Next Article in Journal
Characterization of Microstructure of Crept Nb and Ta-Rich γ-TiAl Alloys by Automated Crystal Orientation Mapping and Electron Back Scatter Diffraction
Previous Article in Journal
New Progressive Iterative Approximation Techniques for Shepard-Type Curves
Previous Article in Special Issue
Symmetry in Functional Equations and Analytic Inequalities II
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Application of Lie Symmetry to a Mathematical Model that Describes a Cancer Sub-Network

by
Maba Boniface Matadi
Department of Mathematics, University of Zululand, Private Bag X1001, Kwadlangezwa 3886, Kwazulu Natal, South Africa
Symmetry 2022, 14(2), 400; https://doi.org/10.3390/sym14020400
Submission received: 3 December 2021 / Revised: 24 January 2022 / Accepted: 10 February 2022 / Published: 17 February 2022
(This article belongs to the Special Issue Symmetry in Functional Equations and Analytic Inequalities II)

Abstract

:
In this paper, a mathematical model of a cancer sub-network is analysed from the view point of Lie symmetry methods. This model discusses a human cancer cell which is developed due to the dysfunction of some genes at the R-checkpoint during the cell cycle. The primary purpose of this paper is to apply the techniques of Lie symmetry to the model and present some approximated solutions for the three-dimensional system of first-order ordinary differential equations describing a cancer sub-network. The result shows that the phosphatase gene (Cdc25A) regulates the cyclin-dependent kinases inhibitor ( P 27 K i p 1 ). Furthermore, this research discovered that the activity that reverses the inhibitory effects on cell cycle progression at the R-checkpoint initiates a pathway.

1. Introduction

Over the last two decades, researchers have developed mathematical models to understand the dynamic mechanisms of the cell cycle [1,2,3,4]. In [5,6,7], scholars used non-linear differential equations to model cell cycle mutations as limit cycles. The R-checkpoint, according to Pardee, represents a unique switch between the quiescent and proliferative phases of normal cells [7]. Researchers further highlighted the importance of the R-checkpoint in preventing malignant transformation [8]. As a result, if a cell has damaged DNA or has not grown properly, the cell cycle is said to be stalled [2,9,10]. In particular, genes such as phosphatase Cdc25A, cyclins ( D , E ) , cyclin-dependent kinases ( C d k s ) , retinoblastoma protein ( R b ) , cyclin-dependent kinases inhibitor P 27 K i p 1 , and transcriptional factors (E2F, C-Myc) are the most significant control regulators [2,9,10,11].
A mathematical model can be defined as the representation and development of a previously investigated process. This insight has led to the creation of mathematical forms that represent real-world scenarios. This will make it easier to comprehend the phenomenon that has been observed. The Lie symmetry technique and numerical analyses provide understanding, responses, and useful guidance in analysing the formulated mathematical model.
In this study, a mathematical model of a cancer sub-network is analysed from the view point of Lie symmetry. This technique is indeed a powerful tool for solving non-linear differential equations. The Cancer Sub-Network model is governed by the following three-dimensional system of first-order non-linear differential equations [10]:
d x 1 d t = λ 1 + a x 2 μ 1 x 1 , d x 2 d t = λ 2 + b x 1 μ 2 x 2 + c ρ c + x 3 , d x 3 d t = λ 3 μ 3 x 3 + d σ d + x 2 ,
where the dependent variables and parameters are described in the table below (Table 1). The terms μ 1 x 1 , μ 2 x 2 , and μ 3 x 3 refer to protein degradation caused by ubiquitin-proteasomes with the fixed rate coefficients μ 1 , μ 2 , and μ 2 [10]. The inhibition nature of cell x 3 to x 2 and of x 2 to x 3 are represented by c ρ c + x 3 and d σ d + x 2 , respectively.
The rest of the paper is organised as follows. In Section 2, a realistic background of the fundamental theories of Lie symmetry are presented. A simplified and parametrised form of the Cancer Sub-Network model is developed in Section 3. Lie symmetry analysis of the model is performed in Section 4. The numerical solutions are performed and presented graphically in Section 5. Finally, a discussion and concluding remarks are provided in Section 6.

