1 Compact Error-Resilient Computational DNA Tiling Assemblies John H.Reif, Sudheer Sahu, and Peng Yin Presenter: Seok, Ho-SIK.

Slides:



Advertisements
Similar presentations
An information-bearing seed for nucleating algorithmic self-assembly Presented by : Venkata Chaitanya Goli Robert D. Barish1, Rebecca Schulman1,
Advertisements

Circuit and Communication Complexity. Karchmer – Wigderson Games Given The communication game G f : Alice getss.t. f(x)=1 Bob getss.t. f(y)=0 Goal: Find.
1 SODA January 23, 2011 Temperature 1 Self-Assembly: Deterministic Assembly in 3D and Probabilistic Assembly in 2D Matthew CookUniversity of Zurich and.
Design of a biomolecular Device that executes process Algebra Urmi Majumder and John Reif Department of Computer Science Duke University DNA15, JUNE 10,
Cyclic Code.
PROTOCOL VERIFICATION & PROTOCOL VALIDATION. Protocol Verification Communication Protocols should be checked for correctness, robustness and performance,
Mutual Exclusion By Shiran Mizrahi. Critical Section class Counter { private int value = 1; //counter starts at one public Counter(int c) { //constructor.
Prepared by Ilya Kolchinsky.  n generals, communicating through messengers  some of the generals (up to m) might be traitors  all loyal generals should.
Dynamic Programming Dynamic Programming is a general algorithm design technique for solving problems defined by recurrences with overlapping subproblems.
Copyright © 2006 Addison-Wesley. All rights reserved.1-1 ICS 410: Programming Languages Chapter 3 : Describing Syntax and Semantics Axiomatic Semantics.
Algebra Problems… Solutions Algebra Problems… Solutions © 2007 Herbert I. Gross Set 4 By Herb I. Gross and Richard A. Medeiros next.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
1 Huffman Codes. 2 Introduction Huffman codes are a very effective technique for compressing data; savings of 20% to 90% are typical, depending on the.
1 Lecture 25: Parallel Algorithms II Topics: matrix, graph, and sort algorithms Tuesday presentations:  Each group: 10 minutes  Describe the problem,
DNA Computing by Self Assembly  Erik Winfree, Caltech.
1 1. BLAST (Basic Local Alignment Search Tool) Heuristic Only parts of protein are frequently subject to mutations. For example, active sites (that one.
Computational Complexity, Physical Mapping III + Perl CIS 667 March 4, 2004.
Dr. Muhammed Al-Mulhem 1ICS ICS 535 Design and Implementation of Programming Languages Part 1 Fundamentals (Chapter 4) Axiomatic Semantics ICS 535.
Variable-Length Codes: Huffman Codes
Hand Signals Recognition from Video Using 3D Motion Capture Archive Tai-Peng Tian Stan Sclaroff Computer Science Department B OSTON U NIVERSITY I. Introduction.
4. There once lived a king, named Hagar, who had thousands of sons and daughters, still giving more births to his wives. One of his serious problems was.
1 Exact Set Matching Charles Yan Exact Set Matching Goal: To find all occurrences in text T of any pattern in a set of patterns P={p 1,p 2,…,p.
Sequencing Problem.
Keystone Problems… Keystone Problems… next Set 19 © 2007 Herbert I. Gross.
Statistical Techniques I
February 25, 2002Applied Discrete Mathematics Week 5: Mathematical Reasoning 1 Addition of Integers How do we (humans) add two integers? Example: 7583.
Quantum Error Correction Jian-Wei Pan Lecture Note 9.
QNT 531 Advanced Problems in Statistics and Research Methods
Towers of Hanoi. Introduction This problem is discussed in many maths texts, And in computer science an AI as an illustration of recursion and problem.
Cooperative Molecular Communication for Nanonetwork Liang Hong 1, Wei Chen 1, Feng Liu 2 1 College of Engineering, Tennessee State University, U.S.A. 2.
