SlideShare a Scribd company logo
1 of 7
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 44
A CLONAL BASED ALGORITHM FOR THE RECONSTRUCTION OF
GENETIC NETWORK USING S-SYSTEM
Jereesh A S 1
, Govindan V K 2
1
Research scholar, 2
Professor, Department of Computer Science & Engineering, National Institute of Technology,
Calicut, Kerala, India, jereesh.a.s@gmail.com, vkg@nitc.ac.in
Abstract
Motivation: Gene regulatory network is the network based approach to represent the interactions between genes. DNA microarray is
the most widely used technology for extracting the relationships between thousands of genes simultaneously. Gene microarray
experiment provides the gene expression data for a particular condition and varying time periods. The expression of a particular gene
depends upon the biological conditions and other genes. In this paper, we propose a new method for the analysis of microarray data.
The proposed method makes use of S-system, which is a well-accepted model for the gene regulatory network reconstruction. Since
the problem has multiple solutions, we have to identify an optimized solution. Evolutionary algorithms have been used to solve such
problems. Though there are a number of attempts already been carried out by various researchers, the solutions are still not that
satisfactory with respect to the time taken and the degree of accuracy achieved. Therefore, there is a need of huge amount further
work in this topic for achieving solutions with improved performances.
Results: In this work, we have proposed Clonal selection algorithm for identifying optimal gene regulatory network. The approach is
tested on the real life data: SOS Ecoli DNA repairing gene expression data. It is observed that the proposed algorithm converges
much faster and provides better results than the existing algorithms.
Index Terms: Microarray analysis, Evolutionary Algorithm, Artificial Immune System, S-system, Gene Regulatory
Network, SOS Ecoli DNA repairing, Clonal Selection Algorithm.
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
DNA microarray is a modern technology, which is used to
analyze the interactions between thousands of genes in parallel
[7]. Exploiting the hybridization property of CDNA, the
transcript abundance information is measured in microarray
experiment. Microarrays have numerous applications. A
particular set of genes are activated for a particular condition.
Identification of activated genes will be useful for recovering
or activating the conditions artificially. Even though the
technology is well developed, direct biological methods
available for finding gene expression are complex. Analysis of
protein expression data is very expensive due to the complex
structures of proteins.
Microarray data analysis involves methodologies and
techniques to analyze the data obtained after the microarray
experiments. The major part of the microarray data analysis is
the numerical analysis of normalized data matrix. Gene
expression analysis is a large-scale experiment, which comes
under functional genomics. Functional genomics deals with
the analysis of large data sets to identify the functions and
interactions between genes [24]. A set of algorithms and
methods are defined for the analysis of microarray data. There
is a tradeoff between the time and accuracy for using an
algorithm for analyzing the microarray data.
Gene Regulatory Network (GRN) is a network of set of genes,
which are involved, in a particular process. In GRN, each node
represents gene and links between genes define the
relationships between those genes. Gene regulatory network is
the network based approach to represent the interactions
between genes. The expression of a particular gene depends
upon the biological conditions and other genes. Gene
microarray experiment identifies the gene expression data for
a particular condition and varying time periods. Identifying
such network will lead to various applications in biological
and medical areas. Objective of this paper is to propose a new
method, which leads to substantial improvements in
processing time and accuracy. High dimensionality of the
microarray data matrix makes the identification of GRN
complex. In this paper optimization of S-system model using
artificial immune system is proposed.
The rest of this paper is organized as follows. A brief survey
of some of the existing work is given in Section 2. Section 3
presents the mathematical model used for the modeling of
gene regulatory network and algorithm for the optimization
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 45
process. Section 4 describes the experimental setup and
compares the results of the new proposal with the existing
approach. Section 5 is a discussion based on the results
obtained by the proposed method on the real life data set
called SOS Ecoli DNA repairing gene expression. Finally, the
paper is concluded in Section 6.
2. LITERATURE SURVEY
There have been several mathematical models applied for the
gene regulatory network reconstruction. One of the basic
mathematical models identified was based on Random
Boolean Network [1]. According to this model, the state of a
particular gene will be either in on or off state. The state space
for Boolean network is 2N
where N is the number of genes in
microarray. This model gives the information about gene
states, but does not provide expression levels of genes.
Zhang et al. [25] suggested Bayesian network model based on
joint probability distribution. This model uses DAG (Directed
Acyclic Graph) structure for modeling. Since the gene
regulatory network is having the property of cyclic
dependency between gene nodes, this type of model is not
efficient for inferring gene network.
Another important work [17] proposed is the modeling of
Gene regulatory network using ANN (Artificial Neural
Network) with the standard back propagation method. The
number of inputs and outputs required for this model is N,
where N is the number of genes in microarray data set. The
structural complexity of ANN model will increase as the
number of genes increases; hence, this model is not efficient
for large data sets.
Reverse engineering using the evolutionary algorithms can be
applied for solving the optimization problems. Genetic
algorithm is one of the major evolutionary algorithms that can
be used to construct the gene network. Spieth et al. [21]
proposed a memetic inference method for gene regulatory
network based on S-system. This is a popular mathematical
model proposed by Savageau [20]. The memetic algorithm
uses a combination of genetic algorithm and evolution
strategies [21].
A multi objective phenomic algorithm proposed by Rio
D’Souza et al. [8] is an advanced method, which concentrates
on multiple objectives like Number of Links (NoL) and Small
World Similarity Factor (SWSF). Rio DSouza et al. in [9]
proposes an Integrated Pheneto-Genetic Algorithm (IPGA),
which makes use of the approach of S-system model [20] with
memetic algorithm proposed by Spiethet al. [21]. The memetic
algorithm [21] makes use of genetic algorithm to identify the
populations of structures of possible networks. For N genes,
out of N combinations of solutions, GA is used to identify the
best solution by optimizing the error or fitness value. Memetic
algorithm is a superior method than the existing evolutionary
algorithms such as standard evolutionary strategy and
skeletalizing (extension of standard GA) for the particular
problem [21]
Nonetheless, the above algorithms are standard algorithms, the
tradeoff between time, space and accuracy factors of the
algorithms are still issues need to be addressed. In this paper,
we make a new proposal to optimize the model parameters for
the reconstruction of gene network for achieving improved
performance.
3. PROPOSED METHOD
3.1 MODEL
S-systems are a type of power law formalism, which was
suggested by Savageau [20] and defined as follows.
Where Gij and Hij are kinetic exponents, i and i are positive
rate constants and those values are optimized using Evolution
strategies. According to the S-system equation [1], 2N*(1+N)
values are to be optimized for each individual in a population,
where N is the total number of genes in a microarray data set.
We propose to employ an optimization technique known as
Clonal selection algorithm, which is faster than the genetic
algorithm. Clonal selection algorithm is a technique used in
artificial immune systems. A brief description of artificial
immune system and Clonal selection algorithm is given in the
following:
3.2 ARTIFICIAL IMMUNE SYSTEM (AIS)
Artificial Immune System is based on the theory of biological
immune system. In biological immune system, the foreign
materials, which are trying to intrude the body, will be
identified and prevented. These foreign materials are called
pathogens. Each pathogen has molecules called antigen which
will be identified by the antibody. There are two types of
immune systems in body called innate immune system and
adaptive immune system [2]. Innate immune system is a static
method, which is generic to all bodies. These are the basic
level of protection from pathogen [6]. Adaptive immune
systems are self-adaptive natured immunities, which work
with the antigens. This type of immunity remembers previous
attacks and strengthens the immunity process. In artificial
immune system, the principles of biological immune system
are used to solve the various computational problems. Clonal
selection is one of the theories, which explain the process of
immunity.
3.3 CLONAL SELECTION ALGORITHM
The response of immune system to infection explained by
Burnet is a well-known theory in immunology [4]. In this
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 46
work, Clonal selection is used to explain the processing of
adaptive immune system to antigens. In 2002, Castro and
Zuben proposed a Clonal based algorithm called CLONALG
[6]. Clonal selection algorithms follow the biological adaptive
immune system, which consists of antibodies and antigens [2].
This type of algorithms considers solution set as antibody. The
set of antibodies is called as population. At each generation
selection, cloning, affinity maturation and reselection are
happening to the population and trying to generate new
population with better affinity. In this algorithm, affinity is
calculated with the help of fitness value. As there are no
recombination/ crossover steps in Clonal selection algorithm,
it is faster than the genetic algorithm and hence the basic
Clonal selection algorithm is used to optimize the S-systems
model. The Clonal algorithm for the optimization of the S-
systems model is given below:
Algorithm 1: CLONAL based Algorithm
Require: Max N of Generation; error tolerance
Ensure: Optimal antibody
a. Start.
b. Generation: = 0
c. Pop(Generation) := Init(Clonal pop)
d. Evaluate_Fitness (Pop (Generation))
e. while termination criteria not met do
i. Selected_Pop(Generation):=Selection(Pop(Generatio
n))
ii. Cloned_Pop(Generation):=Clone(Selected_Pop(Gene
ration)
iii. Pop(Generation):=Maturation(Cloned_pop(Generatio
n))
iv. Evaluate_Fitness (Pop(Generation)
v. Pop(Generation+1):=Re_Selection(Pop(Generation))
vi. Generation := Generation + 1
f. end while
g. Stop.
Fitness function: The proposed method uses the following
fitness function proposed by Tominaga et al. [23]:
Where Xcal
i,t, Xexp
i,t are the expression value of gene i at time t
from the estimated (calculated) and experimental data
respectively.
4. EXPERIMENTAL SET UP AND RESULTS
For the experimentation, the standard artificial gene regulatory
network, given in Table 1, used by various researchers [12, 13,
14, 16, 18, 19] is made use of. This network consists of 5
genes. The Runge-kutta algorithm is used to infer standard
microarray data using the S-system model [13]. In order to
confirm the ability of proposed method to infer the gene
regulatory network we generated 10 sets of expression data
artificially. Initial values of these sets are randomly generated
in the range [0, 1] as shown in Table 2.The 10 sets of time
series data are obtained using equation(1) and S-system
parameters given in Table 1,with T=11 and G=5; so totally
10*11*5=550expression values are observed. A sample Time
dynamics of the 5 dimensional regulatory system inferred is
shown in Fig.1where duration of 0.0 to 0.5 is divided into 11
equi-distance samples, and 10 points are computed between
each sampling point.
In order to confirm the effectiveness of the proposed model,
both the proposed algorithm and the standard memetic
algorithm have been implemented and applied to a standard
artificial genetic network [12, 13, 14, 16, 18, 19]. Since these
algorithms are stochastic in nature, we have to test on multiple
data sets for the experiment. After computing the model
parameters, the microarray data set is regenerated and
compared with the original. We have used350000 fitness
evaluations in the comparative study. Mean Squared Error
(MSE) [23] is used as the error evaluation measurement
metric.
Fig. 1: A sample Time dynamics of the 5-dim regulatory
system using parameters in Table 1.
Fig. 2 shows comparison of average error (MSE) versus
fitness evaluation courses obtained for memetic and proposed
method for 3.5 lakhs fitness evaluation. Since memetic
algorithm uses genetic algorithm for the optimization purpose,
over all error will be reduced after some iterations. In memetic
algorithm, S-system parameters are optimized for the
reconstruction of gene regulatory network. In this algorithm
for each generation in genetic algorithm, evolutionary strategy
with covariance matrix adaptation (CMA) has to be
performed. Evolutionary strategy is a local optimal
evolutionary algorithm, which is much similar to genetic
algorithm. Due to hybrid nature of the algorithm, huge amount
of computation is required for the processing. For the memetic
algorithm, convergence happens after 20 lakhs fitness
evaluations [21]. The proposed method converged after 3.5
lakhs fitness evaluations whereas, at this point, standard
memetic algorithm is far away from convergence. Hence, it is
also observed that the proposed algorithm converges much
faster than the existing memetic algorithm
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 47
.
Table 1: S-system model parameters for the target network model [12, 13, 14, 16, 18, 19]
Table 2: Initial expression values for 10 Data sets
i
1 5.0 0.0 0.0 1.0 0.0 -1.0 10.0 2.0 0.0 0.0 0.0 0.0
2 10.0 2.0 0.0 0.0 0.0 0.0 10.0 0.0 2.0 0.0 0.0 0.0
3 10.0 0.0 -1.0 0.0 0.0 0.0 10.0 0.0 -1.0 2.0 0.0 0.0
4 8.0 0.0 0.0 2.0 0.0 -1.0 10.0 0.0 0.0 0.0 2.0 0.0
5 10.0 0.0 0.0 0.0 2.0 0.0 10.0 0.0 0.0 0.0 0.0 2.0
Data sets
Genes
Set 1 Set2 Set3 Set4 Set5 Set6 Set7 Set8 Set9 Set10
G1 0.8231 0.2851 0.9961 0.9991 0.7937 0.1479 0.6264 0.9556 0.6724 0.4216
G2 0.3933 0.2586 0.0400 0.0770 0.5441 0.2278 0.9497 0.6866 0.2542 0.6126
G3 0.6273 0.4616 0.5457 0.9494 0.8954 0.1921 0.3645 0.9983 0.3055 0.7605
G4 0.5855 0.2377 0.0971 0.0282 0.9090 0.0518 0.4206 0.7768 0.6902 0.5935
G5 0.5401 0.8144 0.8121 0.6938 0.6359 0.1169 0.9943 0.3467 0.5378 0.5618
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 48
Fig. 2: Comparison of average error (MSE) obtained for
memetic algorithm and the proposed approach; the proposed
algorithm converges at about 3.5 lakhs fitness evaluations.
5. DISCUSSION
5.1 ANALYSIS OF REAL LIFE DATA USING THE
PROPOSED METHOD
In order to assure the performance of a method, it should be
evaluated on a real life data. We employed a famous real life
dataset called SOS DNA repair system in E.coli [22] to study
the performance of the proposed method. Fig.3 graphically
describes the interactions during the repairing of DNA of
E.coli., when DNA damage is occurred. According to this
system, when a damage happens immediately RecA protein
will identify the damage and will invoke the processing of
cleavage of LexA protein without any help of enzymes. Thus,
the concentration of LexA will be decreased. Due to reduction
of LexA other proteins in the SOS system will activate the
repairing process of the DNA. LexA protein is acting as a
repressor in the system. After the repairing of DNA,
concentration of RecA will be dropped; in effect, automatic
cleavage of RecA will stop. Finally, concentration of LexA
will increase and repress the other genes. This will lead to a
stable state and will continue in this state till the next damage
happens.
SOS Data is obtained from the website www.weizmann
.ac.il/mcb/UriAlon/Papers/SOSData/ as a result of
experiments done by Uri Alon lab of Weizmann institute of
science. They have 4experimental results obtained, each of 8
proteins and 50 time points. As the first time-point represents
0 seconds all initial expression values are zeros. Since the first
time-point contains no information it was removed and the
remaining 49 time points were used for the modeling. From
the previous literatures [3, 5, 10, 12, 15, 16] it was identified
that out of 8 genes, 6 major genes (uvrD, umuD, lexA,recA,
uvrA and polB) and last 2 experimental results are required for
the accurate prediction of SOS Gene regulatory system. Each
values of the gene expression values are normalized in the
interval [0,1].
Fig3. SOS DNA repair system of E.coli.
Implementation of the proposed approach on SOS Data set
inferred the gene network of Fig.4. Since in the given
microarray, data is real one it is concealed with noise, and
hence the accuracy of the proposed algorithm depends on the
degree of noise. As the biological systems are so complex,
even with the biological experiments it is difficult to extract
all the hidden facts in the system. Therefore, the SOS DNA
repair system of Ecoli identified in Fig. 4 may not contain all
the relationships. There is still a possibility of finding new
relationships. The gene network obtained by the proposed
method identified inhibitions from LexA to LexA, uvrD,
uvrA, recA and polB. Proposed method also identified
regulations from recA to recA and recA to lexA correctly.
There are also some more relations, as given in Table 3
reported by other researchers, identified by the proposed
method.
Table3. Relations identified by the proposed approach that are also already identified by previous researchers
Gene Predicted relation and the references where these are already identified
uvrD uvrD -| uvrD(12, 5, 15, 11), uvrD -| umuDc (15), uvrD -| lexA (15), uvrD→polB (10, 11)
LexA LexA-| LexA(3, 5, 10, 12, 16), LexA-| uvrD(5, 10, 12, 16), LexA-| recA(3, 12, 16), LexA-| uvrA(5, 10, 11, 12),
LexA→ uvrA(11, 15), LexA-| PolB(5, 11, 12, 16), LexA→ PolB(11, 15),
umuDc umuDc -| umuDc (3, 5, 15, 11), umuDc -| recA(16, 3, 11), umuDc -| polB(11), umuDc→uvrA(11), umuDc -|
lexA (3, 15, 11)
recA recA→uvrA(11), recA -| uvrA (15, 10), recA -| umuDc(12, 15, 10, 11)
uvrA uvrA -| uvrA (16, 12, 5, 15, 11), uvrA -| recA (11), uvrA -| umuDc (16, 10), uvrA -| lexA (15, 10),
uvrA→uvrD(16, 12, 10, 11), uvrA -| polB(16, 11)
polB polB -| polB(12, 5, 11), polB→uvrD (11), polB -| recA(16, 11), polB→uvrA (11), polB -| uvrA(11)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 49
Therefore, out of the total 33 relations, 30 relations are already
proposed by previous researchers. The remaining may be the
relations, which were not found yet, or false positives. Hence,
it is demonstrated that the proposed algorithm can be used for
the real life applications.
Fig4. SOS DNA repair system of E.coli. Identified by the
proposed method (dashed lines indicate the inhibition and
solid lines indicate the activation); 33 relations are identified.
CONCLUSIONS
Gene regulatory network reconstruction is a major issue in
bioinformatics. Existing methods for GRN reconstruction
either take longer computations for convergence or poor in
accuracy of identifying the relations. This paper proposes a
Clonal based approach using S-system model. The model
parameters are computed using optimization employing the
basic Clonal selection algorithm. Performance of the model is
compared with the existing standard memetic algorithm and
found to be superior with respect to execution time and
accuracy. Convergence is achieved with much lesser number
of fitness evaluations than the standard memetic algorithm.
The results obtained on SOS DNA repair system of E.coli.
demonstrate that the proposed approach identified most of the
relations identified by the previous researchers. This amply
proves that the approach is powerful and applicable to real life
data.
REFERENCES
[1]. Akutsu, T., Miyano, S., Kuhara, S., et al. (1999).
Identification of genetic networks from a small number of
gene expression patterns under the boolean network model.In
Pacific Symposium on Biocomputing, volume 4, pages 17–28.
World ScientificMaui, Hawaii.
[2]. Al-Enezi, J., Abbod, M., and Alsharhan, S. (2010).
Artificial immunesystemsmodels,algorithms and applications.
International Journal.
[3]. Bansal, M., Della Gatta, G., and Di Bernardo, D. (2006).
Inference of generegulatory networks and compound mode of
action from time course gene expressionprofiles.
Bioinformatics, 22(7), 815–822.
[4]. Burnet, F. (2008). A modification of jerne’s theory of
antibody production using theconcept of clonal selection. CA:
A Cancer Journal for Clinicians, 26(2), 119–121.
[5]. Cho, D., Cho, K., and Zhang, B. (2006). Identification of
biochemical networks by s-tree based genetic programming.
Bioinformatics, 22(13), 1631–1640.
[6]. De Castro, L. and Von Zuben, F. (2002). Learning and
optimization using the Clonal selection principle. Evolutionary
Computation, IEEE Transactions on, 6(3), 239–251.
[7]. Dubitzky, W., Granzow, M., Downes, C., and Berrar, D.
(2003). Introduction to microarray data analysis. A Practical
Approach to Microarray Data Analysis, pages1–46.
[8]. DSouza, R., Sekaran, K., and Kandasamy, A. (2012a). A
multiobjective phenomic algorithm for inference of gene
networks. Bio-Inspired Models of Network, Information, and
Computing Systems, pages 440–451.
[9]. DSouza, R., Sekaran, K., and Kandasamy, A. (2012b). A
phenomic algorithm for inference of gene networks using s-
systems and memetic search. Bio-Inspired Modelsof Network,
Information, and Computing Systems, pages 229–237.
[10]. Hsiao, Y. and Lee, W. (2012). Inferring robust gene
networks from expression databy a sensitivity-based
incremental evolution method. BMC bioinformatics, 13, 1–21.
[11]. Huang, H., Chen, K., Ho, S., and Ho, S. (2008). Inferring
s-systemmodels of genetic networks from a time-series real
data set of gene expression profiles. In Evolutionary
Computation, 2008. CEC 2008.(IEEE World Congress
onComputational Intelligence). IEEE Congress on, pages
2788–2793. IEEE.
[12]. Kabir, M., Noman, N., and Iba, H. (2010). Reverse
engineering gene regulatory network from microarray data
using linear time-variant model. BMC bioinformatics,
11(Suppl 1), S56.
[13]. Kikuchi, S., Tominaga, D., Arita, M., Takahashi, K., and
Tomita, M. (2003). Dynamic modeling of genetic networks
using genetic algorithm and s-system. Bioinformatics, 19(5),
643–650.
[14]. Kimura, S., Ide, K., Kashihara, A., Kano, M.,
Hatakeyama, M., Masui, R., Nakagawa, N., Yokoyama, S.,
Kuramitsu, S., and Konagaya, A. (2005). Inference of s-
system models of genetic networks using a cooperative
coevolutionary algorithm.Bioinformatics, 21(7), 1154–1163.
[15]. Kimura, S., Nakayama, S., and Hatakeyama, M. (2009).
Genetic network inference as a series of discrimination
tasks.Bioinformatics, 25(7), 918–925.
[16]. Kimura, S., Sonoda, K., Yamane, S., Maeda, H.,
Matsumura, K., and Hatakeyama, M. (2008). Function
approximation approach to the inference of reduced ngnet
models of genetic networks.BMC bioinformatics, 9(1), 23.
[17]. Narayanan, A., Keedwell, E., Gamalielsson, J., and
Tatineni, S. (2004). Singlelayer artificial neural networks for
gene expression analysis.Neurocomputing, 61, 217–240.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 50
[18]. Noman, N. and Iba, H. (2007). Inferring gene regulatory
networks using differential evolution with local search
heuristics.IEEE/ACM Transactions on Computational Biology
and Bioinformatics (TCBB), 4(4), 634–647.
[19]. Perrin, B., Ralaivola, L., Mazurie, A., Bottani, S., Mallet,
J., and dAlche Buc, F. (2003). Gene networks inference using
dynamic bayesian networks.Bioinformatics, 19(suppl 2),
ii138–ii148.
[20]. Savageau, M. (20). years of s-systems. Canonical
Nonlinear Modeling. S-systems Approach to Understand
Complexity, pages 1–44.
[21]. Spieth, C., Streichert, F., Speer, N., and Zell, A. (2004).
A memetic inference method for gene regulatory networks
based on s-systems. InEvolutionary Computation, 2004.
CEC2004. Congress on, volume 1, pages 152–157. IEEE.
[22]. Sutton, M., Smith, B., Godoy, V., and Walker, G. (2000).
The sos response: recent insights into umudc-dependent
mutagenesis and dna damage tolerance.Annual review of
genetics, 34(1), 479–497.
[23]. Tominaga, D., Koga, N., and Okamoto, N. (2000).
Efficient numerical optimization algorithm based on genetic
algorithm for inverse problem. In Proceedings of the Genetic
and Evolutionary Computation Conference, pages 251–258.
[24]. Wikipedia (2012). Epistasis and functional genomics—
Wikipedia, the free encyclopedia. [Online; accessed 22-June-
2012].
[25]. Zhang, B. and Hwang, K. (2003). Bayesian network
classifiers for gene expression analysis. A Practical Approach
to Microarray Data Analysis, pages 150–165.
BIOGRAPHIES
Jereesh A S received Bachelor’s degree in
Computer science and engineering from the
Rajiv Gandhi Institute of technology Kottayam
in the year 2007 and received Master’s degree
in Computer science and engineering
(Information Security) from the National
Institute of technology Calicut in the year 2010. He is
currently a research scholar pursuing for Ph.D degree in the
Department of Computer science and engineering at National
institute of Technology Calicut. His research interests include
the Bioinformatics, data mining and evolutionary algorithms.
V K Govindan received Bachelor’s and
Master’s degrees in electrical engineering from
the National Institute of technology Calicut in
the year 1975 and 1978, respectively. He was
awarded PhD in Character Recognition from
the Indian Institute of Science, Bangalore, in
1989. His research areas include Image processing, pattern
recognition, data compression, document imaging and
operating systems. He has more than 125 research publications
in international journals and conferences, and authored ten
books. He has produced seven PhDs and reviewed papers for
many Journals and conferences. He has more than 34 years of
teaching experience at UG and PG levels and he was the
Professor and Head of the Department of Computer Science
and Engineering, NIT Calicut during years 2000 to 2005. He
is currently working as Professor in the Department of
Computer Science and Engineering, and Dean Academic at
National Institute of Technology Calicut, India

More Related Content

What's hot

Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...ijdms
 
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksSoftware Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksEditor IJCATR
 
AN EFFICIENT PSO BASED ENSEMBLE CLASSIFICATION MODEL ON HIGH DIMENSIONAL DATA...
AN EFFICIENT PSO BASED ENSEMBLE CLASSIFICATION MODEL ON HIGH DIMENSIONAL DATA...AN EFFICIENT PSO BASED ENSEMBLE CLASSIFICATION MODEL ON HIGH DIMENSIONAL DATA...
AN EFFICIENT PSO BASED ENSEMBLE CLASSIFICATION MODEL ON HIGH DIMENSIONAL DATA...ijsc
 
Classification of medical datasets using back propagation neural network powe...
Classification of medical datasets using back propagation neural network powe...Classification of medical datasets using back propagation neural network powe...
Classification of medical datasets using back propagation neural network powe...IJECEIAES
 
The Evaluated Measurement of a Combined Genetic Algorithm and Artificial Immu...
The Evaluated Measurement of a Combined Genetic Algorithm and Artificial Immu...The Evaluated Measurement of a Combined Genetic Algorithm and Artificial Immu...
The Evaluated Measurement of a Combined Genetic Algorithm and Artificial Immu...IJECEIAES
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsDrjabez
 
Network embedding in biomedical data science
Network embedding in biomedical data scienceNetwork embedding in biomedical data science
Network embedding in biomedical data scienceArindam Ghosh
 
Drug Discovery and Development Using AI
Drug Discovery and Development Using AIDrug Discovery and Development Using AI
Drug Discovery and Development Using AIDatabricks
 
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...IJNSA Journal
 
Solar Irradiation Prediction using back Propagation and Artificial Neural Net...
Solar Irradiation Prediction using back Propagation and Artificial Neural Net...Solar Irradiation Prediction using back Propagation and Artificial Neural Net...
Solar Irradiation Prediction using back Propagation and Artificial Neural Net...ijtsrd
 
Inference of Nonlinear Gene Regulatory Networks through Optimized Ensemble of...
Inference of Nonlinear Gene Regulatory Networks through Optimized Ensemble of...Inference of Nonlinear Gene Regulatory Networks through Optimized Ensemble of...
Inference of Nonlinear Gene Regulatory Networks through Optimized Ensemble of...Arinze Akutekwe
 
IRJET- Plant Disease Detection and Classification using Image Processing a...
IRJET- 	  Plant Disease Detection and Classification using Image Processing a...IRJET- 	  Plant Disease Detection and Classification using Image Processing a...
IRJET- Plant Disease Detection and Classification using Image Processing a...IRJET Journal
 
Sample Work For Engineering Literature Review and Gap Identification
Sample Work For Engineering Literature Review and Gap IdentificationSample Work For Engineering Literature Review and Gap Identification
Sample Work For Engineering Literature Review and Gap IdentificationPhD Assistance
 
SURVEY ON MODELLING METHODS APPLICABLE TO GENE REGULATORY NETWORK
SURVEY ON MODELLING METHODS APPLICABLE TO GENE REGULATORY NETWORKSURVEY ON MODELLING METHODS APPLICABLE TO GENE REGULATORY NETWORK
SURVEY ON MODELLING METHODS APPLICABLE TO GENE REGULATORY NETWORKijbbjournal
 
An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...IJECEIAES
 

What's hot (18)

1104.0355
1104.03551104.0355
1104.0355
 
Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...
 
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksSoftware Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
 
AN EFFICIENT PSO BASED ENSEMBLE CLASSIFICATION MODEL ON HIGH DIMENSIONAL DATA...
AN EFFICIENT PSO BASED ENSEMBLE CLASSIFICATION MODEL ON HIGH DIMENSIONAL DATA...AN EFFICIENT PSO BASED ENSEMBLE CLASSIFICATION MODEL ON HIGH DIMENSIONAL DATA...
AN EFFICIENT PSO BASED ENSEMBLE CLASSIFICATION MODEL ON HIGH DIMENSIONAL DATA...
 
Classification of medical datasets using back propagation neural network powe...
Classification of medical datasets using back propagation neural network powe...Classification of medical datasets using back propagation neural network powe...
Classification of medical datasets using back propagation neural network powe...
 
The Evaluated Measurement of a Combined Genetic Algorithm and Artificial Immu...
The Evaluated Measurement of a Combined Genetic Algorithm and Artificial Immu...The Evaluated Measurement of a Combined Genetic Algorithm and Artificial Immu...
The Evaluated Measurement of a Combined Genetic Algorithm and Artificial Immu...
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
 
AI for drug discovery
AI for drug discoveryAI for drug discovery
AI for drug discovery
 
Network embedding in biomedical data science
Network embedding in biomedical data scienceNetwork embedding in biomedical data science
Network embedding in biomedical data science
 
Drug Discovery and Development Using AI
Drug Discovery and Development Using AIDrug Discovery and Development Using AI
Drug Discovery and Development Using AI
 
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
 
Solar Irradiation Prediction using back Propagation and Artificial Neural Net...
Solar Irradiation Prediction using back Propagation and Artificial Neural Net...Solar Irradiation Prediction using back Propagation and Artificial Neural Net...
Solar Irradiation Prediction using back Propagation and Artificial Neural Net...
 
Inference of Nonlinear Gene Regulatory Networks through Optimized Ensemble of...
Inference of Nonlinear Gene Regulatory Networks through Optimized Ensemble of...Inference of Nonlinear Gene Regulatory Networks through Optimized Ensemble of...
Inference of Nonlinear Gene Regulatory Networks through Optimized Ensemble of...
 
IRJET- Plant Disease Detection and Classification using Image Processing a...
IRJET- 	  Plant Disease Detection and Classification using Image Processing a...IRJET- 	  Plant Disease Detection and Classification using Image Processing a...
IRJET- Plant Disease Detection and Classification using Image Processing a...
 
Sample Work For Engineering Literature Review and Gap Identification
Sample Work For Engineering Literature Review and Gap IdentificationSample Work For Engineering Literature Review and Gap Identification
Sample Work For Engineering Literature Review and Gap Identification
 
SURVEY ON MODELLING METHODS APPLICABLE TO GENE REGULATORY NETWORK
SURVEY ON MODELLING METHODS APPLICABLE TO GENE REGULATORY NETWORKSURVEY ON MODELLING METHODS APPLICABLE TO GENE REGULATORY NETWORK
SURVEY ON MODELLING METHODS APPLICABLE TO GENE REGULATORY NETWORK
 
NRNB EAC Meeting 2012
NRNB EAC Meeting 2012NRNB EAC Meeting 2012
NRNB EAC Meeting 2012
 
An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...
 

Viewers also liked

An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolutioneSAT Publishing House
 
Human identification using finger images
Human identification using finger imagesHuman identification using finger images
Human identification using finger imageseSAT Publishing House
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
A novel p q control algorithm for combined active
A novel p q control algorithm for combined activeA novel p q control algorithm for combined active
A novel p q control algorithm for combined activeeSAT Publishing House
 
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...eSAT Publishing House
 
Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...eSAT Publishing House
 
Investigations on the performance of diesel in an air
Investigations on the performance of diesel in an airInvestigations on the performance of diesel in an air
Investigations on the performance of diesel in an aireSAT Publishing House
 
Parameter study of stable walking gaits for nao
Parameter study of stable walking gaits for naoParameter study of stable walking gaits for nao
Parameter study of stable walking gaits for naoeSAT Publishing House
 
Performance analysis of cmos comparator and cntfet comparator design
Performance analysis of cmos comparator and cntfet comparator designPerformance analysis of cmos comparator and cntfet comparator design
Performance analysis of cmos comparator and cntfet comparator designeSAT Publishing House
 
Evaluation of performance of intake tower dam for
Evaluation of performance of intake tower dam forEvaluation of performance of intake tower dam for
Evaluation of performance of intake tower dam foreSAT Publishing House
 
Vibration analysis of a torpedo battery tray using fea
Vibration analysis of a torpedo battery tray using feaVibration analysis of a torpedo battery tray using fea
Vibration analysis of a torpedo battery tray using feaeSAT Publishing House
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...eSAT Publishing House
 
Static analysis of c s short cylindrical shell under internal liquid pressure...
Static analysis of c s short cylindrical shell under internal liquid pressure...Static analysis of c s short cylindrical shell under internal liquid pressure...
Static analysis of c s short cylindrical shell under internal liquid pressure...eSAT Publishing House
 
A heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithmA heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithmeSAT Publishing House
 
Matlab based comparative studies on selected mppt
Matlab based comparative studies on selected mpptMatlab based comparative studies on selected mppt
Matlab based comparative studies on selected mppteSAT Publishing House
 
Effective face feature for human identification
Effective face feature for human identificationEffective face feature for human identification
Effective face feature for human identificationeSAT Publishing House
 
Accuracy enhancement of srtm and aster dems using weight estimation regressio...
Accuracy enhancement of srtm and aster dems using weight estimation regressio...Accuracy enhancement of srtm and aster dems using weight estimation regressio...
Accuracy enhancement of srtm and aster dems using weight estimation regressio...eSAT Publishing House
 
Gsm based automatic lpg ordering system with leakage alert
Gsm based automatic lpg ordering system with leakage alertGsm based automatic lpg ordering system with leakage alert
Gsm based automatic lpg ordering system with leakage alerteSAT Publishing House
 

Viewers also liked (20)

An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolution
 
Human identification using finger images
Human identification using finger imagesHuman identification using finger images
Human identification using finger images
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
A novel p q control algorithm for combined active
A novel p q control algorithm for combined activeA novel p q control algorithm for combined active
A novel p q control algorithm for combined active
 
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...
 
Studies on stabilised adobe blocks
Studies on stabilised adobe blocksStudies on stabilised adobe blocks
Studies on stabilised adobe blocks
 
Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...
 
Investigations on the performance of diesel in an air
Investigations on the performance of diesel in an airInvestigations on the performance of diesel in an air
Investigations on the performance of diesel in an air
 
Parameter study of stable walking gaits for nao
Parameter study of stable walking gaits for naoParameter study of stable walking gaits for nao
Parameter study of stable walking gaits for nao
 
Language identification using g lda
Language identification using g ldaLanguage identification using g lda
Language identification using g lda
 
Performance analysis of cmos comparator and cntfet comparator design
Performance analysis of cmos comparator and cntfet comparator designPerformance analysis of cmos comparator and cntfet comparator design
Performance analysis of cmos comparator and cntfet comparator design
 
Evaluation of performance of intake tower dam for
Evaluation of performance of intake tower dam forEvaluation of performance of intake tower dam for
Evaluation of performance of intake tower dam for
 
Vibration analysis of a torpedo battery tray using fea
Vibration analysis of a torpedo battery tray using feaVibration analysis of a torpedo battery tray using fea
Vibration analysis of a torpedo battery tray using fea
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
 
Static analysis of c s short cylindrical shell under internal liquid pressure...
Static analysis of c s short cylindrical shell under internal liquid pressure...Static analysis of c s short cylindrical shell under internal liquid pressure...
Static analysis of c s short cylindrical shell under internal liquid pressure...
 
A heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithmA heuristic approach for optimizing travel planning using genetics algorithm
A heuristic approach for optimizing travel planning using genetics algorithm
 
Matlab based comparative studies on selected mppt
Matlab based comparative studies on selected mpptMatlab based comparative studies on selected mppt
Matlab based comparative studies on selected mppt
 
Effective face feature for human identification
Effective face feature for human identificationEffective face feature for human identification
Effective face feature for human identification
 
Accuracy enhancement of srtm and aster dems using weight estimation regressio...
Accuracy enhancement of srtm and aster dems using weight estimation regressio...Accuracy enhancement of srtm and aster dems using weight estimation regressio...
Accuracy enhancement of srtm and aster dems using weight estimation regressio...
 
Gsm based automatic lpg ordering system with leakage alert
Gsm based automatic lpg ordering system with leakage alertGsm based automatic lpg ordering system with leakage alert
Gsm based automatic lpg ordering system with leakage alert
 

Similar to A clonal based algorithm for the reconstruction of

IRJET- Gene Mutation Data using Multiplicative Adaptive Algorithm and Gene On...
IRJET- Gene Mutation Data using Multiplicative Adaptive Algorithm and Gene On...IRJET- Gene Mutation Data using Multiplicative Adaptive Algorithm and Gene On...
IRJET- Gene Mutation Data using Multiplicative Adaptive Algorithm and Gene On...IRJET Journal
 
Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...
Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...
Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...rahulmonikasharma
 
Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...
Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...
Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...Sarvesh Kumar
 
Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...eSAT Journals
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programmingeSAT Publishing House
 
CCC-Bicluster Analysis for Time Series Gene Expression Data
CCC-Bicluster Analysis for Time Series Gene Expression DataCCC-Bicluster Analysis for Time Series Gene Expression Data
CCC-Bicluster Analysis for Time Series Gene Expression DataIRJET Journal
 
Pattern recognition system based on support vector machines
Pattern recognition system based on support vector machinesPattern recognition system based on support vector machines
Pattern recognition system based on support vector machinesAlexander Decker
 
Srge most important publications 2020
Srge most important  publications 2020Srge most important  publications 2020
Srge most important publications 2020Aboul Ella Hassanien
 
Gene Selection for Sample Classification in Microarray: Clustering Based Method
Gene Selection for Sample Classification in Microarray: Clustering Based MethodGene Selection for Sample Classification in Microarray: Clustering Based Method
Gene Selection for Sample Classification in Microarray: Clustering Based MethodIOSR Journals
 
APPLICATION OF CLONAL SELECTION IMMUNE SYSTEM METHOD FOR OPTIMIZATION OF DIST...
APPLICATION OF CLONAL SELECTION IMMUNE SYSTEM METHOD FOR OPTIMIZATION OF DIST...APPLICATION OF CLONAL SELECTION IMMUNE SYSTEM METHOD FOR OPTIMIZATION OF DIST...
APPLICATION OF CLONAL SELECTION IMMUNE SYSTEM METHOD FOR OPTIMIZATION OF DIST...UniversitasGadjahMada
 
Performance analysis of neural network models for oxazolines and oxazoles der...
Performance analysis of neural network models for oxazolines and oxazoles der...Performance analysis of neural network models for oxazolines and oxazoles der...
Performance analysis of neural network models for oxazolines and oxazoles der...ijistjournal
 
Applications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer PredictionApplications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer PredictionIRJET Journal
 
An Efficient PSO Based Ensemble Classification Model on High Dimensional Data...
An Efficient PSO Based Ensemble Classification Model on High Dimensional Data...An Efficient PSO Based Ensemble Classification Model on High Dimensional Data...
An Efficient PSO Based Ensemble Classification Model on High Dimensional Data...ijsc
 
Comparative study of artificial neural network based classification for liver...
Comparative study of artificial neural network based classification for liver...Comparative study of artificial neural network based classification for liver...
Comparative study of artificial neural network based classification for liver...Alexander Decker
 
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...cscpconf
 
Single parent mating in genetic algorithm for real robotic system identification
Single parent mating in genetic algorithm for real robotic system identificationSingle parent mating in genetic algorithm for real robotic system identification
Single parent mating in genetic algorithm for real robotic system identificationIAESIJAI
 
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGAOptimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGArahulmonikasharma
 
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGAOptimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGArahulmonikasharma
 

Similar to A clonal based algorithm for the reconstruction of (20)

IRJET- Gene Mutation Data using Multiplicative Adaptive Algorithm and Gene On...
IRJET- Gene Mutation Data using Multiplicative Adaptive Algorithm and Gene On...IRJET- Gene Mutation Data using Multiplicative Adaptive Algorithm and Gene On...
IRJET- Gene Mutation Data using Multiplicative Adaptive Algorithm and Gene On...
 
Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...
Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...
Clustering Approaches for Evaluation and Analysis on Formal Gene Expression C...
 
Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...
Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...
Model of Differential Equation for Genetic Algorithm with Neural Network (GAN...
 
Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programming
 
CCC-Bicluster Analysis for Time Series Gene Expression Data
CCC-Bicluster Analysis for Time Series Gene Expression DataCCC-Bicluster Analysis for Time Series Gene Expression Data
CCC-Bicluster Analysis for Time Series Gene Expression Data
 
Pattern recognition system based on support vector machines
Pattern recognition system based on support vector machinesPattern recognition system based on support vector machines
Pattern recognition system based on support vector machines
 
Srge most important publications 2020
Srge most important  publications 2020Srge most important  publications 2020
Srge most important publications 2020
 
Gene Selection for Sample Classification in Microarray: Clustering Based Method
Gene Selection for Sample Classification in Microarray: Clustering Based MethodGene Selection for Sample Classification in Microarray: Clustering Based Method
Gene Selection for Sample Classification in Microarray: Clustering Based Method
 
APPLICATION OF CLONAL SELECTION IMMUNE SYSTEM METHOD FOR OPTIMIZATION OF DIST...
APPLICATION OF CLONAL SELECTION IMMUNE SYSTEM METHOD FOR OPTIMIZATION OF DIST...APPLICATION OF CLONAL SELECTION IMMUNE SYSTEM METHOD FOR OPTIMIZATION OF DIST...
APPLICATION OF CLONAL SELECTION IMMUNE SYSTEM METHOD FOR OPTIMIZATION OF DIST...
 
Performance analysis of neural network models for oxazolines and oxazoles der...
Performance analysis of neural network models for oxazolines and oxazoles der...Performance analysis of neural network models for oxazolines and oxazoles der...
Performance analysis of neural network models for oxazolines and oxazoles der...
 
presentation
presentationpresentation
presentation
 
Applications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer PredictionApplications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer Prediction
 
Thesis Presentation
Thesis PresentationThesis Presentation
Thesis Presentation
 
An Efficient PSO Based Ensemble Classification Model on High Dimensional Data...
An Efficient PSO Based Ensemble Classification Model on High Dimensional Data...An Efficient PSO Based Ensemble Classification Model on High Dimensional Data...
An Efficient PSO Based Ensemble Classification Model on High Dimensional Data...
 
Comparative study of artificial neural network based classification for liver...
Comparative study of artificial neural network based classification for liver...Comparative study of artificial neural network based classification for liver...
Comparative study of artificial neural network based classification for liver...
 
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...
PREDICTION OF MALIGNANCY IN SUSPECTED THYROID TUMOUR PATIENTS BY THREE DIFFER...
 
Single parent mating in genetic algorithm for real robotic system identification
Single parent mating in genetic algorithm for real robotic system identificationSingle parent mating in genetic algorithm for real robotic system identification
Single parent mating in genetic algorithm for real robotic system identification
 
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGAOptimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
 
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGAOptimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 

Recently uploaded (20)

"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 

A clonal based algorithm for the reconstruction of

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 44 A CLONAL BASED ALGORITHM FOR THE RECONSTRUCTION OF GENETIC NETWORK USING S-SYSTEM Jereesh A S 1 , Govindan V K 2 1 Research scholar, 2 Professor, Department of Computer Science & Engineering, National Institute of Technology, Calicut, Kerala, India, jereesh.a.s@gmail.com, vkg@nitc.ac.in Abstract Motivation: Gene regulatory network is the network based approach to represent the interactions between genes. DNA microarray is the most widely used technology for extracting the relationships between thousands of genes simultaneously. Gene microarray experiment provides the gene expression data for a particular condition and varying time periods. The expression of a particular gene depends upon the biological conditions and other genes. In this paper, we propose a new method for the analysis of microarray data. The proposed method makes use of S-system, which is a well-accepted model for the gene regulatory network reconstruction. Since the problem has multiple solutions, we have to identify an optimized solution. Evolutionary algorithms have been used to solve such problems. Though there are a number of attempts already been carried out by various researchers, the solutions are still not that satisfactory with respect to the time taken and the degree of accuracy achieved. Therefore, there is a need of huge amount further work in this topic for achieving solutions with improved performances. Results: In this work, we have proposed Clonal selection algorithm for identifying optimal gene regulatory network. The approach is tested on the real life data: SOS Ecoli DNA repairing gene expression data. It is observed that the proposed algorithm converges much faster and provides better results than the existing algorithms. Index Terms: Microarray analysis, Evolutionary Algorithm, Artificial Immune System, S-system, Gene Regulatory Network, SOS Ecoli DNA repairing, Clonal Selection Algorithm. -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION DNA microarray is a modern technology, which is used to analyze the interactions between thousands of genes in parallel [7]. Exploiting the hybridization property of CDNA, the transcript abundance information is measured in microarray experiment. Microarrays have numerous applications. A particular set of genes are activated for a particular condition. Identification of activated genes will be useful for recovering or activating the conditions artificially. Even though the technology is well developed, direct biological methods available for finding gene expression are complex. Analysis of protein expression data is very expensive due to the complex structures of proteins. Microarray data analysis involves methodologies and techniques to analyze the data obtained after the microarray experiments. The major part of the microarray data analysis is the numerical analysis of normalized data matrix. Gene expression analysis is a large-scale experiment, which comes under functional genomics. Functional genomics deals with the analysis of large data sets to identify the functions and interactions between genes [24]. A set of algorithms and methods are defined for the analysis of microarray data. There is a tradeoff between the time and accuracy for using an algorithm for analyzing the microarray data. Gene Regulatory Network (GRN) is a network of set of genes, which are involved, in a particular process. In GRN, each node represents gene and links between genes define the relationships between those genes. Gene regulatory network is the network based approach to represent the interactions between genes. The expression of a particular gene depends upon the biological conditions and other genes. Gene microarray experiment identifies the gene expression data for a particular condition and varying time periods. Identifying such network will lead to various applications in biological and medical areas. Objective of this paper is to propose a new method, which leads to substantial improvements in processing time and accuracy. High dimensionality of the microarray data matrix makes the identification of GRN complex. In this paper optimization of S-system model using artificial immune system is proposed. The rest of this paper is organized as follows. A brief survey of some of the existing work is given in Section 2. Section 3 presents the mathematical model used for the modeling of gene regulatory network and algorithm for the optimization
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 45 process. Section 4 describes the experimental setup and compares the results of the new proposal with the existing approach. Section 5 is a discussion based on the results obtained by the proposed method on the real life data set called SOS Ecoli DNA repairing gene expression. Finally, the paper is concluded in Section 6. 2. LITERATURE SURVEY There have been several mathematical models applied for the gene regulatory network reconstruction. One of the basic mathematical models identified was based on Random Boolean Network [1]. According to this model, the state of a particular gene will be either in on or off state. The state space for Boolean network is 2N where N is the number of genes in microarray. This model gives the information about gene states, but does not provide expression levels of genes. Zhang et al. [25] suggested Bayesian network model based on joint probability distribution. This model uses DAG (Directed Acyclic Graph) structure for modeling. Since the gene regulatory network is having the property of cyclic dependency between gene nodes, this type of model is not efficient for inferring gene network. Another important work [17] proposed is the modeling of Gene regulatory network using ANN (Artificial Neural Network) with the standard back propagation method. The number of inputs and outputs required for this model is N, where N is the number of genes in microarray data set. The structural complexity of ANN model will increase as the number of genes increases; hence, this model is not efficient for large data sets. Reverse engineering using the evolutionary algorithms can be applied for solving the optimization problems. Genetic algorithm is one of the major evolutionary algorithms that can be used to construct the gene network. Spieth et al. [21] proposed a memetic inference method for gene regulatory network based on S-system. This is a popular mathematical model proposed by Savageau [20]. The memetic algorithm uses a combination of genetic algorithm and evolution strategies [21]. A multi objective phenomic algorithm proposed by Rio D’Souza et al. [8] is an advanced method, which concentrates on multiple objectives like Number of Links (NoL) and Small World Similarity Factor (SWSF). Rio DSouza et al. in [9] proposes an Integrated Pheneto-Genetic Algorithm (IPGA), which makes use of the approach of S-system model [20] with memetic algorithm proposed by Spiethet al. [21]. The memetic algorithm [21] makes use of genetic algorithm to identify the populations of structures of possible networks. For N genes, out of N combinations of solutions, GA is used to identify the best solution by optimizing the error or fitness value. Memetic algorithm is a superior method than the existing evolutionary algorithms such as standard evolutionary strategy and skeletalizing (extension of standard GA) for the particular problem [21] Nonetheless, the above algorithms are standard algorithms, the tradeoff between time, space and accuracy factors of the algorithms are still issues need to be addressed. In this paper, we make a new proposal to optimize the model parameters for the reconstruction of gene network for achieving improved performance. 3. PROPOSED METHOD 3.1 MODEL S-systems are a type of power law formalism, which was suggested by Savageau [20] and defined as follows. Where Gij and Hij are kinetic exponents, i and i are positive rate constants and those values are optimized using Evolution strategies. According to the S-system equation [1], 2N*(1+N) values are to be optimized for each individual in a population, where N is the total number of genes in a microarray data set. We propose to employ an optimization technique known as Clonal selection algorithm, which is faster than the genetic algorithm. Clonal selection algorithm is a technique used in artificial immune systems. A brief description of artificial immune system and Clonal selection algorithm is given in the following: 3.2 ARTIFICIAL IMMUNE SYSTEM (AIS) Artificial Immune System is based on the theory of biological immune system. In biological immune system, the foreign materials, which are trying to intrude the body, will be identified and prevented. These foreign materials are called pathogens. Each pathogen has molecules called antigen which will be identified by the antibody. There are two types of immune systems in body called innate immune system and adaptive immune system [2]. Innate immune system is a static method, which is generic to all bodies. These are the basic level of protection from pathogen [6]. Adaptive immune systems are self-adaptive natured immunities, which work with the antigens. This type of immunity remembers previous attacks and strengthens the immunity process. In artificial immune system, the principles of biological immune system are used to solve the various computational problems. Clonal selection is one of the theories, which explain the process of immunity. 3.3 CLONAL SELECTION ALGORITHM The response of immune system to infection explained by Burnet is a well-known theory in immunology [4]. In this
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 46 work, Clonal selection is used to explain the processing of adaptive immune system to antigens. In 2002, Castro and Zuben proposed a Clonal based algorithm called CLONALG [6]. Clonal selection algorithms follow the biological adaptive immune system, which consists of antibodies and antigens [2]. This type of algorithms considers solution set as antibody. The set of antibodies is called as population. At each generation selection, cloning, affinity maturation and reselection are happening to the population and trying to generate new population with better affinity. In this algorithm, affinity is calculated with the help of fitness value. As there are no recombination/ crossover steps in Clonal selection algorithm, it is faster than the genetic algorithm and hence the basic Clonal selection algorithm is used to optimize the S-systems model. The Clonal algorithm for the optimization of the S- systems model is given below: Algorithm 1: CLONAL based Algorithm Require: Max N of Generation; error tolerance Ensure: Optimal antibody a. Start. b. Generation: = 0 c. Pop(Generation) := Init(Clonal pop) d. Evaluate_Fitness (Pop (Generation)) e. while termination criteria not met do i. Selected_Pop(Generation):=Selection(Pop(Generatio n)) ii. Cloned_Pop(Generation):=Clone(Selected_Pop(Gene ration) iii. Pop(Generation):=Maturation(Cloned_pop(Generatio n)) iv. Evaluate_Fitness (Pop(Generation) v. Pop(Generation+1):=Re_Selection(Pop(Generation)) vi. Generation := Generation + 1 f. end while g. Stop. Fitness function: The proposed method uses the following fitness function proposed by Tominaga et al. [23]: Where Xcal i,t, Xexp i,t are the expression value of gene i at time t from the estimated (calculated) and experimental data respectively. 4. EXPERIMENTAL SET UP AND RESULTS For the experimentation, the standard artificial gene regulatory network, given in Table 1, used by various researchers [12, 13, 14, 16, 18, 19] is made use of. This network consists of 5 genes. The Runge-kutta algorithm is used to infer standard microarray data using the S-system model [13]. In order to confirm the ability of proposed method to infer the gene regulatory network we generated 10 sets of expression data artificially. Initial values of these sets are randomly generated in the range [0, 1] as shown in Table 2.The 10 sets of time series data are obtained using equation(1) and S-system parameters given in Table 1,with T=11 and G=5; so totally 10*11*5=550expression values are observed. A sample Time dynamics of the 5 dimensional regulatory system inferred is shown in Fig.1where duration of 0.0 to 0.5 is divided into 11 equi-distance samples, and 10 points are computed between each sampling point. In order to confirm the effectiveness of the proposed model, both the proposed algorithm and the standard memetic algorithm have been implemented and applied to a standard artificial genetic network [12, 13, 14, 16, 18, 19]. Since these algorithms are stochastic in nature, we have to test on multiple data sets for the experiment. After computing the model parameters, the microarray data set is regenerated and compared with the original. We have used350000 fitness evaluations in the comparative study. Mean Squared Error (MSE) [23] is used as the error evaluation measurement metric. Fig. 1: A sample Time dynamics of the 5-dim regulatory system using parameters in Table 1. Fig. 2 shows comparison of average error (MSE) versus fitness evaluation courses obtained for memetic and proposed method for 3.5 lakhs fitness evaluation. Since memetic algorithm uses genetic algorithm for the optimization purpose, over all error will be reduced after some iterations. In memetic algorithm, S-system parameters are optimized for the reconstruction of gene regulatory network. In this algorithm for each generation in genetic algorithm, evolutionary strategy with covariance matrix adaptation (CMA) has to be performed. Evolutionary strategy is a local optimal evolutionary algorithm, which is much similar to genetic algorithm. Due to hybrid nature of the algorithm, huge amount of computation is required for the processing. For the memetic algorithm, convergence happens after 20 lakhs fitness evaluations [21]. The proposed method converged after 3.5 lakhs fitness evaluations whereas, at this point, standard memetic algorithm is far away from convergence. Hence, it is also observed that the proposed algorithm converges much faster than the existing memetic algorithm
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 47 . Table 1: S-system model parameters for the target network model [12, 13, 14, 16, 18, 19] Table 2: Initial expression values for 10 Data sets i 1 5.0 0.0 0.0 1.0 0.0 -1.0 10.0 2.0 0.0 0.0 0.0 0.0 2 10.0 2.0 0.0 0.0 0.0 0.0 10.0 0.0 2.0 0.0 0.0 0.0 3 10.0 0.0 -1.0 0.0 0.0 0.0 10.0 0.0 -1.0 2.0 0.0 0.0 4 8.0 0.0 0.0 2.0 0.0 -1.0 10.0 0.0 0.0 0.0 2.0 0.0 5 10.0 0.0 0.0 0.0 2.0 0.0 10.0 0.0 0.0 0.0 0.0 2.0 Data sets Genes Set 1 Set2 Set3 Set4 Set5 Set6 Set7 Set8 Set9 Set10 G1 0.8231 0.2851 0.9961 0.9991 0.7937 0.1479 0.6264 0.9556 0.6724 0.4216 G2 0.3933 0.2586 0.0400 0.0770 0.5441 0.2278 0.9497 0.6866 0.2542 0.6126 G3 0.6273 0.4616 0.5457 0.9494 0.8954 0.1921 0.3645 0.9983 0.3055 0.7605 G4 0.5855 0.2377 0.0971 0.0282 0.9090 0.0518 0.4206 0.7768 0.6902 0.5935 G5 0.5401 0.8144 0.8121 0.6938 0.6359 0.1169 0.9943 0.3467 0.5378 0.5618
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 48 Fig. 2: Comparison of average error (MSE) obtained for memetic algorithm and the proposed approach; the proposed algorithm converges at about 3.5 lakhs fitness evaluations. 5. DISCUSSION 5.1 ANALYSIS OF REAL LIFE DATA USING THE PROPOSED METHOD In order to assure the performance of a method, it should be evaluated on a real life data. We employed a famous real life dataset called SOS DNA repair system in E.coli [22] to study the performance of the proposed method. Fig.3 graphically describes the interactions during the repairing of DNA of E.coli., when DNA damage is occurred. According to this system, when a damage happens immediately RecA protein will identify the damage and will invoke the processing of cleavage of LexA protein without any help of enzymes. Thus, the concentration of LexA will be decreased. Due to reduction of LexA other proteins in the SOS system will activate the repairing process of the DNA. LexA protein is acting as a repressor in the system. After the repairing of DNA, concentration of RecA will be dropped; in effect, automatic cleavage of RecA will stop. Finally, concentration of LexA will increase and repress the other genes. This will lead to a stable state and will continue in this state till the next damage happens. SOS Data is obtained from the website www.weizmann .ac.il/mcb/UriAlon/Papers/SOSData/ as a result of experiments done by Uri Alon lab of Weizmann institute of science. They have 4experimental results obtained, each of 8 proteins and 50 time points. As the first time-point represents 0 seconds all initial expression values are zeros. Since the first time-point contains no information it was removed and the remaining 49 time points were used for the modeling. From the previous literatures [3, 5, 10, 12, 15, 16] it was identified that out of 8 genes, 6 major genes (uvrD, umuD, lexA,recA, uvrA and polB) and last 2 experimental results are required for the accurate prediction of SOS Gene regulatory system. Each values of the gene expression values are normalized in the interval [0,1]. Fig3. SOS DNA repair system of E.coli. Implementation of the proposed approach on SOS Data set inferred the gene network of Fig.4. Since in the given microarray, data is real one it is concealed with noise, and hence the accuracy of the proposed algorithm depends on the degree of noise. As the biological systems are so complex, even with the biological experiments it is difficult to extract all the hidden facts in the system. Therefore, the SOS DNA repair system of Ecoli identified in Fig. 4 may not contain all the relationships. There is still a possibility of finding new relationships. The gene network obtained by the proposed method identified inhibitions from LexA to LexA, uvrD, uvrA, recA and polB. Proposed method also identified regulations from recA to recA and recA to lexA correctly. There are also some more relations, as given in Table 3 reported by other researchers, identified by the proposed method. Table3. Relations identified by the proposed approach that are also already identified by previous researchers Gene Predicted relation and the references where these are already identified uvrD uvrD -| uvrD(12, 5, 15, 11), uvrD -| umuDc (15), uvrD -| lexA (15), uvrD→polB (10, 11) LexA LexA-| LexA(3, 5, 10, 12, 16), LexA-| uvrD(5, 10, 12, 16), LexA-| recA(3, 12, 16), LexA-| uvrA(5, 10, 11, 12), LexA→ uvrA(11, 15), LexA-| PolB(5, 11, 12, 16), LexA→ PolB(11, 15), umuDc umuDc -| umuDc (3, 5, 15, 11), umuDc -| recA(16, 3, 11), umuDc -| polB(11), umuDc→uvrA(11), umuDc -| lexA (3, 15, 11) recA recA→uvrA(11), recA -| uvrA (15, 10), recA -| umuDc(12, 15, 10, 11) uvrA uvrA -| uvrA (16, 12, 5, 15, 11), uvrA -| recA (11), uvrA -| umuDc (16, 10), uvrA -| lexA (15, 10), uvrA→uvrD(16, 12, 10, 11), uvrA -| polB(16, 11) polB polB -| polB(12, 5, 11), polB→uvrD (11), polB -| recA(16, 11), polB→uvrA (11), polB -| uvrA(11)
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 49 Therefore, out of the total 33 relations, 30 relations are already proposed by previous researchers. The remaining may be the relations, which were not found yet, or false positives. Hence, it is demonstrated that the proposed algorithm can be used for the real life applications. Fig4. SOS DNA repair system of E.coli. Identified by the proposed method (dashed lines indicate the inhibition and solid lines indicate the activation); 33 relations are identified. CONCLUSIONS Gene regulatory network reconstruction is a major issue in bioinformatics. Existing methods for GRN reconstruction either take longer computations for convergence or poor in accuracy of identifying the relations. This paper proposes a Clonal based approach using S-system model. The model parameters are computed using optimization employing the basic Clonal selection algorithm. Performance of the model is compared with the existing standard memetic algorithm and found to be superior with respect to execution time and accuracy. Convergence is achieved with much lesser number of fitness evaluations than the standard memetic algorithm. The results obtained on SOS DNA repair system of E.coli. demonstrate that the proposed approach identified most of the relations identified by the previous researchers. This amply proves that the approach is powerful and applicable to real life data. REFERENCES [1]. Akutsu, T., Miyano, S., Kuhara, S., et al. (1999). Identification of genetic networks from a small number of gene expression patterns under the boolean network model.In Pacific Symposium on Biocomputing, volume 4, pages 17–28. World ScientificMaui, Hawaii. [2]. Al-Enezi, J., Abbod, M., and Alsharhan, S. (2010). Artificial immunesystemsmodels,algorithms and applications. International Journal. [3]. Bansal, M., Della Gatta, G., and Di Bernardo, D. (2006). Inference of generegulatory networks and compound mode of action from time course gene expressionprofiles. Bioinformatics, 22(7), 815–822. [4]. Burnet, F. (2008). A modification of jerne’s theory of antibody production using theconcept of clonal selection. CA: A Cancer Journal for Clinicians, 26(2), 119–121. [5]. Cho, D., Cho, K., and Zhang, B. (2006). Identification of biochemical networks by s-tree based genetic programming. Bioinformatics, 22(13), 1631–1640. [6]. De Castro, L. and Von Zuben, F. (2002). Learning and optimization using the Clonal selection principle. Evolutionary Computation, IEEE Transactions on, 6(3), 239–251. [7]. Dubitzky, W., Granzow, M., Downes, C., and Berrar, D. (2003). Introduction to microarray data analysis. A Practical Approach to Microarray Data Analysis, pages1–46. [8]. DSouza, R., Sekaran, K., and Kandasamy, A. (2012a). A multiobjective phenomic algorithm for inference of gene networks. Bio-Inspired Models of Network, Information, and Computing Systems, pages 440–451. [9]. DSouza, R., Sekaran, K., and Kandasamy, A. (2012b). A phenomic algorithm for inference of gene networks using s- systems and memetic search. Bio-Inspired Modelsof Network, Information, and Computing Systems, pages 229–237. [10]. Hsiao, Y. and Lee, W. (2012). Inferring robust gene networks from expression databy a sensitivity-based incremental evolution method. BMC bioinformatics, 13, 1–21. [11]. Huang, H., Chen, K., Ho, S., and Ho, S. (2008). Inferring s-systemmodels of genetic networks from a time-series real data set of gene expression profiles. In Evolutionary Computation, 2008. CEC 2008.(IEEE World Congress onComputational Intelligence). IEEE Congress on, pages 2788–2793. IEEE. [12]. Kabir, M., Noman, N., and Iba, H. (2010). Reverse engineering gene regulatory network from microarray data using linear time-variant model. BMC bioinformatics, 11(Suppl 1), S56. [13]. Kikuchi, S., Tominaga, D., Arita, M., Takahashi, K., and Tomita, M. (2003). Dynamic modeling of genetic networks using genetic algorithm and s-system. Bioinformatics, 19(5), 643–650. [14]. Kimura, S., Ide, K., Kashihara, A., Kano, M., Hatakeyama, M., Masui, R., Nakagawa, N., Yokoyama, S., Kuramitsu, S., and Konagaya, A. (2005). Inference of s- system models of genetic networks using a cooperative coevolutionary algorithm.Bioinformatics, 21(7), 1154–1163. [15]. Kimura, S., Nakayama, S., and Hatakeyama, M. (2009). Genetic network inference as a series of discrimination tasks.Bioinformatics, 25(7), 918–925. [16]. Kimura, S., Sonoda, K., Yamane, S., Maeda, H., Matsumura, K., and Hatakeyama, M. (2008). Function approximation approach to the inference of reduced ngnet models of genetic networks.BMC bioinformatics, 9(1), 23. [17]. Narayanan, A., Keedwell, E., Gamalielsson, J., and Tatineni, S. (2004). Singlelayer artificial neural networks for gene expression analysis.Neurocomputing, 61, 217–240.
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 50 [18]. Noman, N. and Iba, H. (2007). Inferring gene regulatory networks using differential evolution with local search heuristics.IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), 4(4), 634–647. [19]. Perrin, B., Ralaivola, L., Mazurie, A., Bottani, S., Mallet, J., and dAlche Buc, F. (2003). Gene networks inference using dynamic bayesian networks.Bioinformatics, 19(suppl 2), ii138–ii148. [20]. Savageau, M. (20). years of s-systems. Canonical Nonlinear Modeling. S-systems Approach to Understand Complexity, pages 1–44. [21]. Spieth, C., Streichert, F., Speer, N., and Zell, A. (2004). A memetic inference method for gene regulatory networks based on s-systems. InEvolutionary Computation, 2004. CEC2004. Congress on, volume 1, pages 152–157. IEEE. [22]. Sutton, M., Smith, B., Godoy, V., and Walker, G. (2000). The sos response: recent insights into umudc-dependent mutagenesis and dna damage tolerance.Annual review of genetics, 34(1), 479–497. [23]. Tominaga, D., Koga, N., and Okamoto, N. (2000). Efficient numerical optimization algorithm based on genetic algorithm for inverse problem. In Proceedings of the Genetic and Evolutionary Computation Conference, pages 251–258. [24]. Wikipedia (2012). Epistasis and functional genomics— Wikipedia, the free encyclopedia. [Online; accessed 22-June- 2012]. [25]. Zhang, B. and Hwang, K. (2003). Bayesian network classifiers for gene expression analysis. A Practical Approach to Microarray Data Analysis, pages 150–165. BIOGRAPHIES Jereesh A S received Bachelor’s degree in Computer science and engineering from the Rajiv Gandhi Institute of technology Kottayam in the year 2007 and received Master’s degree in Computer science and engineering (Information Security) from the National Institute of technology Calicut in the year 2010. He is currently a research scholar pursuing for Ph.D degree in the Department of Computer science and engineering at National institute of Technology Calicut. His research interests include the Bioinformatics, data mining and evolutionary algorithms. V K Govindan received Bachelor’s and Master’s degrees in electrical engineering from the National Institute of technology Calicut in the year 1975 and 1978, respectively. He was awarded PhD in Character Recognition from the Indian Institute of Science, Bangalore, in 1989. His research areas include Image processing, pattern recognition, data compression, document imaging and operating systems. He has more than 125 research publications in international journals and conferences, and authored ten books. He has produced seven PhDs and reviewed papers for many Journals and conferences. He has more than 34 years of teaching experience at UG and PG levels and he was the Professor and Head of the Department of Computer Science and Engineering, NIT Calicut during years 2000 to 2005. He is currently working as Professor in the Department of Computer Science and Engineering, and Dean Academic at National Institute of Technology Calicut, India