Professional Documents
Culture Documents
Ebook Genomic Sequence Analysis For Exon Prediction Using Adaptive Signal Processing Algorithms 1St Edition MD Zia Ur Rahman Online PDF All Chapter
Ebook Genomic Sequence Analysis For Exon Prediction Using Adaptive Signal Processing Algorithms 1St Edition MD Zia Ur Rahman Online PDF All Chapter
https://ebookmeta.com/product/luminescence-signal-analysis-using-
python-vasilis-pagonis/
https://ebookmeta.com/product/multivariate-statistical-machine-
learning-methods-for-genomic-prediction-montesinos-lopez/
https://ebookmeta.com/product/digital-signal-processing-for-
wireless-communication-using-matlab-signals-and-communication-
technology-e-s-gopi/
https://ebookmeta.com/product/verified-signal-processing-
algorithms-in-matlab-and-c-first-2022-edition-arie-dickman/
Frontiers in Clinical Drug Research Hematology 1st
Edition Atta-Ur-Rahman
https://ebookmeta.com/product/frontiers-in-clinical-drug-
research-hematology-1st-edition-atta-ur-rahman/
https://ebookmeta.com/product/biomedical-sensing-and-analysis-
signal-processing-in-medicine-and-biology-iyad-obeid/
https://ebookmeta.com/product/sequence-analysis-and-modern-c-
hauswedell/
https://ebookmeta.com/product/frontiers-in-clinical-drug-
research-anti-infectives-1st-edition-atta-ur-rahman/
https://ebookmeta.com/product/frontiers-in-clinical-drug-
research-diabetes-and-obesity-1st-edition-atta-ur-rahman/
Genomic Sequence Analysis
for Exon Prediction
Using Adaptive Signal
Processing Algorithms
Taylor & Francis
Taylor & Francis Group
http://taylora ndfra ncis.com
Genomic Sequence Analysis
for Exon Prediction
Using Adaptive Signal
Processing Algorithms
The right of Zia Ur Rahman and Srinivasareddy Putluri to be identified as author of this work has been
asserted by him in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988.
Reasonable efforts have been made to publish reliable data and information, but the author and publisher
cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication and
apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright
material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or
contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400.
For works that are not available on CCC please contact mpkbookspermissions@tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Typeset in Times
by codeMantra
Contents
Authors ......................................................................................................................ix
ix
Taylor & Francis
Taylor & Francis Group
http://taylora ndfra ncis.com
1 Introduction
1.1 GENOMICS ENGINEERING
In the past few decades, engineering in genomics has become a vigorous area of
study that has attracted massive attention from the digital signal processing (DSP)
research community. Some of its primary goals are analysis of deoxyribonucleic
acid (DNA) sequences, protein structure modeling, locating exon segments in
gene sequences, and finding correlations between various gene expression profiles.
Genomic sequence analysis can be classified into two well-researched areas: DNA
sequence analysis and microarray analysis. Signal processing in genomics is a novel
field of research that combines DSP methods for a superior gene data analysis [1].
This book discourses a substantial challenging issue, namely, exon prediction in the
DNA sequences of Homo sapiens in the area of genome sequence analysis. With the
recent completion of numerous very large-scale genomic sequencing projects (e.g.
human, Caenorhabditis elegans) and the need for a future scope of learning about
different novel gene sequences, this issue is considered on major real significance.
This issue arises primarily as the nature of genes in a genome is not continuous.
Eukaryotic genes are further categorized into coding regions termed as exons and
also other sections named as introns. Moreover, both these sections comprise the
major part of a genome. The exon sections occupy only 3% of the human DNA.
The narrow accuracy of the various available data-driven software programs for
gene prediction such as AUGUSTUS [2], FGENESH [3], GeneID [4], GeneMark.
hmm [5], Genie [6], GENSCAN [7], HMM-gene [8], MORGAN [9], and MZEF [10]
is an indication for improvement in the accuracy of gene prediction. The effective-
ness of different gene finding programs is presented in Ref. [11]; also the use of
Bayesian gene prediction, as illustrated in Ref. [12], has been put forward to use
non-traditional methods, and thus this area is worth to investigate further. This can
be dealt thru inspecting the roles of specific DSP procedures and developing differ-
ent novel adaptive techniques towards improving the effectiveness of algorithms for
exon identification. DSP-based techniques remain prominent as genomic data do not
need any training, unlike prevailing data-driven methods.
1
2 Genomic Sequence Analysis for Exon Prediction
Converting these alphabetic bases to distinct numeric sequences aids new benefi-
cial applications of DSP to solve diverse issues connected to DNA like gene identifi-
cation. DSP elucidates this task with an improved accuracy and also less complexity
[13]. This work is highly cross-disciplinary in nature while basic subject matter is
biological and final results obtained are of biological interest, techniques from other
fields like DSP are greatly used.
The precise prediction of exon/intron sections, splice sites of acceptor/donor, addi-
tional segments, and also genetic signals of DNA with genic and intergenic sections
is depicted in Figure 1.1. These positions relevant to 5′ and 3′ end points were accus-
tomed in linking exon segments present on two sides of introns termed as splicing.
A novel ailment-free computation method is presented in Ref. [14] for calculating
the distance between a pair of sequences. In this work, the roles of DSP techniques
in locating exon segments of genomic sequences are examined, and novel adaptive
exon predictor (AEP)-based methods are developed for this purpose. Prevalent DSP
techniques for exon prediction remain less accurate due to their lone dependency on
period-3 identification, and they are also not good in terms of exon locating ability,
computational complexities, and convergence behavior.
In this book, several methods of DNA symbolic-to-numeric representation for
extraction of exon segments are reviewed and a Voss binary representation for con-
version of alphabetic DNA to binary notation is also presented. The existing least
mean squares (LMS) and new AEP-based techniques are then evaluated using real
gene datasets taken from NCBI gene databank using various performance met-
rics computed at nucleotide level. We believe that the proposed novel DSP-based
adaptive techniques are effective in gene identification, and also their ensuing
AEPs offer improved gene prediction accuracy, better convergence performance,
and considerably lower computational complexity than that offered by the existing
LMS methods.
Introduction 3
1.4 OBJECTIVES
To study and also develop several capable AEPs using DSP techniques to accurately
locate exon segments in the genomic sequences of Homo sapiens taken from the
NCBI gene databank is the main objective of this book.
This wide objective includes all the below goals:
TABLE 1.1
Genome Sizes of Certain Species
Species Number of Chromosomes (diploid) Genome Size (base pairs)
Bacteriophage (virus) 1 5 × 104
Escherichia coli (bacterium) 1 5 × 106
Saccharomyces cerevisiae (yeast) 32 1 × 107
Caenorhabditis elegans (worm) 12 1 × 108
Drosophila melanogaster (fruit fly) 8 2 × 108
Homo sapiens (human) 46 3 × 109
parts of exon segments and genes within the DNA of eukaryotes. Before synthesis
of proteins, conversion to messenger RNA (mRNA) occurs within DNA sequence.
The codon ‘AUG’ that codes to form methionine and signals the start of a gene is
part of this many-to-one mapping [20]. Based on genetic codes, the flow of informa-
tion outlines relations between the base sequences in the transcript of DNA or its
mRNA and amino acids of protein. An amino acid is specified by a sequence of three
bases, termed as codon. The block diagram shown in Figure 1.3 explains that the flow
of information within DNA results in proteins. In the process of DNA replication or
synthesis of proteins, a single exact duplicate copy of a genome is created, prior to
the cell division. Each of the two resulting identical double strands is comprised of
one newly synthesized strand and one original strand [21]. A cell mechanism (i.e.
promoter) recognizes the start point of genes.
Every type of amino acid is specified by triplets formed by mRNA nucleotides,
which are termed as codons. Genetic code is known to be mapping of 64 probable
codons to 20 amino acids as well as three terminator signals.
DNA then converts into RNA in the process known as transcription. The genetic
transcription is more complex in eukaryotes. Only exons in DNA code for proteins
and introns are removed during splicing. Due to these regions in eukaryotes, different
names are given to entire gene found in chromosome and spliced sequence. The earlier
one is termed as genomic DNA, while the latter one as complementary DNA (cDNA).
With the use of an mRNA template, molecules of DNA are produced during
reverse transcription process. Finally a translation process translates the mRNA
codons into proteins, a chain of amino acids. The central dogma of molecular biol-
ogy defines the whole method of translation of DNA into proteins, as depicted in
Figure 1.4. Typically, moving from DNA to protein in eukaryotes is the so-called
central dogma of molecular biology. Transcription remains the first part, where
genetic information from DNA is transferred into RNA. Splicing of mRNA is done
by eliminating introns and combining exon segments into one unit, which could be
transformed into proteins using genetic codes.
1.6 GENE PREDICTION
Recognizing exon segments in computational biology area using algorithms is known
as gene prediction. Identification of other DNA functional components such as RNA
genes and regulatory networks may also be included.
x A [n] = {1,0,0,0,0,0,1,0,0,0,1,0,0} ,
x C [n] = {0,0,0,0,1,0,0,1,1,0,0,0,1} ,
x G [n] = {0,1,0,0,0,0,0,0,0,1,0,1,0} ,
x T [n] = {0,0,1,1,0,1,0,0,0,0,0,0,0} ,
where x A [n] + x C [n] + xG [n] + x T [n] = 1,∀n and n is the index for the base.
A symbolic sequence s[n] comprising M different symbols S1 ,…, S M , to which
numerical values a1 ,…, aM are assigned, can also be represented as follows:
ln = ∑ x [i],
i=0
l l ∈{ A,C,G,T} (1.2)
Introduction 11
x n = 2 [ A n − A n −1 + Gn − G n −1 ] − 1,
yn = 2 [ A n − A n −1 + Cn − Cn −1 ] − 1, (1.3)
zn = 2 [ A n − A n −1 + Tn − Tn −1 ] − 1
The Z-curve sequences can also be calculated using the four binary indicators of the
Voss representation as follows:
x A [n]
xn 1
0 1 0 x C [n] 1
yn = 2x 1 1 0 0 x − 1 (1.4)
zn 1 0 0 1 x G [n] 1
x T [n ]
The gene sequence is shown by Z-curve sequences as three signals with values 1 or
−1, each of which has a biological interpretation. The relation (1.3) can be used to
show that xn equals 1 for nth nucleotide base G (purine) or A, or −1 for nth nucleotide T
(pyrimidine) or C also yn equals 1 for nth nucleotide base C (amino-type) or A, or −1 for
nth nucleotide base T (keto-type) or G; also zn equals 1 for nth nucleotide base T (weak
hydrogen bond) or A, or −1 for nth nucleotide base G (strong hydrogen bond) or C.
In addition, the Z-curve technique reduces calculation costs in subsequent processing
phases by removing one redundant sequence from the Voss range of four binary indica-
tor sequences. The DNA spectrum based on the Z-curve has been shown to be the same
as the one founded by the Voss.
1.9.3 tetrahedron
The tetrahedron notation too decreases the amount of sequences from 4 to 3, in a
way that is symmetrically consistent with entire four components [44]. In this way,
the four nucleotides define a path to one corner of the tetrahedron in the representa-
tion. A 3D vector may represent each nucleotide (e.g. having r, g, and b coefficients)
as follows:
A=k
2 2 6 1
C=− i+ j− k
3 3 3
2 2 6 1 (1.5)
G=− i− j− k
3 3 3
2 2 1
T=− i− k
3 3
12 Genomic Sequence Analysis for Exon Prediction
whereas xA[n], xC[n], xG[n], and x T[n] remain four numeric binary sequences, and
(ar, ag, ab), (cr, cg, cb), (gr, gg, gb), and (tr, tg, tb) are four 3D vector coefficients. Therefore,
the final tetrahedral gene sequences were determined using expressions given by
2
x r [n] = ( − xC [n] − xG [n] + 2 − xT [n])
3
6
x g [ n] = ( xC [n] − xG [n]) (1.7)
3
1
x b [ n] = ( 3 x A [n] − xC [n] − 2 xG [n] − xT [n])
3
The representations of Voss and Tetrahedron were shown to be equal for calcula-
tion of the power spectrum. Therefore, given the equivalence of Z-curve and Voss
notation, logically, the spectra of Z-curve and tetrahedron representations are also
identical.
1.9.4 comPlex
A symbolic representation of DNA sequence using a complex notation is illustrated
in Ref. [45]. The complex representation presented is dependent on the notion that
four 3D vector coefficients in (1.5) are either +1 or −1 and written as follows:
A=i+ j+k
C=− i+ j−k
(1.8)
G = −i − j − k
T=i+ j−k
A = 1+ j
C = −1 + j
(1.9)
G = −1 − j
T = 1− j
Introduction 13
1.9.5 QUaternion
Quaternions have been known as hyper complex numbers, due to the fact that a
quaternion can be represented as q = q1 + iq2 + jq3 + kq4, where i, j, and k are three
complex elements (each just like the element i or j in complex numbers). The first
element of quaternion, q1, is referred to as a scalar, and the last three elements q2,
q3, and q4 are referred to as the vector parts of the quaternion. A quaternion with all
four elements is known as a complex quaternion, whereas a quaternion with last three
elements is recognized as a pure quaternion [46,47]. The fundamental formula for
quaternion multiplication is
i 2 = j2 = k2 = i j k = −1 (1.10)
A = i + j + k,C = i − j − k
(1.12)
G = −i − j + k , T = −i + j – k
W=
( 0.252 (
X Z * X sin 1.04 X π X Z * )) (1.13)
(2 X π)
where Z* in (3.13) is a quasi-valence number defined as
m
Z* = ∑ n Nz
i =1
i i
(1.14)
where Zi is the valence atomic number of ith component, ni is the amount of atoms
of ith atomic component, m is the amount of components of atom in molecule, and N
is the total atoms. This notation has a distinct magnitude for individual base and is
unevenly distinguished from each representation.
From any given ind[n], it is not possible to reproduce the original sequence. However,
the decompositions of the ind sequence into two sequences (i.e. paired ind and pair-
ing A-T/C-G) and four sequences do conserve the biological information of the origi-
nal sequence, although at the expense of extra processing.
W
MLE = arg max log p P , P (1.16)
p= B M
where B = {1,…, N0} is the search space for parameter P (N0 < N), W = [w1,…, wN] is
the sequence of vectors to represent D, and M is the stochastic matrix whose columns
represent the probability mass functions of data sources; entry Mji denotes the prob-
ability that ith source generates jth symbol for alphabet S ∈ {A, C, G, T}.
Thus, three versions of simplified sign algorithms are combined with all LMS-based
algorithms, which results in sign-based versions of that particular algorithm. Versions
of LMS such as Sign Regressor LMS (SRLMS), Sign LMS (SLMS), and Sign-Sign
LMS (SSLMS) were derived.
Therefore, we have considered five adaptive algorithms here including LMS algo-
rithm, and their sign-based versions result in twenty algorithms for the development of
AEPs. This chapter also covers evaluation of the performance of various AEPs using
measures like computational complexities, convergence plots, calculation of metrics
like sensitivity (Sn), specificity (Sp), and precision (Pr) along with exon prediction
results using power spectral density (PSD) and comparing with the existing LMS
algorithm. Then, the results and discussion of various sign-based LMS variants are
presented in this chapter, which covers various gene datasets from the NCBI database
used for gene sequence analysis, and exon prediction results followed by conclusions.
Chapter 4 extends the approach of LMS algorithm and its sign-based realizations
with normalization factor for DNA analysis. Generally normalization is employed
with LMS-type filters to improve convergence speed. Here, we consider both data
and error normalizations. The variant of LMS with normalization of data remains
regarded as Normalized LMS (NLMS) technique. In this, the correlation between
input reference and error output remains normalized thru square of norm of input
reference signal vector. The main benefit with this algorithm is that the size of
step can be chosen regardless of signal power handling and quantity of filter coef-
ficients. Extension of NLMS by combining sign algorithms results in Normalized
Sign Regressor LMS (NSRLMS), Normalized Sign LMS (NSLMS), and Normalized
Sign-Sign LMS (NSSLMS) algorithms. The steady-state error does not rely on the
reference input signal power because of the existence of a normalizing factor. Instead
of data normalization done in NLMS, error can also be used for normalization. An
alternate name for error NLMS technique is Error Nonlinear LMS (ENLMS). Thus,
the resultant sign-based realizations considered are ENSRLMS, ENSLMS, and
ENSSLMS algorithms.
Similarly, the same strategy is applied to Normalized LMF (NLMF) and Variable
Step Size NLMS (VNLMS) techniques. Therefore, we have discussed about various
sign versions of NLMS, ENLMS, VNLMS, and NLMF algorithms for the develop-
ment of AEPs for DNA analysis in this chapter. The resulting signed algorithms
of VNLMS and NLMF include VNSRLMS, VNSLMS, VNSSLMS, NSRLMF,
NSLMF, and NSSLMF algorithms. Normally in practical situations, when input gene
sequence is large, adaptive filter length has to be increased for less computational dif-
ficulty. Hence, block processing of input data is used as it considerably decreases the
adaptive filter’s computing load.
In block processing, the data are handled block by block instead of sample by
sample. The maximum normalized version of NLMS is known as Maximum NLMS
(MNLMS) algorithm. Several maximum variants of all normalized and error nor-
malized techniques based on signum function are also presented in this chapter for
the development of AEPs. Thus, the resulting signed variants for maximum normal-
ized variants of NLMS include MNLMS, MNSRLMS, MNSLMS, and MNSSLMS
algorithms are discussed. Similarly, we have developed various AEPs using signed
variants and other maximum normalized algorithms including Maximum ENLMS
Introduction 17
The authors Daniel Kotlar et al. (2003) in Ref. [57] have presented a new measure
by name Spectral Rotation Measure to identify the DNA sequence protein-coding
areas. This measure is based on a 1/3 frequency phase of the DFT, calculated with
the four binary sequences A, C, T, and G. A number of metrics depending on the
phase property are proposed. The measurements are calculated by rotation of the
vectors in clockwise direction, achieved thru DFT on every frame of evaluation, at
an angle similar to the respective core value. All vectors of the complex plane in
protein-coding areas are presumed to be aligned closely, amplifying the vector sum
magnitude. Magnitude does not considerably alter here in non-coding areas. The
phase property is also used to find the reading frame of the sequence. Digital filtering
and DFT relevant methods used to identify coding areas do not substantially sup-
press the DNA spectrum of non-coding regions at 2π/3. Non-coding segments may
therefore be recognized as exon segments inadvertently. The authors Trevor W. Fox
et al. (2004) described in Ref. [58] a novel method that eliminates almost all non-
coding areas and enhances the probability of properly recognizing coding regions in
such genes.
The authors David DeCaprio et al. (2007) in Ref. [59] have presented Conrad,
the first semi-Markov conditional random field (SMCRF) comparison gene predic-
tor. Conrad, as opposed to the best independent genetic predictors, is trained on the
basis of generalized hidden Markov models (GHMMs) and is trained by the highest
probability, in order to maximize annotation precision. In addition, Conrad encrypts
all information sources as a feature and handles all features of learning and infer-
ence procedures equally as opposed to the finest annotation pipelines which rely on
heuristic and arbitrary decision rules to mix standalone genome predictors with addi-
tional information such as Expressed Sequence Tag (EST) and protein homology.
In addition, Conrad encrypts all information sources as a feature and handles all
features of learning and inference procedures equally as opposed to the finest anno-
tation pipelines which rely on heuristic and arbitrary decision rules to mix standalone
genome predictors with additional information such as ESTs and protein homology.
Because of its extremely modular nature, SMCRFs are a likely framework for gene
prediction, which simplifies the design method and tests of potential indicators of
genetic composition. Conrad’s SMCRFs advance the state-of-the-art gene identifica-
tion in plants and provide a strong base for the current and new studies. The writer
Jeremy M. Berg in 2008 also illustrated that they had succeeded in producing an
extensive assessment of the comparative positions of more than 2000 genes on four
chromosomes of fruit fly, Drosophila melanogaster, by 1922.
Digital filters were used to predict genes and proteins, but when the characteristic
frequency or periodic behavior is altered, the filters need to be redesigned. Later
the author Baoshan Ma in 2010 presented a novel approach based on adaptive filter-
ing theory using LMS adaptive algorithm which can identify genes or proteins in a
genomic sequence. The authors Hamidreza Saberkari et al. (2013) presented a novel
rapid algorithm in Ref. [60] to explore the place of exons in DNA strand based on the
mixture of the Goertzel method and Linear Predictive Coding Model (LPCM). The
authors Inbamalar T. M. et al. (2013) in Ref. [61] presented new methods to analyze
the DNA sequences. This algorithm increases the speed of the process and reduces
computational complexity.
22 Genomic Sequence Analysis for Exon Prediction
It is a quite distinct issue in eukaryotic organisms which was found within pro-
karyotes. Transcription of exon segments launched in particular promoter sequences
is accompanied by elimination of non-coding sequences from pre-mRNA thru
a splicing mechanism, thus resulting in exon regions. The subsequent functional
mRNA can be converted from the first starting codon to the first stop codon, once
introns are withdrawn and some other changes are rendered to mature RNA, usually
in the 5’ to 3’ direction. The encoding of the ORF gene will disrupt the presence of
introns that generate stop codons due to intron regions within the eukaryotic gene
sequences. This study concentrates on the more complex problem in eukaryotic mod-
els of gene identification.
on period-3 identification. Furthermore, these techniques are not ready for captur-
ing supplementary characteristics relevant to genomic regions, and they also address
background noise within nucleotide exon identification levels. Most of the existing
period-3 detection methods use sliding window attributes to analyze DNA sequences
with window length N and the amount of shift between two consecutive windows as
one nucleotide to preserve a decent base domain resolution.
The author D. Anastassiou has presented DFT-based methods in which the 351 win-
dow size argument was used for making the information window reasonably long or
for a few hundred base pairs length. The rectangular window has been widely used in
detection of period-3 based on DFT methods. The authors Suprakash Datta et al. (2005)
in Ref. [68] have presented an enhanced period-3 detection based on DFT with use of
information window of Bartlett as compared to that of rectangular window. In AR mod-
eling, the calculation of its model needs comparatively some sample values, which is
useful when the exon areas are brief and/or close to each other. To minimize the spectral
leakage in locating exon areas based on DFT, a wider window size is required, meaning
longer computational times as well as base domain resolution is compromised.
Digital filters for period-3 detection somehow address this issue and offer a compara-
ble precision of locating exon sections with use of DFT. With use of exon-level identifica-
tion, a feature value higher than a choice limit within exon for every nucleotide remains
adequate to detect that specific exon. By considering the characteristic nucleotide val-
ues within the exon, a particular method of detection can give more insight into the
robustness. For all existing gene and exon prediction methods, using a sum-of-squares
method, characteristics are typically combined to create a one-dimensional function to
compare some predetermined boundary. As the technique of sum-of-squares reduces
the dimensionality of the features and does not necessarily result in optimal fusion of
features, multi-dimensional gene extraction, and exon prediction features.
The resulting characteristics are then passed on to classification between protein-
coding and non-coding areas for back-end processing. For one-dimensional classi-
fication, a decision threshold derived empirically can be applied, whereas the use of
well-known tools for pattern detection such as Gaussian (GMM) or matrix support
devices (SVMs) for multi-dimensional evaluation can be achieved. The DSP-based
work can be combined with statistical data-driven methods for a more accurate rec-
ognition of biological signals at end points. After converting DNA symbols into the
numerical sequences using DNA binary representation, some of the existing meth-
ods dependent on DSP meant for periodicity identification remain useful for these
sequences to acquire one- or multi-dimensional gene, and characteristics of exon
prediction are discussed in the following sections.
N −1
X [k ] = ∑ x[n]e
n= 0
− j 2 πnk / N
, 0 ≤ k ≤ N −1 (2.1)
Literature Review 25
S[ k ] = ∑ X [k]
m
m
2
, m { A,C,G,T} (2.2)
26 Genomic Sequence Analysis for Exon Prediction
Based on the SC measurement, the GENSCAN program calculates the peak SNR
at k = N/3 with P = S [ N /3] S’ where S’ is the average of the complete Fourier
spectrum (over k) in (2.2). It is presumed that the areas with P ≥ 4 are protein-
coding regions.
FIGURE 2.2 Output vectors of spectral rotation used by the GENSCAN test set for (a) coding
and (b) non-coding regions [71].
Literature Review 27
The subsequent vectors of coding segments can be seen to be relatively large and
‘point’ mainly in one of the three feasible paths, whereas vectors of intron regions
are tiny in magnitude and pointing in random directions. The SR measure also splits
each term in order to give more weight to smaller distributions by the respective
phase angle deviations σ m .
The feature
2
e − jµm
SR[ k ] = ∑
m
σm
, m ∈ A, C,G,T (2.4)
for exon detection function has been used. The SR measure showed a better effi-
ciency than the SC (2.2) and optimized SC (2.3) measurements at a false-positive
gene detection level of 10%. Apart from the DFT-based SC, optimized SC and SR
measures, the other less popular DFT-based algorithms are combined GeneScan and
length shuffle. The authors Datta and Asif in Ref. [72] also showed a promising gene-
level identification using a fast DFT-based algorithm.
FPS[ k ] = ∏ X [k ] , m ∈{A,C,G, T}
m
m (2.5)
constructed from the second order. The transfer function of such a real coefficient
filter with poles at Re±j is given by
A( z ) =
(R 2
− 2 R cosθ z −1 + z −2 ) (2.6)
(
1 − 2 R cosθ z −1 + R 2 z −2 )
where R is the two pole radii in the z-plane, and R2 < 1 for stability. It was shown that
expression (2.6) can be used to design a filter having the AN (i.e. complement of a
notch) property, if tuned at θ = 2π /3.
The following expression is presented to define the AN filter as follows:
H (z) =
(1 − A(z) ) (2.7)
2
The frequency response of the AN filter defined in (2.7) can be sharp arbitrarily
by selecting R near to unity. However, an R value that remains too closer to unity
will make effects relevant to round off noise noticeable and the important portion
of the filter’s impulse response is also going to be very long and compromise the
base domain resolution of exon identification. Leave output of the AN filter with an
indicator sequence xm[n] to be input, let AN filter output in (2.7) be denoted by ym[n],
where m ∈ {A, G, C, T}.
The respective inputs of the four binary sequences can be combined to create a
digital filter-based metric for gene and exon prediction is expressed as
Y[n] = ∑ y [n]
m
m
2
(2.8)
Digital period-3-based filter detection findings have been shown to be similar to the
DFT-based SC measure provided by (2.2). A multistage narrowband band pass filter
has also been used to improve the prediction accuracy of IIR AN filter. This mul-
tistage design cascades H1(z3), a multiband version of the low-pass prototype filter
H1(z), with another H2(z) filter, filter that significantly dampens the zero-frequency
pass band with the expression given by
( )
H ( z ) = H1 z 3 . H 2 ( z ) (2.9)
whereas H1(z) is implemented using an all pass filter of the first order A0 (z) and
the second order all pass filter A1(z), both with real coefficients, and H2(z) remains
selected to have two zeros at z = 0, i.e. given by
A0 ( z ) + A1 ( z )
H1 ( z ) = (2.10)
2
Literature Review 29
( )
2
H 2 ( z ) = 1 − z −1 (2.11)
The resultant narrow band filter H(z) in (2.9) is shown to predict exons with good
accuracy, when one of the pass bands of H1(z3) is centered at 2π/3.
1
H (z) = (2.12)
∑
p
1+ al z −1
i =1
where al are the coefficients of the order p model. The following expression of the
power spectrum estimation provided in equation for the AR model in (2.11) may be
used to detect exon areas specified as
σ2
pˆ ( k ) = 2 (2.13)
2πkl
∑
p − j
N
1+ al e
l =1
where σ 2 is the input variance and k represents the power spectrum points. AR tech-
nique has a special benefit that calculation of the AR model requires relatively few
base pairs, and remains convenient for closer and shorter length exon areas. Also,
resolution of detection using AR method remains higher than that of Fourier methods
for small DNA sequences [75].
Spurious spectral peaks of high-order AR models limit the efficacy of spectrum-
based detection. N. Chakravarthy et al. (2004) in Ref. [76] presented the use of AR
modeling for residual error and feature-based analyses of DNA sequences. Note that
AR models could not be implemented fairly to numeric notation since they could not
be the outcome of an AR method. Before their implementation to AR modeling, the
band pass filtering of binary sequences is a possible solution to the problem.
Adaptation occurs through the modification of the parameters of the filter based
on information of the incoming signal so that a given performance index is opti-
mized. Therefore, there is almost no previous knowledge of signal as well as noise
characteristics. Since no or almost no prior information is available, an adaptive filter
needs adaptation or an initial learning period. During this period, its performance is
unsatisfactory. The filter should act optimally when tracking non-stationary signals
after initial adaptation. In our current work, AEP developed with use of existing
LMS adaptive method is also considered in comparison with all the developed AEPs
in terms of different performance measures for DNA analysis.
2.6 CONCLUSIONS
In this chapter, the significant developments for exon prediction in the field of bioin-
formatics from its origin are reviewed covering the biological background of genomic
sequence analysis followed by gene and early development of genetics. Then, the
origin of three-base periodicities in genomic sequences is also discussed. Several
types of gene prediction approaches, DSP-based techniques used for DNA analysis
that include DFT, spectral content measure, optimized SC measure, spectral rotation
measure, FPS method, digital filters, and autoregressive models from the literature
are discussed. Different DSP-based methods and the existing LMS adaptive algo-
rithm presented are less efficient in terms of accurate exon prediction. Finally, an
account of existing adaptive techniques for genomic analysis followed by motivation
of our research work is discussed.
3 Sign LMS Based
Realization of Adaptive
Filtering Techniques
for Exon Prediction
3.1 INTRODUCTION
In the field of bioinformatics, precise identification of a gene in a genomic sequence
is crucial and demanding. The first and most significant step is to know the molecu-
lar aspects of DNA followed by gene sequencing of a species. Adaptive algorithms
can handle very lengthy sequence strands in various iterations in the encoding
of the genomic sequence and can alter weight values according to its statistical
nature. A basic adaptive method is the least mean square (LMS) algorithm which
is also used for exon prediction [77]. This algorithm is commonly used due to its
ease of application. The adaptive filter is able to alter its coefficients of weight
based on the incoming data. Adaptation occurs through the modification of the
parameters of the filter based on the information of the incoming signal so that a
given performance index is optimized. They therefore involve little or no previous
understanding of the features of the signal or noise. Since no or almost no prior
information is available, the initial learning period or adaptation requires an adap-
tive filter. During this period, its performance is unsatisfactory. The filter should
operate optimally during the tracking of non-stationary input modifications after
initial adjustment.
Adaptive LMS-based algorithms make use of the factor that error is a filter weight
vector function. Therefore, to identify the state of adaptive process, a single value for
objective function occurs for each tap weight vector. The idea remains to iteratively
update the tap weights in a way that every new instance exists within the direction of
gradient. In this chapter, we develop sign LMS-based adaptive methods, in which the
weight update equation is varied with respect to that of LMS. The fundamentals of
these methods are presented in Ref. [78]. In addition to the exon prediction accuracy,
computational difficulty, convergence efficiency, and prediction accuracy, the ulti-
mate aim is to provide a comprehensive overview of multiple AEPs produced using
LMS-based adaptive realizations.
Specificity (Sp), sensitivity (Sn), and precision (Pr) are the measures for perfor-
mance of exon prediction considered in the present work. Here, we took into account
four methods obtained from the LMS method, namely, least mean fourth (LMF),
variable step size LMS (VSLMS), least mean logarithmic squares (LMLS), and least
31
32 Genomic Sequence Analysis for Exon Prediction
{
J = E e( n )
2
} (3.1)
TABLE 3.1
Summary of Algorithms Used in Chapter 3
S. No. Acronym Name Advantage
1 LMS Least mean squares Weight drift problem can be avoided and
stability increases
2 SRLMS Sign regressor least mean Single multiplication required and data is
squares clipped
3 SLMS Sign least mean squares Error is clipped
4 SSLMS Sign regressor least mean Zero multiplications; both data and error are
squares clipped
5 LMF Least mean fourth Lower steady-state error than LMS
6 SRLMF Sign regressor least mean Single multiplication required; data is
fourth clipped; lower steady-state error than LMS
7 SLMF Sign least mean fourth Error is clipped; lower steady-state error
than LMS
8 SSLMF Sign-sign least mean fourth Zero multiplications; both data and error are
clipped; lower steady-state error than LMS
9 VSLMS Variable step size least Lower steady-state error than LMS
mean squares
10 SRVSLMS Sign regressor variable step Single multiplication required; data is
size least mean squares clipped; lower steady-state error than LMS
11 SVSLMS Sign variable step size least Zero multiplications; both data and error are
mean squares clipped; lower steady-state error than LMS
12 SSVSLMS Sign-sign variable step size Zero multiplications; both data and error are
least mean squares clipped; convergence performance; lower
steady-state error than LMS
13 LMLS Least mean logarithmic Weight drift problem can be avoided and
squares stability increases
14 SRLMLS Sign regressor least mean Single multiplication required; data is
logarithmic squares clipped; weight drift problem can be
avoided; stability increases
15 SLMLS Sign least mean logarithmic Error is clipped; weight drift problem can
squares be avoided; stability increases
16 SSLMLS Sign-sign least mean Zero multiplications; both data and error are
logarithmic squares clipped; weight drift problem can be
avoided; stability increases
17 LLAD Least logarithmic absolute Uses logarithmic cost function with
difference normalized error; faster convergence than
LMLS and other variants
18 SRLLAD Sign regressor least Less computational complexity than LLAD
logarithmic absolute and other variants; faster convergence than
difference LMLS algorithm
19 SLLAD Sign least logarithmic Error is clipped; weight drift problem can
absolute difference be avoided; stability increases
20 SSLLAD Sign-sign least logarithmic Zero multiplications; both data and error are
absolute difference clipped; weight drift problem can be
avoided; stability increases
34 Genomic Sequence Analysis for Exon Prediction
MMSE SS
M ad = (3.2)
MMSE
where EMSEss is the steady-state value of excess mean square error (EMSE)
and MMSE is the minimum mean square error. Misadjustment is a dimen-
sionless factor that gives a metric of how near the algorithm is to optimal
MSE.
The MMSE is the optimum filter error, which is a component of the pri-
mary signal not to cancel the ideal weight. After the algorithm reaches its
stable state, it can be defined with alternating power of signal over samples.
This can be expressed as
k
MMSE =
1
k−p ∑ x ( n)
n= P
2
(3.3)
Here, k is the overall sample amount and p is the amount of samples for
which the algorithm reaches a stable state. EMSE is described as the result
of weight deviation from their optimal values given by
N −1
EMSE(n) =
1
N ∑ e (n − j )
j=0
1 (3.4)
where e1(n) is the residual error and N is the amount of samples used within
estimation. The steady-state EMSE is definite by taking EMSE over certain
duration after the convergence characteristics are obtained. Its expression
is given as
K
EMSE ss =
1
k−p ∑ EMSE(k )
n= P
(3.5)
1.
THE three swung round and jerked their hands above their heads. A
very tall man stood in the doorway. He had a spade-shaped beard
and a coppery complexion. His hair of a glossy black was brushed
smoothly back from a long, retreating forehead. His large nose was
like the beak of a bird, and his black eyes glittered. In his
outstretched hands he held two large automatic pistols. Hugh
recognized to his amazement the supposed Brazilian diplomat,
Doctor Bergius.
“Keep your hands up, gentlemen,” said Doctor Bergius warningly;
and with a careless air he lowered his pistols and entered the room.
At his heels trooped three others. The first, no other than the dashing
Italian Castelli, was in evening dress, but handling his revolver as if
accustomed to its use. The other two were the most blood-thirsty
pair of ruffians Hugh had ever seen. One was huge and hulking,
hairy like a bear. A short beard almost covered his face, and his hair,
bristly as that of a worn scrubbing-brush, came down to meet his
bushy eyebrows. His companion was a very small man, spare, active
and hairy as a monkey, with a lean and withered face and slit eyes
that twinkled with malice.
“Come on, Golaz,” said Doctor Bergius to the tall ruffian. “You can
look after the old fellow. Golaz, gentlemen, is my knife-man. In fact
he used to be a pig-sticker. He is rather an enthusiastic specialist.
He’d as lief cut your throat as look at you. Wouldn’t you, Golaz?”
The ursine man grunted in a pleased way. He took out a murderous-
looking knife and going up to Bob Bender, who was standing very
straight, with his arms in the air, made a playful pass with the knife
across Bob’s scraggy throat. A little spot of blood appeared. Bob
shuddered. Then Golaz gave him a little dig in the ribs with the
needle point of the knife. Bob shivered.
“Golaz is really an artist,” said the doctor. “I have the greatest
difficulty in restraining him. Now let me introduce another of my pets.
Advance, Gamba.”
The simian man came forward grinning.
“Gamba’s specialty is strangling,” explained Doctor Bergius. “His
work is slower but not less sure. Once let him get those hairy hands
of his around your throat, and you’ll have to kill him to make him let
go. You love to get your fingers round a windpipe, don’t you,
Gamba?”
Gamba grinned broadly, clutching and gripping with his hands in a
suggestive manner.
“All right, Gamba, you can account for the chauffeur. As for you,
Castelli, I leave you the Englishman. Now that these preliminaries
are all settled I can take a smoke.”
With a sigh of satisfaction Doctor Bergius sank down in the big arm-
chair and lit a cigarette.
“Ah,” he sighed again, “what would life be without the soothing
weed? You can have women and wine, Castelli; I would not
exchange them both for nicotine. This is a comfortable den, Vulning;
I feel quite at home already. Ha! I see you have the papers there.
Castelli, hand them to me.”
The Italian took the system from Vulning’s hand and gave it to the
doctor.
“Thank you. I imagine it’s all here. Also ...” he turned to Hugh, “it’s
translator. Excellent. You know, Vulning, you’ve given me a lot of
trouble. We were both on the same errand, only you went out by the
door just as I came in by the window. What a pity you closed that
safe. How was I to know it was empty? There I was struggling to
open it, when the old man woke up. Golaz had to take his case in
hand. The methods of Golaz are not refined but they are effective.
Well, now to business.”
Doctor Bergius turned over the leaves of the system. “Here it is in my
hands at last, the key that opens the golden gates of wealth. I say,
Vulning, I’m sorry for you. You worked hard for this. I’m not such a
bad chap after all. I’m going to take you in with us. You and Castelli
can be on the same footing. The others can rank with Golaz and
Gamba. Do you accept?”
Vulning nodded sullenly; the other two with alacrity.
“Good. You may lower your hands. And now let us come to this
young man you have so beautifully bound, and I fear, so sadly
maltreated. Your methods are primitive. I think I can show you a
better way to make him listen to reason. Golaz, bring in the girl.”
Hugh started. He had fallen forward; but, by turning his head
painfully, he could follow the movements of Golaz. He saw the big
cut-throat disappear into the hallway. He heard a low moan and it
seemed his heart forgot to beat. With straining eyes he watched the
doorway. Yes, his worst fears were realized. Golaz entered with
Margot in his arms. Her hands and feet were tied; her eyes closed,
her hair streaming to the floor. She did not seem conscious of what
was happening.
“Put her down,” said Doctor Bergius. “And now suppose we begin by
trying this instrument of torture on those rosy little nails. It may be
more effective with our obstinate friend here. Golaz and Gamba,
hold her. Castelli, you can wield the pincers.”
But Castelli hung back. “No, Master,” he said with a shrug, “I have no
stomach for that. A man, yes! A woman, well....”
“All right, Castelli. I know your softness of heart where the weaker
sex is concerned. Vulning, to you will fall the honour.”
Again Paul Vulning took up the big pincers, and the points closed
over the girl’s thumb-nail. With a piercing scream she opened her
eyes.
“Hear that?” said Doctor Bergius to Hugh. “That’s only a beginning. If
necessary we’ll crack her ten little nails like hazel nuts. Then if you
don’t do what we want, I’ll hand her over to Golaz and Gamba to
work their will on her. You know what that means. On the other hand
if you consent, if you tell us the meaning of all this, you will both be
well treated. You will perhaps be kept in close confinement for a few
weeks, but after that you will be released. By then I hope we shall be
ready to depart with the spoil. Shall we begin again on the girl?”
Hugh shook his head. His face was stamped with horror. “No, no,” he
cried hoarsely. “I’ll do anything you want.”
“That’s a sensible lad. Seat him at the table and release his right
arm. Vulning, have the goodness to fetch me pen, ink and paper.”
Vulning brought them from a little card table that stood in front of the
bay window. Doctor Bergius rose and bent over Hugh.
“Now,” he said in his harsh metallic voice, “what we want you to do is
quite simple. You will put on that paper all the symbols in those
documents with their meanings. After that we will shut you up while I
make the translation. If you forget anything and give me needless
trouble, I shall have to deal severely with you. Also I will hold you
responsible for the subsequent working of the system. So you see I
want you to take your task very seriously. Now, go ahead.”
Hugh was placed facing the curtained window. He took up the pen
and began to write. Doctor Bergius paced up and down. Every now
and then he would look at the document in his hand and then at the
symbols Hugh was writing. The page was soon covered with them.
Hugh strained his memory. Had he forgotten anything? Were they
complete?
As he paused for a moment, his brows pursed in thought, the eyes of
all were fixed on him. The doctor stood with his back to the bay
window, and as he struck a match to light a fresh cigarette, he laid
the precious documents down on the little card table. Then in the
tense silence the striking of the match startled Hugh, and he glanced
up.... What was it he was seeing?... Behind the doctor a long sinewy
hand was passing between the crimson curtains. It reached towards
the little card table; it clutched the bundle of papers; it disappeared.
But in that swift moment Hugh saw that the little finger of the hand
was missing.
2.
The silence was almost painful. Hugh wondered how long it would
last. Suddenly Paul Vulning pointed to the empty table with a cry.
“The system! It has vanished.”
Swift as a flash Doctor Bergius looked down. Then he rushed to the
window.
“Quick,” he shouted, “I saw some one leap from the terrace. All of
you in pursuit. We must recover it at all cost.”
He dashed out, Vulning, Castelli and the three others following him.
From the darkness Hugh heard shots and much shouting.
“Scatter. Search the garden. Fire only if you’re sure.”
They had all gone. He was alone with Margot. He tried to see her, to
go to her. He twisted around and tumbled from his chair.
Could he believe his ears? As he lay face down he heard a voice
address him.
“Quick, sir. I’m goin’ to cut the ropes.”
It was old Bob Bender. He cut and slashed to such good purpose
that in a moment Hugh and Margot were both free.
“There’s not a moment to lose,” whispered Bob. “They’re hunting out
in front but they may return any minute. You must escape by the
back. Come, I’ll show you the way. Buck up, missy, you’ve got to
make an effort.”
Hugh supported the girl, and Bob piloted them along the dark
hallway. At the foot of a flight of stairs Bob opened a door. The pure
air of the mountain caressed their faces.
“Take to the woods,” whispered Bob. “Climb high, make a wide
circle. I’ll slip back and get that paper you wrote. Then I’ll join them in
the hunt. Good luck to you. Krantz is a wonder. The Casino is
saved.”
3.
Taking the girl’s hand Hugh led her through the darkness, down a
narrow flight of stone steps, and along a steep pathway amid the
shrubbery. He heard sounds of the pursuit from the other side of the
house and once the sharp crack of a revolver. Once too, some one
came panting along the pathway towards them. He had scarcely
time to pull Margot into the deep shadow of the bushes before a
burly form pounded past. Trembling and terrified the girl clung to him
until the footsteps were drowned in silence.
Once more he dragged her on. At the end of the pathway, they came
to a small door set in the high wall, secured by a rusted bolt that at
first resisted all his efforts. Suddenly it shot back, and they found
themselves on the mountain side.
From the door a steep trail led to higher altitudes, and up this he
hurried her. Rocks tripped them, and thorny bushes clutched at
them, but spurred by fear they stumbled on. Even when the tiny
donkey-path faded out and they found themselves on the raw and
ragged flanks of the mountain, they continued to climb and climb.
Several times he thought Margot was going to give out, but a few
words from him inspired her with a new courage. In the last of these
pauses he listened acutely. The silence was absolute. They must be
safe by now. They had been climbing for nearly an hour. He urged
her to make one more effort, but she was unequal to it and entirely
collapsed.
Lifting her in his arms he carried her to where a huge overhanging
boulder formed a shallow shelter and laid her down. Resting her
head on his knee, he covered her with his coat. Then with his back
to the rock he waited for the daylight.
With the first brightening of the dove-grey sky he saw that they had
climbed further than he had reckoned. They were on the slope
beneath the Tete-du-Chien; above them towered the great bluff, its
beetling front steel grey, stained with cinnamon, and around them, as
if the greater gods had pelted it in sport, huge boulders heaped in
fantastic confusion. Below them the olive groves were saturnine; the
roofs of the Condamine a sullen crimson, and the sea’s immense
tranquillity painted with a pale fire.
He looked down at the white face, pillowed on shining hair. Poor girl!
How desperately exhausted she must be. Her sleep had been
troubled by fits of trembling; and dry nervous sobs had awakened
her half a dozen times. He had soothed her with assurances of
safety. He aroused her gently and pointed to the brightening sky.
“Look!”
“But you are chilled through,” she said. “You are shivering. You
should not have given me your coat.”
They rose stiffly, their faces haggard in the dawn. Slowly and
painfully they descended the mountain.
“What happened,” he asked, “that night?...”
“I don’t know. I never understood. It was very late; I heard a noise in
the professor’s room and tried his door; it opened. All was dark.
There was a curious smell. Again I heard a noise. I was afraid he
was ill. I hurried to his assistance. Some one caught me from behind,
and a hand covered my mouth. I struggled, but I had no power. They
bound and gagged me. Just as we were going away one of them
flashed an electric torch on the floor. I saw the professor lying face
downward. It was horrible....”
“Yes, I know. They killed the poor old man. But what after that?”
“A very strong man carried me in his arms; we descended from the
window by a rope ladder. Below they had a closed-in car. We went
up among the mountains, before we stopped at a lonely house. They
lifted me down, and carried me to a room. I was locked in, a prisoner.
Oh, they treated me well enough. There was a peasant woman who
brought me my food and was kind to me. But the time was long, for I
was terrified, and so anxious about you. I thought I should go mad.
Then last night they put me in the car again, and brought me down.
You know the rest.”
“What shall we do now? I suppose we had better go back to our
room.”
She shook her head. “Nothing can make me spend another night
there. The very idea horrifies me. No, I want to go far away from
here, very far. If you don’t mind, I will get my things, stay at a hotel
to-night, and to-morrow morning leave for Paris.”
“I quite understand. But ... how about that cottage at Villefranche?
Won’t you come there with me?”
Again she shook her head. “No, not now....”
“Once you wanted to.”
“Once, yes. Once I had a dream.... That’s finished now. I’ve been a
foolish girl. I did lots of thinking when I was alone up there, and I see
my way clear. It’s a lonely way but perhaps I’ll have my share of
happiness. Yes, I’d better go.”
He felt that she was right, and did not try to dissuade her.
“At any rate,” he said, “you’ll let me lend you that money, the two
thousand we had such a fuss over?”
“Yes, I’ll borrow it gladly, and I’ll pay you back. I bless you for all
you’ve done for me....”
Next morning he saw her off at the station. As she leaned from the
window of a third class carriage she tried hard to keep back her
tears. He remembered their arrival at this same station, and how he
had followed her. He would miss her painfully. A last handclasp and
the train bore her away. A loneliness came over him that was almost
a heartache.
“That ends another chapter,” he said to himself. “Perhaps I’ll never
see her again. Ah! little girl, may the gods bless you and make you
happy.”
And with that he went sadly away.
CHAPTER SEVEN
AN INTERLUDE
1.
2.
3.
Bob, rusty and creaky as ever, looked singularly out of place in his
radiant garden.
“Excuse me, sir,” he said, rubbing his hands together with a rasping
sound, “for interruptin’ your horticulturous provocations.”
“Not at all. Glad to see you.”
“Thank you, sir. You’ve got a tidy sorto’ place ’ere. Now if I was you
I’d bank up that celery a little more, an’ them artichokes want cuttin’
back. Awful things artichokes is to grow on you, if you gives ’em a
chance.”
“What do you know about gardening?”
“Most all there is to know, I expect, considerin’ that I was once in that
way myself. Indeed I ’opes some day, if ever I can scrape up enough
money, to buy a little place I know out ’Ampstead way. But there, I
didn’t come ’ere to talk of gardens; I came over on quite another
matter. Krantz sent me.”
“Krantz!”
“Yes. You see that Doctor Bergius ’as got something up ’is sleeve.
We can’t quite make ’im out. ’E’s a great one, ’e is. There ain’t a
greater international crook on the Continent to-day. ’E was ragin’
mad because Krantz got the system away from ’im, and now ’e
swears ’e’ll get even, and do the Casino one in the eye.”
“That reminds me,” said Hugh. “What happened that night after we
got away?”
“Oh, they thought you’d got at a knife with your free ’and and cut the
ropes. I joined the chase and ’eaded ’em in the wrong direction. You
see my bein’ with Vulning was an idea of Krantz’s. He suspected that
Vulning ’ad the papers and got me to approach ’im. I pretended I’d
fallen out with Krantz; and after a bit Vulning told me ’e ’ad the
papers. It was me suggested ’e get you to translate ’em. Krantz was
to come to your rescue. But we didn’t bargain on the other gang.
However, it came off all right.”
“What do you want of me now?”
“Well, you see, I’m no longer in the confidence of that crowd. The
doctor distrusted me from the first. There was the business of the
window for one thing. Why didn’t I ’appen to fasten it properly?
Anyhow they won’t ’ave anything to do with me now; and I can’t get
to the bottom of the game they are playin’. But I do know they are
’avin’ an important meetin’ to-morrow at Vulning’s villa. It’s at two
o’clock. There will only be Vulning and the doctor and Castelli. Now
we were thinkin’ if we could get Vulning out of the way, and you
could take his place....”
“What!”
“It’s really very simple, sir. You see you’re so extraordinary like ’im
any way. Just a touch of make-up and you’d be perfect. We’ll give
you a key to the villa and you can change into some of ’is clothes
and receive the other two in the library. You can close the curtains
and darken the room. Then you’ll deceive them, ’ear their plans and
let us know.”
“But I’m risking my life.... If these fellows suspect, they’ll shoot me
like a dog.”
“It’s true there’s a lot of risk; but Krantz says ’e’ll pay you ten
thousand francs if you get the information ’e wants.”
“I’d rather not. I swore I’d never set foot in the Principality again.”
“Krantz says that, if ever ’e asked a favour of you, you promised
you’d do it.”
“That’s true.... Well, tell Krantz ... I’ll do it.”
CHAPTER EIGHT
THE PLOT
“CHER COMERADE:
There is something which weighs on me and of which I
have been trying to write to you since several days.
You have heard me speak of Florent Garnier. Twice has
he asked me in marriage, and a week ago he sought me
out and demand me for the third time.
He is more prosperous than ever. He has a grand auto,
and a villa near the forest of St. Germain. On Sunday with
Jeanne we drive out to see it, and it is truly charming. Only
he says he is so lonely there all by himself....
What am I to do? I think I am the most unhappy girl in all
Paris. It is a great chance for me, and Madame Folette,
Jeanne and the girls tell me I am crazy to refuse. Which is
quite true because I am all alone in the life....
I do not ask your advice because I know you will tell me to
take him too, and I don’t like when you do that. All the
same I thing you are right, and this time it is for the best
that I shall tell him.... Yes.
I hope you are well, and happy, and think of you very, very
often.
Votre petite soeur adoptée,
Margot.
Florent wishes we marry on the seventeenth September
so that in that day you must think of me and wish me
happiness.”
It was quarter past one when Hugh received this letter; it was half
past when he jumped into the carmine car and told the chauffeur to
drive him to Vulning’s villa.
“Keep to the blind side of that chap and he’ll never know you,” Bob
Bender had said. “What with Vulning’s coat and hat and them yellow
glasses he’s wearin’ lately any one would take you for his twin
brother. The chauffeur’s had one or two drinks too much anyway,—
we’ve seen to that. ’E’ll ’ave all ’is time taken up lookin’ after ’is car.”
“And Vulning?”
“We’ve got ’im safe. You see there’s a little girl he’s been after for
some time. Mrs. Emslie’s daughter wot committed suicide. She’s
workin’ as a nurse girl; but she won’t ’ave anything to do with ’im.
Well, we got ’er to send ’im a note sayin’ she’d meet ’im at one
o’clock in a room in a certain ’otel that’s a bit out of the way. ’E came
all right; and, while he waited for her, we simply locked ’im in. ’E’s
there now, ’ammerin’ at the door and ragin’ like a madman. We won’t
let ’im out till you get back.”
“I’m feeling nervous.”
“Don’t be afraid. With that touch of make-up you’re as like ’im as two
peas. You’ll fool ’em all right. ’Ere’s a key to the front door. Now run
and jump into the car as if you were in a ’urry. Take this. It will steady
you.”
Hugh took the small flask of brandy that Bender handed to him,
walked quickly to the car and leaped in. The chauffeur did not even
look at him. He touched the button that started the motor, moved into
gear and the car shot forward.
As Hugh left the town below him his uneasiness increased. His
excitement seemed to mount with the mounting road, his heart
pounded like the straining motor of the car that bore him on. He took
a pull at the brandy flask, and felt better.
They were now among the olive trees and still climbing. A sleepy
quiet brooded around them. When they drew near the solitary house
Hugh wanted to leap out and make for safety, but it was too late to
draw back.
As the chauffeur drove the car around to the garage, Hugh mounted
the front steps and opened the door. A rush of stale air met him. The
hallway was dark and dirty. Vulning did not seem to have a caretaker
and probably only slept there once in a while. The rooms leading off
the hall were shuttered and dark. Hugh went into the library, threw
back the shutters and unclasped the window. The light leaped in like
a wild thing. He looked carefully out of the window. It gave on the
terrace with a balustrade about three feet high. Below was the road
leading to the garage, and beyond that dense shrubbery. He closed
the window without clasping it, then drew the heavy curtains,
plunging the room in mysterious gloom.
Once more he went out into the unlighted hall. How quiet and dark
the house was! His footsteps awakened echoes everywhere. He
went upstairs to where a door, slightly open, showed a chink of light.
It appeared to be Vulning’s bedroom. The bed was unmade, the
room untidy. He took off his overcoat and drew on a dressing-gown
he found lying over a chair. On the tiny table at the head of the bed
was a small automatic pistol. Seeing that it was loaded, he put it into
his pocket.
He felt horribly “funky,” but a glance in the mirror reassured him. His
sunburnt skin had been made up to resemble Vulning’s sallow one;
little crowsfeet were round his eyes, and cynical lines about his
mouth. His hair was parted in the middle and brushed back like
Vulning’s. When he put on Vulning’s yellow glasses it would have
taken a very clever man indeed to detect the substitution. If only his
confounded nervousness would not give him away! He wound a silk
muffler around his neck, noting as he did so how his hands trembled.
That would never do! He took another big swig at the brandy flask.
Courage glowed in him, even to the point of recklessness. He was
ready to go down and face them.
As he descended the stairway somewhat unsteadily he saw that his
guests were already awaiting him. How quietly they had come in! He
had not heard them. Golaz and Gamba were in the hall and
glowered at him with fierce and restless eyes as he passed. In the
darkened library Castelli and the doctor were talking in low tones,
bending over the table on which lay a large plan. They turned as he
entered.
Hugh shivered as he shook the large hairy hand of Doctor Bergius.
How he hated this man. Those deep set eyes were profound with
cruelty; that dense blue-black beard concealed a face that might be
that of a fiend incarnate; his large fleshy lips of a bright unnatural
red, set in that black beard, gave a singularly repulsive impression.
When he smiled it was with a grin, callous, relentless, orientally
cruel.
He smiled now, and Hugh was glad of his yellow goggles. They
concealed the fact that his eyes were black instead of blue. He was
glad, too, of the drawn heavy curtain. It seemed to him that even with
all his precautions Doctor Bergius was regarding him with a curious
fixity.
“Ah, young man,” he said in his metallic voice, “you have kept us
waiting. There is so much to be done and we have so little time.
Castelli, close that door.”
Hugh nodded sullenly. He dared not trust himself to speak. Once
again Doctor Bergius regarded him curiously. He did not seem
satisfied. He went up to Hugh and stared at him very hard. Hugh’s
heart began to thump.
“I am discovered,” he thought, and his hand went to his pistol.
But the Doctor turned away with an expression of contempt. “Pah!”
he said. “You’ve been drinking again. I hope you’re not off on one of
your bouts.”
Hugh shook his head. He affected a certain surly stupidity. “No, no,
doctor,” he said thickly, “only a touch of brandy. Got sore throat.
Caught a chill on the golf course. Felt shaky. Took it to steady me,
clear my head.”
“Well, it must be the last until to-morrow evening. After that you can
go to the devil your own way. Promise me that now,—the last.”
Hugh nodded sulkily.
“That is understood. Your part in the programme is a small one, but
important. You must have all your wits about you. If you fail you may
throw out the whole plan.”
“All right. I’ll keep off the stuff.”
“Good. Now to business. Look!... Here’s a plan of the Casino.”
Hugh showed an eager interest. In order to see it better he edged
round to the side of the table nearest the window. He had Doctor
Bergius on his right, on his left Castelli. The plan showed the entire
ground floor of the Casino, the different rooms, the entrances, the
windows, even the tables. Here and there were traced lines and
figures in red, with names in Italian.
“You already have an idea,” went on Doctor Bergius, “of what the
great plan is. It is something unheard of, unthought of, magnificent in
its audacity. Only a man of genius could have imagined it, perfected
it in all its detail. Only one man living could have done it. That man is
myself. It is what the Americans call a ‘hold-up.’ We propose to hold-
up the Casino.”
Here the doctor paused to give effect to his words, then continued:
“To do that, you realize, is a project of the greatest gravity. But I have
arranged everything; and it should go like clockwork. In the first
place we need lots of men. I have a band of about sixty, all
desperate characters, recruited from the slums of Genoa. They are
supposed to be a touring athletic club, all wear the same caps and
ties. You may have noticed some of them already. They have been
here for some days and have visited the Casino in the morning when
it is open to all visitors. Besides this we have secured admission
cards for about a score of them. They know the ground. Every man
has his part and is drilled in it. Each is of proved and desperate
courage, will carry two six-chambered revolvers, and know how to
use them. Ah, my friend, it is a marvellous conception. You should
have been present at our rehearsals.”
“What is my part?”
“Your part, my dear Vulning, is very simple. We have got a day ticket
for you in the name of a Swedish gentleman. You will wear a heavy
blonde beard and be completely disguised. This is for your sake. You
see with what consideration we treat you. At six o’clock in the
evening you will enter the Casino. That is the hour of affluence when