Abstract
A cell phenotype can be represented by an attractor state of the underlying molecular regulatory network, to which other network states eventually converge. Here, the set of states converging to each attractor is called its basin of attraction. A central question is how to drive a particular cell state toward a desired attractor with minimal interventions on the network system. We develop a general control framework of complex Boolean networks to provide an answer to this question by identifying control targets on which one-time temporary perturbation can induce a state transition to the boundary of a desired attractor basin. Examples are shown to illustrate the proposed control framework which is also applicable to other types of complex Boolean networks.
Similar content being viewed by others
Introduction
Various complex phenomena across different disciplines are often explained by the complicated interactions of their constituting elements, resulting in a class of models called complex networks1,2,3,4. In the study of complex networks, our ultimate goal is to control their steady state behavior such that a desired behavior is achieved5. For instance, in cancer study, we want to identify target molecule(s) in the complex intracellular molecular regulatory network that can effectively induce apoptosis of cancer cells, where the desired steady state behavior is apoptosis represented by a particular converging steady state of molecules, called a desired attractor6.
A number of studies have been conducted to control complex networks and to achieve a desired behavior, but most of them assumed persistent perturbation of the identified target elements7,8,9,10,11. Such approaches, however, have critical limitations if the duration of perturbation is difficult to be specified in advance or persistence perturbation might cause other significant problems as in the case of biomedical applications where long-term treatment of drugs might cause resistance or side-effects12. So, in this study, we present a different kind of Boolean network control based on temporary perturbation instead of persistent perturbation. Moreover, to achieve minimal intervention, our control strategy drives any initial state of a complex Boolean network only to the boundary of basin of attraction to the desired attractor where a state in the basin autonomously converges to the corresponding attractor eventually. This boundary-reaching control (BRC) can ensure to achieve the desired steady state behavior of any complex Boolean network by only temporarily perturbing the identified minimal number of control target nodes. To implement the BRC, we need to find out the exact basin of attraction of a given desired attractor and to further delineate the boundary of a basin with respect to the current initial state of a network. There is, however, a computational challenge in identifying such an exact basin due to the computational complexity that increases exponentially with the network size13. Here we present an algorithm to identify the exact basin of attraction using the topological property as well as regulatory logics of complex networks. We also present an algorithm to identify the boundary of a basin by measuring the distance between the current state and the basin in the state space. We can then identify control targets for BRC from the information of boundary. Our BRC is applicable irrespective of the relative size of basin of attraction while it becomes easier to identify control targets when the basin of a desired attractor is large enough.
We illustrate the BRC using toy example networks and demonstrate its usefulness by applying it to biomolecular regulatory networks of different scales. We further show that it can also be applied to other types of complex networks such as an ecological network and an insect social network. The BRC is a generic control strategy applicable to any complex Boolean networks and it ensures the convergence of any network state to the desired attractor through minimal and temporary intervention of network dynamics.
Results
Overview of boundary-reaching control
The BRC can be summarized in three steps as shown in Fig. 1a. Let us consider a Boolean network model in Fig. 1a where its state update logics are given (Supplementary Fig. 1) and its current state is at an undesired state α which will eventually converge to an undesired attractor. Since BRC is a control strategy to drive the undesired state to a state in the basin of a desired attractor β in Fig. 1a by perturbing a minimum number of nodes, we first need to identify the exact basin of the desired attractor and search a minimum set of target nodes (first step \(\overline{)\,{\rm{i}}\,}\) in Fig. 1a). Each basin state is hierarchically identified in a sequential manner: the desired attractor state is located at the 1st layer. A given state Sℓ at the ℓth layer (ℓ ≥ 1) is substituted in the state at time step t + 1 in the Boolean update rules to get a system of equations and the solution states Sℓ+1 are located at the (ℓ + 1)th layer, where the given state is called a terminal basin state if no more solution state is calculated. The first step is completed when every terminal basin state is identified. The boundary concept of the basin (second step \(\overline{)\,{\rm{ii}}\,}\) in Fig. 1a) is related to a basin state to which α is driven to transit by perturbing (i.e. changing) some nodes’ values in α, where these nodes are called “control target nodes” and the number of these nodes is a “Hamming distance (HD) from α to the basin state”. In particular, a minimum set of control target nodes with their target values is referred as a “minimum control target set”. A basin state is called a “boundary state from α” if the basin state is located away from α with the minimum HD (mHD), and the set of boundary states from α is referred to as the “boundary of the basin from α”. For instance, in the right of Fig. 1a, the HD between the basin state (A, B, C, D, E, F, G) = (0, 0, 1, 0, 1, 0, 0) and α (0, 0, 0, 0, 1, 0, 0) is equal to 1 and therefore (0, 0, 1, 0, 1, 0, 0) is a boundary state, where {C = 0} is the minimum control target set (third step \(\overline{){\rm{iii}}}\) in Fig. 1a).
Each of the three steps (\(\overline{)\,{\rm{i}}\,}\), \(\overline{)\,{\rm{ii}}\,}\) and \(\overline{)\,{\rm{ii}}\,}\)) can be summarized as in Fig. 1b: the first step requires b1 to b5 and the other steps requires b5 to b7. The first step begins to find a node (denoted by O) with no outgoing link (node G in b2 of Fig. 1b), which implies that O has no influence when identifying basin states in our framework. As a result, for each basin state S at the ℓth layer, there is a basin state at the ℓth layer which is equal to S except for the value of Ο. So, Ο is called a “symmetric node” of mean value 0.5 in the basin (Supplementary Figs 1–2). When identifying basin states, no influence of the symmetric node let us remove node O from the original network to repeat the process for a new symmetric node (node F in b2 of Fig. 1b) until there is no more symmetric node in the subnetwork. As in b2 and b3 in Fig. 1b, the original network is divided into two symmetric nodes (F and G) and a subnetwork without any symmetric node, respectively, where we refer to the subnetwork b3 as a “non-symmetric network”. The reduced attractor state of the non-symmetric network is the state obtained by removing all symmetric nodes from the desired attractor state, and the basin of the reduced attractor is referred to as “reduced basin”. Note that concatenating the values (0 or 1) of symmetric nodes and reduced basin states provides the exact basin. To reduce the computational time complexity when hierarchically calculating reduced basin states, we find sufficient conditions for terminal basin states. For instance, the B’s value in a given state S at the ℓth layer determines the unique value of Cℓ+1 in a solution candidate state at the (ℓ + 1)th layer and the Cℓ+1’s unique value is an input to the E’s value in S at the ℓth layer (b3 of Fig. 1b), which implies that the B’s value in each basin state S must be an input to the E’s value in S. So, the algebraic structure among B, C and E gives an algebraic relation between two values of B and E in S. If S is not terminal, this relation must hold, where the condition in the contrapositive becomes a sufficient condition for S to be terminal (b4 of Fig. 1b and Supplementary Fig. 1). See “Sufficient conditions for terminal basin states and classifications of update rules” in the Methods section for details. By concatenating the values (0 or 1) of symmetric nodes (b2 of Fig. 1b) and the reduced basin states of the non-symmetric subnetwork (b5 of Fig. 1b), we can identify the basin of the desired attractor of the original network (\(\overline{)\,{\rm{i}}\,}\) in Fig. 1b and Supplementary Fig. 2). Identification process of an exact basin is illustrated with an example network in Supplementary Fig. 3. The second and third steps begin to divide nodes of the non-symmetric network into three parts depending on the reduced basin (b5 in Fig. 1b): symmetric nodes of mean value 0.5, nodes of fixed values, and nodes of unfixed values in the reduced basin. For instance, in the case of the non-symmetric network b3, the reduced basin in Supplementary Fig. 1 gives no symmetric node, node C of a fixed value 1 (b6 in Fig. 1b) and the other nodes of no fixed values (b7 in Fig. 1b). So, every boundary state (A, B, C, D, E, F, G) from α (0, 0, 0, 0, 1, 0, 0) has C = 1 as well as (F, G) = (0, 0). Therefore comparing α and the states of (A, B, D, E) in each reduced basin state (Supplementary Fig. 1) provides mHD = 1, the boundary {(A, B, C, D, E, F, G) = (0, 0, 1, 0, 1, 0, 0)} and a minimum control set {C = 1} (\(\overline{)\,{\rm{ii}}\,}\) and \(\overline{){\rm{iii}}}\) in Fig. 1b and Supplementary Fig. 1).
Application of BRC to a biomolecular network and analysis of the distribution of its average mHD
To show the details of BRC, we applied it to a biomolecular network of appropriate size, the reduced colitis-associated colon cancer (CACC) network of 21 nodes14 (Fig. 2a). This network is to be simply called “CACC21” and its state update logics are provided in Supplementary Data 1.
CACC21 is divided into the set of four symmetric nodes shown in the light blue area in Fig. 2a and the subnetwork of 17 non-symmetric nodes shown in the light gray area in Fig. 2a by using the CACC21 topology. The symmetric nodes of mean value 0.5 are identified hierarchically as shown in Fig. 1: Proliferation is the unique symmetric node in CACC21. P21 and CyclinD1 are symmetric in CACC21 without Proliferation. Bcatenin is symmetric in CACC21 without Proliferation, P21 and CyclinD1. There is no symmetric node in CACC21 without Proliferation, P21, CyclinD1 and Bcatenin. The subnetwork (top right of Fig. 2a) has a reduced attractor (θ1) composed of 17 non-symmetric nodes with their values in θ. As illustrated in Fig. 1, sufficient conditions for terminal basin states are derived to efficiently identify the basin of θ1 of the subnetwork, which will be then used to identify the basin of θ of the original network by concatenating the values of four symmetric nodes and each state of the basin of θ1 (Supplementary Fig. 4).
A basin state of θ can be decomposed as in in Fig. 2b: sub-states of symmetric nodes (“Symmetric”), nodes of fixed state values (“Fixed”) and the other nodes of unfixed values (“Unfixed”), where only the last two sub-states are used to identify control targets as in Fig. 1b (Supplementary Fig. 5).
CACC21 has two undesired attractors (state value 1 of Proliferation) and six desired attractors (state value 0 of Proliferation) in the state space. The average mHD from any state converging to one of the two undesired attractors to the basin boundary of one of the six desired attractors is presented in Fig. 2c. As expected, the average mHD decreases as the basin size of the desired attractor increases (Supplementary Data 1).
BRC identifies therapeutic targets for temporary perturbation of a biomolecular network by identifying its exact basin
CACC network originally consists of 70 nodes14. To represent the condition for a premalignant intestinal epithelial cell (IEC) in pro-tumor microenvironments, we fixed the values of DC and APC nodes to ON state14 (green diamonds in Fig. 3a). As a result, the states of 21 nodes are fixed and annotated as unperturbed nodes in Fig. 3a (dotted circles), and the remaining network consists of 49 nodes which are annotated as perturbed nodes in Fig. 3a (solid circles). We refer to the remaining subnetwork as “CACC49 network” or simply “CACC49” (Supplementary Data 2) which contains two phenotypic nodes, Apoptosis and Proliferation. We confirm that the dynamics of CACC49 can represent the growth of premalignant IECs14 (Supplementary Data 2) since the activation of Apoptosis was blocked and the activation of Proliferation was significantly increased whereas it did not reach its full activation.
From Monte-Carlo simulation, we found out 16 attractors (Supplementary Data 2). Two attractors have the constantly activated Proliferation node, which can be considered as undesired attractors (cancerous attractors) and so states converging to one of these two undesired attractors are considered undesired states (precancerous states). In addition, three attractors have the constantly inactivated Proliferation node (three desired attractors) and then states converging to one of these three desired attractors are considered desired states which are approximately 0.03994% of states in the state space. 10,000 randomly selected undesired states were used to identify boundary states.
Using our algorithm for identifying a basin, we found that desired states are 0.038409% out of all possible states. To drive the network state from an undesired state onto the boundary of the basin of a desired attractor by one-time temporary perturbation, we need to identify the boundary states that can be used to further find out control target sets and the mHD to the boundary, where the average number of control target sets is 5.2476 (standard deviation of 5.7703) and the average mHD is 4.7426 (standard deviation of 1.5885) as shown in Fig. 3c. Even if the relative basin size is extremely small as in Fig. 3b, the actual number of desired states is not much small (21,622,344,760,959 desired states), which might, in part, explain why the average mHD is not so large. The distribution of average mHD is theoretically and computationally obtained in Supplementary Figs 6–8, where we showed that the average and normalized average mHDs decrease as the network size increases but the relative size of a basin is fixed. In addition, we demonstrated that the mHD decreases if basin states are farther apart from each other in Supplementary Fig. 8.
From BRC point of view, each node in Fig. 3a is colored according to the relative frequency of inclusion of the node in control target sets, referred to as “control target probability” where a darker red color represents a higher control target probability. Activity levels of each node in the 10,000 randomly selected undesired states are uniformly distributed as in the first panel of Fig. 3d except for CTL and IFNG of the activity level 0 (first panel of Fig. 3d). The update rules for CTL and IFNG (CTL(t + 1) = IFNG(t) and IFNG(t + 1) = CTL(t)) and the fixed activity level 0 of CTL and IFNG in the three desired attractors (second panel of Fig. 3d and Supplementary Data 2) determine the fixed activity level of CTL and IFNG. So, CTL and IFNG become “fixed nodes”.
We found that eight nodes (i.e. APOPTOSIS, BCATENIN, CTL, CYCLIND1, IFNG, PROLIFERATION, SMAD7 and SMASE) are not included in control target nodes (third panel of Fig. 3d) since CTL and IFNG are fixed nodes and the other nodes are symmetric nodes of mean value of 0.5 (Fig. 3a and the fourth panel of Fig. 3d). We also found that six nodes (AKT, IKK, MAC, NFKB, TNFA and TNFR) are enriched in the control target sets (Fig. 3a and the third panel of Fig. 3d), where the inhibitory pattern is similar to that in the basin of the desired attractors (fourth panel of Fig. 3d). In addition, the six nodes showed lowest activities in the basin of the desired attractors in contrast to the undesired states (first panel of Fig. 3d) except the fixed nodes (CTL and IFNG). These results may indicate that the six nodes are essential for maintaining cancer progression, and so inhibition of them can result in cancer regression. The Akt signaling pathway is a well-known oncogenic pathway dysregulated in most colon cancer15 and inhibition of this pathway can prevent tumorigenesis of CAC16. IκB kinase (IKK) and Nuclear factor-κB (NF-κB) transcription factor are involved in the IKK/NF-κB signaling pathway linking inflammation and tumorigenesis of CAC17,18. TNF-α can augment the IKK/NF-κB signaling pathway, so blocking TNF-α and its receptor can reduce CAC19. Lastly, it remains as a future study to experimentally validate whether the activity of Mac1+ cells is critical to regulate CAC.
BRC can reveal therapeutic targets for temporary perturbation of a biomolecular network without identifying its exact basin in the case of a relatively large basin
In case the basin of a desired attractor is large enough such that it covers most of the state space, BRC can be applied without identifying the exact basin of the desired attractor. This is illustrated by a Boolean network model on survival of competent cytotoxic T lymphocytes in T cell large granular lymphocyte (T-LGL) leukemia20,21. This network consists of 60 nodes including proteins, mRNAs, and small molecules involved in T-LGL survival signaling pathways, together with six inputs (CD45, IL15, PDGF, Stimuli, Stimuli2 and TAX; dotted rectangles in Fig. 4a) and three outputs (Cytoskeleton signaling, Proliferation and Apoptosis). We refer to this model as “T-cell54” (Fig. 4a and Supplementary Data 3).
To reflect the condition for signaling abnormalities in T-LGL leukemia, we fixed the values of input nodes for Stimuli, IL15 and PDGF to ON state; and CD45, Stimuli2 and TAX to OFF state21. From Monte-Carlo simulation, we found out four attractors in which the values of two outputs Cytoskeleton signaling and Proliferation are 1 and 0, respectively. The other output Apoptosis has value 0 in two (“undesired attractors”) out of four attractors and value 1 in the other two attractors (“desired attractors”), where the total size of the basins of the desired attractors is approximately 99.53% (Fig. 4b and Supplementary Data 3).
Since the desired basins occupy most of the state space, every undesired state is expected to be located very close to the desired basins, which implies that perturbation of only few nodes at each undesired state might drive the undesired state onto the boundary of the desired basins. Except the inputs, the outputs, the conceptual node P2 and the previously identified 19 targets20 (dotted circles in Fig. 4a), the remaining 31 nodes (solid circles in Fig. 4a) were perturbed to examine whether such perturbation can actually drive the undesired state onto the boundary of a desired basin.
We identified boundary states from each of 100,000 random undesired states. As a result, we can find out control target sets and mHDs to the boundary of the two desired basins. The average number of control target sets is 3.3824 (standard deviation of 1.6723, upper panel of Fig. 4c). As expected, 105 random undesired states are located very close to the boundary since 97.35% of all the undesired states are located with HD 1 to the boundary and 100% are situated at having HD 3 at most (lower panel of Fig. 4c).
Each node in Fig. 4a is colored according to the relative frequency of its inclusion in all control target sets where a darker red color represents a higher probability of being a control target. TBET, Fas and FasT are highly enriched in the control target sets (Fig. 4a), where their activity levels are opposite to those in the 100,000 random undesired states (Fig. 4d). Fas and FasT are involved in the signaling pathway for Fas-induced apoptosis22, and they were also previously suggested as potential therapeutic targets from the analysis of the ODE model of T-LGL network23. We further found that TBET (T box expressed in T cells) can be a candidate for a therapeutic target.
Comparison of temporary vs. persistent interventions in controlling a biomolecular network
To compare the differential effects of temporary and persistent perturbations7,8,9,10,11, we employed the Boolean network model of mitogen-activated protein kinase (MAPK) network24 composed of 53 nodes (Fig. 5a and Supplementary Data 4). We fixed the values of EGFR to ON (dotted diamond in Fig. 5a) and all the input nodes to OFF (dotted rectangles in Fig. 5a) for the case of urinary bladder cancer with EGFR over-expression24. As a result, the state values of 20 nodes are also fixed, which are annotated as unperturbed nodes (dotted circles in Fig. 5a), and the remaining network consists of 33 nodes which are annotated as perturbed nodes (solid circles in Fig. 5a). We refer to this subnetwork as “MAPK33” (update rules in Supplementary Data 4).
10,000,000 randomly selected initial states converge to one of 12 attractors (Supplementary Data 4). Among those, one desired attractor is an attractor with (Apoptosis, Growth_Arrest, Proliferation) = (1, 1, 0), which is located in the 5th and 8th columns of Fig. 5b, and one undesired attractor is an attractor with (Apoptosis, Growth_Arrest, Proliferation) = (0, 0, 1). An undesired state is the undesired attractor with the values denoted by the color of each node (red and green denote values 0 and 1, respectively), which is located in the center of Fig. 5b. A temporary target set for BRC is (ERK, P53, P38, AP1, CREB, DUSP1, MEK1_2) = (0, 1, 1, 1, 0, 0, 0) (hexagons on Fig. 5b, left) and a persistent target set for persistent perturbation is (BCL2, ERK, FOXO3, P21, P53) = (0, 0, 1, 1, 1) (rectangles in Fig. 5b, right).
After one-time temporary perturbation of the temporary target set, the undesired state is driven to the boundary state (“1st state” on the left side of Fig. 5b), which converges to the desired attractor without any further perturbation. When applying BRC, there is no indirect perturbation of a node. On the other hand, if we persistently perturb the persistent target nodes, as usually assumed in most previous studies on complex network control, then the other nodes can also be indirectly perturbed and any state converges to the desired attractor through 8 state transitions in our Boolean simulation (right of Fig. 5b and Methods). In addition, the conventional control methods could not guarantee to achieve the control goal, convergence to the desired attractor, if the persistent perturbation is interrupted before an initial state converges to the desired attractor. From the simulation results with different interruptions during perturbation simulations (Supplementary Fig. 9a), we found that the success rate of converging to the desired attractor from random initial states exponentially decreases as the interruption occurs at an earlier state transition step. Hence, insufficient duration of persistent perturbation may fail to achieve the desired control goal. Intriguingly, in this example, none of the states in the undesired basin could successfully be controlled over such insufficient perturbation duration (Supplementary Fig. 9b).
A determining factor for the control target nodes and their perturbation values
Identifying control target nodes depends on both a desired basin and undesired states. A question then arises as to whether there is any particular dependence relationship between these two factors. To answer to this question, we analyzed all the nodal values in both undesired and desired basins and found that the difference between nodal values in the two basins may provide a clue. We discovered that a larger difference (x-axis in Fig. 6a) tends to result in a higher probability of the node to be a control target (y-axis in Fig. 6a). Moreover, the sign of the difference (x-axis in Fig. 6b) can be used to determine inhibition or activation of the control target (y-axis in Fig. 6b). Together, these results suggest that control targets and their mode (i.e. activation or inhibition) of control in BRC can be predicted from the information of undesired and desired states without computing the distance from an undesired state to a desired basin.
Discussion
Systems biological investigations primarily focused on unraveling the hidden mechanism of biological phenomena25,26,27,28,29,30,31,32,33,34,35,36,37,38 and they are recently being extended to controlling the dynamic behavior caused by complex regulatory networks. Previous studies of controlling complex networks mostly considered persistent perturbation of control target elements in the networks. Such persistent perturbation might, however, not be feasible in some cases or bring about undesired side effects even if it is feasible. To resolve this issue fundamentally, we proposed in this study a different concept of network control, BRC based on temporary perturbation. The basic idea of this control strategy is to drive any undesired state to a boundary state of the basin of attraction of a desired attractor using temporary perturbation, whereafter the network state converges to the desired attractor without any further intervention. To implement BRC, we need to find out the exact basin of attraction to a given desired attractor and the boundary of the basin. We have developed general algorithms for these purposes. In case where the size of basin is large enough, BRC can be implemented without identifying the exact basin as illustrated in the example of Fig. 4.
Of note BRC can also be used to the case of a desired cyclic attractor by temporarily perturbing the identified control target nodes to some fixed state values whereas previous network control strategies using persistent perturbation require periodically changing the state values of control target nodes8,10, which is very difficult or mostly impossible in many cases. For instance, oscillations emerge in various cellular functions39,40 such as cell cycle, DNA damage response with p53, and stress response with NF-kB, and they are all represented by cyclic attractors of the underlying molecular networks41,42. In those cases, periodically changing any target molecule is very hard and not feasible in practice. On the other hand, BRC requires only to temporarily perturb some target nodes to fixed state values such that the network state transits to the boundary of the basin of attraction to the desired cyclic attractor. There is another important feature of BRC. Owing to the nature of its transient perturbation, BRC preserves the original attractor landscape of a complex network whereas it is often distorted by persistent perturbation7. This means that the desired cyclic attractor might change or even disappear unexpectedly if persistent perturbation is applied to the network, but such cases would not happen if we employ BRC. In the case of p53 regulation, the cellular phenotype of an oscillatory p53 response can be conversely changed to that of a sustained p53 response43 and therefore preserving the original attractor landscape is critical to induce a desired phenotype.
We have provided examples of an ecological network44 and an insect social network45 to show the applicability of BRC to diverse complex networks. In the ecological network, the ecological community assembly consists of three plants species and two pollinators species, and a control target set was found to restore an ecologically desired steady state from an undesired state44 (Supplementary Fig. 10). The “control target nodes” found from BRC indicate key structural components (or “master regulators”) of information flow in the insect social network composed of paired dominant interactions in the social wasp R. marginata where physical interactions play an important role in information flow and a primitively eusocial wasp is dominating over the other in paired interactions45 (Supplementary Fig. 11). A dominant in a paired interaction usually becomes a subordinate in other paired interaction. Since the dominant network consists of a feedforward structure without inhibition of information flow, there exist dominant wasps which are not subordinates; and such wasps play roles as “master regulators” with respect to information flow. We showed that the set of master regulators are equal to the set of control target nodes found from BRC without constructing the hierarchical structure of the paired interactions (Supplementary Fig. 11).
The number of control targets is critical for application to real systems, and it depends on the size and structure of the basin of a desired attractor. This number becomes smaller for a larger basin (Fig. 2c). On the other hand, if the size of basin is relatively small compared to the size of a network, one may intuitively imagine that a larger number of control targets would be needed. However, it is not as shown in Fig. 3 where the average number of control targets is about 5 (note that the Hamming distance to the basin is 5) which is very small considering that the network consists of 49 nodes (so 249 states in total) and the relative size of the basin is extremely small (about 0.0384% of 249). Even if the relative size of basin is extremely small in this case, the number of basin states is sufficiently large (above 1011) enough to cover all 104 random undesired states within average HD of 5, which might in part explain the counter-intuitive result. To reduce the number of control targets, a union of basins of all desired attractors, instead of considering only one desired attractor, can be used for BRC (Supplementary Fig. 8c). In this study, we did not consider any preprocessing procedure to reduce the number of control targets before applying BRC, and therefore it remains as a further study.
Our deterministic control framework cannot reflect fluctuations in biological systems when identifying temporary control target sets. Even if an undesired state is driven to a boundary state converging to a desired attractor by using the temporary control targets, the boundary state could switch to an undesired state due to the fluctuation. If the fluctuation is considered a random process of flipping the state of each node, determining a control target set for a boundary state stable to the flipping might be a way to reflect the fluctuation (Supplementary Fig. 12). To reflect the fluctuation in the process of identifying control targets, a stochastic control framework should be considered46.
Our discrete control framework might be extended to non-discrete models including ordinary differential equation (ODE) models if the exact basin of a given attractor could be explicitly identified. We demonstrated the possibility by using an example of a homogeneous system of finite linear differential equations with constant coefficients in Supplementary text. In the case that a non-linear ODE model and a desired point attractor state are given, the non-linear ODE can be linearized at the desired state and the linearized ODE might provide desired basin states around the desired state. Such a linearization might be a starting point to find an approximate basin of the desired attractor.
So far, there has been no study considering minimal one-time temporary intervention for complex network control and no attempt to identify the exact basin of attraction to a desired attractor using the topological and algebraic structures of a network. Hence, the presented control strategy and algorithms for identifying the exact basin of attraction would be useful for any future studies of controlling complex networks with minimal interventions.
Methods
Classifications of nodes
We consider a Boolean network G(V0, E0, F0) with synchronous update rules for its state transition where V0, E0 and F0 are the sets of nodes, directed edges between nodes, and update rules for the nodes, respectively. Node x is called an “input to y” if there exists an outgoing link from x to y. The outdegree and indegree of x are the numbers of outgoing links from x and incoming links to x, respectively, which are denoted by outdeg(x) and indeg(x). x is also used to denote the state value of node x. If outdeg(x) = 0, then x is called an “independent” node. Let G(V1, E1, F1) denote the subnetwork obtained by removing all independent nodes from G(V0, E0, F0). If G(V1, E1, F1) has an independent node, then we remove all independent nodes from G(V1, E1, F1). We repeat this removal process until there is no more independent node in subnetwork G(Vη, Eη, Fη) for some positive integer η. Independent nodes in G(Vi, Ei, Fi) (0 ≤ i ≤ η − 1) are also called “symmetric” nodes since independent nodes generate a symmetric structure in the basin of each attractor: Let \({V}_{0}=\{{x}_{1},\cdots ,{x}_{{n}_{0}}\}\) and \(\{{x}_{j}^{sym}\in {V}_{0}|1\le j\le {n}_{sym}\}\) be the set of symmetric nodes in G(Vi, Ei, Fi)(0 ≤ i ≤ η − 1) for some positive integers n0 and nsym. If \(({x}_{1},\cdots ,{x}_{j}^{sym},\cdots ,{x}_{{n}_{0}})\) is a basin state of an attractor, then \(({x}_{1},\cdots ,1-{x}_{j}^{sym},\cdots ,{x}_{{n}_{0}})\) is also a basin state of the attractor since an independent node does not regulate any node, which is explained in “Sufficient conditions for terminal basin states and classifications of update rules” (see below). Both \(({x}_{1},\cdots ,{x}_{j}^{sym},\cdots ,{x}_{{n}_{0}})\) and \(({x}_{1},\cdots ,1-{x}_{j}^{sym},\cdots ,{x}_{{n}_{0}})\) are basin states, and so this is the reason why independent nodes are called symmetric nodes, which results in average value 0.5 of every symmetric node in the basin. Node x in G(Vη, Eη, Fη) is called “deterministic” if there exists a node of indegree 1 to which x is an input. Node x in G(Vη, Eη, Fη) is called “nondeterministic” if x is not deterministic. Let \({V}_{det}=\{{x}_{\ell }^{det}\in {V}_{\eta }|1\le \ell \le {n}_{det}\}\) and \({V}_{nondet}=\{{x}_{\theta }^{nondet}\in {V}_{\eta }-{V}_{det}|1\le \theta \le {n}_{nondet}\}\) be the sets of deterministic and nondeterministic nodes, respectively. Let \({V}_{nondet}^{inputdet}=\{{x}_{\tau ,inputdet}^{nondet}\in {V}_{nondet}|1\le \tau \le {n}_{nondet}^{inputdet}\}\) be the set of nondeterministic nodes which have at least one deterministic node as an input.
Sufficient conditions for terminal basin states and classifications of update rules
The basin states of an attractor are hierarchically identified by following the reverse of state transition trajectories, where the attractor is located at the 1st layer in the basin. Basin states calculated from a basin state at the δth layer are located at the (δ + 1)th layer. Let x(t + 1) and x(t) denote state values of node x at time steps t + 1 and t, respectively, which are located in the δth and (δ + 1)th layers (δ ≥ 1), respectively. For each deterministic node \({x}_{\ell }^{det}\), let \({x}_{{\ell }_{j}}^{det}(1\le j\le {n}_{det,\ell })\) be nodes of indegree 1 to which \({x}_{\ell }^{det}\) is an input. The update rule \({x}_{{\ell }_{1}}^{det}(t+1)={f}_{det,{\ell }_{1}}({x}_{\ell }^{det}(t))\) is called a “deterministic equation” since the equation determines the unique value of \({x}_{\ell }^{det}\)
given the value of \({x}_{{\ell }_{1}}^{det}(t+1)\), where the other update rules
are used as necessary conditions for given states at time step t + 1 to have basin states at time step t as follows:
Then the contrapositive of the conditional statements gives \({n}_{det,\ell }-1\) sufficient conditions for given states at time step t + 1 to be terminal basin states as follows:
A different type of sufficient conditions for terminal basin states can be constructed from the update rule for \({x}_{\tau ,inputdet}^{nondet}\), a nondeterministic node which has at least one deterministic node as an input,
where \({x}_{{\ell }^{\tau ,m}}^{det}\in {V}_{det}(1\le m\le i)\) and \({x}_{{\theta }^{\tau ,m}}^{nondet}\in {V}_{indet}(1\le m\le s)\). Let us consider basin states at time t + 1 which do not satisfy (Eq. 2). Then, the equality
becomes also sufficient conditions for given states at time step t + 1 to be terminal basin states, where “*” denotes either 0 or 1. Therefore, (Eq. 2) and (Eq. 3) are sufficient conditions for given states at time step t + 1 to be terminal basin states. The update rules are called “nondeterministic equations” except for “deterministic equation”.
Algorithm for identifying the exact basin of a desired attractor
Step 1. Determine a desired attractor. Let us consider one attractor of interest (e.g. a desired attractor) in the state space of a Boolean network G(V0, E0, F0). Let β = [S1, ⋯, Sc] be a desired attractor of length c(c ≥ 1), where Sq(1 ≤ q ≤ c) is a state in the state space; substitution of Sp into the update rule as an initial state results in the state Sp+1(1 ≤ p ≤ c − 1) at the next time step; substitution of Sc into the update rule as an initial state results in S1 at the next time step.
Step 2. Classify nodes in the network. Nodes are classified into three categories: “symmetric”, “deterministic” and “nondeterministic” nodes by following the definitions in the foregoing subsection (Classifications of nodes).
Step 3. Determine the subnetwork without symmetric nodes. Following the removing process of symmetric nodes in the foregoing subsection (Classifications of nodes), the desired subnetwork G(Vη, Eη, Fη) can be obtained.
Step 4. Identify the basin of the reduced desired attractor of the subnetwork without symmetric nodes. Let \(\tilde{\beta }=[{\tilde{S}}_{1},\cdots ,{\tilde{S}}_{c}]\) be the reduced attractor in the state space of G(Vη, Eη, Fη), where \({\tilde{S}}_{i}\) is obtained from Si (1 ≤ i ≤ c) by removing the values of nodes that are not contained in Vη.
Step 4-1. Classify Boolean update rules for nodes in G(Vη, Eη, Fη). The update rules for nodes in G(Vη, Eη, Fη) are classified into three categories: “deterministic equations”, “sufficient conditions for terminal basin states” and “nondeterministic equations” by following the definitions in the foregoing subsection (Sufficient conditions for terminal basin states and classifications of update rules).
Step 4-2. Construct the collection Ωternimal of all terminal basin states converging to \(\tilde{\beta }\). Using (Eq. 2) and (Eq. 3), we can identify the collection of all the terminal basin states.
Step 4-3. Identify all states converging to each \({\tilde{S}}_{q}(1\le q\le c)\), the set of which is called the “local basin of \({\tilde{S}}_{q}\)” and denoted by \(LB({\tilde{S}}_{q})\). Since local basins have no common state except for \({\tilde{S}}_{q}(1\le q\le c)\), we can find each \(LB({\tilde{S}}_{q})\) in hierarchical and parallel processing where the first layer consists of \({\tilde{S}}_{q}\).
Case 1.
If \({\tilde{S}}_{q}\) is contained in Ωternimal, then \(LB({\tilde{S}}_{q})=\{{\tilde{S}}_{q}\}\).
Otherwise, go to Case 2.
Case 2.
Let \({\tilde{S}}_{q}=({v}_{1}^{q},\cdots ,{v}_{n}^{q})\) with \({v}_{i}^{q}\in {V}_{det}\) and \({v}_{j}^{q}\in {V}_{nondet}\),
where n = ndet + nnondet, 1 ≤ i ≤ ndet and ndet + 1 ≤ j ≤ n,
where Vdet and Vnondet are defined in the foregoing subsection (Classifications of nodes). The second layer consists of solutions
of the system of Boolean equations
where \(({x}_{1}^{det},\cdots ,{x}_{{n}_{det}}^{det})=({v}_{1}^{det},\cdots ,{v}_{{n}_{det}}^{det})\) is determined by (Eq. 1) with \({x}_{{\ell }_{i}}^{det}(t+1)={v}_{i}^{q}(1\le i\le {n}_{det})\). Go to Case 3.
Case 3.
If there is a basin state in the second layer, then replace \({\tilde{S}}_{q}\) with each state in the second layer and repeat Cases 1 and 2, so that the third layer can be obtained. Repeat this process until all the given states are contained in Ωternimal. Then we can finally identify \(LB({\tilde{S}}_{q})(1\le q\le c)\).
Step 4-4. Identify the basin of \(\tilde{\beta }=[{\tilde{S}}_{1},\cdots ,{\tilde{S}}_{c}]\) in the subnetwork G(Vη, Eη, Fη). The union of local basins \(\mathop{\cup }\limits_{1\le q\le c}LB({\tilde{S}}_{q})\) is the basin of the reduced attractor \(\tilde{\beta }\).
Step 5. Identify the exact basin of β = [S1, L, Sc] in G(V0, E0, F0). Let \(\{{x}_{j}^{sym}\in {V}_{0}|1\le j\le {n}_{sym}\}\) be the set of symmetric nodes. Then each state of the exact basin can be represented as
where \({v}_{j}^{sym}\in \{0,1\}(1\le j\le {n}_{sym})\) and \(({v}_{1}^{det},\cdots ,{v}_{{n}_{det}}^{det},{v}_{1}^{nondet},\cdots ,{v}_{{n}_{nondet}}^{nondet})\in \mathop{\cup }\limits_{1\le q\le c}LB({\tilde{S}}_{q})\).
Identification of control targets for BRC
Let β = [S1, ⋯, Sc] be the attractor in the foregoing subsection (Algorithm for identifying the exact basin of a desired attractor). Let α be an undesired state converging to an undesired attractor. Let \(\mathop{\cup }\limits_{1\le q\le c}LB({\tilde{S}}_{q})\) be the basin of the reduced attractor \(\tilde{\beta }\) in the state space of G(Vη, Eη, Fη), which are defined in the foregoing subsections.
Step 1. Classify nodes in G(Vη, Eη, Fη) depending on state values in \(\mathop{\cup }\limits_{1\le q\le c}LB({\tilde{S}}_{q})\). Let \({V}_{sym}=\)\(\{{x}_{j}^{sym}\in {V}_{\eta }|1\le j\le {n}_{sym}\}\) and \({V}_{fixed}=\{{x}_{j}^{fixed}\in {V}_{\eta }-{V}_{sym}|1\le j\le {n}_{fixed}\}\) be the sets of symmetric nodes \({x}_{i}^{sym}\) and nodes \({x}_{j}^{fixed}\) of fixed values in \(\mathop{\cup }\limits_{1\le q\le c}LB({\tilde{S}}_{q})\), respectively, where the fixed values are denoted by \({x}_{j}^{fixed}={v}_{j}^{fixed}\in \{0,1\}\). Let the set of nodes of unfixed values in \(\mathop{\cup }\limits_{1\le q\le c}LB({\tilde{S}}_{q})\) be denoted by \({V}_{unfixed}=\{{x}_{j}^{unfixed}\in {V}_{\eta }-\)\({V}_{sym}-{V}_{fixed}|1\le j\le {n}_{unfixed}\}\). Here, “symmetric” means that if \(({x}_{1}^{sym},\cdots ,{x}_{{n}_{sym}}^{sym},{v}_{1}^{fixed},\cdots ,{v}_{{n}_{fixed}}^{fixed},{x}_{1}^{unfixed},\cdots ,\)\({x}_{{n}_{unfixed}}^{unfixed})\in \mathop{\cup }\limits_{1\le q\le c}LB({\tilde{S}}_{q})\), then
Step 2. Represent α depending on the classifications. Using the notations defined in Step 1, the undesired state α can be represented as
Step 3. Calculate the minimum Hamming distance (mHD) from α to \(\mathop{\cup }\limits_{1\le q\le c}LB({\tilde{S}}_{q})\).
Let \(HD(({\alpha }_{1}^{fixed},\cdots ,{\alpha }_{{n}_{fixed}}^{fixed}),({v}_{1}^{fixed},\cdots ,{v}_{{n}_{fixed}}^{fixed}))={\rho }_{fixed}\) be the Hamming distance between the two states \(({\alpha }_{1}^{fixed},\cdots ,{\alpha }_{{n}_{fixed}}^{fixed})\) and \(({v}_{1}^{fixed},\cdots ,{v}_{{n}_{fixed}}^{fixed})\) such that \({\alpha }_{{p}_{i}}^{fixed}=1-{v}_{{p}_{i}}^{fixed}\) for some pi ∈ {1, ⋯, nfixed}(1 ≤ i ≤ ρfixed). Let \(HD(({\alpha }_{1}^{unfixed},\cdots ,{\alpha }_{{n}_{unfixed}}^{unfixed}),({v}_{1}^{unfixed},\cdots ,{v}_{{n}_{unfixed}}^{unfixed}))={\rho }_{unfixed}\) be the minimum Hamming distance between two vectors of nodes of unfixed values in α and \(\mathop{\cup }\limits_{1\le q\le c}LB({\tilde{S}}_{q})\) such that
where I is an index set contained in {1, ⋯, nunfixed}. Therefore, mHD between α and \(\mathop{\cup }\limits_{1\le q\le c}LB({\tilde{S}}_{q})\) is ρfixed + ρunfixed.
Step 4. Identify control target sets driving α to the boundary of the exact basin. Let |I| denote the number of elements of I. Then there exist |I| control target sets
Boolean simulations to estimate the attractor landscape of a Boolean network
We performed all Boolean simulations using MATLAB. To find out attractor states of large-scale Boolean networks (CACC49, T-cell54, and MAPK33), we estimated the attractor landscape of each network using a Monte Carlo approach. Each of 10,000,000 randomly selected states was substituted in a deterministic Boolean update rule as an initial state and then the state of each node in a network was synchronously updated following the logical rule. Then we obtained attractor states to which the initial states converge and the approximated ratio of each basin of attraction.
Boolean simulations to compare temporary versus persistent interventions
One-time temporary perturbation of BRC (Fig. 5b, left) was implemented by flipping the state of a node in a BRC set to the value of the node in the BRC set and tracking the state trajectory from the perturbed state to the desired attractor state. On the other hand, persistent perturbation of conventional control methods (Fig. 5b, right) was implemented by persistently fixing the state of each node in a conventional control set to the value of the node (directly fixed values) in the control set. The nodes and their directly fixed values are placed in the “1st state” in the right of Fig. 5b. Substituting the directly fixed values of all the nodes into the Boolean update rules at time step t results in some other fixed node values (indirectly fixed values) at time step t + 1, where the nodes of fixed values are placed in the “2nd state”. This process was repeated up to the “8th state”, which is the desired attractor state.
Data Availability
All codes are available from the authors upon request.
References
McNally, R. J. The network takeover reaches psychopathology. Behav Brain Sci 42, e15, https://doi.org/10.1017/S0140525X18001073 (2019).
Barabasi, A. L. & Oltvai, Z. N. Network biology: understanding the cell’s functional organization. Nat Rev Genet 5, 101–113, https://doi.org/10.1038/nrg1272 (2004).
Barabasi, A. L., Gulbahce, N. & Loscalzo, J. Network medicine: a network-based approach to human disease. Nat Rev Genet 12, 56–68, https://doi.org/10.1038/nrg2918 (2011).
Palla, G., Derenyi, I., Farkas, I. & Vicsek, T. Uncovering the overlapping community structure of complex networks in nature and society. Nature 435, 814–818, https://doi.org/10.1038/nature03607 (2005).
Liu, Y. Y. & Barabasi, A. L. Control principles of complex systems. Rev Mod Phys 88, https://doi.org/10.1103/RevModPhys.88.035006 (2016).
Creixell, P., Schoof, E. M., Erler, J. T. & Linding, R. Navigating cancer network attractors for tumor-specific therapy. Nat Biotechnol 30, 842–848, https://doi.org/10.1038/nbt.2345 (2012).
Kim, J., Park, S. M. & Cho, K. H. Discovery of a kernel for controlling biomolecular regulatory networks. Sci Rep 3, 2223, https://doi.org/10.1038/srep02223 (2013).
Zanudo, J. G. T., Yang, G. & Albert, R. Structure-based control of complex networks with nonlinear dynamics. Proc Natl Acad Sci USA 114, 7234–7239, https://doi.org/10.1073/pnas.1617387114 (2017).
Choo, S. M., Ban, B., Joo, J. I. & Cho, K. H. The phenotype control kernel of a biomolecular regulatory network. BMC Syst Biol 12, 49, https://doi.org/10.1186/s12918-018-0576-8 (2018).
Fiedler, B., Mochizuki, A., Kurosawa, G. & Saito, D. Dynamics and Control at Feedback Vertex Sets. I: Informative and Determining Nodes in Regulatory Networks. J Dyn Differ Equ 25, 563–604, https://doi.org/10.1007/s10884-013-9312-7 (2013).
Zanudo, J. G. & Albert, R. Cell fate reprogramming by control of intracellular network dynamics. PLoS Comput Biol 11, e1004193, https://doi.org/10.1371/journal.pcbi.1004193 (2015).
Gottesman, M. M. Mechanisms of cancer drug resistance. Annu Rev Med 53, 615–627, https://doi.org/10.1146/annurev.med.53.082901.103929 (2002).
Berdahl, A., Shreim, A., Sood, V., Paczuski, M. & Davidsen, J. Random sampling versus exact enumeration of attractors in random Boolean networks. New J Phys 11, https://doi.org/10.1088/1367-2630/11/4/043024 (2009).
Lu, J. et al. Network modelling reveals the mechanism underlying colitis-associated colon cancer and identifies novel combinatorial anti-cancer targets. Sci Rep 5, 14739, https://doi.org/10.1038/srep14739 (2015).
Danielsen, S. A. et al. Portrait of the PI3K/AKT pathway in colorectal cancer. Biochim Biophys Acta 1855, 104–121, https://doi.org/10.1016/j.bbcan.2014.09.008 (2015).
Khan, M. W. et al. PI3K/AKT signaling is essential for communication between tissue-infiltrating mast cells, macrophages, and epithelial cells in colitis-induced cancer. Clin Cancer Res 19, 2342–2354, https://doi.org/10.1158/1078-0432.CCR-12-2623 (2013).
Wang, S., Liu, Z., Wang, L. & Zhang, X. NF-kappaB signaling pathway, inflammation and colorectal cancer. Cell Mol Immunol 6, 327–334, https://doi.org/10.1038/cmi.2009.43 (2009).
Bollrath, J. & Greten, F. R. IKK/NF-kappaB and STAT3 pathways: central signalling hubs in inflammation-mediated tumour promotion and metastasis. EMBO Rep 10, 1314–1319, https://doi.org/10.1038/embor.2009.243 (2009).
Popivanova, B. K. et al. Blocking TNF-alpha in mice reduces colorectal carcinogenesis associated with chronic colitis. J Clin Invest 118, 560–570, https://doi.org/10.1172/JCI32453 (2008).
Saadatpour, A. et al. Dynamical and structural analysis of a T cell survival network identifies novel candidate therapeutic targets for large granular lymphocyte leukemia. PLoS Comput Biol 7, e1002267, https://doi.org/10.1371/journal.pcbi.1002267 (2011).
Zhang, R. et al. Network model of survival signaling in large granular lymphocyte leukemia. Proc Natl Acad Sci USA 105, 16308–16313, https://doi.org/10.1073/pnas.0806447105 (2008).
Nagata, S. Apoptosis by death factor. Cell 88, 355–365 (1997).
Cornelius, S. P., Kath, W. L. & Motter, A. E. Realistic control of network dynamics. Nat Commun 4, 1942, https://doi.org/10.1038/ncomms2939 (2013).
Grieco, L. et al. Integrative modelling of the influence of MAPK network on cancer cell fate decision. PLoS Comput Biol 9, e1003286, https://doi.org/10.1371/journal.pcbi.1003286 (2013).
Kwon, Y. K. & Cho, K. H. Boolean dynamics of biological networks with multiple coupled feedback loops. Biophys J 92, 2975–2981, https://doi.org/10.1529/biophysj.106.097097 (2007).
Schmidt, H., Cho, K. H. & Jacobsen, E. W. Identification of small scale biochemical networks based on general type system perturbations. FEBS J 272, 2141–2151, https://doi.org/10.1111/j.1742-4658.2005.04605.x (2005).
Murray, P. J. et al. Modelling spatially regulated beta-catenin dynamics and invasion in intestinal crypts. Biophys J 99, 716–725, https://doi.org/10.1016/j.bpj.2010.05.016 (2010).
Eshaghi, M. et al. Genomic binding profiling of the fission yeast stress-activated MAPK Sty1 and the bZIP transcriptional activator Atf1 in response to H2O2. PLoS One 5, e11620, https://doi.org/10.1371/journal.pone.0011620 (2010).
Kim, J. R. & Cho, K. H. The multi-step phosphorelay mechanism of unorthodox two-component systems in E. coli realizes ultrasensitivity to stimuli while maintaining robustness to noises. Comput Biol Chem 30, 438–444, https://doi.org/10.1016/j.compbiolchem.2006.09.004 (2006).
Kim, J. R. et al. Reduction of complex signaling networks to a representative kernel. Sci Signal 4, ra35, https://doi.org/10.1126/scisignal.2001390 (2011).
Shin, S. Y. et al. Switching feedback mechanisms realize the dual role of MCIP in the regulation of calcineurin activity. Febs Letters 580, 5965–5973, https://doi.org/10.1016/j.febslet.2006.09.064 (2006).
Wolkenhauer, O., Ghosh, B. K. & Cho, K. H. Control and coordination in biochemical networks. Ieee Contr Syst Mag 24, 30–34, https://doi.org/10.1109/Mcs.2004.1316651 (2004).
Lee, H. S., Hwang, C. Y., Shin, S. Y., Kwon, K. S. & Cho, K. H. MLK3 is part of a feedback mechanism that regulates different cellular responses to reactive oxygen species. Sci Signal 7, ra52, https://doi.org/10.1126/scisignal.2005260 (2014).
Shin, S. Y. et al. The switching role of beta-adrenergic receptor signalling in cell survival or death decision of cardiomyocytes. Nat Commun 5, 5777, https://doi.org/10.1038/ncomms6777 (2014).
Kim, J. et al. Robustness and evolvability of the human signaling network. PLoS Comput Biol 10, e1003763, https://doi.org/10.1371/journal.pcbi.1003763 (2014).
Shin, D. et al. The hidden switches underlying RORalpha-mediated circuits that critically regulate uncontrolled cell proliferation. J Mol Cell Biol 6, 338–348, https://doi.org/10.1093/jmcb/mju023 (2014).
Sreenath, S. N., Cho, K. H. & Wellstead, P. Modelling the dynamics of signalling pathways. Essays Biochem 45, 1–28, https://doi.org/10.1042/BSE0450001 (2008).
Assmus, H. E., Herwig, R., Cho, K. H. & Wolkenhauer, O. Dynamics of biological systems: role of systems biology in medical research. Expert Rev Mol Diagn 6, 891–902, https://doi.org/10.1586/14737159.6.6.891 (2006).
Kang, J. H. & Cho, K. H. A novel interaction perturbation analysis reveals a comprehensive regulatory principle underlying various biochemical oscillators. BMC Syst Biol 11, 95, https://doi.org/10.1186/s12918-017-0472-7 (2017).
Novak, B. & Tyson, J. J. Design principles of biochemical oscillators. Nat Rev Mol Cell Biol 9, 981–991, https://doi.org/10.1038/nrm2530 (2008).
Choi, M., Shi, J., Jung, S. H., Chen, X. & Cho, K. H. Attractor landscape analysis reveals feedback loops in the p53 network that control the cellular response to DNA damage. Sci Signal 5, ra83, https://doi.org/10.1126/scisignal.2003363 (2012).
Cho, S. H., Park, S. M., Lee, H. S., Lee, H. Y. & Cho, K. H. Attractor landscape analysis of colorectal tumorigenesis and its reversion. BMC Syst Biol 10, 96, https://doi.org/10.1186/s12918-016-0341-9 (2016).
Purvis, J. E. et al. p53 dynamics control cell fate. Science 336, 1440–1444, https://doi.org/10.1126/science.1218351 (2012).
Campbell, C., Yang, S., Albert, R. & Shea, K. A network model for plant-pollinator community assembly. Proc Natl Acad Sci USA 108, 197–202, https://doi.org/10.1073/pnas.1008204108 (2011).
Nandi, A. K., Sumana, A. & Bhattacharya, K. Social insect colony as a biological regulatory system: modelling information flow in dominance networks. J R Soc Interface 11, https://doi.org/10.1098/rsif.2014.0951 (2014).
Li, C. Identifying the optimal anticancer targets from the landscape of a cancer-immunity interaction network. Phys Chem Chem Phys 19, 7642–7651, https://doi.org/10.1039/c6cp07767f (2017).
Acknowledgements
This work was supported by the National Research Foundation of Korea (NRF) grants funded by the Korea Government, the Ministry of Science, ICT & Future Planning (2017R1A2A1A17069642 and 2015M3A9A7067220).
Author information
Authors and Affiliations
Contributions
K.-H.C. designed the project and supervised the research; S.-M.C. developed the mathematical framework and algorithms; S.-M.C. and S.-M.P. performed the modeling and analysis; and S.-M.C., S.-M.P. and K.-H.C. wrote the manuscript.
Corresponding author
Ethics declarations
Competing Interests
The authors declare no competing interests.
Additional information
Publisher’s note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Choo, SM., Park, SM. & Cho, KH. Minimal intervening control of biomolecular networks leading to a desired cellular state. Sci Rep 9, 13124 (2019). https://doi.org/10.1038/s41598-019-49571-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-019-49571-6