Autonomous DNA Nanomechanical Device Capable of Universal Computation and Universal Translational Motion Peng Yin*, Andrew J. Turberfield †, Sudheer Sahu*,
DNA Based Self-Assembly and Nano-Device: Theory and Practice Peng Yin Committee Prof. Reif (Advisor), Prof. Agarwal, Prof. Hartemink Prof. LaBean, Prof.
Motif finding with Gibbs sampling CS 466 Saurabh Sinha.
Reliable Communication in the Presence of Failures Based on the paper by: Kenneth Birman and Thomas A. Joseph Cesar Talledo COEN 317 Fall 05.
Copyright © 2013, 2009, 2005 Pearson Education, Inc. 1 3 Polynomial and Rational Functions Copyright © 2013, 2009, 2005 Pearson Education, Inc.
Cellular Automata & DNA Computing 우정철. Definition Of Cellular Automata Von Von Neuman’s Neuman’s Definition Wolfram’s Wolfram’s Definition Lyman.
Notes for self-assembly of thin rectangles Days 19, 20 and 21 of Comp Sci 480.
CMPUT Computer Organization and Architecture II1 CMPUT329 - Fall 2003 Topic 5: Quine-McCluskey Method José Nelson Amaral.
Notes on local determinism Days 12, 13 and 14 of Comp Sci 480.
Section 2: Replication of DNA
Improving Loss Resilience with Multi- Radio Diversity in Wireless Networks by Allen Miu, Hari Balakrishnan and C.E. Koksal Appeared in ACM MOBICOM 2005,
UNIT 5.  The related activities of sorting, searching and merging are central to many computer applications.  Sorting and merging provide us with a.
Notes on temperature programming: lines and scaled shapes Days 28, 29 and 30 of Comp Sci 480.
Whiplash PCR History: - Invented by Hagiya et all 1997] - Improved by Erik Winfree Made Isothermal by John Reif and Urmi Majumder 2008 Whiplash.
John Reif and Urmi Majumder Department of Computer Science Duke University Isothermal Reactivating Whiplash PCR for Locally Programmable Molecular Computation.
Data Communications and Networking
TileSoft: Sequence Optimization Software for Designing DNA Secondary Structures P. Yin*, B. Guo*, C. Belmore*, W. Palmeri*, E. Winfree †, T. H. LaBean*
Notes for temperature 1 self- assembly Days 15, 16, 17 and 18 of Comp Sci 480.
Ashish Goel, 1 The Source of Errors: Thermodynamics Rate of correct growth ¼ exp(-G A ) Probability of incorrect growth ¼ exp(-G A.
Condition Testing. Condition testing is a test case design method that exercises the logical conditions contained in a program module. A simple condition.
Towards Autonomous Molecular Computers Towards Autonomous Molecular Computers Masami Hagiya, Proceedings of GP, Nakjung Choi
LECTURE 4 Logic Design. LOGIC DESIGN We already know that the language of the machine is binary – that is, sequences of 1’s and 0’s. But why is this?
ECE DIGITAL LOGIC LECTURE 15: COMBINATIONAL CIRCUITS Assistant Prof. Fareena Saqib Florida Institute of Technology Fall 2015, 10/20/2015.
Interleaving Compounding Packets & Convolution Codes
Boolean Algebra and Computer Logic Mathematical Structures for Computer Science Chapter 7 Copyright © 2006 W.H. Freeman & Co.MSCS Slides Boolean Logic.
Author : Tzi-Cker Chiueh, Prashant Pradhan Publisher : High-Performance Computer Architecture, Presenter : Jo-Ning Yu Date : 2010/11/03.
Section 2: Replication of DNA
Prof. Sin-Min Lee Department of Computer Science
Condition Testing.
Section 2: Replication of DNA
Packetizing Error Detection
Section 2: Replication of DNA
Packetizing Error Detection
Compact Error Resilient Computational DNA Tiling Assemblies
Packetizing Error Detection
John H. Reif and Sudheer Sahu
Sudheer Sahu John H. Reif Duke University
Notes on temperature programming
Disk Failures Disk failure ways and their mitigation
Algorithms for Robust Self-Assembly
Presentation transcript:

1 Compact Error-Resilient Computational DNA Tiling Assemblies John H.Reif, Sudheer Sahu, and Peng Yin Presenter: Seok, Ho-SIK

2 How to decrease assembling error? First approach  Optimizing the physical environment, improving the design of the tile itself or using novel material  They admit that DNA is not suitable for constructing tiles Second approach  Design of new tile sets that can reduce the total number of errors in the final structure even with the same intrinsic error rate

3 Winfree’s proofreading - 1 The basic idea  To exploit cooperative binding at the next higher level: to have several tiles that stabilize each other when they bind together  Essentially, each rule tile in the original tile set is replaced by four tiles with related labels  According to the aTAM, assembly from the seed tile proceeds according to the same logic as the original tile set, but scaled up in size by a factor of two

4 *Kinetic trapping The essential feature of kinetic trapping within tile self-assembly is that once an error has occurred, both sites above the mismatched tile display an (x, y) pair that is perfectly matched by some monomer tile in solution, because tiles implementing all replacement rules are present. Thus, if such a tile arrives before the mismatched tile dissociates, the mismatched tile becomes locked in by multiple bonds and is now unlikely to dissociate (Winfree)

5 Winfree’s proofreading - 2  If a mismatch occurs, the assembly process stalls, giving time for the initial mismatched tile to fall off and be replaced by a correct tile They want to escape the kinetic trap If there is a tile structure with desired size, then an experimenter can guarantee that the structure is the wanted one

6 Errors in assemblies The pad mismatch rate ε  Critical issue in 2D tiling assemblies  It determines the size of the error-free assembly Key challenge in experimentally demonstrating large scale assemblies is to construct error-resilient tiles  Winfree’s approach resulted in a final structure that is four times the size of the original one Winfree wanted to inhibit occurrence of an incorrectly matched tile structure

7 Assembly with no error corrections N X M array V(i,j)  The value of i-th bit on the j-th row displayed at position (i.j) and communicated to the position (i,j+1)  V(i,j)= U(i-1,j) OP 1 V(i,j-1) U(i,j)  Boolean value communicated to the position (i+1,j)  U(i,j)= U(i-1,j) OP 2 V(i,j-1) Bottom pad: V(i,j-1) Right pad: U(i-1, j) Top pad: V(i,j) computed by V(i,j-1) OP 1 U(i-1,j) Left pad: U(i,j) computed by V(i,j-1) OP 2 U(i-1,j) U(i-1,j) V(i,j) U(i,j) V(i,j-1)

8 Error-resilient assembly using two-way overlay redundancy Error-Resilient Assembly I  Proposed architecture  This architecture drops the probability of a tile assembly error rate to 6 ε 2 Basic idea  Two way overlay redundancy  Each tile T 1 (i, j) computes the outputs for its own position (i, j) and also for its right neighbor’s position (i-1, j)  The redundant computation results obtained by T 1 (i, j) and its right neighbor T 1 (i-1, j) is compared via an additional error checking portion on T 1 (i, j)’s right pad  If only one of T 1 (i, j) and T 1 (i-1, j) is in error, the kinetics of the assembly may allow for the incorrectly placed tile to be ejected from the assembly

9 Construction Note  The bottom portion of the right pad represents the value of V(i-1, j)  The value V(i-1, j) is redundantly determined by T 1 (i-1, j) and hence the bottom portion performs comparison of the two values and is referred to as error checking portion  The value is communicated to tile T 1 (i, j) from its immediate right neighbor T 1 (i-1, j)  The determined value is displayed by the tile T 1 (i, j) using an extruding ssDNA  We emphasize that through a pad has two portions, it should be treated as a whole unit. A value change in one portion of a pad changes the pad to a completely new pad U(i-1,j)=U(i-2,j)OP 2 V(i-1,j-1) But, V(i, j)=U(i-1,j)OP 1 V(i,j-1)  This tile is a sequential machine! Error checking portion V(i,j), V(i-1,j) U(i-2,j), V(i-1,j) V(i,j-1), V(i-1,j-1) U(i-1,j), V(i,j)

10 Assumptions of the construction We can glue a pad selectively on a DNA tile after some internal calculations We or a nice guy could found a method for pushing sequential machine into a DNA tile We or a genius could invent a method capable of kicking off mismatched sequences after examining content the sequences There would be a way delivering information without annealing Or we escape the limit of DNA, so do not harass us with the notion of DNA! We can use some nice material and we no longer use the double helix structure  We are talking about some nice kind of nano machine not damn it DNA machine!!!

