Loading [MathJax]/jax/element/mml/optable/BasicLatin.js
Research article

Finite state machine and Markovian equivalents of the lac Operon in E. coli bacterium

  • The lac operon in E. coli has been extensively studied by computational biologists. The bacterium uses it to survive in the absence of glucose, utilizing lactose for growth. This paper presents a novel modeling mechanism for the lac operon, transferring the process of lactose metabolism from the cell to a finite state machine (FSM). This FSM is implemented in field-programmable gate array (FPGA) and simulations are run in random conditions. A Markov chain is also proposed for the lac operon, which helps study its behavior in terms of probabilistic variables, validating the finite state machine at the same time. This work is focused towards conversion of biological processes into computing machines.

    Citation: Urooj Ainuddin, Maria Waqas. Finite state machine and Markovian equivalents of the lac Operon in E. coli bacterium[J]. AIMS Bioengineering, 2022, 9(4): 400-419. doi: 10.3934/bioeng.2022029

    Related Papers:

    [1] Tiantian Zhang, Wenwen Xu, Xindong Li, Yan Wang . Multipoint flux mixed finite element method for parabolic optimal control problems. AIMS Mathematics, 2022, 7(9): 17461-17474. doi: 10.3934/math.2022962
    [2] Jie Liu, Zhaojie Zhou . Finite element approximation of time fractional optimal control problem with integral state constraint. AIMS Mathematics, 2021, 6(1): 979-997. doi: 10.3934/math.2021059
    [3] Lu Zhi, Jinxia Wu . Adaptive constraint control for nonlinear multi-agent systems with undirected graphs. AIMS Mathematics, 2021, 6(11): 12051-12064. doi: 10.3934/math.2021698
    [4] Andrew Calcan, Scott B. Lindstrom . The ADMM algorithm for audio signal recovery and performance modification with the dual Douglas-Rachford dynamical system. AIMS Mathematics, 2024, 9(6): 14640-14657. doi: 10.3934/math.2024712
    [5] Xiang Wu, Yuzhou Hou, Kanjian Zhang . Optimal feedback control for a class of fed-batch fermentation processes using switched dynamical system approach. AIMS Mathematics, 2022, 7(5): 9206-9231. doi: 10.3934/math.2022510
    [6] Yuelong Tang . Error estimates of mixed finite elements combined with Crank-Nicolson scheme for parabolic control problems. AIMS Mathematics, 2023, 8(5): 12506-12519. doi: 10.3934/math.2023628
    [7] Jun Moon . The Pontryagin type maximum principle for Caputo fractional optimal control problems with terminal and running state constraints. AIMS Mathematics, 2025, 10(1): 884-920. doi: 10.3934/math.2025042
    [8] Jun Moon . A Pontryagin maximum principle for terminal state-constrained optimal control problems of Volterra integral equations with singular kernels. AIMS Mathematics, 2023, 8(10): 22924-22943. doi: 10.3934/math.20231166
    [9] Min Wang, Jiao Teng, Lei Wang, Junmei Wu . Application of ADMM to robust model predictive control problems for the turbofan aero-engine with external disturbances. AIMS Mathematics, 2022, 7(6): 10759-10777. doi: 10.3934/math.2022601
    [10] Gerardo Sánchez Licea . Strong and weak measurable optimal controls. AIMS Mathematics, 2021, 6(5): 4958-4978. doi: 10.3934/math.2021291
  • The lac operon in E. coli has been extensively studied by computational biologists. The bacterium uses it to survive in the absence of glucose, utilizing lactose for growth. This paper presents a novel modeling mechanism for the lac operon, transferring the process of lactose metabolism from the cell to a finite state machine (FSM). This FSM is implemented in field-programmable gate array (FPGA) and simulations are run in random conditions. A Markov chain is also proposed for the lac operon, which helps study its behavior in terms of probabilistic variables, validating the finite state machine at the same time. This work is focused towards conversion of biological processes into computing machines.



    In this paper, let H denote a real Hilbert space with inner product , and norm . Let M, R, and N stand for the nonempty closed convex subset of H, set of real numbers and set of positive integers, respectively. Let G:HH be a mapping. The variational inequality problem (VIP) is concerned with the problem of finding a point uM such that

    Gu,uu0,uM. (1.1)

    We denote the solution set of VIP (1.1) by VI(M,G). The VIP, which Fichera [12] and Stampacchia [38] independently examined, is a crucial tool in both the applied and pure sciences. It has attracted the attention of many authors in recent years due to its wide range of applications to issues arising from partial differential equations, optimal control problems, saddle point problems, minimization problems, economics, engineering, and mathematical programming.

    On the other hand, an element uM is said to be the fixed point of a mapping S:MM, if Su=u. The set of all the fixed points of S is denoted by F(S)={uM:Su=u}. The study of the fixed point theory of nonexpansive mappings has been applied in several fields such as game theory, differential equations, signal processing, integral equations, convex optimization, and control theory [19]. There are several recent results in the literature on approximation of fixed points of nonexpansive mappings (see, for example, [8,9,26,27,28,29,34,35,36] and the references therein).

    It is well-known that the VIP (1.1) can be reformulated as a fixed point problem as follows:

    u=PM(IηG)u, (1.2)

    where PM:HM is the metric projection and η>0. The extragradient method is a prominent method that has been used by many authors over the years to solve VIP. This method was first introduced by Korpelevich [21] in 1976. Given an initial point u0M, the sequence {um} generated by the extragradient method is as follows:

    {vm=PM(IηG)um,um+1=PM(umηGvm),m0, (1.3)

    where η(0,1L), and G is an operator that is L-Lipschitz continuous and monotone. For VI(M,G), the author showed that the sequence {um} defined by (1.3) converges weakly to an element in VI(M,G).

    The extragradient method's main flaw is its iterative requirement to compute two projections on the feasible set M. In fact, if M has a complex structure, this might have an impact on how efficiently the method computes. In recent years, several authors have paid a great deal of attention to overcoming this restriction (see, for example [6,7,11,16,48]). In order to address the drawback of the extragragient method, in 1997, He [16] introduced a method that requires only a single projection per each iteration. This method is known as the projection and contraction method and it is given as follows:

    {vm=PM(umηGum),wm=(umvm)η(GumGvm),um+1=umσϖmwm,

    where σ(0,2), η(0,1L) and ϖm is defined as

    ϖm=umvm,wmwm2. (1.4)

    The author showed that the sequence {um} generated by (1.4) converges weakly to a unique solution of VIP (1.1). The subgradient extragradient method, which was developed by Censor et al. [6,7,11], is another effective strategy for addressing the limitation of the extragradient method and it is defined as follows:

    {vm=PM(umηGum),Tm={uH|umηGumvm,uvm0},um+1=PTm(umηGvm), (1.5)

    where η(0,1L), and G is a L-Lipschitz continuous and monotone operator. The main idea in this method is that a projection onto a special contractible half-space is used to replace the second projection onto M of the extragradient method, and this significantly reduces the difficulty of calculation. The authors showed that if VI(M,G), the sequence {um} defined by (1.5) weakly converges to a point in VI(M,G).

    Furthermore, the notion of the inertial extrapolation technique is based upon a discrete analogue of a second order dissipative dynamical system and it is known as an acceleration process of iterative methods. It was first developed in [37] to solve smooth convex minimization problems. For some years now, the inertial techniques have been widely adopted by many authors to improve the convergence rate of various iterative algorithms for solving several kinds of optimization problems (see, for example, [1,17,30,31,32,41,44,45,46,55]).

    It is worthy to note that the study of the problem involving the approximation of the common solution of the fixed point problem (FPP) and VIP plays a significant role in mathematical models whose constraints can be expressed as FPP and VIP. This happens in real-world applications such as image recovery, signal processing, network resource allocation, and composite site reduction (see, for example, [2,14,18,22,24,25,33,51] and the references therein).

    Very recently, Thong and Hieu [43] introduced two modified subgradient extragradient methods with line search process for solving the VIP with L-Lipschitz continuous and monotone operator G and FPP involving quasi-nonexpansive mapping S, such that IS is demiclosed at zero. Under appropriate assumptions, the authors showed that the sequences generated by their algorithms weakly converge some points in F(S)VI(M,G).

    We note that Thong and Hieu [43] only proved weak convergence results for their algorithms. According to Bauschke and Combettes [3], for the solution of optimization problems, the strong convergence of iterative methods are more desirable than their weak convergence counterparts. Furthermore, we observe that Thong and Hieu [43] employed the Armijo-type line search rule step size to their algorithms in order to enable them to operate without requiring prior knowledge of the Lipschitz constant of the operators. However, the use of Armijo-type step sizes may cause the considered methods to perform multiple calculations of the projection values per iteration on the feasible set. To overcome this limitation, Liu and Yang [23] developed an adaptive step size criterion, which only needs the use of some previously given information to complete the step size calculation.

    As far as we know, there is no result in the literature involving the subgradient extragradient method with double inertial extrapolations for finding the common solution of VIP and FPP in real Hilbert spaces. Due to the importance of common solutions of VIP and FPP to some real-world problems, it is natural to ask the following question:

    Is it possible to construct a double inertial subgradient extragradient-type algorithms with a new step size for finding the common solution of VIP and FPP?

    One of the purposes of this article is to give an affirmative answer to the above question. Motivated by the ongoing research in these directions, we propose some modified subgradient extragradient methods with a new step size. These proposed methods are derived from the combinations of the original subgradient extragradient method, viscosity method, projection and contraction method. We prove that our new methods converge strongly to the common solutions of VIP involving pseudo-monotone mappings and FPP involving quasi-nonexpansive mappings that are demiclosed at zero in real Hilbert spaces. The following are more contributions made in this research:

    ● Our algorithms do not need any Armijo-type line search techniques. Rather, they use a new self-adaptive step size technique, which generates a non-monotonic sequence of step sizes. This step size is formulated such that it reduces the dependence of the algorithms on the initial step size. Conducted numerical experiments proved that the proposed step size is more efficient and ensures that our methods require less computation time than many methods in the literature that work with Armijo-type line search technique.

    ● Our step size properly includes those in [23,41,50].

    ● Our algorithms are constructed to approximate the common solution of VIP involving pseudo-monotone mappings and FPP involving quasi-nonexpansive mappings. Since the class of Pseudo-monotone mappings is more general than the class of monotone mappings, it means that our results improve and generalize several results in the literature for finding common solution VIP involving monotone mappings and quasi-nonexpansive mappings. Hence, our results are improvements of the results in [22,43,47] and several others.

    ● Our algorithms are embedded with double inertial terms to accelerate their convergence speed. Numerical tests showed that the proposed algorithms converge faster than the compared existing methods with single inertial term.

    ● We prove our strong convergence result under mild conditions imposed on the parameters. Our results are improvements on the weak convergence results in [43,47].

    ● To show the computational advantage of the suggested methods over some well-known methods in the literature, several numerical experiments are provided.

    ● We utilize our methods to solve some real-world problems, such as optimal control and signal processing problems.

    ● The proofs of our strong convergence results do not require the conventional "two cases" approach that have been employed by several authors in the literature to establish strong convergence results; see, for example, [5,30].

    The article is organized as follows: In Section 2, some useful definitions and lemmas are recalled. The proposed algorithms and their convergence results are presented in Section 3. In Section 4, we conduct some numerical experiments to show the efficiency of our proposed algorithms over several well known methods. In Section 5, we consider the application of our algorithms to the solution of optimal control problem. In Section 6, we apply our methods to image recovery problem and in Section 7, we give summary of the basic contributions in this work.

    In what follows, we denote the weak convergence of the sequence {um} to u by umu as m and the strong convergence of the sequences {um} is denoted by umu as m.

    Next, the following definitions and lemmas will be recalled. Let G:HH be an operator, then G is called:

    (a1) contraction if there exists a constant k[0,1) such that

    GuGvkuv,u,vH;

    (a2) L-Lipschitz continuous, if L>0 exists with

    GuGvLuv,u,vH.

    If L=1, then G becomes a nonexpansive mapping;

    (a3) Quasi-nonexpansive, if F(G) such that

    Guuuu,uH,uF(G);

    (a4) α-strongly monotone, if there exists a constant α>0 such that

    GuGv,uvαuv2,u,vH;

    (a5) Monotone, if

    GuGv,uv0,u,vH;

    (a6) Pseudo-monotone, if

    Gu,uv0Gu,uv0,u,vH;

    (a7) Sequentially weakly continuous, if for any sequence {um} which converges weakly to u, then the sequence {Gum} weakly converges to Gu.

    Lemma 2.1. [15] Let H be a real Hilbert space and M a nonempty closed convex subset of H. Suppose uH and vM, then v=PMu uv,vw0, wM.

    Lemma 2.2. [15] Let M be a closed convex subset of a real Hilbert space H. If uH, then

    (i) PMuPMv2PMuPMv,uv,vH;

    (ii) (IPM)u(IPM)v,uv(IPM)u(IPM)v2,vH;

    (iii)PMuv2uv2uPMu2,vH.

    Lemma 2.3. For each u,v,wH and where α,β,δ[0,1] with α+β+δ=1, the followings hold in Hilbert spaces:

    (a)

    u+vu2+2v,u+v;

    (b)

    u+v2=u2+2u,v+v2;

    (c)

    αu+βv+γw2=αu2+βv2+γw2αβuv2αγuw2βγvw2.

    Lemma 2.4. [15] Let G:HH be a nonlinear operator such that F(G). Then IG is called demiclosed at zero if for any umH, the following implication holds:

    umuand(IG)um0uF(G).

    Lemma 2.5. [52] Let {am} be a sequence of nonnegative real numbers such that

    am+1(1νm)am+νmbm,m1,

    where {νm}(0,1) with m=0νm=. If lim supkbmk0 for every subsequence {amk} of {am}, the following inequality holds:

    lim infk(amk+1amk)0.

    Then limmam=0.

    In this section, we introduce three new double inertial subgradient extragradient algorithm-types for solving VIP and FPP. In order to establish our main results, we assume that the following conditions are fulfilled:

    (C1) The feasible set M is nonempty, closed and convex.

    (C2) The mapping G:HH is pseudo-monotone and L-Lipschitz continuous.

    (C3) The solution set F(S)VI(M,G).

    (C4) The mapping G is sequentially weak continuous on M.

    (C5) The mappings K,J:HH are non-expansive.

    (C6) The mapping S:HH is quasi-nonexpansive such that IS is demiclosed at zero.

    (C7) The mapping f:HH is a contraction with constant k[0,1).

    (C8) Let {αm}(0,1), {βm}, {γm}[a,b](0,1) such that αm+βm+γm=1, limmαm=0, m=αm= and limmϵmαm=0=limmξmαm, where {ϵm} and {ξm} are positive real sequences.

    (C9) Let {pm},{qm}[0,) and {hm}[1,) such that m=0pm<, limmqm=0, and limmhm=1.

    Remark 3.1. We note the following in Algorithm 3.1:

    Algorithm 3.1.
    Initialization: Choose η1>0,ϕ>0,θ>0,ρ(0,2),μ(0,1) and let g0,g1H be arbitrary.
    Iterative Steps: Given the iterates um1 and {um} (m1), calculate um+1 as follows:
    Step 1: Choose ϕm and θm such that ϕm[0,ˉϕm] and θm[0,ˉθm], where
    ˉϕm={min{m1m+ϕ1,ϵmumum1}, if umum1,m1m+ϕ1,otherwise. (3.1) 
    ˉθm={min{m1m+θ1,ξmumum1}, if umum1,m1m+θ1,otherwise. (3.2) 
    Step 2: Set
    sm=um+ϕm(KumKum1), (3.3) 
    rm=um+θm(JumJum1), (3.4) 
    and compute
    wm=PM(smηmGsm). (3.5) 
    If sm=wm or Gsm=0, stop; sm is a solution of the VIP. Otherwise, do Step 3.
    Step 3: Compute
    zm=PTm(smρηmδmGwm), (3.6) 
    where
    Tm={uH:smηmGsmwm,uwm0}, (3.7) 
    δm={smwm,vmvm2, if vm0,0,otherwise, (3.8) 
    and
    vm=smwmηm(GsmGwm). (3.9) 
    Step 4: Compute
    um+1=αmf(rm)+βmzm+γmSzm. (3.10) 
    Update
    ηm+1={min{(qm+hmμ)smwmGsmGwm,ηm+pm}, if GsmGwm,ηm+pm,otherwise. (3.11) 
    Set m:=m+1 and go back to Step 1.

    (i) It is not hard to see from (3.1), (3.2), and condition (C8) that

    limmϕmumum1=limmθmumum1=0

    and

    limmϕmαmumum1=limmθmαmumum1=0.

    (ii) In order to get larger step sizes, we introduce the sequence {qm} and {hm} in (3.11) to relax the the parameter μ. The relaxation parameters can often improve the numerical performances of algorithms, see [10]. If qm=0 in (3.11), then {ηm} becomes the step size in [41]. If hm=1 in (3.11), then {ηm} becomes that in [50]. If qm=0 and hm=1 in (3.11), then the step size {ηm} reduces to that in [23]. Lastly, if qm=pm=0 and hm=1, {ηm} reduces to the step sizes used by many authors in the literature (see, for example, [13,42,53,54]).

    We now establish the following lemmas that will be useful in proving our strong convergence theorems.

    Lemma 3.1. If conditions (C3) and (C4) are fulfilled and {ηm} is the sequence generated by (3.11). Then, {ηm} is well-defined and limmηm=η[min{μL,η1},η1+m=1pm].

    Proof. Since G is Lipschitz continuous with L>0, qm0 and hm1, by (3.11), if GsmGwm, we have

    ηm(qm+hmμ)smwmGsmGwmqm+hmμLμL.

    We omit the remaining part of the proof to avoid repetitive expressions of the proof of Lemma 3.1 in [50].

    Lemma 3.2. Let {sm} and {wm} be two sequences generated by Algorithm 3.1. Suppose that conditions (C1)(C4) are fulfilled and if a subsequence {smk} of {sm} exists, such that smkvH and limksmkwmk=0, then vVI(M,G).

    Proof. Since wmk=PM(smkηmkGsmk), then by applying Lemma 2.1, we have

    smkηmkGsmkwmk,uwmk0,uM.

    Equivalently, we have

    1ηmksmkwmk,uwmkGsmk,uwmk,uM.

    It follows that

    1ηmksmkwmk,uwmk+Gsmk,wmksmkGsmk,usmk,uM. (3.12)

    Since smkv, we know that {smk} is bounded and G is L-Lipschitz continuous on H, this means that {Gsmk} is also bounded. Again, since limksmkwmk=0, then {wmk} is also bounded and {ηmk}{μL,η1}. From (3.12), we have

    lim infkGsmk,usmk0,uM. (3.13)

    On the other hand, we have

    Gwmk,uwmk=GwmkGsmk,usmk+Gsmk,usmk+Gwmk,smkwmk,uM. (3.14)

    Since limksmkwmk=0 and G is L-Lpischitz continuous on H, we have

    limkGsmkGwmk=0. (3.15)

    By limksmkwmk=0, (3.13) and (3.15), (3.14) reduces to

    lim infkGwmk,uwmk0,uM. (3.16)

    Next, we show that vVI(M,G). To show this, we choose a decreasing sequence {ξk} of positive numbers which approaches zero. For each k, let Nk stand for the smallest positive integer fulfilling the following inequality:

    Gwmj,uwmj+ξk0,jNk. (3.17)

    It is not hard to see that the sequence {Nk} increases as {ξk} decreases. Moreover, since wNkM, for each k, we can assume that GwNk0 (otherwise, wNk is a solution). Putting

    gNk=GwNkGwNk2,

    we get GwNk,gNk=1, for each k. We can infer from (3.17) that for each k

    GwNk,u+ξkgNkwNk0.

    Now, owing to the pseudo-monotonicity of G on H, we have

    G(u+ξkgNk),u+ξkgNkwNk0.

    This means that

    Gu,uwNkGuG(u+ξkgNk),u+ξkgNkwNkξkGu,gNk. (3.18)

    We now have to show that limkξkgNk=0. Indeed, by the fact that smkv and limksmkwmk=0, we have wNkv as k. Since the norm mapping is sequentially weakly lower semicontinuous, we have

    0<Gvlim infkGwmk. (3.19)

    Since wNkwmk and ξk0 as k, we have

    0lim supkξkgNk=lim supk(ξkGwmk)limkξklim infkGwmk=0, (3.20)

    which implies that limkξkgNk=0. Now, owing to the fact that G is Lipschitz continuous, {wmk}, {gNk} are bounded, and limkξkgNk=0, then letting k in (3.18), we obtain

    lim infkGu,uwNk0.

    Thus, for all uM, we have

    Gu,uv=limkGu,uwNk=lim infkGu,uwNk0.

    Lemma 3.3. Assume that conditions (C1)(C3) hold and {zm} is a sequence generated by Algorithm 3.1, then, for all uVI(M,G), and for m0>0, we have

    zmu2smu2smzmρδmvm2(2ρ)ρ(1qm+hmμηm+11+qm+hmμηm+1)2smwm2,mm0. (3.21)

    Proof. From Lemma 3.1 and (3.9), we have

    vm=smwmηm(GsmGwm)smwmηmGsmGwmsmwm(qm+hmμ)ηmηm+1smwm=(1(qm+hmμ)ηmηm+1)smwm. (3.22)

    By Lemma 3.1, we know that limmηm exists, which together with limmqm=0 and limmhm=1 gives

    limm(1(qm+hmμ)ηmηm+1)=1μ>0.

    Thus, there exists m0N such that

    1(qm+hmμ)ηmηm+1>1μ2,mm0.

    By (3.22), for all mm0, we have

    vm>(1μ2)smwm0. (3.23)

    Since uVI(M,C)MTm, then by Lemmas 2.2 and 2.3,

    2zmu2=2PTm(smρηmδmGwm)PTmu22zmu,smρηmδmGwmu=zmu2+smρηmδmGwmu2zmsm+ρηmδmGwm2=zmu2+smu2+ρη2mδ2mGwm22smu,ρηmδmGwmzmsm2ρη2mδ2mGwm22zmsm,ρηmδmGwm=zmu2+smu2zmsm22zmu,ρηmδmGwm.

    This implies that

    zmu2smu2zmsm22ρηmδmzmu,Gwm. (3.24)

    Since wmM and uVI(M,G), we have Gu,wmu0. From the pseudo-monotonicity of G, we know that Gwm,wmu0. This implies that

    Gwm,zmu=Gwm,zmwm+Gwm,wmu.

    Thus,

    2ρηmδmGwm,zmu2ρηmδmGwm,zmwm. (3.25)

    On the other hand, from zmTm, we have

    smηmGsmwm,zmwm0.

    It follows that

    smwmηm(GsmGwm),zmwmηmGwm,zmwm.

    Thus,

    vm,zmwmηmGwm,zmwm.

    Therefore,

    2ρηmδmGwm,zmwm2ρδmvm,zmwm. (3.26)

    Moreover, we have

    2ρδmvm,zmwm=2ρδmvm,smwm+2ρδmvm,smzm. (3.27)

    Recalling (3.23), we have know that vm0, for all mm0. This implies that δm=smwm,vmvm2. Thus, we have

    smwm,vm=δmvm2,mm0. (3.28)

    On the other hand,

    2ρδmvm,smzm=2ρδmvm,smzm=smzm2+ρ2δ2mvm2smzmρδmvm2. (3.29)

    Putting (3.28) and (3.29) into (3.27), then for all mm0, we get

    2ρδmvm,zmwm2ρδ2mvm2+smzm2+ρ2δ2mvm2smzmρδmvm2=smzm2smzmρδmvm2(2ρ)ρδ2mvm2. (3.30)

    Using (3.26) and (3.30), we get

    2ρηmδmGwm,zmwm2ρδ2mvm2+smzm2+ρ2δ2mvm2smzmρδmvm2=smzm2smzmρδmvm2(2ρ)ρδ2mvm2. (3.31)

    Also, from the combination of (3.25) and (3.31), we have

    2ρηmδmGwm,zmu2ρδ2mvm2+smzm2+ρ2δ2mvm2smzmρδmvm2=smzm2smzmρδmvm2(2ρ)ρδ2mvm2. (3.32)

    Putting (3.32) into (3.24), we obtain

    zmu2smu2smzmρδmvm2(2ρ)ρδ2mvm2. (3.33)

    Now, by Lemma 3.1 and (3.9), we have

    vm=smwmηm(GsmGwm)smwm+ηmGsmGwmsmwm+(qm+hmμ)ηmηm+1smwm=(1+(qm+hmμ)ηmηm+1)smwm.

    Thus,

    vm2(1+(qm+hmμ)ηmηm+1)2smwm2,

    or equivalently

    1vm21(1+(qm+hmμ)ηmηm+1)2smwm2.

    Again, from (3.9), we have

    smwm,vm=smwm2ηmsmwm,GsmGwmsmwm2ηmsmwmGsmGwmsmwm2(qm+hmμ)ηmηm+1smwm2=(1(qm+hmμ)ηmηm+1)smwm2.

    Therefore, for all mm0, we have

    δmvm2=smwm,vm(1(qm+hmμ)ηmηm+1)smwm2 (3.34)

    and

    δm=smwm,vmvm2(1(qm+hmμ)ηmηm+1)(1+(qm+hmμ)ηmηm+1)2. (3.35)

    Combining (3.34) and (3.35), we have

    δ2mvm2(1(qm+hmμ)ηmηm+1)2(1+(qm+hmμ)ηmηm+1)2smwm2,mm0. (3.36)

    Putting (3.36) into (3.33), we have

    zmu2smu2smzmρδmvm2(2ρ)ρ(1(qm+hmμ)ηmηm+1)2(1+(qm+hmμ)ηmηm+1)2smwm2,mm0.

    Next, the strong convergence theorem of Algorithm 3.1 is established as follows:

    Theorem 3.1. Suppose the conditions (C1)(C8) are performed and {um} is the sequence generated by Algorithm 3.1, then {um} converges strongly to an element uF(S)VI(M,G), where u=PF(S)VI(M,G)f(u).

    Proof. We divide the proof into four parts as follows:

    Claim 1. We show that {um} is bounded.

    Indeed, due to (3.21), we have

    zmusmu. (3.37)

    From (3.3), we have

    smu=um+ϕm(KumKum1)uumu+ϕmKumKum1umu+ϕmumum1=umu+αmϕmαmumum1. (3.38)

    From Remark 1, limmϕmαmumum1=0. Therefore, {ϕmαm||umum1} is bounded, so, a constant Γ1>0 exists such that

    ϕmαmumum1Γ1,m1. (3.39)

    Combining (3.37)–(3.39), we have

    zmusmuumu+αmΓ1. (3.40)

    Also, from (3.4), we have

    rmu=um+θm(JumJum1)uumu+θmJumJum1umu+θmumum1=umu+αmθmαmumum1. (3.41)

    From Remark 3.1, we see that limmθmαmumum1=0. Thus, a constant Γ2>0 exists such that

    θmαmumum1Γ2,m1. (3.42)

    Combining (3.41) and (3.42), we have

    rmuumu+αmΓ2. (3.43)

    Using (3.10) and condition (C7), we have

    um+1u=αmf(rm)+βmzm+γmSzmu=αm(f(rm)u)+βm(zmu)+γm(Szmu)αmf(rm)f(u)+f(u)u+βmzmu+γmSzmuαmf(rm)f(u)+αmf(u)u+βmzmu+γmSzmuαmkrmu+αmf(u)u+βmzmu+γmzmu=αmkrmu+αmf(u)u+(1αm)zmu. (3.44)

    Putting (3.40) and (3.43) into (3.44), we have

    um+1uαmk(umu+αmΓ2)+αmf(u)u+(1αm)(umu+αmΓ1)=(1(1k)αm)umu+α2mkΓ2+αm(1αm)Γ1+αmf(u)u(1(1k)αm)umu+αmΓ2+αmΓ1+αmf(u)u=(1(1k)αm)umu+αmΓ3+αmf(u)u=(1(1k)αm)umu+(1k)αmΓ3+f(u)u1kmax{umu,Γ3+f(u)u1k}max{um0u,Γ3+f(u)u1k},mm0, (3.45)

    where Γ3=Γ1+Γ2. This means that {um} is bounded. It follows that {zm}, {sm}, {wm}, {f(rm)} and {f(zm)} are bounded.

    Claim 2.

    (1αm)smzmρδmvm2+(1αm)(2ρ)ρ(1(qm+hmμ)ηmηm+1)2(1+(qm+hmμ)ηmηm+1)2smwm2+βmγmzmSzm2umu2um+1u2+αmΓ7,mm0,

    for some Γ7>0.

    Indeed, from (3.40), we have

    smu2(umu+αmΓ1)2=umu2+αm(2Γ1umu+αmΓ21). (3.46)

    Since {um} is a bounded sequence, it therefore implies that a constant Γ4>0 exists, such that 2Γ1umu+αmΓ21Γ4. Hence, (3.46) becomes

    smu2umu2+αmΓ4.

    Also, from (3.43), we get

    rmu2(umu+αmΓ2)2=umu2+αm(2Γ2umu+αmΓ22). (3.47)

    Since {um} is a bounded sequence, it therefore implies that a constant Γ5>0 exists, such that 2Γ2umu+αmΓ22Γ5. Hence, (3.47) becomes

    rmu2umu2+αmΓ5.

    Now, from (3.10) and Lemma 2.3, we have

    um+1u2=αmf(rm)+βmzm+γmSzmu2=αm(f(rm)u)+βm(zmu)+γm(Szmu)2αmf(rm)u2+βmzmu2+γmSzmu2βmγmzmSzm2αm(f(rm)f(u)+f(u)u)2+βmzmu2+γmSzmu2βmγmzmSzm2αm(krmu+f(u)u)2+βmzmu2+γmzmu2βmγmzmSzm2=αm(k2rmu2+2rmuf(u)u+f(u)u2)+(1αm)zmu2βmγmzmSzm2αm(rmu2+2rmuf(u)u+f(u)u2)+(1αm)zmu2βmγmzmSzm2=αmrmu2+αm(2rmuf(u)u+f(u)u2)+(1αm)zmu2βmγmzmSzm2. (3.48)

    Due to the boundedness of {rm}, we know that a constant Γ6>0 exists, such that 2rmuf(u)u+f(u)u2Γ6. Therefore, (3.48) becomes

    um+1u2αmrmu2+(1αm)zmu2βmγmzmSzm2+αmΓ6. (3.49)

    Putting (3.21) into (3.49), we get

    um+1u2αmrmu2+(1αm)smu2(1αm)smzmρδmvm2(1αm)(2ρ)ρ(1(qm+hmμ)ηmηm+1)2(1+(qm+hmμ)ηmηm+1)2smwm2βmγmzmSzm2+αmΓ6. (3.50)

    Substituting (3.40) and (3.43) into (3.50), we have

    um+1u2αm(umu+αmΓ2)2+(1αm)(umu+αmΓ1)2(1αm)smzmρδmvm2(1αm)(2ρ)ρ(1(qm+hmμ)ηmηm+1)2(1+(qm+hmμ)ηmηm+1)2smwm2βmγmzmSzm2+αmΓ6.umu2(1αm)smzmρδmvm2(1αm)(2ρ)ρ(1(qm+hmμ)ηmηm+1)2(1+(qm+hmμ)ηmηm+1)2smwm2βmγmzmSzm2+αmΓ1+αmΓ2+αmΓ6, (3.51)

    it follows from (3.51) that

    (1αm)smzmρδmvm2+(1αm)(2ρ)ρ(1(qm+hmμ)ηmηm+1)2(1+(qm+hmμ)ηmηm+1)2smwm2+βmγmzmSzm2umu2um+1u2+αmΓ7,mm0,

    where Γ7=Γ1+Γ2+Γ6>0.

    Claim 3.

    um+1u2(1(1k)αm)umu2+(1k)αm[21kf(u)u,um+1u+3Γ81kθmαmumum1+3Γ91kϕmαmumum1],mm0, (3.52)

    for some and .

    Indeed, using (3.3), we have

    (3.53)

    Also, from (3.4), we get

    (3.54)

    Using (3.10) and Lemma 2.3, we have

    (3.55)

    Substituting (3.53) and (3.54) into (3.55), we obtain

    where and .

    Claim 4. The sequence converges to zero. Indeed, from (3.52), Remark 3.1 and Lemma 2.5, it is enough to show that for any subsequence of of fulfilling

    (3.56)

    Now, we assume that is a subsequence of such that (3.56) holds, then

    By Claim 2 and condition , we get

    which implies that

    (3.57)

    On the other hand,

    (3.58)

    By (3.8) and (3.23), we know that

    (3.59)

    Putting (3.59) into (3.58) and using the Cauchy Schwartz inequality, we have

    Recalling (3.57), we have

    (3.60)

    Also, from (3.3), we have

    (3.61)

    By Remark 3.1, condition and (3.61), we have

    (3.62)

    Using (3.60) and (3.62), we have

    (3.63)

    Again, from (3.10), we have

    (3.64)

    From condition , (3.57) and (3.64), we obtain

    (3.65)

    Next, we have that

    (3.66)

    Combing (3.60), (3.62), (3.65), and (3.66), we have

    (3.67)

    Since the sequence is bounded, then we know that a subsequence of exists such that . Furthermore,

    (3.68)

    Thus, we have since Since , it follows from Lemma 3.2 that . From (3.63), it follows that . Following the demiclosedness of at zero as defined in Lemma 2.4, we know that . Thus, . By combining (3.68), and , we get

    (3.69)

    Using (3.67) and (3.69), we have

    (3.70)

    By Claim 3, Remark 1, (3.70), and Lemma 2.5, we obtain that , and this completes the proof of Theorem 3.1.

    Next, we propose our second and third algorithms as in Algorithms 3.2 and 3.3, which differ slightly from Algorithm 3.1.

    Algorithm 3.2.
    Initialization: Choose and let be arbitrary.
    Iterative Steps: Given the iterates and , calculate as follows:
    Step 1: Choose and such that and , where and are as defined in (3.1) and (3.2).
    Step 2: Set
                                                                                 
    and compute
                                                                                           
    If or , stop, is a solution of the VIP. Otherwise, do Step 3.
    Step 3: Compute
                                                                                      
    where , and are as defined in (3.7)–(3.9).
    Step 4: Compute
                                                                                 
    Update by (3.11).
    Set and go back to Step 1.

    Algorithm 3.3.
    Initialization: Choose and let be arbitrary.
    Iterative Steps: Given the iterates and , calculate as follows:
    Step 1: Choose and such that and , where and are as defined in (3.1) and (3.2).
    Step 2: Set
                                                                            
    and compute
                                                                                     
    If or , stop, is a solution of the VIP. Otherwise, do Step 3.
    Step 3: Compute
                                                                                
    where , and are as defined in (3.7)–(3.9).
    Step 4: Compute
                                                                            
    Update by (3.11).
    Set and go back to Step 1.

    Remark 3.2. In Algorithm 3.2, we replace the term in (3.10) of Algorithm 3.1 with . Also, in Algorithm 3.3, we replace the term in (3.10) of Algorithm 3.1 with . Now, the strong convergence theorems of Algorithms 3.2 and 3.3 will be stated without proofs. Their proofs are very similar to that of Theorem 3.1. Hence, we leave the proofs for the reader to verify.

    Theorem 3.2. Suppose the conditions are performed and is the sequence generated by Algorithm 3.2, then converges strongly to an element , where .

    Theorem 3.3. Suppose the conditions are performed and is the sequence generated by Algorithm 3.3, then converges strongly to an element , where .

    In this part of the work, we consider two numerical examples to demonstrate the computational efficiency of our Algorithms 3.1–3.3 (shortly, OAUAN Algs. 3.1, 3.7 and 3.8) over some existing modified algorithms, namely, Algorithms 1 and 2 of Thong and Hieu [43] (shortly, TH Alg. 1 and TH Alg. 2), Algorithm 2 of Tian and Tong [47] (shortly, TT Alg. 2), Algorithm 3.1 of Ogwo et al. [33] (shortly, OAM Alg. 3.1), Algorithm 3.1 of Godwin et al. [14] (shortly, GAMY Alg 3.1), and Algorithm 3.1 of Maluleka et al. [24] (shortly, MUA Alg 3.1). We perform all numerical simulations using MATLAB R2020b and carried out on PC Desktop Intel Core i7-3540M CPU @ 3.00GHz 4 memory 400.00GB.

    Example 4.1. Suppose that is defined by , where and , is a diagonal matrix whose diagonal terms are nonnegative (hence is positive symmetric definite), is a skew-symmetric, and is a matrix. We define the feasible set by

    It is not hard to see that the mapping is monotone and -Lipschitz continuous with (hence, is pseudo-monotone). For , the solution set . On the other hand, let . Clearly, the only fixed point of is 0, i.e., . The mapping is quasi-nonexpansive but not nonexpansive. Indeed, for , we have

    Hence, is quasi-nonexpansive. Moreover, if we take and , then we have

    Therefore, is not quasinonexpansive. Notice that is demiclosed at 0 and . Furthermore, we take , where for , and .

    The parameters for all the algorithms are taken as follows:

    For Algorithms 3.1–3.3, we take , , , , , , , , , and .

    For TH Algs. 1 and 2 , , .

    For Algorithm 2 of Tian and Tong [47] (TT Alg.), we take , , and .

    For Algorithm 3.1 of Godwin et al. [14] (GAMY Alg. 3.1), we take , , , , , , , , and .

    For Algorithm 3.1 of Maluleka et al. [24] (MUA Alg. 3.1), we take , , and .

    For Algorithm 3.2 of Ogwo et al. [33] (OAM Alg. 3.1), we take , , , , , , and .

    In this example, all entries , and are taken randomly from [1, 100]. We consider 4 different dimensions for , Case I: , Case II: , Case III: , Case IV: . The initial values are chosen at random using in MATLAB and stopping criterion is taken as . The results of the numerical simulations are presented in Table 1 and Figures 1 and 2.

    Table 1.  Numerical Results for the four dimensions considered in Example 4.1.
    Algorithms Case Ⅰ Case Ⅱ Case Ⅲ Case Ⅳ
    Iter. CPU Iter. CPU Iter. CPU Iter. CPU
    OUANC Alg. 3.1 15 0.0062 14 0.0043 15 0.0093 15 0.0205
    OUANC Alg. 3.7 16 0.0099 16 0.0075 16 0.0096 17 0.0199
    OUANC Alg. 3.8 17 0.0089 13 0.0037 14 0.0096 17 0.0242
    TH Alg. 1 33 0.0194 35 0.0363 35 0.0777 39 0.1864
    TH Alg. 2 38 0.0254 31 0.0413 38 0.0823 51 0.1878
    TT Alg. 2 23 0.0092 30 0.0181 36 0.0146 30 0.0565
    GAMY Alg. 3.1 90 0.0201 91 0.0399 99 0.0276 103 0.0712
    MUA Alg. 3.1 47 0.0207 47 0.0159 44 0.0294 45 0.0453
    OAM Alg. 3.1 40 0.0144 39 0.0076 41 0.0159 42 0.033

     | Show Table
    DownLoad: CSV
    Figure 1.  Graph of the iterates for Cases Ⅰ and Ⅱ.
    Figure 2.  Graph of the iterates for Cases Ⅲ and Ⅳ.

    Example 4.2. Let , i.e., . Let be such that . Let and . Obviously, the solution set . Now, we show that is -Lipschitz continuous on and pseudo-monotone on . Indeed, for any , we have

    Hence, is Lipschitz continuous with . Now, let be such that , then we have . Since , we have . Hence,

    This shows that is a pseudo-monotone mapping. If we set and , the projection formula is defined by

    (4.1)

    Now, let It is not hard to show that the mapping is nonexpansive (hence, quasi-nonexpansive). We see that . Thus, . We take the stopping criterion as . Furthermore more, we maintain the same control parameters as in Example 4.1. Since we cannot sum to infinity in MATLAB, we considered the subspace of consisting of finite nonzero terms defined by

    The first points of the initial points are generated randomly considering the following cases for : Case I: , Case II: , Case III: , Case IV: . We use the same control parameters used in the previous example for all the algorithms. The results of the numerical simulations are presented in Table 2 and Figures 3 and 4.

    Table 2.  Numerical results for the four dimensions considered in Example 4.2.
    Algorithms Case Ⅰ Case Ⅱ Case Ⅲ Case Ⅳ
    Iter. CPU Iter. CPU Iter. CPU Iter. CPU
    OUANC Alg. 3.1 13 0.0024 16 0.0042 17 0.0309 17 0.1011
    OUANC Alg. 3.7 16 0.0067 17 0.0083 18 0.0220 19 0.1094
    OUANC Alg. 3.8 16 0.0089 16 0.0081 17 0.0273 20 0.1105
    TH Alg. 1 37 0.0065 35 0.0286 40 0.1310 45 1.1786
    TH Alg. 2 34 1.0409 35 0.0190 37 0.1328 38 1.1063
    TT Alg. 2 36 0.0131 37 0.0101 38 0.0256 46 0.1978
    GAMY Alg. 3.1 67 0.0089 65 0.0081 69 0.0545 73 0.3740
    MUA Alg. 3.1 44 0.0083 42 0.0063 45 0.0467 47 0.2787
    OAM Alg. 3.1 33 0.0039 34 0.0128 37 0.0299 39 0.1892

     | Show Table
    DownLoad: CSV
    Figure 3.  Graph the Iterates for Cases Ⅰ and Ⅱ.
    Figure 4.  Graph the Iterates for Cases Ⅲ and Ⅳ.

    Remark 4.1. After conducting numerical simulations in Examples 4.1 and 4.2 our proposed Algorithms 3.1–3.3 have exhibited a competitive nature and potential when compared to existing algorithms. They outperformed Algorithms 1 and 2 of Thong and Hieu [43], Algorithm 2 of Tian and Tong [47], Algorithm 3.1 of Ogwo et al. [33], Algorithm 3.1 of Godwin et al. [14], and Algorithm 3.1 of Maluleka et al. [24] in terms of computational time and the number of iterations required to meet the specified stopping criteria, highlighting their superior performance.

    In this section, the solution of variational inequality problem arising from optimal control problem is approximated by our Algorithm 3.1. Let , then we denote the Hilbert space of the square integrable by , measurable vector function induced with the inner product

    and norm

    Now, the following optimal control problem will be considered on [0, T]:

    (5.1)

    supposing such control exists. Note that denotes the set of admissible controls, which takes the form an -dimensional box and is made up of a piecewise continuous function:

    Particularly, the control can be piecewise constant function (bang-bang).

    The terminal objective can be expressed as:

    where is a differentiable and convex function defined on the attainability set. If the trajectory fulfills constrains in the form of a linear differential equation system:

    (5.2)

    where and are matrices which are continuous for all . Using the Pontryagin maximum principle, we know that a function exists with the triple solving the following system for a.e. :

    (5.3)
    (5.4)
    (5.5)

    where is the normal cone to at defined by

    (5.6)

    Letting , where is shown by Khoroshilova [20] to be the gradient of objective cost function . The express (5.4) can be expressed as a variational inequality problem as follows:

    (5.7)

    Next, we discretize the continuous function and also take a natural number with the mesh size . Furthermore, we identify any discretized control with its piecewise constant extension:

    Again, any discretized state is identified with its piecewise linear interpolation

    (5.8)

    The same approach can be used to identify the co-state variable .

    The system of ordinary differential equations (ODEs) (5.3) and (5.4) will be solved by the Euler method [49]

    (5.9)
    (5.10)

    Next, we solve use Algorithm 3.1 to solve the problem in the following example:

    Example 5.1. (see [4])

    The exact solution of the problem in Example 5.1 is

    The initial controls are randomly taken in [-1, 1]. For this, we use the same parameters defined in Example 4.1 and set . The stopping criterion for this section is . The approximate optimal control and the corresponding trajectories of Algorithm 3.1 are shown in Figure 5.

    Figure 5.  Random initial control (green) and optimal control (purple) on the left and optimal trajectories on the right for Example 5.1 generated by Algorithm 3.1.

    It is noticed that images are, in most cases distorted by the process of acquisition. The purpose of the restoration technique for distorted images is to restore the original image from the noisy observation of it. The image restoration problem can be modeled as the following undetermined system of the linear equation:

    (6.1)

    where is a bounded linear operator, is an original image and is the observed image with noise . It is well-known that the solution of the model (6.1) is equivalent the solution of the (LASSO) problem as follows [39]:

    (6.2)

    where . It is worthy to know that according [40], one can reconstruct the LASSO problem (6.2) as a variational inequality problem by letting . For this, is monotone (hence is pseudomonotone) and Lipschitz continuous with .

    Now, we compare the restoration efficiency of our suggested Algorithms 3.1–3.3 (shortly, OAUAN Algs. 3.1, 3.7 and 3.8) with Algorithms 1 and 2 of Thong and Hieu [43] (shortly, TH Alg. 1 and TH Alg. 2), and Algorithm 2 of Tian and Tong [47] (shortly, TT Alg. 2), Algorithm 3.1 of Ogwo et al. [33] (shortly, OAM Alg. 3.1), Algorithm 3.1 of Godwin et al. [14] (shortly, GAMY Alg. 3.1), and Algorithm 3.1 of Maluleka et al. [24], (shortly, MUA Alg. 3.1). The test images are Austine and Peacock of sizes and , respectively. The images went through a Gaussian blur of size and standard deviation of . The performances of the algorithms are measured via signal-to-noise ratio (SNR) defined by

    (6.3)

    where is the restored image and is the original image. In this experiment, we maintain the same parameters used for all the algorithms in Example 4.1 with stopping criterion . The numerical results for this experiment are shown in Figures 69 and Tables 36.

    Figure 6.  Austine's image deblurring by various algorithms.
    Figure 7.  Peacock's image deblurring by various algorithms.
    Figure 8.  Graph corresponding to Tables 3 and 4.
    Figure 9.  Graph corresponding to Tables 5 and 6.
    Table 3.  Numerical comparison of various algorithms using their SNR values for Austine's image.
    Images m OAUAN Alg. 3.1 OAUAN Alg. 3.7 OAUAN Alg. 3.8 OAM Alg 3.1 GAMY Alg. 3.1
    Austine.png SNR SNR SNR SNR SNR
    () 50 54.18938 40.5451 33.1598 28.1770 26.6383
    100 54.2745 40.7152 34.2100 28.8195 26.6932
    150 55.3164 41.3918 34.8141 29.5183 27.7202
    200 55.3532 41.17770 34.5151 29.9243 27.7442

     | Show Table
    DownLoad: CSV
    Table 4.  Numerical comparison of various algorithms using their SNR values for Austine's image.
    Images m MUA Alg. 3.1 TT Alg. 2 TH Alg. 1 TH Alg. 2
    Austine.png SNR SNR SNR SRN
    () 50 26.6726 21.18938 21.5451 13.1598
    100 26.6726 25.2745 21.7152 13.2100
    150 26.8450 25.3164 21.3918 13.8141
    200 26.9953 25.3532 21.1777 13.5151

     | Show Table
    DownLoad: CSV
    Table 5.  Numerical comparison of various algorithms using their SNR values for Peacock's image.
    Images m OAUAN Alg. 3.1 OAUAN Alg. 3.7 OAUAN Alg. 3.8 OAM Alg. 3.1 GAMY Alg. 3.1
    Peacock.png SNR SNR SNR SNR SNR
    () 40 53.17939 40.6452 33.2599 28.2771 26.7384
    80 54.3746 40.8153 34.3101 28.9196 26.7933
    120 55.4165 41.4919 34.9142 29.6184 27.8203
    150 55.4533 41.27771 34.6152 29.9244 27.8443

     | Show Table
    DownLoad: CSV
    Table 6.  Numerical comparison of various algorithms using their SNR values for Peacock's image.
    Images m MUA Alg. 3.1 TT Alg. 2 TH Alg. 1 TH Alg. 2
    Peacock.png SNR SNR SNR SNR
    () 40 26.7727 21.28939 21.6452 13.2599
    80 26.8727 25.3746 21.8153 13.3101
    120 26.9451 25.4165 21.4919 13.9142
    150 26.9955 25.4533 21.2778 13.6152

     | Show Table
    DownLoad: CSV

    It is well-known that the higher the SNR value of an algorithm, the better the quality of the image it restores. From Figures 69 and Tables 36, it is evident that our Algorithms 3.1–3.3 restored the blurred images better than Algorithms 1 and 2 of Thong and Hieu [43], and Algorithm 2 of Tian and Tong [47], Algorithm 3.1 of Ogwo et al. [33], Algorithm 3.1 of Godwin et al. [14], and Algorithm 3.1 of Maluleka et al. [24]. Hence, our algorithms are more effective and applicable than many existing methods.

    In this work, we have introduced three novel iterative algorithms for finding the common solution of quasi-nonexpansive FPP and pseudo-monotone variational inequality problems. Our algorithms embed double inertial steps which accelerate their convergence rates. Numerical experiments have shown that our algorithms outperformed several existing algorithms with single or no inertial terms. Further, we a considered a new self-adaptive step size technique that produces a non-monotonic sequence of step sizes while also correctly incorporating a number of well-known step sizes. The step size is designed to lessen the algorithms' reliance on the initial step size. Numerical tests were performed, and the results showed that our step size is more effective and that it guarantees that our methods require less execution time. Our convergence results were obtained without the imposition of stringent conditions on the control parameters. The class of pseudo-monotone operators, which has been studied in the work, is more general than the class of monotone operators which has been studied in [43,47] and several other articles. To test the applicability and efficiencies of our methods in solving real-world problems, we utilized the methods to solve optimal control and image restorations problems.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The authors extend their appreciation to Prince Sattam bin Abdulaziz University for funding this work through the projection number (PSAU/2023/01/8980).

    The authors declare that they have no conflict of interest.



    Conflict of interest



    The Authors declare that there is no conflict of interest.