2. Preliminaries on Lie Symmetry Method

In this Section, a summary of the Lie symmetry analysis to solve a system of differential equations is provided. The method comprises the tools that are needed in this study. Firstly, the mathematical concept of symmetry is enlightened. Secondly, the overall properties of groups are given and extended to the Lie groups. Several textbooks are available in the literature. Furthermore, numerous research articles are published on the theory of the Lie symmetry technique for solving ordinary differential equations (ODEs) as well as partial differential equations (PDEs).
In accordance with the theory of Lie symmetry, the given three-dimensional system of the first-order differential equation is as follows:
x 1 ˙ = f 1 ( t , x 1 , x 2 , x 3 ) , x 2 ˙ = f 2 ( t , x 1 , x 2 , x 3 ) , x 3 ˙ = f 3 ( t , x 1 , x 2 , x 3 ) ,
which admits the following Lie group of one-parameter transformations (a):
t ˜ t + a T ( t , x 1 , x 2 , x 3 ) , x 1 ˜ x 1 + a X 1 ( t , x 1 , x 2 , x 3 ) , x 2 ˜ x 2 + a X 2 ( t , x 1 , x 2 , x 3 ) , x 3 ˜ x 3 + a X 3 ( t , x 1 , x 2 , x 3 ) ,
with the infinitesimal Lie operators below:
G = T t + X 1 x 1 + X 2 x 2 + X 3 x 3 .
The group transformations t ˜ , x 1 ˜ , x 2 ˜ , and x 3 ˜ are obtained by solving the following Lie equations [8]:
d t ˜ d a = T ( t , x 1 , x 2 , x 3 ) , d x 1 ˜ d a = X 1 ( t , x 1 , x 2 , x 3 ) , d x 2 ˜ d a = X 2 ( t , x 1 , x 2 , x 3 ) , d x 3 ˜ d a = X 3 ( t , x 1 , x 2 , x 3 ) ,
with the initial conditions:
t ˜ a = 0 = t , x 1 ˜ a = 0 = x 1 , x 2 ˜ a = 0 = x 2 , x 3 ˜ a = 0 = x 3 .
The first extension of the Lie operators above is defined as follows:
G [ 1 ] = G + X 1 [ t ] x ˙ 1 + X 2 [ t ] x ˙ 2 + X 3 [ t ] x ˙ 3 ,
where
X 1 [ t ] = D t ( X 1 ) x ˙ 1 D t ( T ) , X 2 [ t ] = D t ( X 2 ) x ˙ 2 D t ( T ) , X 3 [ t ] = D t ( X 3 ) x ˙ 3 D t ( T ) ,
with D t representing the total differential operator, described as follows:
D t = t + x 1 ˙ x 1 + x 2 ˙ x 2 + x 3 ˙ x 3 + x 1 ¨ x 1 ˙ + x 2 ¨ x 2 ˙ + x 3 ¨ x 3 ˙ +
The infinitesimal transformation obtained will be used to solve the following equation:
T r t + X 1 r x 1 + X 2 r x 2 + + X 3 r x 3 = 0 , T u t + X 1 u x 1 + X 2 u x 2 + + X 3 u x 3 = 0 , T v t + X 1 v x 1 + X 2 v x 2 + + X 3 v x 3 = 0 , T w t + X 1 w x 1 + X 2 w x 2 + + X 3 w x 3 = 1 .
Equation (4) will provide a set of new independent variable r, and dependent variables u, v, and w, which can be used to transform the non-linear system (1) into a linear system.
Theorem 1.
A function h ( t , x 1 , , x k ) is invariant under the prolonged group G if and only if [14]:
G [ k ] h = 0 ,
where
G [ k ] = G + i = 1 n X ( i ) j = 1 i i j x ( i + 1 j ) T ( j ) x ( i )
is the kth extension of the Lie operator of G.
Theorem 2.
Every one-parameter group of transformations ( x ^ = f ( x , y , ε ) , y ^ = g ( x , y , ε ) ) is reduced to a group of translations t ^ = t + ε , u ^ = u with the following generator [15,16]:
X = t ,
by a suitable change of variables
t = t ( x , y ) , u = u ( x , y ) .
Considering that the Lie groups of point transformations related to a given differential equation E involve n independent variables x = ( x 1 , x 2 , , x n ) R n and m dependent variables u = ( u 1 , u 2 , , u m ) R m [16,17], let:
x * = X ( x , u ; a ) , u * = U ( x , u ; a )
be a group of transformations in the space R n + m of the variables ( x , u ) [17,18]. Moreover, let the following equation:
u = Θ ( x ) ( Θ 1 ( x ) , Θ 2 ( x ) , , Θ m ( x ) ) ,
be a solution for the equation E . A Lie group of transformations of the form (5) admitted by E has the two corresponding properties below [15,17]:
  • A transformation of the group maps any solution of E into another solution of E ;
  • A transformation of the group leaves E invariant, supposing that E reads the same in terms of the variables ( x , u ) and in terms of the transformed variables ( x * , u * ) .

