Generic Heuristics Encoding And Phylogenies
Proceeding: The Second International Conference on e-Technologies and Networks for Development (ICeND)Publication Date: 2013-3-4
Authors : Chadi Kallab;
Page : 180-190
Keywords : Generic; Heuristics; Encoding; Phylogenies; Artificial Intelligence; Bio-informatics; NP-Hard; Genetic Algorithm; Simulated Annealing; Simulated Evolution; Stochastic Evolution; Tabu Search;
Abstract
This paper tackles one of the most known problems in biology: search for an optimal sequences tree topology. Bio-informatics researchers and scientists have categorized this problem as Non-Polynomial Hard (NP-Hard). The main idea behind this problem is to minimize differences between given (leaf) and/or derived (parent) sequences. The count of potential solutions goes exponentially proportional to the number of given leaf sequences. This leads researchers to look for optimization methods that would provide an acceptable optimal topology. Despite the efforts of research being done to group species and gene families, many popular methods used to attempt solving the problem remain heavy in terms of the computational power needed (ex: parsimony and maximum likelihood), inferring the quasi-impossibility of finding an exact solution for more than 20 leaf sequences. Depending on the number and length of sequences to be compared, such as Pairwise Alignment or Multiple Sequence Alignment (MSA) or even alignment of an entire genome, different types of algorithms can be used to help reach an optimal topology: dynamic programming, linear programming based or heuristicbased or a combination. The higher the number of given sequences is, the more advisable and efficient it would be to go towards heuristics as they would provide a close-enough solution faster, as for instance greedy algorithms, hill climbing, simulated annealing and genetic algorithms do. Thus, as part of a larger research in Heuristics and phylogenies, this paper aims to suggest a general way to encode the problem into instances of different heuristic algorithms.
Other Latest Articles
- End-to-End Architecture For E-Commerce Security
- A New Gaussian Cipher With Optimal Keyed Process (KAM-FA)
- Enhanced IDEA Algorithm For Strong Encryption Based On Efficient Strong Rotor Banks
- Battle For Online Freedom Of Speech-Identity: Authenticity Or Anonymity
- A Skype ML Datasets Validation and Detection Mechanism Using Machine Learning Approach
Last modified: 2013-06-18 22:05:50