11 Error analysis - 1 Our intention is that the individual tiling assembly error rate is substantially decreased, due to cooperative assembly of neighboring tiles, which redundantly compute the values at their positions and at their right neighbors We consider only the cases where the pad binding error occurs on either the bottom pad or the right pad of a tile T 1 (i, j)

12 Error analysis - 2 Lemma  Suppose that the neighborhood tiles independent of tile T 1 (i,j) have correctly computed V, U. If there is a single pad mismatch between tile T 1 (i,j) or to its just below or immediate right, then there is at least one further pad mismatch in the neighborhood of tile T 1 (i,j). Furthermore, given the location of the initial mismatch, the location of the further pad mismatch can be determined among at most three possible pad locations Suspicion  They have invented some kind of DNA fastener so there would be no need for annealing between information portion Information Some kind of linker of fastener

13 Error analysis – 3 (Proof) 1. Error occurs on the bottom pad of tile T 1 (i, j) 1.1 Error is due to the incorrect value of the right portion V(i-1, j-1) of the bottom pad of tile T 1 (i, j) Error checking portion V(i,j), V(i-1,j) U(i-2,j), V(i-1,j) V(i,j-1), V(i-1,j-1) In this case, T 1 (i, j) will compute incorrect value for right V(i-1, j) (V(i-1, j)=U(i-2,j) OP 2 V(i-1, j-1)), which is distinct from the correct value of V(i-1, j) determined by its right neighbor tile T 1 (i-1, j) 1.2 Error is due to the incorrect value of the left portion V(i, j-1) of the bottom pad of tile T 1 (i, j) In this case, T 1 (i, j) will compute incorrect value for V(i, j). So there must be a further mismatch at tile T 1 (i+1, j). If there is no mismatch, then there is a mismatch between T 1 (i+1, j) and T 1 (i+1, j-1) U(i-1, j) V(i, j) Their mismatch may mean a mismatch between a pad and a tile If a tile itself is mismatched, then correct value of U(i-2., j) can not be delivered Or we can believe that tile knows correct value of its neighbor tiles before computation

14 Error analysis – 4 (Proof) 2. Error occurs on the right pad of tile T 1 (i, j) 2.1 The error occurs on the U(i-2, j) portion of the right pad of tile T 1 (i, j) Error checking portion V(i,j), V(i-1,j) U(i-2,j), V(i-1,j) V(i,j-1), V(i-1,j-1) In this case, T 1 (i, j) will compute incorrect value for top V(i-1, j) So there must be a further pad mismatch at tile T 1 (i, j+1) (Because, V(i-1, j+1)=u(i-2, j+1) OP2 V(i-1, j)) U(i-1, j) V(i, j) Given the location of the initial mismatch, the location of the further pad mismatch can be determined among at most three possible pad locations

15 Error analysis - 5 The probability of a single pad mismatch between adjacent assembling tiles   The probability that there is no pad mismatch between tile T 1 and another tile just below or to its immediate right is (1-  ) 2  Hence the probability that there is a pad mismatch between tile T 1 and another tile just below or to its immediate right is 1-(1-  ) 2 =2  -  2, which is at most 2  The probability that there is such a further pad mismatch between tiles at most three possible pad locations is at most 1-(1-  ) 3, which is at most 3 . This implies that with probability (2  )(3  )=6  2, there is both (i) a pad mismatch between tile T 1 and another tile just below or to its immediate right; and (ii) there is also a further pad mismatch between tiles in the immediate neighborhood of tile T 1

16 *Suspicion However in their tile structure, the above and left tiles do depend on their just below and immediately right tile. Therefore, it is impossible for perfectly matched tile to arrive above mismatched tile Or tiles stick to some frame and only pads are floating around In this model, there is no need for distinction between independent and dependent tiles  If distinction is meaningful, then mismatch will spread  If distinction is meaningless, then their computation is just kidding

17 Simulation Using simulation, our version 1(T 1 ) is comparable to winfree’s proofreading tile set constructions, while our version 2 (T 2 ) outperforms both of them

18 Comparison to Winfree Winfree’s method can inhibit the spreading of incorrect mismatches  With their notion of dependency, they (Reif & his followers) do not show the method for spreading inhibition  Their 6  2 was computed with the kinetic trapping In Winfree’s method, structuring is computation  They assume some internal computation  Their model should implement sequential machine, comparator, and a method for communication. Therefore, their claim that their structure is less than Winfree’s one is meaningless