Exhaustive Search: DNA Mapping and Brute Force Algorithms

Slides:



Advertisements
Similar presentations
Amanda Barrera Biology Honors Period 1
Advertisements

Recombinant DNA Technology
DNA Analysis Techniques
RESTRICTION ENZYMES & GEL ELECTROPHORESIS ANALYSIS OF PRECUT LAMBDA DNA.
Biotechnological Tools. What are we doing here?!?! One of the major advances in genetic research is the usage of recombinant DNA. Recombinant DNA refers.
Introduction to Techniques
13-2 Manipulating DNA.
Introduction to Bioinformatics Algorithms DNA Mapping and Brute Force Algorithms.
CISC667, F05, Lec3, Liao CISC 667 Intro to Bioinformatics (Fall 2005) Molecular Biology Tools Gel electrophoresis Cloning PCR DNA Sequencing.
Sequencing and Sequence Alignment
Introduction to Bioinformatics Molecular Biology Tools.
EXPERIMENT OBJECTIVE: The objective of this experiment is to develop an understanding of DNA mapping by determining restriction enzyme cleavage sites.
Introduction to Bioinformatics Algorithms DNA Mapping and Brute Force Algorithms.
Physical Mapping II + Perl CIS 667 March 2, 2004.
The Simplified Partial Digest Problem: Hardness and a Probabilistic Analysis Zo ë Abrams Ho-Lin Chen
Agarose Gel Electrophoresis 1Dr. Nikhat Siddiqi. Agarose is a linear polymer made up of the basic repeating unit of agarobiose which comprises alternating.
Introduction to Bioinformatics Algorithms Clustering and Microarray Analysis.
Introduction to Bioinformatics Algorithms Exhaustive Search and Branch-and-Bound Algorithms for Partial Digest Mapping.
7.1 Techniques for Producing and Analyzing DNA SBI4UP MRS. FRANKLIN.
Gel Electrophoresis Do you want a footer?.
Quickie Intro to DNA Technologies
Copyright Pearson Prentice Hall
Biotechnology SB2.f – Examine the use of DNA technology in forensics, medicine and agriculture.
Chapter 13 Section 1 DNA Technology. DNA Identification Only.10% of the human genome varies from person to person 98% of our genetic makeup does not code.
Biotechnology.
1 Outline Last time: –Molecular biology primer (sections ) –PCR Today: –More basic techniques for manipulating DNA (Sec. 3.8) Cutting into shorter.
Introduction to Bioinformatics Algorithms DNA Mapping and Brute Force Algorithms.
III Manipulating DNA. The Tools of Molecular Biology How do scientists make changes to DNA? The Tools of Molecular Biology.
Technological Solutions. In 1977 Sanger et al. were able to work out the complete nucleotide sequence in a virus – (Phage 0X174) This breakthrough allowed.
KEY CONCEPT Biotechnology relies on cutting DNA at specific places.
Restriction Mapping An Introduction to Bioinformatics Algorithms (Jones and Pevzner)
Genetic Engineering. What is genetic engineering? Application of molecular genetics for practical purposes Used to – identify genes for specific traits.
CMPT 438 Algorithms. Why Study Algorithms? Necessary in any computer programming problem ▫Improve algorithm efficiency: run faster, process more data,
Nucleic Acids Genetic Material. Nucleic Acids are macromolecules There are two main types: DNARNA.
RFLP Analysis Restriction Fragment Length Polymorphism 1.Extract/Isolate DNA from the cell restriction enzymes 2.Cut DNA into smaller fragments using restriction.
Part One BIOTECHNOLOGICAL TOOLS & TECHNIQUES. What is biotechnology? Applied biology genetics; molecular biology; microbiology; biochemistry Uses living.
Gel Electrophoresis. Definition – COPY ME! Separation of DNA fragments according to size and charge Based on movement through a gel medium when an.
Introduction to Bioinformatics Algorithms DNA Mapping and Brute Force Algorithms.
KEY CONCEPT Biotechnology relies on cutting DNA at specific places.
Locating and sequencing genes
BIOTECHNOLOGY DNA is now being easily manipulated. Molecular biologists analyze and alter genes and their respective proteins. Recombinant DNA is DNA from.
Restriction Enzymes Gabriela Perales 1. Restriction Enzymes  Restriction enzymes, also called restriction endonucleases, are molecules that cut double.
DNA Fingerprinting. Introduction to DNA Fingerprinting Technicians in forensic labs are often asked to do DNA profiling or “fingerprinting” Restriction.
AYESHA MASRUR KHAN DECEMBER More on Restriction Enzymes 2 Restriction enzymes are Nucleases which can cleave the sugar-phosphate backbone of DNA,
Restriction Enzymes Biotechnology Fall 2013.
Biotechnological Tools and Techniques. 1. Restriction Endonuclease (enzymes) Molecular scissors. Recognizes specific sequence (recognition site) on DNA.
An Introduction to Bioinformatics Algorithmswww.bioalgorithms.info Physical Mapping – Restriction Mapping.
Plasmids Small circular pieces of extra genomic DNA that can exit and enter bacterial cells.
RESTRICTION ENZYMES & GEL ELECTROPHORESIS FORENSIC DNA FINGERPRINTING.
Biotechnology I. POINT > Define what restriction enzymes are POINT > Describe how restriction enzymes cut DNA POINT > Show how restriction enzymes facilitate.
Genetic Changes  Humans have changed the genetics of other species for thousands of years by selective breeding  Causing Artificial Selection  Natural.
Gel electrophoresis.
CMPT 438 Algorithms.
Biotechnology.
Uses of Restriction Enzymes
BIOTECHNOLOGICAL TOOLS & TECHNIQUES
AMPLIFYING AND ANALYZING DNA.
KEY CONCEPT Biotechnology relies on cutting DNA at specific places.
KEY CONCEPT Biotechnology relies on cutting DNA at specific places.
Recombinant DNA Unit 12 Lesson 2.
Restriction Endonuclease
Restriction Digestion and Analysis of Lambda DNA Kit
KEY CONCEPT Biotechnology relies on cutting DNA at specific places.
KEY CONCEPT Biotechnology relies on cutting DNA at specific places.
KEY CONCEPT Biotechnology relies on cutting DNA at specific places.
CSE 5290: Algorithms for Bioinformatics Fall 2009
KEY CONCEPT Biotechnology relies on cutting DNA at specific places.
KEY CONCEPT Biotechnology relies on cutting DNA at specific places.
Presentation transcript:

