Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Calculating all multiple parameter solutions of ODE models to avoid biological misinterpretations

  • Received: 11 January 2019 Accepted: 05 July 2019 Published: 11 July 2019
  • Biological system's dynamics are increasingly studied with nonlinear ordinary differential equations, whose parameters are estimated from input/output experimental data. Structural identifiability analysis addresses the theoretical question whether the inverse problem of recovering the unknown parameters from noise-free data is uniquely solvable (global), or if there is a finite (local), or an infinite number (non identifiable) of parameter values that generate identical input/output trajectories. In contrast, practical identifiability analysis aims to assess whether the experimental data provide information on the parameter estimates in terms of precision and accuracy. A main difference between the two identifiability approaches is that the former is mostly carried out analytically and provides exact results at a cost of increased computational complexity, while the latter is usually numerically tested by calculating statistical confidence regions and relies on decision thresholds. Here we focus on local identifiability, a critical issue in biological modeling. This is the case when a model has multiple parameter solutions which equivalently describe the input/output data, but predict different behaviours of the unmeasured variables, often those of major interest. We present theoretical background and applications to locally identifiable ODE models described by rational functions. We show how structural identifiability analysis completes the practical identifiability results. In particular we propose an algorithmic approach, implemented with our software DAISY, to calculate all numerical parameter solutions and to predict the corresponding behaviour of the unmeasured variables, which otherwise would remain hidden. A case study of a locally identifiable HIV model shows that one should be aware of the presence of multiple parameter solutions to comprehensively describe the biological system and avoid biological misinterpretation of the results.

    Citation: Maria Pia Saccomani, Karl Thomaseth. Calculating all multiple parameter solutions of ODE models to avoid biological misinterpretations[J]. Mathematical Biosciences and Engineering, 2019, 16(6): 6438-6453. doi: 10.3934/mbe.2019322

    Related Papers:

    [1] Tareq M. Al-shami, Zanyar A. Ameen, A. A. Azzam, Mohammed E. El-Shafei . Soft separation axioms via soft topological operators. AIMS Mathematics, 2022, 7(8): 15107-15119. doi: 10.3934/math.2022828
    [2] Mohammad H. M. Rashid, Feras Bani-Ahmad . An estimate for the numerical radius of the Hilbert space operators and a numerical radius inequality. AIMS Mathematics, 2023, 8(11): 26384-26405. doi: 10.3934/math.20231347
    [3] Mustafa Ekici . On an axiomatization of the grey Banzhaf value. AIMS Mathematics, 2023, 8(12): 30405-30418. doi: 10.3934/math.20231552
    [4] Thabet Abdeljawad, Kifayat Ullah, Junaid Ahmad, Muhammad Arshad, Zhenhua Ma . On the convergence of an iterative process for enriched Suzuki nonexpansive mappings in Banach spaces. AIMS Mathematics, 2022, 7(11): 20247-20258. doi: 10.3934/math.20221108
    [5] Younes Talaei, Sanda Micula, Hasan Hosseinzadeh, Samad Noeiaghdam . A novel algorithm to solve nonlinear fractional quadratic integral equations. AIMS Mathematics, 2022, 7(7): 13237-13257. doi: 10.3934/math.2022730
    [6] Jagdev Singh, Jitendra Kumar, Devendra kumar, Dumitru Baleanu . A reliable numerical algorithm based on an operational matrix method for treatment of a fractional order computer virus model. AIMS Mathematics, 2024, 9(2): 3195-3210. doi: 10.3934/math.2024155
    [7] Amit K. Pandey, Manoj P. Tripathi, Harendra Singh, Pentyala S. Rao, Devendra Kumar, D. Baleanu . An efficient algorithm for the numerical evaluation of pseudo differential operator with error estimation. AIMS Mathematics, 2022, 7(10): 17829-17842. doi: 10.3934/math.2022982
    [8] Mesfer H. Alqahtani, Alaa M. Abd El-latif . Separation axioms via novel operators in the frame of topological spaces and applications. AIMS Mathematics, 2024, 9(6): 14213-14227. doi: 10.3934/math.2024690
    [9] Yonghong Duan, Ruiping Wen . An alternating direction power-method for computing the largest singular value and singular vectors of a matrix. AIMS Mathematics, 2023, 8(1): 1127-1138. doi: 10.3934/math.2023056
    [10] Najla Altwaijry, Cristian Conde, Silvestru Sever Dragomir, Kais Feki . Further norm and numerical radii inequalities for operators involving a positive operator. AIMS Mathematics, 2025, 10(2): 2684-2696. doi: 10.3934/math.2025126
  • Biological system's dynamics are increasingly studied with nonlinear ordinary differential equations, whose parameters are estimated from input/output experimental data. Structural identifiability analysis addresses the theoretical question whether the inverse problem of recovering the unknown parameters from noise-free data is uniquely solvable (global), or if there is a finite (local), or an infinite number (non identifiable) of parameter values that generate identical input/output trajectories. In contrast, practical identifiability analysis aims to assess whether the experimental data provide information on the parameter estimates in terms of precision and accuracy. A main difference between the two identifiability approaches is that the former is mostly carried out analytically and provides exact results at a cost of increased computational complexity, while the latter is usually numerically tested by calculating statistical confidence regions and relies on decision thresholds. Here we focus on local identifiability, a critical issue in biological modeling. This is the case when a model has multiple parameter solutions which equivalently describe the input/output data, but predict different behaviours of the unmeasured variables, often those of major interest. We present theoretical background and applications to locally identifiable ODE models described by rational functions. We show how structural identifiability analysis completes the practical identifiability results. In particular we propose an algorithmic approach, implemented with our software DAISY, to calculate all numerical parameter solutions and to predict the corresponding behaviour of the unmeasured variables, which otherwise would remain hidden. A case study of a locally identifiable HIV model shows that one should be aware of the presence of multiple parameter solutions to comprehensively describe the biological system and avoid biological misinterpretation of the results.


    In [1], we distinguished the limit from the infinite sequence. In [2], we defined the Operator axioms to extend the traditional real number system. In [3], we promoted the research in the following areas:

    1. We improved on the Operator axioms.

    2. We defined the VE function and EV function. For clarity, we rename VE Function [3] to Prefix Function. For clarity, we rename EV Function [3] to Suffix Function.

    3. We proved two theorems about the Prefix function and Suffix function.

    The Operator axioms forms a new arithmetic axiom. The [3,Definition 2.2] defines real number system on the basis of the logical calculus {Φ,Ψ}. The [2,TABLE 2] defines new operators according to the definition of number systems. Real operators naturally produce new equations such as y=[x++++[1+1]], y=[[1+1]x], y=[x////[1+1]] and so on. In other words, real operators extend the traditional mathematical models which are selected to describe various scientific rules. Operator axioms have included infinite operators, so no other operator can be added to them. This means the Operator axioms is a complete real number system. In fact, infinite operators imply the completeness.

    Thus, real operators exhibit potential value as follows:

    1. Real operators can give new equations and inequalities so as to precisely describe the relation of mathematical objects.

    2. Real operators can give new equations and inequalities so as to precisely describe the relation of scientific objects.

    So real operators help to describe complex scientific rules which are difficult described by traditional equations and have an enormous application potential.

    As to the equations including real operators, engineering computation often need the approximate solutions reflecting an intuitive order relation and equivalence relation. Although the order relation and equivalence relation of real numbers are consistent, they are not as intuitive as those of base-b expansions. In practice, it is quicker to determine the order relation and equivalence relation of base-b expansions. So we introduce numerical computations to approximate real numbers with base-b expansions.

    The numerical computations we proposed are not the best methods to approximate real numbers with base-b expansions, but the simple methods to approximate real numbers with base-b expansions. The compution complexity of the numerical computations we proposed could be promoted furtherly. However, we first prove that the Operator axioms can run on any modern computer. The numerical computation we proposed blends mathematics and computer science. Modern science depends on both the mathematics and the computer science. Arithmetic is the core of both the mathematics and the science. As a senior arithmetic, the Operator axioms will promote both the mathematics and the science in the future.

    Theorem 1.1. Any positive number ξ may be expressed as a limit of an infinite base-b expansion sequence

    limnA1A2As+1. a1a2a3an, (1.1)

    where 0A1<b,0A2<b,,0an<b, not all A and a are 0, and an infinity of the an are less than (b-1). If ξ1, then A10.

    Proof. Let [ξ] be the integral part of ξ. Then we write

    ξ=[ξ]+x=X+x, (1.2)

    where X is an integer and 0x<1, and consider X and x separately.

    If X>0 and bsx<bs+1, and A1 and X1 are the quotient and remainder when X is divided by bs, then X=A1bs+X1, where 0<A1=[bsX]<b, 0X1<bs.

    Similarly

    X1=A2bs1+X2(0A2<b,0X2<bs1),X2=A3bs2+X3(0A3<b,0X3<bs2),Xs1=Asb+Xs(0As<b,0Xs<b),Xs=As+1(0As+1<b).