3. Simplification and Parametrisation Form of Model (1)

In this Section, a reduction of the number of parameters from the original model is performed. As a result, a cosmetic simplification of the non-linear system (1) is achieved below.
By letting:
τ = μ 3 t , u 1 ( τ ) = b x 1 λ 2 , u 2 ( τ ) = a x 2 λ 1 , u 3 ( τ ) = x 3 c .
The left-hand side of the model Equation (1) becomes:
d x 1 d t = λ 2 μ 3 b d u 1 d τ , d x 2 d t = λ 1 μ 3 a d u 2 d τ , d x 3 d t = c μ 3 d u 3 d τ .
The substitution of Equations (6) and (7) into (1) gives the following:
d u 1 d τ = b λ 1 λ 2 μ 3 1 + u 2 μ 1 μ 3 u 1 , d u 2 d τ = a λ 2 λ 1 μ 3 1 + u 1 μ 2 μ 3 u 2 + a ρ ( λ 1 μ 3 ) ( 1 + u 3 ) , d u 3 d τ = λ 3 c μ 3 + a d σ c μ 3 ( a d + λ 1 ) u 2 u 3 .
Hence, Equation (8) is reduced to:
d u 1 d τ = λ 1 * ( 1 + u 2 ) μ 1 * u 1 , d u 2 d τ = λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 , d u 3 d τ = λ 3 * + b * d * + u 2 u 3 ,
with
λ 1 * = b λ 1 λ 2 μ 3 , μ 1 * = μ 1 μ 3 , λ 2 * = a λ 2 λ 1 μ 3 , μ 2 * = μ 2 μ 3 , a * = a ρ λ 1 μ 3 , λ 3 * = λ 3 c μ 3 , b * = σ d * c μ 3 , d * = a d λ 1 .

4. Lie Symmetry Analysis of the Model (9)

By applying Equations (2) and (3) into the Non-dimensional model Equation (9), we obtain the following:
G λ 1 ( 1 + u 2 ) μ 1 * u 1 = μ 1 * U 1 + λ 1 * U 2 , G λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 = λ 2 * U 1 μ 2 * U 2 a * ( 1 + u 3 ) 2 U 3 , G λ 3 * + b * d * + u 2 u 3 = 1 + b * ( d * + u 2 ) 2 U 3 .
The substitution of extended infinitesimal transformations into Equation (3) gives the following equations:
μ 1 * U 1 + λ 1 * U 2 = U 1 [ τ ] + u 1 U 1 [ u 1 ] + u 2 U 1 [ u 2 ] + u 3 U 1 [ u 3 ] u 1 ( T [ τ ] + u 1 T [ u 1 ] + u 2 T [ u 2 ] + u 3 T [ u 3 ] ) , λ 2 * U 1 μ 2 * U 2 a * ( 1 + u 3 ) 2 U 3 = U 2 [ τ ] + u 1 U 2 [ u 1 ] + u 2 U 2 [ u 2 ] + u 3 U 2 [ u 3 ] u 2 ( T [ τ ] + u 1 T [ u 1 ] + u 2 T [ u 2 ] + u 3 T [ u 3 ] ) , 1 + b * ( d * + u 2 ) 2 U 3 = U 3 [ τ ] + u 1 U 3 [ u 1 ] + u 2 U 3 [ u 2 ] + u 3 U 3 [ u 3 ] u 3 ( T [ τ ] + u 1 T [ u 1 ] + u 2 T [ u 2 ] + u 3 T [ u 3 ] ) .
where
u 1 = d u 1 d τ ; u 2 = d u 2 d τ ; u 3 = d u 3 d τ .
The substitution of Equation (9) into (11) gives the following:
λ 1 * ( 1 + u 2 ) μ 1 * u 1 = U 1 [ τ ] + ( λ 1 * ( 1 + u 2 ) μ 1 * u 1 ) U 1 [ u 1 ] T [ τ ] + ( λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 ) U 1 [ u 2 ] + ( λ 3 * + b * d * + u 2 u 3 ) U 1 [ u 3 ] ( λ 1 * ( 1 + u 2 ) μ 1 * u 1 ) 2 T [ u 1 ] ( λ 1 * ( 1 + u 2 ) μ 1 * u 1 ) λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 T [ u 2 ] ( λ 1 * ( 1 + u 2 ) μ 1 * u 1 ) λ 3 * + b * d * + u 2 u 3 T [ u 3 ] , λ 2 * U 1 μ 2 * U 2 a * ( 1 + u 3 ) 2 U 3 = U 2 [ τ ] + λ 1 * ( 1 + u 2 ) μ 1 * u 1 U 2 [ u 1 ] + λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 U 2 [ u 2 ] T [ τ ] + ( λ 3 * + b * d * + u 2 u 3 ) U 2 [ u 3 ] ( λ 1 * ( 1 + u 2 ) μ 1 * u 1 ) λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 T [ u 1 ] λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 2 T [ u 2 ] λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 λ 3 * + b * d * + u 2 u 3 T [ u 3 ] , 1 + b * ( d * + u 2 ) 2 U 3 = U 3 [ τ ] + λ 1 * ( 1 + u 2 ) μ 1 * u 1 U 3 [ u 1 ] + λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 U 3 [ u 2 ] + λ 3 * + b * d * + u 2 u 3 U 3 [ u 3 ] T [ τ ] ( λ 1 * ( 1 + u 2 ) μ 1 * u 1 ) λ 3 * + b * d * + u 2 u 3 T [ u 1 ] λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 λ 3 * + b * d * + u 2 u 3 T [ u 2 ] + λ 3 * + b * d * + u 2 u 3 2 T [ u 3 ] .
Special solutions are needed since it is generally challenging to solve the non-linear system (12). In the case of T = T ( τ ) , U 1 = U 1 ( u 1 ) , U 2 = U 2 ( u 2 ) , U 3 = U 3 ( u 3 ) , the non-linear Equation (12) is reduced as follows:
λ 1 * ( 1 + u 2 ) μ 1 * u 1 U 1 [ u 1 ] T [ τ ] = μ 1 * U 1 + λ 1 * U 2 ,
λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 U 2 [ u 2 ] T [ τ ] = λ 2 * U 1 μ 2 * U 2 a * ( 1 + u 3 ) 2 U 3 ,
λ 3 * + b * d * + u 2 u 3 U 3 [ u 3 ] T [ τ ] = 1 + b * ( d * + u 2 ) 2 U 3 .
Taking the partial derivative of Equation (15) with respect to τ yields to the following second-order partial differential equation:
T [ τ τ ] = 0 ,
which implies that:
T ( τ ) = a 1 τ + a 2 ,
with the a 1 and a 2 constants of integration. The substitution of Equation (16) into (13)–(15) gives the following:
λ 1 * ( 1 + u 2 ) μ 1 * u 1 U 1 [ u 1 ] a 1 = μ 1 * U 1 + λ 1 * U 2 ,
λ 2 * ( 1 + u 1 ) μ 2 * u 2 + a * 1 + u 3 U 2 [ u 2 ] a 1 = λ 2 * U 1 μ 2 * U 2 a * ( 1 + u 3 ) 2 U 3 ,
λ 3 * + b * d * + u 2 u 3 U 3 [ u 3 ] a 1 = 1 + b * ( d * + u 2 ) 2 U 3 .
Twice partially differentiating Equation (18) with respect to u 2 gives:
U 2 [ u 2 u 2 ] = 0 .
Hence,
U 2 ( u 2 ) = b 1 u 2 + b 2 .
The substitution of Equation (18) into (17) gives the equation below:
λ 1 * ( 1 + u 2 ) μ 1 * u 1 U 1 [ u 1 ] a 1 = μ 1 * U 1 + λ 1 * b 1 u 2 + b 2 .
Since Equation (20) depends on all values of u 1 and u 2 , we get the following:
u 1 : μ 1 * U 1 u 1 a 1 = μ 1 * U 1 , u 2 : λ 1 * = λ 1 * b 1 , : λ 1 * = λ 1 * b 2 .
Hence,
U 1 = k exp [ u 1 ] + a 1 , b 1 = 1 , b 2 = 1 .
From (19), we obtain:
u 3 : U 3 u 3 = a 1 .
Hence,
U 3 = a 1 u 3 + c 1 .
Therefore, the infinitesimals transformations are provided as follows:
U 1 ( u 1 ) = k exp [ u 1 ] + a 1 , U 2 ( u 2 ) = b 1 u 2 + b 2 , U 3 ( u 3 ) = a 1 u 3 + c 1 .
It is important to note that these infinitesimal transformations are not unique. However, there exists an infinite set of infinitesimal transformations. Therefore, Equation (2) becomes:
G = a 1 τ + a 2 τ + k exp [ u 1 ] + a 1 u 1 + b 1 u 2 + b 2 u 2 + a 1 u 3 + c 1 u 3 .
Hence, the following Lie generators are found:
G 1 = τ τ + u 1 + u 3 , G 2 = τ , G 3 = exp [ u 1 ] u 1 , G 4 = u 2 u 2 , G 5 = u 2 , G 6 = u 3 .
By computing the Lie bracket, we obtain the given commutator table (Table 2):
By setting the constant of integration to b 1 = 1 , b 2 = 1 , c 1 = 1 , a 1 = 1 , k = 1 . Equation (21) becomes:
U 1 = 1 + exp [ u 1 ] , U 2 = 1 + u 2 , U 3 = 1 + u 3 , T = 1 + τ .
Hence, we have the following equations:
( 1 + τ ) r t + ( 1 + exp [ u 1 ] ) r x 1 + ( 1 + u 2 ) r x 2 + ( 1 + u 3 ) r x 3 = 0 , ( 1 + τ ) u 1 [ τ ] + ( 1 + exp [ u 1 ] ) U 1 [ u 1 ] + ( 1 + u 2 ) U 1 [ u 2 ] + ( 1 + u 3 ) U 1 [ u 3 ] = 0 , ( 1 + τ ) u 2 [ τ ] + ( 1 + exp [ u 1 ] ) U 2 [ u 1 ] + ( 1 + u 2 ) U 2 [ u 2 ] + ( 1 + u 3 ) U 2 [ u 3 ] = 0 , ( 1 + τ ) u 3 [ τ ] + ( 1 + exp [ u 1 ] ) U 3 [ u 1 ] + ( 1 + u 2 ) U 3 [ u 2 ] + ( 1 + u 3 ) U 3 [ u 3 ] = 1 .
The solution of Equation (22) is given by:
r = τ f ( u 1 u 2 u 3 ) , u 1 = τ f ( u 1 u 2 u 3 ) , u 2 = τ f ( u 1 u 2 u 3 ) , u 3 = ln τ + τ f ( u 1 u 2 u 3 ) .
The special case is given by:
r = τ ( u 1 u 2 u 3 ) , u 1 = τ ( u 1 u 2 u 3 ) , u 2 = τ ( u 1 u 2 u 3 ) , u 3 = ln τ + τ ( u 1 u 2 u 3 ) .
Substituting back to Equation (6), we obtain the following:
x 1 = λ 2 b c λ 1 μ 3 t a x 2 x 3 , x 2 = λ 1 a c λ 2 μ 3 t b x 1 x 3 , x 3 = ln [ μ 3 t ] + c λ 1 λ 2 μ 3 t a b x 1 x 2 .

5. Numerical Solutions

As illustrated in the graphs below, the numerical solutions for non-linear differential equations were obtained using the Matlab software. Figure 1 and Figure 2 show the numerical solutions for Equations (1) and (23), respectively. Numerical results obtained before and after using the Lie symmetry techniques on the Cancer Sub-Network model were found to be consistent. The parameters chosen were λ 1 = 0.1 , a = 0.01 , μ 1 = 1 , and the effect of the synthesis rate of Cdc25A has initial values of x 1 ( 0 ) = 2 × 10 5 , 0.25 , 0.75 , 2.55 ; x 2 ( 0 ) = 0.06 . The simulation results are in line with Aguda and Tang’s findings [2], which show that phosphatase gene (Cdc25A) activity increases in lockstep with cyclin-dependent kinase inhibitor ( P 27 K i p 1 ) levels.

6. Conclusions

The cancer sub-network revealed in this research is significantly simplified in comparison to what is known as the molecular and gene interactions of the oncogene and the tumour-suppressor gene. On the other hand, applying Lie symmetry analysis and computationally modelling the full cancer network during the cell cycle phase is challenging. To represent the cancer network, we started with a simple model that encapsulated the network’s key features. This model can be updated in the future to make it more realistic.
In this paper, the Lie symmetry technique was applied to obtain a modified, local, one-parameter infinitesimal transformation. Furthermore, Lie operators and Lie algebra were discovered to be useful in obtaining approximated solutions for the non-linear cancer network model. The results of the numerical simulations were found to be consistent with the findings of Aguda and Tang [2]. The model simulation revealed that when the complex’s degradation rate is less than 0.001 min 1 (all other parameters remaining constant), the subnetwork generates a peak value for the phosphatase gene (Cdc25A) activity.

Funding

The University of Zululand’s research office provided financial support for this study.

Acknowledgments

The University of Zululand’s research office provided financial support for this study. The author would like to thank the reviewers for their insightful comments and suggestions, which significantly improved the manuscript.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Aguda, B.D. A Quantitative Analysis of the Kinetics of the G2 DNA Damage Checkpoint System. Proc. Natl. Acad. Sci. USA 1999, 96, 11352–11357. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Aguda, B.D.; Tang, T. The Kinetic Origins of the Restriction Point in the Mammalian Cell Cycle. Cell Prolif. 1999, 32, 321–335. [Google Scholar] [CrossRef] [PubMed]
  3. Gardner, T.S.; Dolnik, M.; Collins, J.J. A Theory for Controlling Cell Cycle Dynamics using a Reversibly Binding Inhibitor. Proc. Natl. Acad. Sci. USA 1998, 95, 14190–14195. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Thron, C.D. Bistable Biochemical Switching and the Control of the Events of the Cell Cycle. Oncogene 1997, 15, 317–325. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Goldbeter, A. A Minimal Cascade Model for the Mitotic Oscillators Involving Cyclin and Cdc2 Kinases. Proc. Natl. Acad. Sci. USA 1991, 88, 9107–9111. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Norel, R.; Agur, Z. A Model for the Adjustment of the Mitotic Clock by Cyclin and MPF Levels. Science 1991, 251, 1076–1078. [Google Scholar] [CrossRef] [PubMed]
  7. Zhilin, Q.; Weiss, J.N.; Maclellan, W.R. Regulation of the Mammalian Cell Cycle: A Model of the G1-to-S Transition. Am. J. Physiol.–Cell Physiol. 2002, 284, C349–C364. [Google Scholar]
  8. Zondi, P.L.; Matadi, M.B. Lie group theoretic approach of one-dimensional Black-Scholes equation. Aust. J. Math. Anal. Appl. 2021, 18, 1–19. [Google Scholar]
  9. Aguda, B.D. Analysis of Cancer Gene Networks in Cell Proliferation and Death; Information and Communication Technologies for Health: New York, NY, USA, 2008. [Google Scholar]
  10. Yibeltal, B.N. Identifying and Modelling the Dynamics of a Core Cancer Sub-Network; University of KwaZulu Natal Press: Pietermaritzburg, South Africa, 2011; pp. 50–52. [Google Scholar]
  11. Jun-ya, K. Induction of S Phase by G1 Regulatory Factors. Front. Biosci. 1999, 4, 787–792. [Google Scholar]
  12. Pardee, A.B. A Restriction Point for Control of Normal Animal Cell Proliferation. Proc. Natl. Acad. Sci. USA 1974, 71, 1286–1290. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  13. Pardee, A.B. G1 Events and Regulation of Cell Proliferation. Science 1989, 246, 603–608. [Google Scholar] [CrossRef] [PubMed]
  14. Masebe, T.P. A Lie Symmetry Analysis of the Black-Scholes Merton Finance Model through Modified Local One-Parameter Transformations; University of South Africa Press: Unisa, South Africa, 2014; pp. 37–80. [Google Scholar]
  15. Matadi, M.B. Jacoby last multiplier and group theoretic approaches to a model describing breast cancer stem cells. Commun. Math. Biol. Neurosci. 2021, 2021, 85. [Google Scholar]
  16. Matadi, M.B. Lie Symmetry Analysis Of Early Carcinogenesis Model. Appl. Math. E-Notes 2018, 18, 238–249. [Google Scholar]
  17. Oliveri, F. Lie Symmetries of Differential Equations: Classical results and recent contributions. Symmetry 2010, 2, 658–706. [Google Scholar] [CrossRef] [Green Version]
  18. Matadi, M.B. The Conservative Form of Tuberculosis Model with Demography. Far East J. Math. Sci. 2017, 102, 2403–2416. [Google Scholar] [CrossRef]
Figure 1. The numerical results of Equation (1).
Figure 1. The numerical results of Equation (1).
Symmetry 14 00400 g001
Figure 2. The numerical results of Equation (23).
Figure 2. The numerical results of Equation (23).
Symmetry 14 00400 g002
Table 1. Description of variables and parameters.
Table 1. Description of variables and parameters.
Variable and ParameterDescriptionReferences
1 x 1 concentration of gene Cdc25A[1,11]
2 x 2 concentration of gene C d k s [1,2]
3 x 3 concentration of gene P 27 K i p 1 [1,12]
4 λ 1 constitutive protein expressions of Cdc25A[7,9]
5 λ 2 constitutive protein expressions of C d k s [2,9]
6 λ 3 mitogenic signal stimulation[2,3]
7aactivation efficiency of x 2 by x 1 [2,6]
8bactivation efficiency of x 1 by x 2 [2,10]
9cinhibition coefficients of x 3 to x 2 [1,2,13]
10dinhibition coefficients of x 2 to x 3 [2,13]
11 ρ production rates of x 2 to x 3 [2,9]
12 σ production rates of x 3 to x 2 [2,9]
Table 2. The commutator table of the infinitesimal generator.
Table 2. The commutator table of the infinitesimal generator.
G 1 G 2 G 3 G 4 G 5 G 6
G 1 0 G 2 G 3 000
G 2 G 2 00000
G 3 G 3 00000
G 4 0000 G 5 0
G 5 000 G 5 00
G 6 000000
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Matadi, M.B. Application of Lie Symmetry to a Mathematical Model that Describes a Cancer Sub-Network. Symmetry 2022, 14, 400. https://doi.org/10.3390/sym14020400

AMA Style

Matadi MB. Application of Lie Symmetry to a Mathematical Model that Describes a Cancer Sub-Network. Symmetry. 2022; 14(2):400. https://doi.org/10.3390/sym14020400

Chicago/Turabian Style

Matadi, Maba Boniface. 2022. "Application of Lie Symmetry to a Mathematical Model that Describes a Cancer Sub-Network" Symmetry 14, no. 2: 400. https://doi.org/10.3390/sym14020400

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop