avoid the SS before DNA reading, one can eliminate the base–pair connection by selecting a sequence with appropriate nucleotides that must have a sufficient code rate, R, and Hamming distance, d. The net code rate R=log4k/n, where k is the number of codes in a set (coding set) and n is the sequence length number. For example, let us take a set of quinary DNA codewords Σ=AT,AC,CT,CG,TG with length 2 n. Any DNA code with such length is designed by a bijective map between quinary codes and fixed Σ, then the code rate log45/2 ≈ 0.5804. Thus, in this paper, we considered the SS with a positive integer m having stem length l and sequence length with n1. In this case, Theorem 1 constructs the mathematical proof to design the DNA sequences free from secondary structure.

Theorem 1. A DNA sequence with length n is free from the SS if there does not exist a sequence of the stem length l>1 with a minimum Hamming distance dH=d and n1.Proof. For a given sequence x=x1x2x3...xn, two subsequences xixi+1...xi+m1 and xjxj+1...xj+m1 ij>m and xixi+1...xi+m1sc=xjxj+1...xj+m1; then, these two subsequences are known as disjoint secondary-complement. It should be noted that a xrc is a secondary-complement (sc) sequence, but all secondary-complement sequences may not be xrc. In this scenario, if there is a secondary structure with the stem length l>1, there will be two disjoint subsequences (x and y) x=ysc. Thus, the results evolve as contrapositive logic for such observation that if a sequence x=x1x2x3...xn is free from SC subsequences with length l and n1, then the corresponding DNA sequence will also be freed from the SS.Apart from the SS problem, the deletion and substitution errors ε and Hamming weight M in the lower bounds caused the density of the DNA data storage system. Proposition 12 (King, 2003) leads us to construct Theorem 2 (Note 01 in the Supplementary Materials) based on reverse-complement with K-constraint length. The purpose of this theorem is to improve the lower bounds of DNA codes by RC constraints for a maximum number of DNA sequences with minimum errors r. It is constructed by Shannon’s relationship, considering the redundancy of explicit DNA codes with r/2logM.

3 Evolutionary approach

The proposed evolutionary approach leverages the development of the MFO (Mirjalili, 2015) with DNA coding constraints. The MFO algorithm is selected because it can solve the challenging constraints and unknown search space problems for several applications, i.e., sequence compression problems, which motivated us to generalize this algorithm with DNA coding constraints. Moth belongs to the butterfly family with various similar characteristics. It has a particular navigation mechanism known as transverse orientation (TO) to fly by using the moonlight. The TO mechanism empowers the moth to fly by regulating a fixed angle by the Moon’s focal point, which allows it to fly long distances. Meanwhile, the moth often collides with human-made light due to being closer than moonlight, which distracts the moth from the destination. However, the moth endures in preserving the same angle, which causes its deadly spiral path. Eventually, this behavior supports the convergence of the moth toward the light. This concept provides a mathematical optimizer algorithm termed a moth-flame optimizer (MFO) for object convergence (Mirjalili, 2015).

This evolutionary algorithm has two candidate solutions, moth and flame, and one problem variable is the position of the moth during flight. Thus, a moth can fly by changing the position in 1/2/3 or hyper dimension of space. The moth candidate solution can be considered in the following matrix Q due to its population-based system.

Q=q1,1q2,1q1,2q2,2q1,d1q1,dq2,dqn1,1qn,1qn,2qn1,dqn,d1qn,d,Qf=Qf1Qf2Qfn1Qfn,(1)

where n indicates the moth numbers and d presents the dimension variable.

An evolutionary population-based algorithm also considers an array of fitness values for all moths. The first row of Q matrix directs the position vector of a moth, which requires passing the fitness function. As a result, a fitness value is assigned to those particular moths as Qf1 in Qf matrix.

Meanwhile, the second candidate solution of MFO, the flame, also has a similar matrix R as assumed for the flame. The array dimension of both solutions is equal in numbers. Hence, a similar fitness array is also considered for the flame.

R=r1,1r2,1r1,2r2,2r1,d1r1,dr2,drn1,1rn,1rn,2rn1,drn,d1rn,d,Rf=Rf1Rf2Rfn1Rfn,(2)

where n indicates the number of flames and d represents the dimension variable.

It should be noted that moth and flame are both solutions. However, the difference between these solutions is the mechanism we conducted with them to update them in all iterations of processes. The moth’s solution flies in a circular search space by acting as a search agent. In contrast, the flame is the destination solution for the moth in that search space. Hence, the moth struggles to reach the destination as an optimal solution by flying around the search space. Overall, this algorithm (Mirjalili, 2015) mechanism is based on the following three tuples to optimize the problem for an optimal solution.

MFO=U,P,T,(3)

where U is a function that is responsible for the moth’s random population with its related fitness. This function can be modeled as U:ØQ,Qf. Meanwhile, the P function is assumed to fly the moth in a search space. It attains the Q matrix and returns the updated Qi, which is shown as P:QQi. The third tuple is the T function, which delivers the true value if it satisfies the termination criteria; otherwise, it returns false values; it is shown as T:Qtrue,false.

The P function is executed iteratively until it delivers the T function with the true value. The inspiration of this evolutionary algorithm is the TO mechanism by which the moth updates its location by considering the flame location with the following computation model:

Qi=SQi,Rj,(4)

where Qi represents the i-th moth updates, S indicates the spiral function, and Rj presents the j-th flame.

The spiral function is a key component of the MFO, which decides the moth movement with respect to flames. A conceptual model is drawn in Figure 1 for the moth location updates according to the flame. The vertical axis indicates the position of a moth in one dimension, and the horizontal axis presents the possible position update for the next location. The dashed black lines display the locations that can be used for the next position of the moth in the green horizontal line concerning the orange horizontal line of a flame. The exploitation and exploration processes can be determined in the search space. Moth uses one dimension to explore and exploit the search space of flame. Exploitation emerges if the next position between the moth and flame is inside the search space, as directed by arrow 2. In contrast, exploration appears if the position updates between the moth and flame are outside the space, as indicated by arrow 1, 3–5 in Figure 1. Exploration and exploitation can be observed by following three rules.

1) A moth may converge by altering the random number 1,+1 in the flame neighbor.

2) The lower random number is the closest distance to the flame.

3) The position frequency increases automatically as the moth comes closer to the flame.

FIGURE 1
www.frontiersin.org

FIGURE 1. Conceptual model for moth–flame algorithm to update moth’s location according to a flame.

For an effective possible solution, finding the best solution can be considered a flame candidate solution. The Q matrix (1) indicates the best solution gained so far. Apart from these three-tuple-based functions of the MFO algorithm, two consequential parameter-based arrays are also examined as upper and lower bounds:

ub=ub1,ub2,ub3,,ubn1,ubn,(5)
lb=lb1,lb2,lb3,,lbn1,lbn,(6)

where the variables ub and lb present the upper and lower bounds with n number of moths, respectively. These variables are responsible for the moth’s local and global search space limit. It must be noted that these considerations are for optimizing the MFO algorithm, while in nature, it might not be a real mechanism.

The evolutionary mechanism of this algorithm permits the moth to attain the best position in the local and global search space. However, a problem can occur that causes the MFO algorithm (Mirjalili, 2015) to fall into the local optima due to only updating the moth position corresponding to the flame and in one dimension. If all moths update the position with respect to only a single flame, all will be converged due to flying toward a flame in the search space that causes the exploration. In contrast, if all moths update the position with only n different locations and dimensions, say 3D dimensions, it stagnates the exploitation. Both cases adversely affect the promising solution of the MFO algorithm. In order to sustain the balance between exploitation and exploration capabilities and find the optimal global solution for the moth, this study employed two mutation strategies to synergy the original evolutionary algorithm: Levy flight and opposition-based learning (OBL) mutation strategy. To determine the optimal global solution, the algorithm compares the output values of the computed global solution Sg with the values of global position Pg. If the output of Sg>Pg, the algorithm will return the output Xm as the optimal global solution. In this paper, we have omitted the theoretical explanation of the OBL strategy, and readers can see the literature (Rasool et al., 2022a). Meanwhile, the theoretical details of the Levy flight are moved in Note 02 in the Supplementary Materials.

Meanwhile, the computation time complexity is a crucial metric for evaluating the algorithm run time. It is based on algorithm structure and parameter settings, i.e., number of candidates, location updates, maximum iterations, number of variables, and sorting mechanism. The Quicksort method has been adopted with a time complexity of Onlogn for the best case and On2 for the worst case. Considering the moth move function, P, and the mutation strategies, the overall computation time complexity of the improved MFOS algorithm is as follows:

OMFOS=OtOQuicksort+Olocationupdateswithmutationstrategies)),
OMFOS=Otn2+n×v=Otn2+tnv,

where t represents the iteration numbers, n indicates the number of moths, and v is the variable number.

In summary, the MFO (Mirjalili, 2015) has the capability to explore and exploit the solution in the search space, while Levy flight enables MFO for the candidate solution to acquire tiny flight with profound exploration and exploitation ability, and the OBL mutation strategy is concerned with the opposite directions for the optimal solution. These strategies significantly improve the MFOS capabilities for jumping from the local area to the promising global areas. The nest subsection investigates the practical implication of constrained optimization with an improved evolutionary approach. The pseudocode of the improved evolutionary algorithm is presented in Algorithm 1. The information about mutation strategies mentioned in Algorithm 1 is provided in Note 02 in the Supplementary Materials.

Algorithm 1. Pseudocode of the improved MFOS algorithm.

Input: The population size N for 2 candidate solutions (Q, R), moth location (L), moth FitnessFunction (Qf), flame FitnessFunction (Rf).

Output: Optimal global solution Xm

 1: Initialize random population Xi;

 2: for (each moth Xi) do

 3: Calculate Qf and Rf population using Eqs 1, 2;

 4: if (population N converge), then

 5: Update L for lb & ub using Eqs 5, 6;

 6: else

 7: Update Qf and Rf with Eqs 3, 4; end if end for

 8: for synergy of mutation strategies with Eq. (9) and OBL; do

 9: if (iteration reaches), then

 10: Compute global solution;

 11: else

 12: Re-run mutation strategies;

 13: else if

 14: Calculate fitness of population; end else if

 15: end if

 16: end for

Return: Optimal global solution Xm.

3.1 Constrained optimization with MFOS

In order to solve the multi-objective problem of the DNA data storage, the proposed meta-heuristic evolutionary algorithm is applied to the DNA coding constraints (Section 2) to find the lower bounds of DNA code words on coding sets, Cn,W,d, where n shows the sequence length, W indicates the GC-content with n/2 parameters, and d is the Hamming distance. It is convenient to achieve longer codes with repeated values. However, the DNA codes with such sequences are more likely to have errors prone to the nucleotides’ insertion, deletion, or substitution. Therefore, the improved MFOS algorithm tackles this problem by considering computational-based biological coding constraints. Church et al. (2012) reported the influential factors of errors in the sequence and suggested satisfying the GC-content and no-runlength constraints to reduce the sequencing errors (Church et al., 2012). In this regard, this study introduces RC constraints to reduce the error occurrence probability. The DNA code words’ construction that meets the constraint criterion (based on Algorithm 2) is adopted as a primer or address libraries of oligos. These DNA storage code words are more suitable for constructing random storage. Organick et al. (2018) proved that each oligo file can be retrieved without errors from the random-access storage. The development of lower bounds on Cn,W,d sets with MFOS achieves the significant number of code words for coding sets that construct the highly robust DNA data storage. The pseudocode for DNA coding constraint’s satisfactory criteria with MFOS is presented in Algorithm 2.

Algorithm 2. Pseudocode of constraints satisfactory criteria with MFOS.

Input: Sequence length (n), CGC,NL,RC (GC-content, No-runlength, RC constraint, and Hamming distance (d)), Secondary structure (SS).

Output: DNA coding sets CGC,NL,RC.

 1: Initialize individual constraint Ci;

 2: for (constraints satisfaction) do

 3: Update CGC,NL,RC;

 4: if (error occurrence), then

 5: remove SS using Theorem 1;

 6: else if iter500) then

 7: maximum iteration using Theorem 2 for best n and d;

 8: if (lower bounds improved), then

 9: constraint satisfied;

 10: else

 11: update DNA coding constraint; end if

 12: end else if

 13: iter=iter+1Cn;

 14: end if

 15: end for

Return: Improved DNA coding sets CGC,NL,RCn,W,d.

The following are MFOS’s fundamental steps to construct DNA storage coding sets with constraints CGC,NL,RCn,W,d, and the schematic of improved MFOS and its implication for DNA storage is illustrated in Figure 2. Concisely, this approach compresses four major components: 1) initialization, fitness, and convergence computation; 2) synergy of mutation strategies for the best global solution; 3) avoidance of errors by theorems; and 4) DNA coding constraints satisfaction.

• The Universe population N is initialized with the best candidate solution from moth and flame, and MFOS algorithm parameters are set with possible DNA coding that follows the particular constraints (GC, No-runlength, and Hamming distance).

• The DNA storage coding set is performed with the initial Universe population, and globally optimal solutions are secured with the current fitness of the candidate solution.

• The lower and upper bounds are computed with Eqs 5, 6 for the candidate solution, updating its exploration and exploitation position with Eq. 3.

• The updated position is executed with two mutation strategies (Levy flight and OBL) to assign the global search space to the candidate for the improved MFOS algorithm.

• The DNA-coding sets with CGC,NLn,W,d constraints are merged with RC constraints (CGC,NL,RCn,W,d) to eliminate the non-specific hybridization error using theorems 1 and 2, and the coding set with different iterations is computed.

• If the results of combinatorial constraints satisfy the improved coding rate and find the lower bounds in a higher number of codes, then the new output will be the best DNA data storage coding sets C.

FIGURE 2
www.frontiersin.org

FIGURE 2. Schematic of the improved MFOS evolutionary approach with combinatorial DNA coding constraints.

These critical steps have been followed in constructing DNA codes for data storage.

4 Experimental setup

The implementation was conducted in an integrated environment of different tools. All the evolutionary algorithms are executed on MacBook 2.4 GHz Intel Q-Core i5, 8 GB 2133 MHz DDR3, language Python with 3.8.11v, Google’s Collaboratory, and 3-dimensional convergence plots into MATLAB R2018b. In the proposed work, an image file (horse.png1) is converted into binary data by using the python package (TransBin). The binary data are mapped through the quarterly number (A-0, T-1, C-2, and G-3) of DNA bases (A, T, C, and G) for the construction of DNA code words. The proposed MFOS evolutionary algorithm is programmed in Magma software (Cannon et al., 2011) by varying the sequence lengths and Hamming distance. The DNA coding constraint-based theorems are used to generate the least-errors DNA codes with high density and coding ratio. As a result, .cod files are received with different DNA codes that satisfy the GC-content, no-runlength, and RC constraint with different numbers of sequence length and Hamming distance. Consequently, the received DNA codes from .cod files are calculated to construct the lower bound tables. Furthermore, 19 mainstream benchmark functions are implemented with the MFOS algorithm, and the theoretical details are provided in Note 03 in the Supplementary Materials.

All mainstream functions have been implemented with identical conditions. The number of iterations for each function is set at 500, and the number of moths or population size is adjusted to 50. The MFOS convergence rate directly depends on the population size with crossover and mutation probabilities. The higher the crossover, the greater the exploration ability. Typically, the crossover probability is adjusted in the 0.6–1.0 range. In contrast, mutation probability is often considered lower as compared to crossover, i.e., 0.005 to 0.05 (Wang et al., 2020). It should be noted that the moth number of candidate solutions (i.e., flame) must be selected on an experimental basis. The larger the number of candidates’ solutions, the larger the chances of achieving the global optimum. In this study, the number of moths is reasonably estimated up to 30 times to eliminate the randomness of the optimizer results. However, this number can be 10 or 20 as well for different varieties of experiments. The summary of these operators and their parameter selections is presented in Table 1.

TABLE 1
www.frontiersin.org

TABLE 1. MFOS’s operators and parameter settings.

MFOS is a heuristic algorithm based on the MFO algorithm (Mirjalili, 2015), which must be executed almost 10 times to deliver significant results. It is a general standard that an evolutionary optimizer performing for n times can be evaluated by average (AVG) and standard deviation (SD) with the optimal solution in the last iteration, which will be computed as performance metrics (Mirjalili, 2015). This study used the following rule to report the optimal solution with AVG and SD scores.

• The lowest average score is the highest algorithm performance.

• The minimum standard deviation score is the maximum stability of the algorithm.

In addition, the proposed algorithm MFOS is compared with the original MFO (Mirjalili, 2015) and various well-known and popular optimizer algorithms to validate the performance, for example, the Firefly Algorithm (FFA) (Emary et al., 2015), Grey Wolf Optimizer (GWO) (Mirjalili et al., 2014), Differential Evolution (DE) (Zhang et al., 2011), Multi-Verse Optimizer (MVO) (Mirjalili et al., 2016), and Harris Hawks Optimization (HHO) (Heidari et al., 2019). The FFA is a multi-objective optimizer for various domains and still has multiple variants. GWO achieved suitable compromises between exploration and exploitation. Recently, the MVO algorithm has been popular in DNA coding constraints in various DNA-based storage studies, i.e., DMVO (Cao et al., 2020b). HHO is a swarm-based algorithm that supports multiple iterations. A statistical test is computed from the benchmark functions to ensure the result’s originality. A non-parametric Wilcoxon rank-sum test (Kim and Kim, 1996) is adopted to evaluate and compare the results of MFO and MFOS algorithms.

Furthermore, the MFOS algorithm is applied in the Magma program with DNA coding constraints, i.e., GC-content and RC constraint, to assess the DNA storage effectiveness by the coding sets. The received lower-bound values are compared with a state-of-the-art Altruistic algorithm (Limbachiya et al., 2018) and two recent optimizer algorithms [KMVO (Cao et al., 2020a) and DMVO (Cao et al., 2020b)]. In addition, this study reported the lower bounds of DNA codes with RC constraint and compared the results with previous work, MFOL (Rasool et al., 2022a). A thermodynamic analysis is performed on coding constraints and compared with the newly introduced RC constraint to validate it by the computation of temperature variance.

5 Result evaluations

5.1 Benchmark function’s evaluation

A general trend exhibits the improved performance of our evolutionary algorithm in many functions. The improved AVG and SD values in the results prove that strategic combination is more effective in gaining convergence for the global optimum than MFO and the other five algorithms. Further evaluations are reported in Note 04 in the Supplementary Materials.

5.2 Convergence efficiency

The convergence curve is a key criterion for evaluating the optimizer’s convergence speed and ability to jump out from the local optima. This study re-executed experiments on the specific mainstream functions by using five moths over 500 iterations. These functions are selected based on the best performance from Tables 1, Table 2, and 3 given in Note 03 in the Supplementary Materials. Two metrics, search history and convergence rate, are adopted to affirm the convergence of the improved MFOS algorithm. Search history is a qualitative metric that plots the 3D representation curves with the sequence of different iterations. It may also be seen from the 3D representation that fluctuation-flow are greatly dependent on the iteration sequence with different values. These observations guarantee the MFOS’s effectiveness for the optimized problem to attain the balanced transition between exploration and exploitation. In addition, the convergence rate is a quantitative metric that plots the best candidate’s fitness in each iteration. The fitness reduction with the passage of iterations empowers the MFOS convergence. To analyze the effectiveness of the Levy flight and OBL mutation strategies, Figure 3 illustrates the comparison of the original MFO, our MFOS, and the other five algorithms. In the unimodal F2 function, although the MFO secured the optimal global solution, it failed to jump out from the local optima in its early fitness. In contrast, the MFOS algorithm converges more speedily than the MFO and attains the optimal global solution after almost 100 iterations. Meanwhile, our optimizer attained optimal solution at 50 iterations in the F12 function. In contrast, the MFO fell into the local optima. Likewise, in the composite F18 function, the MFO curve tends to be horizontal with no more extended convergence, while the MFOS easily and rapidly converges and accesses the global optima due to its mutation strategies. In summary, the search-based meta-heuristic MFOS convergence curves are empirically insured by quantitative metrics. It is observed that the improved algorithm exhibits competitive results over the state-of-the-art optimizers by endowing a balanced nature between exploration and exploitation.

TABLE 2
www.frontiersin.org

TABLE 2. Superscript identifications and their meanings.

FIGURE 3
www.frontiersin.org

FIGURE 3. Convergence efficiency of unimodal (F2 and F5), multimodal (F9 and F12), and composite (F14 and F18) functions with 3D search space, search history, and curves.

5.3 Wilcoxon rank-sum test

Rank-sum statistical tests are used for doubtful distribution; without consideration, either the object is known or unknown. A popular rank-sum test proposed by Wilcoxon is an alternative non-parametric test for ranking two samples (Kim and Kim, 1996). The null hypothesis of the Wilcoxon rank-sum test is typically interpreted as equal medians instead of equal means. The two populations have the same distribution with the same median, which is another way to conceptualize the null. If evidence is found that one distribution is shifted to the left or right of the other, the null hypothesis will be rejected. Rejecting the null proves that the medians of the two populations are different because we assume that our distributions are equal. This study investigates the statistically significant difference between the MFO and MFOS algorithms by computing the rank-sum of any two samples of the 30 iterations.

Particularly, an algorithm is pondered as statistically substantial if the Pvalue>0.05. In Figures 4A–C, the results met the threshold criteria (p > 0.05) in various functions, and the threshold line presents the Pvalue. These results demonstrate the statistical significance of the MFOS algorithm due to stronger exploration and jumping-out ability from the local optimum.

FIGURE 4
www.frontiersin.org

FIGURE 4. Wilcoxon rank-sum test’s comparison of MFO and MFOS algorithms for (A) unimodal functions, (B) multimodal functions, and (C) composite functions.

5.4 Bounds on DNA storage coding constraints

The MFOS evolutionary algorithm is programmed to enhance the lower bounds of DNA coding sets with CGC,NLn,W,d constraints which present three GC-content, No-runlength, and Hamming distance constraints that delivered the constraints satisfied DNA sequences. Meanwhile, the acquired MFOS outputs are compared with recently best-obtained results from Altruistic (Limbachiya et al., 2018), KMVO (Cao et al., 2020a), and DMVO (Cao et al., 2020b). The altruistic algorithm (Limbachiya et al., 2018) obtained results by utilizing 4n13 and 1d13 constraints with W=n/2. The algorithms (KMVO (Cao et al., 2020a) and DMVO (Cao et al., 2020b)) found the lower bounds with 4n10 and 1dn boundary. The bold entries in Table 3 and Table 4 show the lower bounds of DNA coding sets with our improved MFOS algorithm, and superscript identification is classified in Table 2.

TABLE 3
www.frontiersin.org

TABLE 3. Lower bounds’ comparison of the MFOS algorithm with KMVO (Cao et al., 2020a), DMVO (Cao et al., 2020b), and Altruistic algorithm (Limbachiya et al., 2018) for CGC,NLn,W,d.

TABLE 4
www.frontiersin.org

TABLE 4. Lower bounds of MFOS with CGC,NL,RCn,W,d.

5.4.1 Lower-bound improvements

New lower bounds reported by the MFOS outperformed other algorithms, shown in Table 3. We analyzed the previous three studies’ lower bounds and then compared our lower bounds with the one with the highest lower bound. For example, at n = 8 and d = 3, the lower bounds of the Altruistic algorithm are 289, KMVO has 319, DMVO obtained 324, and our work achieved 469. Therefore, we compared MFOS with the one with the highest lower bound (DMVO). While few coding sets are on the same previous level, i.e., MFOS has the same sets as KMVO and DMVO when n = 5 and d = 3,4, and n = 11 and d = 10 with an Altruistic algorithm. Similarly, few lower bounds are reported with fewer coding sets as the number of sequence lengths (n) increased. For example, MFOS lower bounds were reduced by 0.83% at n = 12 and d = 3, and 11.11% at n = 11 and d = 8, compared to the Altruistic algorithm. However, with an average of 52.28%, the proposed algorithm improved the lower bound coding sets compared with that of the d = 5. Meanwhile, compared with KMVO and DMVO algorithms in the same state (n = 6–13 and d = 5), the MFOS algorithm’s lower bounds are 12–35% higher than the KMVO and 12–28% higher than the DMVO.

These considerable improvements in MFOS are strengthened by adopting Levy flight and OBL mutation strategies. This strategic method accredits the MFOS algorithm with fast convergence and stronger exploration abilities, enabling it to jump out of the local optima to secure itself in the optimal global solution. In conclusion, the proposed MFOS algorithm considerably acquired a large number of lower-bound DNA-coding sets compared to the benchmark algorithm and designed the conditions to store larger files in the DNA storage system.

Regardless of these substantial developments, the fact that the consecutive repetition of subsequences unaffected with CGC,NLn,W,d is still prone to errors in developing DNA coding sets (Erlich and Zielinski, 2017). Additionally, retrospective studies (Cao et al., 2020b; Rasool et al., 2022a) discovered the SS due to this consecutive repetition of similar subsequences that folds back to themselves. We used the RC constraint with computational modeling to eliminate such an SS to design a stable DNA synthesis and sequencing process. Therefore, this study introduced reverse-complement constraints (Section 2) to construct more robust DNA-coding sets; and the higher the robustness, the lower the error probability in the DNA data storage. RC is added to three basic constraints CGC,NLn,W,d and was implemented with the proposed MFOS algorithm. Table 4 represents the yielded coding sets with 4n10 and 3dn bounds that satisfy the four constraints CGC,NL,RCn,W,d. The particular selection of these lower bounds enabled this study to compare the results with MFOL (Rasool et al., 2022a). The results revealed that RC constraints with the MFOS algorithm increased the DNA-coding sets in various n/d. For instance, in all n, 28.12 and 33.52% of DNA coding sets have been improved when d = 4 and d = 5, respectively. In glance of a specific number of sequences, e.g., n = 10 at d = 5, MFOS lower bounds are 31.21% better than the MFOL algorithm.

In contrast, the coding set in a particular Hamming distance is also increased and decreased. For example, in d = 3, 21.13% of lower bounds increased and 11.71% decreased, which is insufficient for DNA data storage construction. It is probably due to the decrement of the MFOS algorithm candidate sets, which decrees the number of appropriate sequences. It indicates there is still room to construct more robust DNA codes without decreasing the lower bounds. For instance, if the candidate sets are increased, n = 10 and d = 7, MFOS can deliver larger sequences with improved lower bounds.

We have illustrated Figure 5 to compare lower-bound improvements for 7n10 and 3d5. Figure 5A is based on the bounds of Table 3, which demonstrates that the GC-content and no-runlength constraints have adequately improved the lower bounds of DNA codes in the lower Hamming distance with all sequence lengths. This improvement is comparatively less with a higher Hamming distance, while it is still more considerable than the existing work with the same constraints. In contrast, Figure 5B reported the lb comparison based on Table 4. It reveals that lower bounds have been significantly improved with a higher Hamming distance with the combination of four constraints, including the RC constraint. The improvement in lower bounds means that the DNA codes given in the particular sequence length have more capacity to accommodate the digital data, improving the density and sequence stability. These consequential performances of the improved algorithm with strategic mutations and the RC constraint confirm its implication for the practical problems of DNA data storage. In addition, the DNA sequences constructed by MFOS for n = 7 and d = 5 are presented in Table 5.

FIGURE 5
www.frontiersin.org

FIGURE 5. Comparison of improved lower bounds (lb) with different sequence lengths based on (A) Table 3 and (B) Table 4.

TABLE 5
www.frontiersin.org

TABLE 5. DNA coding sets received at n=7,d=5 from Table 4.

5.4.2 DNA coding rates

The advancement in the lower bounds is directly favorable to the improvements in DNA coding rates (R), which can be defined as (Cao et al., 2020a):

R=log4K/n,(10)

where K indicates the number of DNA-coding sets and n presents the sequence length number.

The empirical analysis of Table 3 revealed that the MFOS algorithm acquired almost the same coding rate with shorter sequence lengths n1. For example, the Altruistic algorithm reported R = log4190/12 = 0.315 when n = 12 and d = 6, while the MFOS algorithm reported a 0.316 coding rate when n = 11 and d = 6. Although KMVO and DMVO’s coding rates were better than the Altruistic algorithm, the MFOS’s coding rate was more effective. For example, KMVO informed 0.499 coding rates with n = 7 and d = 3, while the proposed algorithm found 0.498 rates with n = 6 and d = 3. In comparison with DMVO, the MFOS reached 0.323 at n = 7 and d = 5, while DMVO got a 0.32 coding rate at n = 8 and d = 5. Meanwhile, in Table 4, the MFOS algorithm has significantly helped to improve the lower bounds in various coding sets as compared to the previous algorithm (Rasool et al., 2022a). For instance, MFOL achieved a 0.545 coding rate when d = 3 and n = 9, while the current algorithm (MFOS) has attained almost the same coding rate of 0.544 with a shorter sequence n1 at n = 8 with d = 3. Similarly, at d = 5, the MFOS’s coding rate was 0.323 with n = 7. However, the previous MFOL algorithm had 0.32 with n = 8. The evaluation of Table 4 revealed that the improved evolutionary algorithm had increased by 50% in DNA coding sets, while 35.7% of coding sets have the same level as MFOL. These adequate improvements in the lower bounds report the satisfaction of DNA coding constraints.

Figure 6 compares the DNA-coding rate based on the standard error mean (SEM) for d = 3. The SEM measures how precise the new sample is as the probability of the existing sample. It is used to statistically estimate the interval of the DNA code rate between our new codes with previous codes. Figure 6A presents the coding rate of Table 3 based on CGC,NLn,W,d constraints and provides the SEM between our code rate and the Altruistic algorithm (Limbachiya et al., 2018; Cao et al., 2020a; Cao et al., 2020b). The rising of bars with the increasing sequence length indicates the improving coding rates with n1 sequence. However, the red error bars specify the estimation of the mean error between our DNA codes and previous ones. It means that the smaller the error bar, the larger the coding rate with the better estimation of DNA codes. Similarly, Figure 6B delivered the same comparison for CGC,NL,RCn,W,d constraints based on Table 4. It emphasizes the effectiveness of combinatorial constraints, wherein four constraints have been configured to attain the maximum coding rate with the slightest mean error. Overall, this evaluation provides the strength that larger digital files can be stored in shorter sequences with n1 by avoiding the mean error.

FIGURE 6
www.frontiersin.org

FIGURE 6. DNA-coding rate comparison at d = 3 using standard error mean based on (A) Table 3 and (B) Table 4.

Hence, these analytical results determined that shorter sequences can also gain the same DNA storage performance as longer sequences. Consequently, shorter sequences would easily reduce the cost and make it easier to synthesize with more stable conditions. The increased lower bounds in the given coding sets signify the reduction of the SS in the DNA sequences, which helped the proposed approach to avoid the non-specific hybridization errors. These results emphasize the improvement of lower bounds for the further advancement of density-based DNA data storage.

5.5 Temperature variance of DNA codes

The temperature variance of DNA codes analytically evaluates the rationality of the newly introduced constraint. In DNA coding, half of the double-stranded DNAs split into single-stranded DNAs during the denaturation process (Sager and Stefanovic, 2006) by the melting temperature (Tm). It relies on GC-content that influences the chemical reaction of DNA molecules: the higher the GC-content presents, the higher the Tm. In the PCR, a proper Tm can be more suitable in binding the forward and reverse primers. Hence, the primers with similar Tm can eliminate non-specific hybridization linked with oligo design and its thermodynamic features. DNA sequences with the same Tm are more stable in constructing the DNA codes. This Tm variances are conducted to differentiate the sequence stability: the smaller the temperature variance, the more stable the Tm of the DNA coding set (Chee and Ling, 2008; Dinis et al., 2020).

As the main objective of this work was to generate a DNA sequence with shorter sequences, an experiential thermodynamic test was performed to authenticate the DNA sequences. The experiential parameters of primer concentration are set at 200nM, and the salt concentration at 50nM. For instance, based on these concentrations, a primer (ACGTATCAGA) with n=10 reported 30% GC-content, and nucleotide degeneration is allowed at Tm=26°C. The coding sets with our evolutionary approach are examined with and without the newly added constraint for its associated Tm values. Table 6 delivers the comparison of Tm variances with CGC,NL; CGC,NL,RC constraints for particular (6 < n < 10, 2 < d < 9) lower bounds. The results demonstrate the lowest Tm variance for the new constraint (CGC,NL,RC) compared to CGC,NL. For comprehensive insights, a clustered bar chart is illustrated in Figure 7. It compares the Tm variances for CGC,NL and CGC,NL,RCn,W,d when n = 9 and Hamming distance is 2 < d < 9. It indicates the 22% smaller Tm variance for the new constraint as compared to CGC,NL. The lowest Tm variances for CGC,NL,RCn,W,d indicates significantly more effective results for the RC than the existing constraints. This analysis dominates the practical inference and demand of the RC constraint for DNA-coding sets as it decreases 13.36–37.99% Tm variances when n = 9. These smaller Tm variances of the DNA-coding set provide support to the stable PCR reaction due to the reduction of non-specific hybridization, which proved the RC constraint applicability.

TABLE 6
www.frontiersin.org

TABLE 6. Comparison of CGC,NL and CGC,NL,RCn,W,d for Tm variance of DNA codes with 5 < n < 10, 2 < d < 9.

FIGURE 7
www.frontiersin.org

FIGURE 7. Comparison of Tm variances when n = 9 for the CGC,NL and CGC,NL,RCn,W,d constraints.

6 Conclusion

Computationally optimized DNA storage algorithms have uncertainty for DNA code stability as required by the DNA synthesis and sequencing process. We, therefore, applied mutation strategies to enhance the optimization efficiency by improving the lower bounds, which allowed us to construct stable DNA codes with the minimum hybridization errors. We synergized a bioengineering-based evolutionary approach with the MFOS algorithm and RC coding constraints to construct more stable and robust codes for DNA storage. The results presented in Figures 3, 4 indicate the MFOS’s competence, faster convergence, and better optimization efficiency than previous algorithms. The improved heuristic algorithm is practiced to generate the optimized DNA code words with the GC-content, Hamming distance, no-runlength constraints, and improved 12–28% lower bounds coding sets than the prior algorithm (DMVO), as revealed in Table 3. In addition, the RC constraint with MFOS meaningfully enhanced the coding rate in 50% of the lower bounds at the same constraints compared with the existing work (Table 4). It attained effective coding rates with shorter sequences by avoiding the SS and enhancing DNA storage density and stability. Consequently, our approach’s shorter sequences can help reduce errors during DNA synthesis and sequencing. Thus, storing a larger file in a shorter DNA sequence is feasible due to the improved lower bounds and coding rates of DNA coding sets. Eventually, comparing temperature variances (Tm) with and without the RC constraint demonstrates that smaller Tm variances of DNA sequences can avoid further non-specific hybridization for stable DNA data storage. This evolutionary approach enhances the robustness of optimization algorithms for a biological purpose: the construction of DNA coding sets for the future digital data storage technology into DNA. The proposed approach will apply to constructing sequence data in other bioengineering technologies.

In the future, the DNA codes generated by the MFOS algorithm can be assessed under more strict constraints, i.e., hairpin structure or triplet-based unpaired constraints (Zhu et al., 2021). As the constraints are strict, the DNA-coding set will be smaller and have a higher density of DNA data storage codes. Similarly, various lower bounds and coding rates are still captivating to be enhanced for more stable DNA codes. Additionally, the constructed coding sets by the proposed approach can be used to design an end-to-end DNA data storage system (Takahashi et al., 2019).

Data availability statement

The datasets presented in this study can be found in online repositories. The names of the repository/repositories and accession number(s) can be found in the article/Supplementary Material.

Author contributions

AR, QJ, and QQ conceived and designed the methodology. AR conducted the experiments and prepared the original manuscript. QJ and QQ supervised the project. QQ, YW, JD, and XH analyzed and validated the theoretical results. AR and QJ reviewed the final draft.

Funding

This work is supported by the National Key Research and Development Program of China under fund numbers 2021YFF1200100, 2021YFF1200104, 2020YFA0909100, and 2021YFF1201700.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Supplementary material

The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fgene.2023.1158337/full#supplementary-material

Footnotes

1http://clipart-library.com/clipart/horse-clip-art-9.htm

References

Aboluion, N., Smith, D. H., and Perkins, S. (2012). Linear and nonlinear constructions of DNA codes with Hamming distance d, constant GC-content and a reverse-complement constraint. Discrete Math. 312 (5), 1062–1075. doi:10.1016/j.disc.2011.11.021

CrossRef Full Text | Google Scholar

Cannon, J. B., Fieker, C., and Steel, A. K. (2011). Handbook of Magma functions. Available online: https://www.math.uzh.ch/sepp/magma-2.20.4-cr/HandbookVolume09.

Google Scholar

Cao, B., Zhao, S., Li, X., and Wang, B. (2020). K-means multi-verse optimizer (KMVO) algorithm to construct DNA storage codes. Ieee Access 8, 29547–29556. doi:10.1109/access.2020.2970838

CrossRef Full Text | Google Scholar

Cao, B., Li, X., Zhang, X., Wang, B., Zhang, Q., and Wei, X. (2020). Designing uncorrelated address constrain for DNA storage by DMVO algorithm. IEEE/ACM Trans. Comput. Biol. Bioinforma. 19, 866–877.

Google Scholar

Cao, B., Zhang, X., Cui, S., and Zhang, Q. (2022). Adaptive coding for DNA storage with high storage density and low coverage. npj Syst. Biol. Appl. 8 (1), 23. doi:10.1038/s41540-022-00233-w

PubMed Abstract | CrossRef Full Text | Google Scholar

Chee, Y. M., and Ling, S. (2008). Improved lower bounds for constant GC-content DNA codes. IEEE Trans. Inf. Theory 54, 391–394. doi:10.1109/tit.2007.911167

CrossRef Full Text | Google Scholar

Church, G. M., Gao, Y., and Kosuri, S. (2012). Next-generation digital information storage in DNA. Science 337 (6102), 1628. doi:10.1126/science.1226355

PubMed Abstract | CrossRef Full Text | Google Scholar

Deng, L., Wang, Y., Noor-A-Rahim, M., Guan, Y. L., Shi, Z., Gunawan, E., et al. (2019). Optimized code design for constrained DNA data storage with asymmetric errors. Ieee Access 7, 84107–84121. doi:10.1109/access.2019.2924827

CrossRef Full Text | Google Scholar

Dinis, T. B. V., Sousa, F., and Freire, M. G. (2020). Insights on the DNA stability in aqueous solutions of ionic liquids. Front. Bioeng. Biotechnol. 8, 547857. doi:10.3389/fbioe.2020.547857

PubMed Abstract | CrossRef Full Text | Google Scholar

Dong, W., Kang, L., and Zhang, W. (2017). Opposition-based particle swarm optimization with adaptive mutation strategy. Soft Comput. 21 (17), 5081–5090. doi:10.1007/s00500-016-2102-5

CrossRef Full Text | Google Scholar

Emary, E., Zawbaa, H. M., Ghany, K. K. A., hassanien, A. E., and Parv, B. (2015). “Firefly optimization algorithm for feature selection,” in Proceedings of the 7th Balkan Conference on Informatics Conference, Craiova, Romania, September 2015 (Association for Computing Machinery), Article 26.

CrossRef Full Text | Google Scholar

Erlich, Y., and Zielinski, D. (2017). DNA Fountain enables a robust and efficient storage architecture. Science 355 (6328), 950–954. doi:10.1126/science.aaj2038

PubMed Abstract | CrossRef Full Text | Google Scholar

Grass, R. N., Heckel, R., Puddu, M., Paunescu, D., and Stark, W. J. (2015). Robust chemical preservation of digital information on DNA in silica with error-correcting codes. Angew. Chemie-International Ed. 54 (8), 2552–2555. doi:10.1002/anie.201411378

CrossRef Full Text | Google Scholar

Heckel, R., Mikutis, G., and Grass, R. N. (2019). A characterization of the DNA data storage channel. Sci. Rep. 9 (1), 9663. doi:10.1038/s41598-019-45832-6

PubMed Abstract | CrossRef Full Text | Google Scholar

Heidari, A. A., Mirjalili, S., Faris, H., Aljarah, I., Mafarja, M., and Chen, H. (2019). Harris hawks optimization: Algorithm and applications. Future Gener. Comput. Syst. 97, 849–872. doi:10.1016/j.future.2019.02.028

CrossRef Full Text | Google Scholar

Kim, D. H., and Kim, Y. C. (1996). Wilcoxon signed rank test using ranked-set sample. Korean J. Comput. Appl. Math. 3 (2), 235–243. doi:10.1007/bf03008904

CrossRef Full Text | Google Scholar

King, O. D. (2003). Bounds for DNA codes with constant GC-content. Electron. J. Comb. 10 (1). doi:10.37236/1726

CrossRef Full Text | Google Scholar

Li, M., Wu, J., Dai, J., Jiang, Q., Qu, Q., Huang, X., et al. (2021). A self-contained and self-explanatory DNA storage system. Sci. Rep. 11 (1), 18063. doi:10.1038/s41598-021-97570-3

PubMed Abstract | CrossRef Full Text | Google Scholar

Li, X., Wei, Z., Wang, B., and Song, T. (2021). Stable DNA sequence over close-ending and pairing sequences constraint. Front. Genet. 12, 644484. doi:10.3389/fgene.2021.644484

PubMed Abstract | CrossRef Full Text | Google Scholar

Limbachiya, D., Gupta, M. K., and Aggarwal, V. (2018). Family of constrained codes for archival DNA data storage. Ieee Commun. Lett. 22 (10), 1972–1975. doi:10.1109/lcomm.2018.2861867

CrossRef Full Text | Google Scholar

Lu, M., wang, M., Qiang, W., Cui, J., Wang, Y., Huang, X., et al. (2023). Towards high-density storage of text and images into DNA by the “Xiao-Pang” codec system. Sci. China Life Sci. doi:10.1007/s11427-022-2252-0

CrossRef Full Text | Google Scholar

Mirjalili, S., Mirjalili, S. M., and Lewis, A. (2014). Grey Wolf optimizer. Adv. Eng. Softw. 69, 46–61. doi:10.1016/j.advengsoft.2013.12.007

CrossRef Full Text | Google Scholar

Mirjalili, S., Mirjalili, S. M., and Hatamlou, A. (2016). Multi-verse optimizer: A nature-inspired algorithm for global optimization. Neural Comput. Appl. 27 (2), 495–513. doi:10.1007/s00521-015-1870-7

CrossRef Full Text | Google Scholar

Mirjalili, S. (2015). Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm. Knowledge-Based Syst. 89, 228–249. doi:10.1016/j.knosys.2015.07.006

CrossRef Full Text | Google Scholar

Organick, L., Ang, S. D., Chen, Y. J., Lopez, R., Yekhanin, S., Makarychev, K., et al. (2018). Random access in large-scale DNA data storage. Nat. Biotechnol. 36 (3), 242–248. doi:10.1038/nbt.4079

PubMed Abstract | CrossRef Full Text | Google Scholar

Rasool, A., Qu, A., Jiang, Q., and Wang, Y. (2022). “A strategy-based optimization algorithm to design codes for DNA data storage system,” in Algorithms and Architectures for Parallel processing (Cham: Springer International Publishing), 284–299.

CrossRef Full Text | Google Scholar

Rasool, A., Qu, Q., Wang, Y., and Jiang, Q. (2022). Bio-constrained codes with neural network for density-based DNA data storage. Mathematics 10 (5), 845. doi:10.3390/math10050845

CrossRef Full Text | Google Scholar

Sager, J., and Stefanovic, D. (2006). “Designing nucleotide sequences for computation: A survey of constraints,” in DNA computing (Berlin, Heidelberg: Springer Berlin Heidelberg).

CrossRef Full Text | Google Scholar

Song, W., Cai, K., Zhang, M., and Yuen, C. (2018). Codes with run-length and GC-content constraints for DNA-based data storage. Ieee Commun. Lett. 22 (10), 2004–2007. doi:10.1109/lcomm.2018.2866566

CrossRef Full Text | Google Scholar

Song, L. F., Deng, Z. H., Gong, Z. Y., Li, L. L., and Li, B. Z. (2021). Large-Scale de novo Oligonucleotide Synthesis for Whole-Genome Synthesis and Data Storage: Challenges and Opportunities. Front. Bioeng. Biotechnol. 9, 689797. doi:10.3389/fbioe.2021.689797

PubMed Abstract | CrossRef Full Text | Google Scholar

Song, L., Geng, F., Gong, Z. Y., Chen, X., Tang, J., Gong, C., et al. (2022). Robust data storage in DNA by de Bruijn graph-based de novo strand assembly. Nat. Commun. 13 (1), 5361. doi:10.1038/s41467-022-33046-w

PubMed Abstract | CrossRef Full Text | Google Scholar

Takahashi, C. N., Nguyen, B. H., Strauss, K., and Ceze, L. (2019). Demonstration of end-to-end automation of DNA data storage. Sci. Rep. 9 (1), 4998. doi:10.1038/s41598-019-41228-8

PubMed Abstract | CrossRef Full Text | Google Scholar

Wang, Z. J., Zhan, Z. H., Lin, Y., Yu, W. J., Wang, H., Kwong, S., et al. (2020). Automatic niching differential evolution with contour prediction approach for multimodal optimization problems. Ieee Trans. Evol. Comput. 24 (1), 114–128. doi:10.1109/tevc.2019.2910721

CrossRef Full Text | Google Scholar

Wang, P. H., Mu, Z., Sun, L., and Wang, B. (2022). Hidden addressing encoding for DNA storage. Front. Bioeng. Biotechnol. 10, 916615. doi:10.3389/fbioe.2022.916615

PubMed Abstract | CrossRef Full Text | Google Scholar

Xiaoru, L. L. G., and Ling, G. (2021). Combinatorial constraint coding based on the EORS algorithm in DNA storage. PLoS ONE 16 (7), e0255376. doi:10.1371/journal.pone.0255376

PubMed Abstract | CrossRef Full Text | Google Scholar

Yang, A. M., Zhang, W., Wang, J., Yang, K., Han, Y., and Zhang, L. (2020). Review on the application of machine learning algorithms in the sequence data mining of DNA. Front. Bioeng. Biotechnol. 8, 1032. doi:10.3389/fbioe.2020.01032

PubMed Abstract | CrossRef Full Text | Google Scholar

Yazdi, S. M. H. T., Gabrys, R., and Milenkovic, O. (2017). Portable and error-free DNA-based data storage. Sci. Rep. 7 (1), 5011. doi:10.1038/s41598-017-05188-1

PubMed Abstract | CrossRef Full Text | Google Scholar

Yim, A. K.-Y., Yu, A. C. S., Li, J. W., Wong, A. I. C., Loo, J. F. C., Chan, K. M., et al. (2014). The essential component in DNA-based information storage system: Robust error-tolerating module. Front. Bioeng. Biotechnol. 2, 49. doi:10.3389/fbioe.2014.00049

PubMed Abstract | CrossRef Full Text | Google Scholar

Yin, Z., Ye, C. M., and Wen, M. (2010). Research on DNA encoding design constraint by minimal free energy. Comput. Eng. Appl. 46 (12), 25–27.

Google Scholar

Zhang, L., Xu, X., Zhou, C., Ma, M., and Yu, Z. (2011). “An improved differential evolution algorithm for optimization problems,” in Advances in computer science, intelligent system and environment (Berlin, Heidelberg: Springer Berlin Heidelberg).

CrossRef Full Text | Google Scholar

Zhu, C. X., Liu, X., Li, Y., Ma, S., Wang, M., and You, T. (2021). Hairpin DNA assisted dual-ratiometric electrochemical aptasensor with high reliability and anti-interference ability for simultaneous detection of aflatoxin B1 and ochratoxin A. Biosens. Bioelectron. 174, 112654. doi:10.1016/j.bios.2020.112654

PubMed Abstract | CrossRef Full Text | Google Scholar

Keywords: biocomputing, DNA coding sets, bioconstrained codes, MFO, DNA data storage

Citation: Rasool A, Jiang Q, Wang Y, Huang X, Qu Q and Dai J (2023) Evolutionary approach to construct robust codes for DNA-based data storage. Front. Genet. 14:1158337. doi: 10.3389/fgene.2023.1158337

Received: 07 February 2023; Accepted: 02 March 2023;
Published: 20 March 2023.

Edited by:

Ka-Chun Wong, City University of Hong Kong, Hong Kong SAR, China

Reviewed by:

Yasser Youssef, University of Oklahoma, United States
Nadir Mahammed, Ecole Supérieure d'Informatique de Sidi Bel Abbès, Algeria

Copyright © 2023 Rasool, Jiang, Wang, Huang, Qu and Dai. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Qingshan Jiang, cXMuamlhbmdAc2lhdC5hYy5jbg==

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.