    Thus X may be expressed uniquely in the form

    X=A1bs+A2bs1++Asb+As+1, (1.3)

    where every A is one of 0, 1, , (b-1), and A1 is not 0. We abbreviate this expression to

    X=A1A2AsAs+1, (1.4)

    the ordinary representation of X in base-b expansion notation.

    Passing to x, we write

    X=f1(0f1<1).

    We suppose that a1=[bf1], so that

    a1bf1<a1+1b;

    a1 is one of 0, 1, , (b-1), and

    a1=[bf1],bf1=a1+f2(0f2<1).

    Similarly, we define a2,a3, by

    a2=[bf2],bf2=a2+f3(0f3<1),a3=[bf3],bf3=a3+f4(0f4<1),

    Every an is one of 0, 1, , (b-1). Thus

    x=xn+gn+1, (1.5)

    where

    xn=a1b+a2b2++anbn, (1.6)
    0gn+1=fn+1bn<1bn. (1.7)

    We thus define a base-b expansion .a1a2a3an associated with x. We call a1,a2, the first, second, digits of the base-b expansion.

    Since an<b, the series

    1anbn (1.8)

    is convergent; and since gn+10, its sum is x. We may therefore write

    x=. a1a2a3, (1.9)

    the right-hand side being an abbreviation for the series (1.8).

    We now combine (1.2), (1.4), and (1.9) in the form

    ξ=X+x=A1A2AsAs+1. a1a2a3; (1.10)

    and the claim follows.

    Theorem 1.1 implies that every real number has base-b expansions arbitrary close to it. So in numerical computations for the Operator axioms, all operands and outputs are denoted by base-b expansions to intuitively show the order relation and equivalence relation.

    The paper is organized as follows. In Section 2, we define the operation order for all operations in the Operator axioms. In Section 3, we construct the numerical computations for binary operations. In Section 4, we define some concepts in the Operator axioms.

    In the Operator axioms, the number '1' is the only base-b expansion while the others derive from the operation of two numbers and one operator. For example, the number "[[1+[1+1]][1+1]]" derives from the operation of the number "[1+[1+1]]", the number "[1+1]" and the real operator "".

    Definition 2.1. Numerical computation is a conversion from an operation to an approximate base-b expansion.

    In general, an operation includes many binary operators. For example, the operation "[[1+[1+1]][1+1]]" includes three "+" and one "". Since each operator produces a binary operation, n operator in an operation will produce n binary operations. It is better to compute all binary operations in an operation in order. The order is denoted as Operation Order.

    [4,§5.3.1] stores tradition operations as an expression tree and then applies traversal algorithm to evaluate the expression tree. Likewise, each operation of the Operator axioms can be stored as an expression tree in which each number '1' become a leaf node and each operator become an internal node. Then Operation Order is just the traversal order of the expression tree. In this paper, we choose inorder traversal as Operation Order. Figure 1 illustrates an expression tree for the number "[[1+[1+1]][1+1]]".

    Figure 1.  An expression tree for the number "[[1+[1+1]][1+1]]".

    It is supposed that the numerical computation applies base-10 expansions. Then the numerical computation for "[[1+[1+1]][1+1]]" will proceed with the following Operation Order:

    [[1+[1+1]][1+1]]=[[1+2][1+1]]=[3[1+1]]=[32]

    In summary, every operation in the Operator axioms can divide into many binary operations by Operation Order. So numerical computations focus on the binary operations.

    In [3], Operator axioms have expressed the real number system. In this section, "real number" refer to the real number deduced from Operator axioms [3].

    According to the complexity of numerical computations, we divide binary operations into low operations, middle operations and high operations. Table 1 lists their elements in detail.

    Table 1.  Division of binary operations.
    Low operations Middle operations High operations
    Operators +,++,,,/,// +++,,/// ++++,+++++,,
    ,,,
    ////,/////,

     | Show Table
    DownLoad: CSV

    In the Operator axioms, / is equal to while // is equal to . From a traditional viewpoint, the low operations "+,++,," are equal to basic arithmetic operations "+,×,,÷". So numerical computations for low operations have been constructed in elementary arithmetic.

    From a traditional viewpoint, +++ is an exponentiation operation, is a root-extraction operation and /// is a logarithm operation. In this subsection, we import the numerical computations for the middle operations "+++,,///" in [5,§23].

    Let e be Euler's number. It is supposed that a(,+) is a base-b expansion, nZ and kN. The numerical computation for [e+++a] can be constructed with the Taylor-series expansion as follows.

    [e+++a]=[limk+(kn=0[[a+++n][n!]])][1+[a[1!]]+[[a+++2][2!]]+[[a+++3][3!]]++[[a+++n][n!]]+]

    It is supposed that a(0,+) is a base-b expansion and nZ. Let b=[[a1][a+1]], then the numerical computation for [a///e] can be constructed with the Taylor-series expansion as follows.

    [a///e]=[[[1+b][1b]]///e]=[2++[limk+(kn=0[[b+++[2n+1]][2n+1]])]][2++[b+[[b+++3]3]+[[b+++5]5]++[[b+++[2n+1]][2n+1]]+]]

    It is supposed that a and b are two base-b expansions, where a(0,+) and b(,+). Then the numerical computation for [a+++b] can be divided and conquered with the identity [a+++b]=[e+++[b++[a///e]]].

    It is supposed that [a+++b] is a real number, where a(,0] and b(,+) are two base-b expansions. Then the numerical computation for [a+++b] can always be equated with the basic numerical computations as above and the basic arithmetic operations in the axioms (OA.1)(OA.75).

    It is supposed that the constants n,a1,a2,b1,b2,c1,c2,mN.

    Zero can be equated with a fraction [[11]1]. Any non-zero base-b expansion can be equated with a fraction [[11]±[a1a2]] for a1,a2N.

    It is supposed that the constant dR with [11]<d. It is supposed that the constant eR with 1<e. For clarity, we rename VE Function [3] to Prefix Function. For clarity, we rename EV Function [3] to Suffix Function.

    Definition 3.1. [3,Definition 3.1] Prefix Function is the function f:[1,+)R defined by f(x)=[x+++˙ed].

    Definition 3.2. [3,Definition 3.2] Suffix Function is the function f:RR defined by f(x)=[e+++˙ex].

    Definition 3.3. [3,Definition 3.3] Fundamental operator functions are Prefix Function and Suffix Function.

    Theorem 3.4. [3,Theorem 3.4] The Prefix Function f(x)=[x+++˙ed] is continuous, unbounded and strictly increasing.

    Theorem 3.5. [3,Theorem 3.5] The Suffix Function f(x)=[e+++˙ex] is continuous, unbounded and strictly increasing.

    It is supposed that the constant t,u,vR.

    Definition 3.6. Root Equations are the equations such as f(x)=t such that:

    1. The function f(x) is real and continuous on any closed interval [u,v] in the domain;

    2. The equation f(x)=t has only one root on the above interval [u,v];

    [6,TABLE PT2.3] lists common root-finding methods and their convergence conditions. When a acts as the lower guess and b acts as the upper guess, both the bisection method [6,§5.2] and Brent's method [6,§6.4] always converge and find the only root on [u,v]. But Brent's method converges faster than the bisection method and thus acts as the main root-finding method for Root Equations.

    In the following, we construct all numerical computations for high operations by induction. It is supposed that the constant p1R with 1p1. It is supposed that the constant p2R. It is supposed that the constant q1R with 1q1. It is supposed that the constant q2R with [11]q2. It is supposed that the constant r1R with [11]<r1. It is supposed that the constant r2R with 1<r2. In the following, we approximate these constants with those fractions such as [a1a2].

    1. The numerical computations for the operations [p1++++p2], [q1q2], [r1////r2] are constructed.

    (a) A numerical computation for [[a1a2]++++[b1b2]] with 1[a1a2] and [11][b1b2] can be constructed.

    i. [b1b2]1.

    (A1)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[b1b2]+++[1+1]])(ˉf=[[b1b2]+++[1+[1+1]]])([[a1a2]++++[b1b2]]=[[1+[ˉc++[ˉe+++1]]][ˉd++[ˉf+++1]]])by (OA.83), (OA.28)(A2)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[b1b2]+++[1+1]])(ˉf=[[b1b2]+++[1+[1+1]]])([[a1a2]++++[b1b2]]=[[1+[ˉc++ˉe]][ˉd++ˉf]])by (OA.83), (OA.62)

    ii. 1<[b1b2].

    (B1)[[a1a2]++++[b1b2]]=[[a1a2]+++[[a1a2]++++[[b1b2]1]]]by (OA.82)(B2)It is supposed that [11][[b1b2]n] and [[b1b2]n]1. Let us distinguish these [a1a2] with the subscripts {(1),(2),(3),}.(B3)[[a1a2]++++[b1b2]]=[[a1a2](1)+++[[a1a2](2)+++[[a1a2]n+++[[a1a2]++++[[b1b2]n]]]]by (OA.82), (B2)(B4)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[[b1b2]n]+++[1+1]])(ˉf=[[[b1b2]n]+++[1+[1+1]]])([[a1a2]++++[[b1b2]n]]=[[1+[ˉc++ˉe]][ˉd++ˉf]])by (B2), (A2)(B5)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[[b1b2]n]+++[1+1]])(ˉf=[[[b1b2]n]+++[1+[1+1]]])([[a1a2]++++[b1b2]]=[[a1a2](1)+++[[a1a2](2)+++[[a1a2]n+++[[1+[ˉc++ˉe]][ˉd++ˉf]]]])by (B3), (B4)

    Then (A1)(A2) and (B1)(B4) have reduced one ++++ operation to many +++ operations. Since §3.3 has constructed the numerical computation for [[a1a2]++++[b1b2]], (A1)(A2) and (B1)(B4) can achieve a numerical computation for [[a1a2]++++[b1b2]].

    (b) A numerical computation for [[a1a2][b1b2]] with 1[a1a2] and [11]<[b1b2] can be constructed.

    The numerical computation for [[a1a2][b1b2]] is equated with the numerical root finding of the equation x=[[a1a2][b1b2]].

    (A1)x=[[a1a2][b1b2]](A2)[x++++[b1b2]]=[[[a1a2][b1b2]]++++[b1b2]]by (OA.108)(A3)[x++++[b1b2]]=[a1a2]by (OA.79), (OA.24), (OA.25)

    According to (OA.37)(OA.40), the function f(x)=[x++++[b1b2]] is defined on the domain [1,+). Theorem 3.4 implies that we can iteratively increase v by step 1 from v=1 until [a1a2]<[v++++[b1b2]] holds.

    Theorem 3.4 implies that f(x)=[x++++[b1b2]] is continuous on the domain [1,v]. (OA.75) derives that [1++++[b1b2]]=1. So (OA.95) derives that [1++++[b1b2]][a1a2]. In summary, both [1++++[b1b2]][a1a2] and [a1a2]<[v++++[b1b2]] hold.

    Then Intermediate Value Theorem derives that the equation [x++++[b1b2]]=[a1a2] has only one root on the domain [1,v]. Since Theorem 3.4 implies that the equation [x++++[b1b2]]=[a1a2] has no root on the domain (v,+), the equation [x++++[b1b2]]=[a1a2] has only one root on the domain [[11],+). Since the equation [x++++[b1b2]]=[a1a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1a2][b1b2]].

    (c) A numerical computation for [[a1a2]////[b1b2]] with 1[a1a2] and with 1<[b1b2] can be constructed.

    The numerical computation for [[a1a2]////[b1b2]] is equated with the numerical root finding of the equation x=[[a1a2]////[b1b2]].

    (A1)x=[[a1a2]////[b1b2]](A2)[11]<[[a1a2]////[b1b2]]by (OA.33)(A3)1<[[b1b2]++++[[a1a2]////[b1b2]]]by (OA.37), (OA.72)(A4)([[b1b2]++++[[a1a2]////[b1b2]]])by (OA.90)(A5)[[b1b2]++++x]=[[b1b2]++++[[a1a2]////[b1b2]]]by (OA.105)(A6)[[b1b2]++++x]=[a1a2]by (OA.80), (OA.104)

    According to (OA.37)(OA.40) and (OA.73), the function f(x)=[[b1b2]++++x] is defined on the domain (,+). Theorem 3.5 implies that we can iteratively decrease u by step 1 from u=1 until [[b1b2]++++u]<[a1a2] holds. Theorem 3.5 also implies that we can iteratively increase v by step 1 from v=1 until [a1a2]<[[b1b2]++++v] holds.

    Theorem 3.5 implies that f(x)=[[b1b2]++++x] is continuous on the domain (,+). In summary, both [[b1b2]++++u]<[a1a2] and [a1a2]<[[b1b2]++++v] hold.

    Then Intermediate Value Theorem derives that the equation [[b1b2]++++x]=[a1a2] has only one root on the domain [u,v]. Since Theorem 3.5 implies that the equation [[b1b2]++++x]=[a1a2] has no root on the domains (,u) and (v,+), the equation [[b1b2]++++x]=[a1a2] has only one root on the domain [u,v]. Since the equation [[b1b2]++++x]=[a1a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1a2]////[b1b2]].

    2. If the numerical computations for [p1+++˙ep2], [q1˙fq2], [r1///˙gr2] have been constructed, then the numerical computations for [p1++++˙ep2], [q1˙fq2], [r1////˙gr2] can also be constructed.

    According to (OA.19), the symbol 'e' represents some successive '+'—"++". According to (OA.20), the symbol 'f' represents some successive ''—"". According to (OA.21), the symbol 'g' represents some successive '/'—"//".

    (a) A numerical computation for [[a1a2]++++˙e[b1b2]] with 1[a1a2] and [11][b1b2] can be constructed.

    i. [b1b2]1.

    (A1)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[b1b2]+++[1+1]])(ˉf=[[b1b2]+++[1+[1+1]]])([[a1a2]++++˙h[b1b2]]=[[1+[ˉc++[ˉe+++[1+˙k]]]][ˉd++[ˉf+++[1+˙k]]]])by (OA.83), (OA.29)

    ii. 1<[b1b2].

    (B1)[[a1a2]++++˙e[b1b2]]=[[a1a2]+++˙e[[a1a2]++++˙e[[b1b2]1]]]by (OA.82)(B2)It is supposed that [11][[b1b2]n] and [[b1b2]n]1. Let us distinguish these [a1a2] with the subscripts {(1),(2),(3),}.(B3)[[a1a2]++++˙e[b1b2]]=[[a1a2](1)+++˙e[[a1a2](2)+++˙e[[a1a2]n+++˙e[[a1a2]++++˙e[[b1b2]n]]]]by (OA.82), (B2)(B4)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[[b1b2]n]+++[1+1]])(ˉf=[[[b1b2]n]+++[1+[1+1]]])([[a1a2]++++˙e[[b1b2]n]]=[[1+[ˉc++ˉe]][ˉd++ˉf]])by (B3), (A1)(B5)(ˉc=[[[a1a2]1]++[1+[1+1]]])(ˉd=[[[a1a2]1]++[1+1]])(ˉe=[[[b1b2]n]+++[1+1]])(ˉf=[[[b1b2]n]+++[1+[1+1]]])([[a1a2]++++˙e[b1b2]]=[[a1a2](1)+++˙e[[a1a2](2)+++˙e[[a1a2]n+++˙e[[1+[ˉc++ˉe]][ˉd++ˉf]]]])by (B3), (B4)

    Then (A1) and (B1)(B5) have reduced one ++++˙e operation to many +++˙e operations. Since the numerical computation for [[a1a2]+++˙e[b1b2]] has been supposed to be constructed, (A1) and (B1)(B5) can achieve a numerical computation for [[a1a2]++++˙e[b1b2]].

    (b) A numerical computation for [[a1a2]˙f[b1b2]] with 1[a1a2] and [11]<[b1b2] can be constructed.

    The numerical computation for [[a1a2]˙f[b1b2]] is equated with the numerical root finding of the equation x=[[a1a2]˙f[b1b2]].

    (A1)x=[[a1a2]˙f[b1b2]](A2)[x++++˙e[b1b2]]=[[[a1a2]i[b1b2]]++++h[b1b2]]by (OA.105)(A3)[x++++˙e[b1b2]]=[a1a2]by (OA.78), (OA.24), (OA.25)

    According to (OA.37)(OA.40), the function f(x)=[x++++˙e[b1b2]] is defined on the domain [1,+). Theorem 3.4 implies that we can iteratively increase v by step 1 from v=1 until [a1a2]<[v++++˙e[b1b2]] holds.

    Theorem 3.4 implies that f(x)=[x++++˙e[b1b2]] is continuous on the domain [1,v]. (OA.75) derives that [1++++˙e[b1b2]]=1. So (OA.95) derives that [1++++˙e[b1b2]][a1a2]. In summary, both [1++++˙e[b1b2]][a1a2] and [a1a2]<[v++++˙e[b1b2]] hold.

    Then Intermediate Value Theorem derives that the equation [x++++˙e[b1b2]]=[a1a2] has only one root on the domain [1,v]. Since Theorem 3.4 implies that the equation [x++++˙e[b1b2]]=[a1a2] has no root on the domain (v,+), the equation [x++++˙e[b1b2]]=[a1a2] has only one root on the domain [[11],+). Since the equation [x++++˙e[b1b2]]=[a1a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1a2]˙f[b1b2]].

    (c) A numerical computation for [[a1a2]////˙g[b1b2]] with 1[a1a2] and with 1<[b1b2] can be constructed.

    The numerical computation for [[a1a2]////˙g[b1b2]] is equated with the numerical root finding of the equation x=[[a1a2]////˙g[b1b2]].

    (A1)x=[[a1a2]////˙g[b1b2]](A2)[11]<[[a1a2]////˙g[b1b2]]by (OA.33)(A3)1<[[b1b2]++++h[[a1a2]////j[b1b2]]]by (OA.37), (OA.72)(A4)([[b1b2]++++h[[a1a2]////j[b1b2]]])by (OA.90)(A5)[[b1b2]++++˙ex]=[[b1b2]++++h[[a1a2]////j[b1b2]]]by (OA.105)(A6)[[b1b2]++++˙ex]=[a1a2]by (OA.80), (OA.104)

    According to (OA.37)(OA.40) and (OA.73), the function f(x)=[[b1b2]++++˙ex] is defined on the domain (,+). Theorem 3.5 implies that we can iteratively decrease u by step 1 from u=1 until [[b1b2]++++˙eu]<[a1a2] holds. Theorem 3.5 also implies that we can iteratively increase v by step 1 from v=1 until [a1a2]<[[b1b2]++++˙ev] holds.

    Theorem 3.5 implies that f(x)=[[b1b2]++++˙ex] is continuous on the domain (,+). In summary, both [[b1b2]++++˙eu]<[a1a2] and [a1a2]<[[b1b2]++++˙ev] hold.

    Then Intermediate Value Theorem derives that the equation [[b1b2]++++˙ex]=[a1a2] has only one root on the domain [u,v]. Since Theorem 3.5 implies that the equation [[b1b2]++++˙ex]=[a1a2] has no root on the domains (,u) and (v,+), the equation [[b1b2]++++˙ex]=[a1a2] has only one root on the domain [u,v]. Since the equation [[b1b2]++++˙ex]=[a1a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1a2]////˙g[b1b2]].

    3. By induction, the numerical computations for [p1+++++p2], [p1++++++p2], [p1+++++++p2], , [q1q2], [q1q2], [q1q2], , [r1/////r2], [r1//////r2], [r1///////r2], can all be constructed.

    We define some replacements for the notations of the Operator axioms, as is shown in Table 2.

    Table 2.  Replacements of notations.
    Replacement Notation in Operator axioms
    + ˙e
    ˙f
    / ˙j
    +1 +
    +2 ++
    +3 +++
    +n +++n
    1
    2
    3
    n n
    /1 /
    /2 //
    /3 ///
    /n ///n

     | Show Table
    DownLoad: CSV

    The notation + can be replaced by any element of the set {+,++,+++,++++,}. The notation can be replaced by any element of the set {,,,,}. The notation / can be replaced by any element of the set {/,//,///,////,}.

    We define the pronunciations for some expressions in the Operator axioms, as is shown in Table 3.

    Table 3.  Pronunciations for some expressions.
    Expression Pronunciation
    + addote
    subote
    / logote
    a+nb a addote n to b
    anb a subote n to b
    a/nb a logote n to b

     | Show Table
    DownLoad: CSV

    We divide the real operators into an ordered level with the natural numbers. Table 4 lists the levels of the real operators in detail.

    Table 4.  Level of operators.
    Level Operators
    1 +1,1,/1
    2 +2,2,/2
    3 +3,3,/3
    n +n,n,/n

     | Show Table
    DownLoad: CSV

    The order of real operators is listed as follows:

    level-1 < level-2 < level-3 < < level-n

    We define the operations of real operators as follows.

    Definition 4.1. Complete Operations are all the binary operations of real operators.

    According to the Definition 4.1, all operations such as a+nb, anb, a/nb compose the complete operations.

    The author declares no conflict of interest.



    [1] J. DiStefano, Dynamic System Biology Modeling and Simulation, 1st ed., Academic Press, Elsevier, USA, 2014.
    [2] L. Ljung, System Identification - Theory For the User, 2nd ed., PTR, Prentice Hall, Upper Saddle River, N.J., USA, 1999.
    [3] E.D. Sontag, Mathematical Control Theory: Deterministic Finite Dimensional Systems, 2nd ed., Springer, New York, 1998.
    [4] L. Ljung and S. T. Glad, On global identifiability for arbitrary model parameterizations, Automatica, 30(1994), 265–276.
    [5] A. Raue, J. Karlsson, M. P. Saccomani, et al., Comparison of approaches for parameter identifiability analysis of biological systems, Bioinformatics, 30(2014), 1440–1448.
    [6] M. P. Saccomani, S. Audoly and L. D'Angiò, Parameter identifiability of nonlinear systems: the role of initial conditions, Automatica, 39(2003), 619–632.
    [7] J. D. Stigter and J. Molenaar, A fast algorithm to assess local structural identifiability, Automatica, 58(2015), 118–124.
    [8] H. Hong, A. Ovchinnikov, G. Pogudin, et al., SIAN: software for structural identifiability analysis of ODE models, Bioinformatics, (2019), bty1069.
    [9] T. S. Ligon, F. Fröhlich, O. T. Chis, et al., GenSSI 2.0: multi-experiment structural identifiability analysis of SBML models, Bioinformatics, 34(2018), 1421–1423.
    [10] A. F. Villaverde, A. Barreiro and A. Papachristodoulou, Structural identifiability of dynamic systems biology models, PLoS Comput. Biol., 12(2016), e1005153.
    [11] M. Anguelova, J. Karlsson and M. Jirstrand, Minimal output sets for identifiability, Math. Biosci., 239(2012), 139–153.
    [12] A. Raue, C. Kreutz, T. Maiwald, et al., Addressing Parameter Identifiability by Model-based Experimentation, IET Syst. Biol., 5(2011), 120–130.
    [13] M. Rodriguez-Fernandez, M. Rehberg, A. Kremling, et al., Simultaneous model discrimination and parameter estimation in dynamic models of cellular systems, BMC Syst. Biol., 7(2013), 1–14.
    [14] T. R. B. Grandjean, M. J. Chappell, J. W. T. Yates, et al., Structural identifiability analysis of candidate models for in vitro Pitavastatin hepatic uptake, European J. Pharmac. Sci., 46(2013), 259–271.
    [15] D. L. I. Janzén, L. Bergenholm, M. Jirstrand, et al., Parameter identifiability of fundamental pharmacodynamic models, Front. Physiol., 7(2016), 590.
    [16] H. Klett, M. Rodriguez-Fernandez, S. Dineen, et al., Modeling the inflammatory response in the hypothalamus ensuing heat stroke: Iterative cycle of model calibration, identifiability analysis, experimental design and data collection, Math. Biosci., 260(2015), 35–46.
    [17] M. P. Saccomani, An effective automatic procedure for testing parameter identifiability of HIV/AIDS models, B. Math. Biol., 73(2011), 1734–1753.
    [18] K. Thomaseth, J. J. Batzel, M. Bachar, et al., Parameter estimation of a model for baroreflex control of unstressed volume, in Mathematical Modeling and Validation in Physiology (eds. J.J. Batzel, M. Bachar, F. Kappel), Springer-Verlag, Berlin, (2013), 215–246.
    [19] J. A. Egea, D. Henriques, T. Cokelaer, et al., MEIGO: an open-source software suite based on metaheuristics for global optimization in systems biology and bioinformatics, BMC Bioinformatics, 15(2014), 136.
    [20] T. Maiwald and J. Timmer, Dynamical Modeling and Multi-Experiment Fitting with PottersWheel, Bioinformatics, 24(2008), 2037–2043.
    [21] G. Bellu, M. P. Saccomani, S. Audoly, et al., DAISY: A new software tool to test global identifiability of biological and physiological systems, Comp. Meth. Prog. Biom., 88(2007), 52–61.
    [22] J. F. Ritt, Differential Algebra, Providence, RI: American Mathematical Society, (1950).
    [23] S. Audoly, G. Bellu, L. D'Angiò, et al., Global identifiability of nonlinear models of biological systems, IEEE Transact. Biomed. Eng., 48(2001), 55–65.
    [24] K. Thomaseth and M. P. Saccomani, Local identifiability analysis of nonlinear ODE models: how to determine all candidate solutions, IFAC PapersOnLine, 51(2018), 529–534.
    [25] P. Stapor, D. Weindl, B. Ballnus, et al., PESTO Parameter EStimation TOolbox, Bioinformatics, 34(2008), 705–707.
    [26] M. P. Saccomani and K. Thomaseth, Structural vs Practical Identifiability of Nonlinear Differential Equation Models in Systems Biology, in Dynamics of Mathematical Models in Biology (eds. A. Rogato, V. Zazzu, M.R. Guarracino), Springer International Publishing, Switzerland, (2016), 31–42.
    [27] J. P. Norton, An Investigation of the Sources of Nonuniqueness in Deterministic Identifiability, Math. Biosci., 60(1982), 89–108.
    [28] A. S. Perelson, D. E. Kirschner and R. DeBoer, Dynamics of HIV Infection of CD4+ T cells, Math. Biosci., 114(1993), 81–125.
    [29] R. Ferrentino and C. Boniello, On the Well-Posedness for Optimization Problems: A Theoretical Investigation, Appl. Math., 10(2019), 19–38.
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(6250) PDF downloads(816) Cited by(3)

Figures and Tables

Figures(4)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog