Journal Title
Title of Journal: Nat Comput
|
Abbravation: Natural Computing
|
Publisher
Springer Netherlands
|
|
|
|
Authors: David Angeli
Publish Date: 2009/10/29
Volume: 10, Issue: 2, Pages: 751-774
Abstract
This paper describes the working principles of an algorithm for boundedness analysis of open Chemical Reaction Networks endowed with massaction kinetics Such models can be thought of both as a special class of compartmental systems or a particular type of continuous Petri Nets in which the firing rates of transitions are not constant or preassigned but expressed as a function of the continuous marking of the network function which in chemistry is referred to as the “kinetics” The algorithm can be applied to a broad class of such open networks and returns as an outcome a classification of the possible dynamical behaviors that are compatible with the network structure by classifying each variable either as bounded converging to 0 or diverging to ∞ This can be viewed as a qualitative study of Input–Output Stability for chemical networks or more precisely as a classification of its possible I–O instability patterns Our goal is to analyze the system irrespectively of values of kinetic parameters More precisely we attempt to analyze it simultaneously for all possible values Remarkably tests on nontrivial examples one of which is discussed in this paper showed that as the kinetic constants of the network are varied all the compatible behaviors could be observed in simulations Finally we discuss and illustrate how the results relate to previous works on the qualitative dynamics of closed reaction networksEfficient implementation of the algorithm is based on the selective exploration of the tree of all possible labelings and on efficient exclusion of branches which are to be found inconsistent according to the standard principle of branch and bound depth search Thanks to the connection with siphon’s computation discussed in Sect 6 it can be seen as some non trivial extension of the algorithm described in Boer and Murata 1994 for the computation of minimal siphons which however only uses 2 types of labels 0 and 1 respectively for places which do belong and do not belong to the siphon currently being tested for These are fairly complex algorithms both computationally and in terms of the source code which is needed to implement them Their description to be intelligible would require the space and accuracy of a standalone paper We feel that is beyond the scope of the present paper which mainly deals with the working principles of such an algorithm For those interested in computational aspects though it might be helpful to know that rather than proceeding with the computation of all possible labelings and some a posteriori check of consistency we gradually update the currently explored configuration by making use of setvalued labels viz labels corresponding to the following 7 different possibilities 0 1 ∞ 01 1∞ 0∞ 01∞ Those involving more than one symbol are meant to be associated to variables for which more than one possible asymptotic behavior is still plausible and has to be simultaneously taken into account The tree is explored thanks to a branch and bound technique which performs consistency checks all the way down from the root to the leaves In such a way incompatible labelings are discarded much earlier in the construction of the tree Tables for addition and multiplication among such labels are constructed by trivially generalizing those for labels involving a single symbol in order to further speed up operations Whenever consistency of a stage is tested the tree is branched by splitting into 2 or 3 different cases by attaching a singlevalued label to one of the species that was still ambiguously marked Then we proceed to recomputation of all the labels and to consistency check Indeed the algorithm performed very rapidly on networks of reasonable size as the one included in this paper for the example discussed here an answer was obtained in less than 3 s on a standard PC
Keywords:
.
|
Other Papers In This Journal:
|