Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2019 Jul 15;35(14):i558-i567.
doi: 10.1093/bioinformatics/btz371.

Controlling large Boolean networks with single-step perturbations

Affiliations

Controlling large Boolean networks with single-step perturbations

Alexis Baudin et al. Bioinformatics. .

Abstract

Motivation: The control of Boolean networks has traditionally focussed on strategies where the perturbations are applied to the nodes of the network for an extended period of time. In this work, we study if and how a Boolean network can be controlled by perturbing a minimal set of nodes for a single-step and letting the system evolve afterwards according to its original dynamics. More precisely, given a Boolean network (BN), we compute a minimal subset Cmin of the nodes such that BN can be driven from any initial state in an attractor to another 'desired' attractor by perturbing some or all of the nodes of Cmin for a single-step. Such kind of control is attractive for biological systems because they are less time consuming than the traditional strategies for control while also being financially more viable. However, due to the phenomenon of state-space explosion, computing such a minimal subset is computationally inefficient and an approach that deals with the entire network in one-go, does not scale well for large networks.

Results: We develop a 'divide-and-conquer' approach by decomposing the network into smaller partitions, computing the minimal control on the projection of the attractors to these partitions and then composing the results to obtain Cmin for the whole network. We implement our method and test it on various real-life biological networks to demonstrate its applicability and efficiency.

Supplementary information: Supplementary data are available at Bioinformatics online.

PubMed Disclaimer

Figures

Fig. 1.
Fig. 1.
(a) Boolean functions, (b) dependency graph and (c) TS for Example 1. The basins of attractions of the respective attractors are shown as shaded grey regions
Fig. 2.
Fig. 2.
Influence of the block size on the efficiency of FC
Fig. 3.
Fig. 3.
The results of TC and SM on the myeloid differentiation network

References

    1. Adai A.T. et al. (2004) LGL: creating a map of protein function with an algorithm for visualizing very large biological networks. J. Mol. Biol., 340, 179–190. - PubMed
    1. Blanchini F., Franco E. (2011) Structurally robust biological networks. BMC Syst. Biol., 5, 74.. - PMC - PubMed
    1. Cervera L. et al. (2015) Extended gene expression by medium exchange and repeated transient transfection for recombinant protein production enhancement. Biotechnol. Bioeng., 112, 934–946. - PubMed
    1. Charrier S. et al. (2011) Quantification of lentiviral vector copy numbers in individual hematopoietic colony-forming cells shows vector dose-dependent effects on the frequency and level of transduction. Gene Ther., 18, 479–487. - PMC - PubMed
    1. Cohen D.P.A. et al. (2015) Mathematical modelling of molecular pathways enabling tumour cell invasion and migration. PLoS Comput. Biol., 11, e1004571.. - PMC - PubMed

Publication types