Exhaustive Search: DNA Mapping and Brute Force Algorithms

Molecular Cell Biology, 4th edition fig 9-10 Molecular Scissors Molecular Cell Biology, 4th edition fig 9-10

Discovering Restriction Enzymes HindII - first restriction enzyme – was discovered accidentally in 1970 while studying how the bacterium Haemophilus influenzae takes up DNA from the virus Recognizes and cuts DNA at sequences: GTGCAC GTTAAC

Discovering Restriction Enzymes My father has discovered a servant who serves as a pair of scissors. If a foreign king invades a bacterium, this servant can cut him in small fragments, but he does not do any harm to his own king. Clever people use the servant with the scissors to find out the secrets of the kings. For this reason my father received the Nobel Prize for the discovery of the servant with the scissors". Daniel Nathans’ daughter (from Nobel lecture) Werner Arber Daniel Nathans Hamilton Smith Werner Arber – discovered restriction enzymes Daniel Nathans - pioneered the application of restriction for the construction of genetic maps Hamilton Smith - showed that restriction enzyme cuts DNA in the middle of a specific sequence

Recognition Sites of Restriction Enzymes Molecular Cell Biology, 4th edition

Restriction Maps A map of all restriction sites in a DNA sequence Can be constructed through both biological and computational methods without knowing DNA sequencs

Uses of Restriction Enzymes Recombinant DNA technology Cloning cDNA/genomic library construction DNA mapping

Full Restriction Digest Cutting DNA at each restriction site creates multiple restriction fragments: Is it possible to reconstruct the order of the fragments and the positions of the cuts?

Full Restriction Digest: Multiple Solutions An alternative ordering of restriction fragments: vs

Separating DNA by Size Gel electrophoresis is a process for separating DNA by size Can separate DNA fragments that differ in length in only 1 nucleotide for fragments up to 500 nucleotides long

Gel Electrophoresis DNA fragments are injected into a gel positioned in an electric field DNA are negatively charged near neutral pH The ribose phosphate backbone of each nucleotide is acidic; DNA has an overall negative charge DNA molecules move towards the positive electrode

Gel Electrophoresis (cont’d) DNA fragments of different lengths are separated according to size Smaller molecules move through the gel matrix more readily than larger molecules The gel matrix restricts random diffusion so molecules of different lengths separate into bands

Detecting DNA: Autoradiography One way to visualize separated DNA bands on a gel is autoradiography: The DNA is radioactively labeled The gel is laid against a sheet of photographic film in the dark, exposing the film at the positions where the DNA is present.

Detecting DNA: Fluorescence Another way to visualize DNA bands in gel is fluorescence: The gel is incubated with a solution containing the fluorescent dye ethidium Ethidium binds to the DNA The DNA lights up when the gel is exposed to ultraviolet light.

Gel Electrophoresis: Example Direction of DNA movement Smaller fragments travel farther Molecular Cell Biology, 4th edition fig 10-7

Partial Restriction Digest The sample of DNA is exposed to the restriction enzyme for only a limited amount of time to prevent it from being cut at all restriction sites We assume that with this method biologists can generate the set of all possible restriction fragments between every two cuts We assume that multiplicity of a fragment can be detected, i.e., the number of restriction fragments of the same length can be determined (e.g., by observing twice as much fluorescence intensity for a double fragment than for a single fragment) This set of fragment sizes is used to determine the positions of the restriction sites in the DNA sequence

Partial Digest Example For the same DNA sequence as before, we would now get the following restriction fragments:

Multiset of Restriction Fragments We assume that multiplicity of a fragment can be detected, i.e., the number of restriction fragments of the same length can be determined (e.g., by observing twice as much fluorescence intensity for a double fragment than for a single fragment) Multiset: {3, 5, 5, 8, 9, 14, 14, 17, 19, 22}

Partial Digest Fundamentals Defining some of the terms used in the Partial Digest Problem: X: the set of n integers representing the location of all cuts in the restriction map, including the start and the end n: the total number of cuts X: the multiset of integers representing lengths of each of the fragments produced from a partial digest

One More Partial Digest Example 2 4 7 10 5 8 3 6 Representation of X = {2, 2, 3, 3, 4, 5, 6, 7, 8, 10} as a two dimensional table, with elements of X = {0, 2, 4, 7, 10} along both the top and left side. The elements at (i, j) in the table is the value xj – xi for 1 ≤ i < j ≤ n.

Partial Digest Problem: Formulation Partial Digest Problem: Given all pairwise distances between points on a line, reconstruct the positions of those points Input: The multiset of pairwise distances L, containing C(n, 2) integers, where n is the number of cuts (including both ends). Output: A set X, of n integers, such that X = L

Turnpike Problem Given the set of distances between every pair of exits on a highway leading from one town to another. Reconstruct the geography of the highway exits; that is, find the location of each exit from the first town.

Partial Digest: Multiple Solutions It is not always possible to uniquely reconstruct a set X based only on X. For example, the set A = {0, 2, 5} and (A  10) = {10, 12, 15} both produce {2, 3, 5} as their partial digest set. The sets {0,1,2,5,7,9,12} and {0,1,5,7,8,10,12} present a less trivial example of the problem of non-uniqueness. Here both sets digest into: {1, 1, 2, 2, 2, 3, 3, 4, 4, 5, 5, 5, 6, 7, 7, 7, 8, 9, 10, 11, 12}

Homometric Sets 1 2 5 7 9 12 4 6 8 11 3 10 1 5 7 8 10 12 4 6 9 11 2 3

Brute Force Algorithms Also known as exhaustive search algorithms; examines every possible solution to find a valid one (e.g., list sorting): look at all permutations of elements in the list until finding the sorted version Efficient in rare cases; usually impractical

Partial Digest: Brute Force Find the restriction fragment of maximum length M. M is the length of the DNA sequence. For every possible solution, compute the corresponding X If X is equal to the experimental partial digest L, then X is the correct restriction map

BruteForcePDP BruteForcePDP(L, n): M  maximum element in L for every set of n – 2 integers 0 < x2 < … xn-1 < M X  {0, x2,…, xn-1, M} Form X from X if X = L return X output “no solution”

Efficiency of BruteForcePDP The speed of the BruteForceDPD is unfortunately O(M n-2) as it must examine all possible sets of positions. One way to improve the algorithm is to limit the values of xi to only those values which occur in L, as we shall see in the next slide.

AnotherBruteForcePDP AnotherBruteForcePDP(L, n) M  maximum element in L for every set of n – 2 integers 0 < x2 < … xn-1 < M from L X  { 0, x2, …, xn-1, M } Form X from X if X = L return X output “no solution”

Efficiency of AnotherBruteForcePDP It’s more efficient, but still slow. Only sets examined, but runtime is still exponential: O(n2n-4) ( |L| = n(n-1)/2). If L = {2, 998, 1000} (n = 3, M = 1000), BruteForcePDP will be extremely slow, but AnotherBruteForcePDP will be quite fast.

Branch and Bound Algorithm for PDP (S. Skiena, W. Smith, and P Branch and Bound Algorithm for PDP (S. Skiena, W. Smith, and P. Lemke 1990) Rough Sketch Begin with X = {0} Remove the largest element in L and place it in X See if the element fits on the right or left side of the restriction map When it fits, find the other lengths it creates and remove those from L Go back to step 2 until L is empty

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0 }

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0 } Remove 10 from L and insert it into X. We know this must be The length of the DNA sequence because it is the largest fragment.

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 10 }

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 10 } Take 8 from L and make y = 2 or 8. But since the two cases are symmetric, we can assume y = 2. We find that the distances from y to other elements at X are (y, X) = {8, 2}, so we remove {8, 2} from L and add 2 to X. (y, X) = {|y – x1|, |y – x2|, …, |y – xn|} for X = {x1, x2, …, xn}

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 2, 10 }

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 2, 10 } Take 7 from L and make y = 7 or y = 10 – 7 = 3. We will explore y = 7 first, so (y, X ) = {7, 5, 3}. Therefore we remove {7, 5 ,3} from L and add 7 to X. (y, X) = {7, 5, 3} = {7 – 0, 7 – 2, 7 – 10}

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 2, 7, 10 }

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 2, 7, 10 } Take 6 from L and make y = 6. Unfortunately ( y, X ) = {6, 4, 1 ,4}, which is not a subset of L. Therefore we won’t explore this branch. 6

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 2, 7, 10 } This time we place the cut on the left and let y = 4. ( y, X ) = {4, 2, 3 ,6}, which is a subset of L, so we will explore this branch. We remove {4, 2, 3 ,6} from L and add 4 to X.

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 2, 4, 7, 10 }

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 2, 4, 7, 10 } L is now empty, so we have a solution, which is X.

PartialDigest Algorithm First, define ( y, X ) as the multi-set of all distances between point y and all other points in the set X (y, X) = {|y – x1|, |y – x2|, …, |y – xn|} for X = {x1, x2, …, xn}

PartialDigest( L ): width  Maximum element in L DELETE( width, L ) X  { 0, width } PLACE( L, X )

PartialDigest Algorithm (cont’d) PLACE( L, X ) // find all solutions if L is empty output X return y  Maximum element in L If ( y, X )  L // place the cut on the right Add y to X and remove lengths (y, X ) from L PLACE(L, X ) Remove y from X and add lengths (y, X ) to L If ( width-y, X )  L // place it on the left Add width-y to X and remove lengths (width-y, X) from L PLACE(L,X ) Remove width-y from X and add lengths (width-y, X ) to L

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 2, 7, 10 } To find other solutions, we backtrack.

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 2, 10 } More backtrack.

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 2, 10 } This time we will explore width-y = 3. (y, X) = {3, 1, 7}, which is not a subset of L, so we won’t explore this branch.

An Example L = { 2, 2, 3, 3, 4, 5, 6, 7, 8, 10 } X = { 0, 10 } We backtracked back to the root. Therefore we have found all the solutions.

Analyzing PartialDigest Algorithm Still exponential in worst case, but is very fast on average For N different fragments, if time of PartialDigest is T(N): No branching case: T(N) = T(N-1) + O(N) Quadratic Branching case: T(N) = 2T(N-1) + O(N) Exponential (Z. Zhang 1994: exponential example for this algorithm)

Double Digest Mapping Double Digest is yet another experimentally method to construct restriction maps Use two restriction enzymes; three full digests: One with only first enzyme One with only second enzyme One with both enzymes Computationally, Double Digest problem is more complex than Partial Digest problem

Double Digest: Example

Double Digest: Example Without the information about X (i.e. A+B), it is impossible to solve the double digest problem as this diagram illustrates

Double Digest Problem Input: dA – fragment lengths from the digest with enzyme A. dB – fragment lengths from the digest with enzyme B. dX – fragment lengths from the digest with both A and B. Output: A – location of the cuts in the restriction map for the enzyme A. B – location of the cuts in the restriction map for the enzyme B.

Double Digest: Multiple Solutions

Homework Problem 4.2. Problem 4.9: Design a brute-force algorithm for the DDP problem and suggest a branch-and-bound approach to improve its performance. (Goldstein and Waterman proved in 1987 that DDP is NP-complete.)