    [1] Ainuddin U, Khurram M, Hasan SMR (2019) Cloning the λ Switch: digital and Markov representations. IEEE Trans NanoBiosci 18: 428-436. https://doi.org/10.1109/TNB.2019.2908669
    [2] Alspector J, Gannett J W, Haber S, et al. (1990) Generating multiple analog noise sources from a single linear feedback shift register with neural network application. ISCAS 1990: 1058-1061.
    [3] Angelova M, Ben-Halim A (2011) Dynamic model of gene regulation for the lac operon. J Phys Conf Ser 286: 012007. https://doi.org/10.1088/1742-6596/286/1/012007
    [4] Balaeff A, Mahadevan L, Schulten K (2004) Structural basis for cooperative DNA binding by CAP and lac repressor. Structure Structure 12: 123-132. https://doi.org/10.1016/j.str.2003.12.004
    [5] Brenguier D, Chaouiya C, Monteiro P T, et al. (2013) Dynamical modeling and analysis of large cellular regulatory networks. Chaos 23: 025114. https://doi.org/10.1063/1.4809783
    [6] Berg JM, Tymoczko JL, Stryer L, et al. (2002) Biochemistry. New York: W. H. Freeman.
    [7] Bchel DE, Gronenborn B, Mller-Hill B (1980) Sequence of the lactose permease gene. Nature 283: 541-545. https://doi.org/10.1038/283541a0
    [8] Calder M, Vyshemirsky V, Gilbert D, et al. (2006) Analysis of signalling pathways using continuous time Markov chains. Transactions on Computational Systems Biology VI . Heidelberg: Springer 44-67.
    [9] Chatterjee S, Rothenberg E (2012) Interaction of bacteriophage λ with its E. coli receptor, lamB. Viruses 4: 3162-3178. https://doi.org/10.3390/v4113162
    [10] Choudhary K, Narang A (2019) Analytical expressions and physics for single-cell mRNA distributions of the lac Operon of E. coli. Biophys J 117: 572-586. https://doi.org/10.1016/j.bpj.2019.06.029
    [11] Daber R, Stayrook S, Rosenberg A, et al. (2007) Structural analysis of lac repressor bound to allosteric effectors. J Mol Biol 370: 609-619. https://doi.org/10.1016/j.jmb.2007.04.028
    [12] Donnelly CE, Reznikoff WS (1987) Mutations in the lac P2 promoter. J Bacteriol 169: 1812-1817. https://doi.org/10.1128/jb.169.5.1812-1817.1987
    [13] Eshra A, El-Sayed A (2014) An odd parity checker prototype using DNAzyme finite state machine. IEEE/ACM Trans Comput Biol Bioinform 11: 316-324. https://doi.org/10.1109/TCBB.2013.2295803
    [14] Esmaeili A, Davison T, Wu A, et al. (2015) PROKARYO: an illustrative and interactive computational model of the lactose operon in the bacterium Escherichia coli. BMC Bioinformatics 16: 1-23. https://doi.org/10.1186/s12859-015-0720-z
    [15] Fang X, Liu Q, Bohrer C, et al. (2018) Cell fate potentials and switching kinetics uncovered in a classic bistable genetic switch. Nat Commun 9: 2787. https://doi.org/10.1038/s41467-018-05071-1
    [16] Gao R, Hu W Study on some modeling problems in the process of gene expression with finite state machine (2012)2012: 5066-5070. https://doi.org/10.1109/WCICA.2012.6359438
    [17] Gao R, Hu W, Tarn TJ (2013) The application of finite state machine in modeling and control of gene mutation process. IEEE Trans NanoBiosci 12: 265-274. https://doi.org/10.1109/TNB.2013.2260866
    [18] Gebali F (2008) Analysis of Computer and Communication Networks. US: Springer. https://doi.org/10.1007/978-0-387-74437-7
    [19] Griffiths AJ, Gelbart WM, Miller JH, et al. (1999) Darwin's Revolution. Modern Genetic Analysis. New York: W. H. Freeman.
    [20] Hasan SMR (2010) A digital cmos sequential circuit model for bio-cellular adaptive immune response pathway using phagolysosomic digestion: a digital phagocytosis engine. J Biomed Sci Eng 3: 470-475. https://doi.org/10.4236/jbise.2010.35065
    [21] Jacob C, Burleigh I (2004) Biomolecular swarms–an agent-based model of the lactose operon. Nat Comput 3: 361-376. https://doi.org/10.1007/s11047-004-2638-7
    [22] Jacob F, Monod J (1961) Genetic regulatory mechanisms in the synthesis of proteins. J Mole Biol 3: 318-356. https://doi.org/10.1016/S0022-2836(61)80072-7
    [23] Julius AA, Halasz A, Kumar V, et al. (2006)2006: 19-24. https://doi.org/10.1109/CDC.2006.376739
    [24] Krogh A, Larsson B, Von Heijne G, et al. (2001) Predicting transmembrane protein topology with a hidden Markov model: application to complete genomes. J Mole Biol 305: 567-580. https://doi.org/10.1006/jmbi.2000.4315
    [25] Lawson CL, Swigon D, Murakami KS, et al. (2004) Catabolite activator protein: DNA binding and transcription activation. Curr Opin Struct Biol 14: 10-20. https://doi.org/10.1016/j.sbi.2004.01.012
    [26] Li H, Wang S, Li X, et al. (2020) Perturbation analysis for controllability of logical control networks. SIAM J Control Optim 58: 3632-3657. https://doi.org/10.1137/19M1281332
    [27] Mahaffy JM, Savev ES (1999) Stability analysis for a mathematical model of the lac operon. Quart Appl Math 57: 37-53. https://doi.org/10.1090/qam/1672171
    [28] McAdams HH, Shapiro L (1995) Circuit simulation of genetic networks. Science 269: 650-656. https://doi.org/10.1126/science.762479
    [29] Moore EF (1956) Gedanken-experiments on sequential machines. Automata Studies 34: 129-153. https://doi.org/10.1515/9781400882618-006
    [30] Muri F (1998) Modelling bacterial genomes using hidden Markov models. COMPSTAT 1998: 89-100. https://doi.org/10.1007/978-3-662-01131-7-8
    [31] Vergne N (2008) Drifting Markov models with polynomial drift and applications to DNA sequences. Stat Appl Genet Mol Biol 7: 6. https://doi.org/10.2202/1544-6115.1326
    [32] Notley-McRobb L, Death A, Ferenci T (1997) The relationship between external glucose concentration and cAMP levels inside Escherichia coli: implications for models of phosphotransferase-mediated regulation of adenylate cyclase. Microbiology 143: 1909-1918. https://doi.org/10.1099/00221287-143-6-1909
    [33] Novick A, Weiner M (1957) Enzyme induction as an all-or-none phenomenon. Proc Natl Acad Sci USA 43: 553-566. https://doi.org/10.1073/pnas.43.7.553
    [34] Oehler S, Amouyal M, Kolkhof P, et al. (1994) Quality and position of the three lac operators of E. coli define efficiency of repression. EMBO J 13: 3348-3355. https://doi.org/10.1002/j.1460-2075.1994.tb06637.x
    [35] Oehler S, Eismann ER, Krmer H, et al. (1990) The three operators of the lac operon cooperate in repression. EMBO J 9: 973-979. https://doi.org/10.1002/j.1460-2075.1990.tb08199.x
    [36] Oishi K, Klavins E (2014) Framework for engineering finite state machines in gene regulatory networks. ACS Synth Biol 3: 652-665. https://doi.org/10.1021/sb4001799
    [37] Rani MJ, Malarkkan S (2012) Design and analysis of a linear feedback shift register with reduced leakage power. Int J Comput Appl 56: 9-13. https://doi.org/10.5120/8957-3159
    [38] Hasan SMR (2008) A novel mixed-signal integrated circuit model for DNA-protein regulatory genetic circuits and genetic state machines. IEEE Trans Circuits Syst Regul Pap 55: 1185-1196. https://doi.org/10.1109/TCSI.2008.925632
    [39] Reznikoff WS (1992) Catabolite gene activator protein activation of lac transcription. J Bacteriol 174: 655-658. https://doi.org/10.1128/jb.174.3.655-658.1992
    [40] Ross SM (2010) Introduction to Probability Models. Boston: Academic Press ocn444116127. https://doi.org/10.1016/B978-0-12-375686-2.00007-8
    [41] Saad Y (2011) Numerical methods for large eigenvalue problems: revised edition. USA: SIAM. https://doi.org/10.1137/1.9781611970739
    [42] Santilln M (2008) Bistable behavior in a model of the lac operon in Escherichia coli with variable growth rate. Biophys J 94: 2065-2081. https://doi.org/10.1529/biophysj.107.118026
    [43] Santilln M, Mackey MC (2004) Influence of catabolite repression and inducer exclusion on the bistable behavior of the lac operon. Biophys J 86: 1282-1292. https://doi.org/10.1016/S0006-3495(04)74202-2
    [44] Shenker JQ, Lin MM (2015) Cooperativity leads to temporally-correlated fluctuations in the bacteriophage lambda genetic switch. Front Plant Sci 6: 214. https://doi.org/10.3389/fpls.2015.00214
    [45] Shmulevich I, Dougherty ER, Zhang W (2002) From Boolean to probabilistic Boolean networks as models of genetic regulatory networks. Proc IEEE 90: 1778-1792. https://doi.org/10.1109/JPROC.2002.804686
    [46] Shuman HA, Silhavy TJ (2003) The art and design of genetic screens: Escherichia coli. Nat Rev Genet 4: 419-431. https://doi.org/10.1038/nrg1087
    [47] Suen G, Jacob C (2003) A symbolic and graphical gene regulation model of the lac operon. Challenging the Boundaries of Symbolic Computation . London: Imperial College 73-80. https://doi.org/10.1142/9781848161313-0010
    [48] Floyd TL (2015) Digital Fundamentals. England: Pearson Education.
    [49] Veliz-Cuba A, Stigler B (2011) Boolean models can explain bistability in the lac operon. J Comput Biol 18: 783-794. https://doi.org/10.1089/cmb.2011.0031
    [50] Vossen KM, Stickle DF, Fried MG (1996) The Mechanism of CAP-lacRepressor Binding Cooperativity at the E. coliLactose promoter. J Mol Biol 255: 44-54. https://doi.org/10.1006/jmbi.1996.0005
    [51] Wang S, Zhang Y, Ouyang Q (2006) Stochastic model of coliphage lambda regulatory network. Phys Rev E 73: 041922. https://doi.org/10.1103/PhysRevE.73.041922
    [52] Wong P, Gladney S, Keasling JD (1997) Mathematical model of the lac operon: inducer exclusion, catabolite repression, and diauxic growth on glucose and lactose. Biotechnol Prog 13: 132-143. https://doi.org/10.1021/bp970003o
    [53] Yang J, Meng X, Hlavacek WS (2010) Rule-based modelling and simulation of biochemical systems with molecular finite automata. IET Syst Biol 4: 453-466. https://doi.org/10.1049/iet-syb.2010.0015
    [54] Yildirim N, Kazanci C (2011) Deterministic and stochastic simulation and analysis of biochemical reaction networks: The lactose operon example. Methods in Enzymology . New York: Academic Press 371-395. https://doi.org/10.1016/B978-0-12-381270-4.00012-3
    [55] Yildirim N, Mackey MC (2003) Feedback regulation in the lactose operon: a mathematical modeling study and comparison with experimental data. Biophys J 84: 2841-2851. https://doi.org/10.1016/S0006-3495(03)70013-7
    [56] Yildirim N, Santillan M, Horike D, et al. (2004) Dynamics and bistability in a reduced model of the lac operon. Chaos 14: 279-292. https://doi.org/10.1063/1.1689451
  • bioeng-09-04-029-s001.pdf
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1820) PDF downloads(77) Cited by(0)

Figures and Tables

Figures(9)  /  Tables(10)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog