International Language Character Code
|
|
- Melinda Henderson
- 8 years ago
- Views:
Transcription
1 , pp International Language Character Code with DNA Molecules Wei Wang, Zhengxu Zhao, Qian Xu School of Information Science and Technology, Shijiazhuang Tiedao University, Shijiazhuang, Hebei, , China {wangwei, zhaozx, Abstract. In 1994, Dr Adleman solved problem using DNA as computational mechanism. He proved the principle that DNA computing could be used to solve computationally complex problems. Recent 20 years with the rapid development of biological molecular computer, scientist have set a series of theoretical model and succeed in biochemical experiment. DNA computing has become an important research direction of the computer science and molecular biology. This research present a novel approach in which character could be encoded by the permutation and combination of the four nitrogenous bases (Adenine, Guanine, Cytosine and Thymine) in DNA molecules. The character encoding should support multi-language and unique identifier. Keywords: DNA Storage, Character Encoding, DNA Computing 1 Introduction The rapid development of science and information industry, especially the development of multimedia technology, cloud computer and computer network, computer storage equipment not only has a larger data storage capacity, higher data transmission rate and more reliable data storage quality. Also on how to make the data more economic and safe storage, storage in time and space on the extensibility, have put forward higher requirements. Current computer storage system the birth defects are revealed and the subsequent development of lack of power, has become one of the bottleneck of the computer promotion. Whether the HDD or optical storage technology is unable to cope with the future demand for storage of computer. It is estimated that in the future semiconductor, disk, and CD-ROM data storage density will achieve its physical limit [1], it is urgent need to develop a new generation of alternative storage technology. On the other hand, Biological molecular computer which Adleman [2] completed the first experimental verification has been rapid development. Nearly two decades, a variety of theoretical models and experimental methods emerge in endlessly, such as Adleman model, Splicing System model, Insertion-Deletion System model and DNA- EC model [3]. DNA storage as an important branch in the field of biological molecular computer, because it has high storage density and low hardware cost, access procedure parallelizable, good scalability and integration, and long term ISSN: ASTL Copyright 2015 SERSC
2 storage. In the foreseeable future DNA storage system will be likely to replace the traditional storage systems. [4] [5] DNA molecule is a powerful and effective natural information storage medium, it has been widely used since 1985 when DNA molecule was synthesized for the first time. There are obvious similarities between DNA storage system and traditional storage system, both of two storage system are sequential storage devices, and use special symbols to indicate the beginning and end of a single information section, and the data error correction coding is used to ensure the integrity of their information. As a result, DNA molecules can be used as a medium of the information is stored. DNA storage technology is based on the DNA molecule storage medium. The four nitrogenous bases (Adenine, Guanine, Cytosine and Thymine) what are contained within DNA molecule can be used to encode information. With the existing biochemical experiment method, it's easily complete the clone operation of DNA molecules and the modify operation of the nitrogenous bases what has been encode in the DNA molecules, these operations are similar with the traditional storage system which read and write operations. Because of the advantages of DNA storage system such as stable and reliable work, no wear, huge information capacity, long life, high quality, low price of bits of information and access procedure parallelizable, DNA storage system is seen as high density and large capacity of storage. Although DNA molecule as a data storage method has been proposed, but at this stage how to encode the information what will be stored in DNA molecule has not yet been determined. The method of character encoding is one of most important foundations of computer system, there is an exploratory research what use permutation and combination of four nitrogenous bases of DNA molecule to encode the character information. This research include two major problems, storage medium select and coding rules. 2 Storage Medium DNA molecule as information storage medium can take many forms. As information storage medium of DNA molecule can be a single-stranded, also can be doublestranded; can be a long chain, can also be a circular strand, some with special biological meaning chain is called the plasmid [6]. These different modes have their different advantages and disadvantages when they are as information storage medium, therefore must consider these factors when choosing storage medium, to make the DNA molecule storage advantages and simplicity of operation have been play. DNA storage system using circular single-stranded DNA molecule as storage medium. Compared with single-stranded and double-stranded each have each advantages and disadvantages. Double-stranded DNA is more stability than single-stranded DNA, that is one of the most important reasons what the most living organisms choose double-stranded DNA as their genetic materials, but the data which stored in the double-stranded DNA are difficult to read. Double-stranded should be unzipped their two attached chains into single-stranded before reading and clone. Single-stranded DNA can use Watson-Crick Complement principle to read data, but it is not stable, and single-stranded DNA is not only more easily fracture than double-stranded DNA, 162 Copyright 2015 SERSC
3 but also easily to form own complementary hairpin structure. It is the reasons why we choose single-stranded that single-stranded easier to read and clone than doublestranded. In addition we can avoid the generation of the hairpin structure in the singlestranded special design. Compare with long-chain DNA than circular strand DNA, long chain will be cut into two independent segments by endonuclease at a time, but circular strand is still together, under certain conditions can also even the back circular strand again. Even more long chain easy to be degraded by certain exonuclease from its ends, and this degradation possibility of a circular strand is less than long chain 3 Coding Rules The DNA molecule is composed of four nitrogenous bases, therefore the permutation and combination of the four nitrogenous bases can be used to encode information which will be stored in the DNA storage system. The coding rules are as follows: 3.1 Unique Code In order to compatible with different countries and languages, multi-language environment, it is must be defined each character as unique code. Coding using an abstract way which combines Adenine, Guanine, Cytosine and Thymine (A, G, C and T for short) to deal with characters, and the visual image work, such as font size, shape, font, form, style and so on for application software to deal with, such as a web browser or word processor. 3.2 Permutation and Combination of Nitrogenous Bases Use The coding rule is composed of four nitrogenous bases permutation and combination. In order to maximize the including information about the character of all countries and languages, from 0 to 0x10FFFF are used to indicate all countries and the language character in Unicode encoding, a total of code points. If use the nitrogenous bases permutation and combination to represent code points, in order to defined each character as unique code, it need 11 nitrogenous bases to represent each code point. For economizing on space of storage, reducing duplication of nitrogenous bases which are from the high-order to low-order. And the adenine (A for short) as '00', the guanine (G for short) as '01', the cytosine (C for short) as '10', the thymine (T for short) as '11'. The table 1 is mapping table of nitrogenous bases. Copyright 2015 SERSC 163
4 Table 1. The mapping table of nitrogenous bases Unicode Binary Sequence 0 0 A 0x1 1 G 0x2 10 C 0x3 11 T 0xA 1010 CC 0xAF CCTT 0x10FFFF GAATTTTTAAA 3.3 Latin Letters Computer system support the basic Latin letters. In the ISO it defined 256 commonly used characters, such as numbers, uppercase Latin letters, lowercase Latin letters, etc. So the first 256 positions in the character encoding reserved for the characters which include in the ISO8859-1, in order to improve the character encoding efficiency and compatibility. 3.4 Multi-Languages Environment To improve the efficiency and compatibility of multi-languages, the character encoding provide independent zone for different language. The Unicode plane is a good reference for the character encoding. 5 Algorithm Algorithm describes how to perform the character encode with nitrogenous bases. First import the text file which will be transform into the memory. According to the order of the characters in the text, get the Unicode of the character one by one. Follow the code rules, transcode the Unicode to nitrogenous bases. Output the final result to store DNA sequence. For example, the character "A" Unicode is 0x41 ( ), the corresponding nitrogenous bases is AAAAAAAAGAAG, simplified nitrogenous bases is GAAG. In encryption round, the nitrogenous bases (DNA sequence) will add round key, sub bytes, shift rows, mix columns. The final ciphertext will be storage. 1: Initialization 2: Import the plaintext file 3: for each character do 4: Get Unicode of the characters C unicode 5: Transcode C unicode to C DNA 6: Output C DNA to store DNA sequence 7: end for 164 Copyright 2015 SERSC
5 6 Verification of Algorithm The Import the text file which include Latin alphabets, Chinese characters, Japanese characters, numbers, and symbols. The application software (Fig. 1 is an example) get Unicode of the character in binary at first. Then follow the coding rules the application software transcode the Unicode to the nitrogenous bases. Inverse this operation, the application software also get the raw text from DNA sequence. Fig. 1. Example of the Character encoding 7 Conclusions This paper puts forward a set of encoding of characters used to DNA storage system. The character encoding can be implemented to convert character to sequence of nitrogenous bases so as to implement the encoding and decoding of character information. This character encoding are more compatible with the multi-language environment, and all character encoding is uniqueness. Acknowledgment. Dr. Yang Guo are greatly acknowledged for supporting this study. Laboratory of complex network and visualization has made publishing of this article possible. Copyright 2015 SERSC 165
6 References 1. Wei Dan, "Review of magnetic information storage technology," in Physics, vol. 33(9), 2004, pp Adleman LM., "Molecular Computation of Solution to Combination Problems," in Science, vol. 266(11), 1994, pp ZINGEL T., "Formal models of DNA computing:a survey," in Proc Estonian Acad Sci Phys Math, vol. 49(2), 2000, pp Dietrich A. and Been W., "Memory and DNA," in J theor Biol, vol. 208, 2001, pp Garzon MH., Neel A., Chen H., "Efficiency and Reliability of DNA Based Memories," in GECCO, 2003, pp ROBERT F W., Molecular Biology, 2nd ed., Beijing:Science Press, 2003, pp Copyright 2015 SERSC
HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2
HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2 1 Tata Consultancy Services, India derahul@ieee.org 2 Bangalore University, India ABSTRACT
More informationInternational Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
More informationUPS battery remote monitoring system in cloud computing
, pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology
More informationA New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 2, February 2015, PP 18-27 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org A
More information2. The number of different kinds of nucleotides present in any DNA molecule is A) four B) six C) two D) three
Chem 121 Chapter 22. Nucleic Acids 1. Any given nucleotide in a nucleic acid contains A) two bases and a sugar. B) one sugar, two bases and one phosphate. C) two sugars and one phosphate. D) one sugar,
More informationBasic Concepts of DNA, Proteins, Genes and Genomes
Basic Concepts of DNA, Proteins, Genes and Genomes Kun-Mao Chao 1,2,3 1 Graduate Institute of Biomedical Electronics and Bioinformatics 2 Department of Computer Science and Information Engineering 3 Graduate
More informationDNA and the Cell. Version 2.3. English version. ELLS European Learning Laboratory for the Life Sciences
DNA and the Cell Anastasios Koutsos Alexandra Manaia Julia Willingale-Theune Version 2.3 English version ELLS European Learning Laboratory for the Life Sciences Anastasios Koutsos, Alexandra Manaia and
More informationCLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,
More information1. Molecular computation uses molecules to represent information and molecular processes to implement information processing.
Chapter IV Molecular Computation These lecture notes are exclusively for the use of students in Prof. MacLennan s Unconventional Computation course. c 2013, B. J. MacLennan, EECS, University of Tennessee,
More informationDesign of Distributed Pharmaceutical Retail Management System Based on Advanced Encryption Standard Algorithm
, pp. 35-42 http://dx.doi.org/10.14257/ijsia.2015.9.6.04 Design of Distributed Pharmaceutical Retail System Based on Advanced Encryption Standard Algorithm Jingjing Yang, Yuanqiang Wang and Xiao Zhang*
More informationPRACTICE TEST QUESTIONS
PART A: MULTIPLE CHOICE QUESTIONS PRACTICE TEST QUESTIONS DNA & PROTEIN SYNTHESIS B 1. One of the functions of DNA is to A. secrete vacuoles. B. make copies of itself. C. join amino acids to each other.
More informationInternational Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
More informationImage Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
More informationResearch on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
More informationMATCH Commun. Math. Comput. Chem. 61 (2009) 781-788
MATCH Communications in Mathematical and in Computer Chemistry MATCH Commun. Math. Comput. Chem. 61 (2009) 781-788 ISSN 0340-6253 Three distances for rapid similarity analysis of DNA sequences Wei Chen,
More informationEffective software oriented cryptosystem in complex PC security software
Computer Science Journal of Moldova, vol.2, no.3(6), 1994 Effective software oriented cryptosystem in complex PC security software A.Moldovyan N.Moldovyan P.Moldovyan Abstract To ensure high encryption
More informationMAKING AN EVOLUTIONARY TREE
Student manual MAKING AN EVOLUTIONARY TREE THEORY The relationship between different species can be derived from different information sources. The connection between species may turn out by similarities
More informationFault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
More informationCyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
More informationA Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards
, pp.166-171 http://dx.doi.org/10.14257/astl.205.98.42 A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards Yeo ChangSub 1, Ryu HyunKi 1 and Lee HaengSuk
More informationParallel Compression and Decompression of DNA Sequence Reads in FASTQ Format
, pp.91-100 http://dx.doi.org/10.14257/ijhit.2014.7.4.09 Parallel Compression and Decompression of DNA Sequence Reads in FASTQ Format Jingjing Zheng 1,* and Ting Wang 1, 2 1,* Parallel Software and Computational
More informationDesign and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
More informationMolecular Genetics. RNA, Transcription, & Protein Synthesis
Molecular Genetics RNA, Transcription, & Protein Synthesis Section 1 RNA AND TRANSCRIPTION Objectives Describe the primary functions of RNA Identify how RNA differs from DNA Describe the structure and
More informationTask: ASC Ascending Paths
Task: ASC Ascending Paths You are visiting the Royal Botanical Gardens. In the gardens there are n intersections connected by m roads. The intersections are numbered from 1 to n. Each road connects two
More informationA Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
More informationA NEW DNA BASED APPROACH OF GENERATING KEY-DEPENDENT SHIFTROWS TRANSFORMATION
A NEW DNA BASED APPROACH OF GENERATING KEY-DEPENDENT SHIFTROWS TRANSFORMATION Auday H. Al-Wattar 1, Ramlan Mahmod 2, Zuriati Ahmad Zukarnain3, and Nur Izura Udzir4, 1 Faculty of Computer Science and Information
More informationSplit Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
More informationAStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationThe Unicode Standard Version 8.0 Core Specification
The Unicode Standard Version 8.0 Core Specification To learn about the latest version of the Unicode Standard, see http://www.unicode.org/versions/latest/. Many of the designations used by manufacturers
More informationChapter 4: Computer Codes
Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
More informationResearch and Performance Analysis of HTML5 WebSocket for a Real-time Multimedia Data Communication Environment
Vol.46 (Multimedia 2014), pp.307-312 http://dx.doi.org/10.14257/astl.2014.46.64 Research and Performance Analysis of HTML5 WebSocket for a Real-time Multimedia Data Communication Environment Jin-tae Park
More informationSTRUCTURES OF NUCLEIC ACIDS
CHAPTER 2 STRUCTURES OF NUCLEIC ACIDS What is the chemical structure of a deoxyribonucleic acid (DNA) molecule? DNA is a polymer of deoxyribonucleotides. All nucleic acids consist of nucleotides as building
More informationImplementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
More informationDNA is found in all organisms from the smallest bacteria to humans. DNA has the same composition and structure in all organisms!
Biological Sciences Initiative HHMI DNA omponents and Structure Introduction Nucleic acids are molecules that are essential to, and characteristic of, life on Earth. There are two basic types of nucleic
More informationComparison of Open Source Cloud System for Small and Medium Sized Enterprises
, pp.276-282 http://dx.doi.org/10.14257/astl.2014.51.63 Comparison of Open Source Cloud System for Small and Medium Sized Enterprises Yasuo Uchida 1, Seigo Matsuno 1, Makoto Sakamoto 2 1 Ube National College
More informationName Class Date. Figure 13 1. 2. Which nucleotide in Figure 13 1 indicates the nucleic acid above is RNA? a. uracil c. cytosine b. guanine d.
13 Multiple Choice RNA and Protein Synthesis Chapter Test A Write the letter that best answers the question or completes the statement on the line provided. 1. Which of the following are found in both
More informationSynthetic Biology: DNA Digital Storage, Computation and the Organic Computer
Synthetic Biology: DNA Digital Storage, Computation and the Organic Computer Alex Widdel University of Minnesota, Morris 1 / 27 Outline Overview of Synthetic Biology 1 Overview of Synthetic Biology 2 3
More informationDevelopment of XML-based Standardized Software Database Specifications and Operating Schema
, pp.215-224 http://dx.doi.org/10.14257/ijseia.2014.8.1.19 Development of XML-based Standardized Software Database Specifications and Operating Schema Chang-Su Kim 1, Tae-Hak Ban 1 and Hoe-Kyung Jung 1*
More informationOverview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography
CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What
More informationCloud Storage Solution for WSN Based on Internet Innovation Union
Cloud Storage Solution for WSN Based on Internet Innovation Union Tongrang Fan 1, Xuan Zhang 1, Feng Gao 1 1 School of Information Science and Technology, Shijiazhuang Tiedao University, Shijiazhuang,
More informationFriendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
More informationMethod of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
More informationName Date Period. 2. When a molecule of double-stranded DNA undergoes replication, it results in
DNA, RNA, Protein Synthesis Keystone 1. During the process shown above, the two strands of one DNA molecule are unwound. Then, DNA polymerases add complementary nucleotides to each strand which results
More informationA PPENDIX G S IMPLIFIED DES
A PPENDIX G S IMPLIFIED DES William Stallings opyright 2010 G.1 OVERVIEW...2! G.2 S-DES KEY GENERATION...3! G.3 S-DES ENRYPTION...4! Initial and Final Permutations...4! The Function f K...5! The Switch
More informationMolecular Computing. david.wishart@ualberta.ca 3-41 Athabasca Hall Sept. 30, 2013
Molecular Computing david.wishart@ualberta.ca 3-41 Athabasca Hall Sept. 30, 2013 What Was The World s First Computer? The World s First Computer? ENIAC - 1946 Antikythera Mechanism - 80 BP Babbage Analytical
More informationDesign of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn
More informationDNA Replication & Protein Synthesis. This isn t a baaaaaaaddd chapter!!!
DNA Replication & Protein Synthesis This isn t a baaaaaaaddd chapter!!! The Discovery of DNA s Structure Watson and Crick s discovery of DNA s structure was based on almost fifty years of research by other
More informationThymine = orange Adenine = dark green Guanine = purple Cytosine = yellow Uracil = brown
1 DNA Coloring - Transcription & Translation Transcription RNA, Ribonucleic Acid is very similar to DNA. RNA normally exists as a single strand (and not the double stranded double helix of DNA). It contains
More informationCrime Hotspots Analysis in South Korea: A User-Oriented Approach
, pp.81-85 http://dx.doi.org/10.14257/astl.2014.52.14 Crime Hotspots Analysis in South Korea: A User-Oriented Approach Aziz Nasridinov 1 and Young-Ho Park 2 * 1 School of Computer Engineering, Dongguk
More informationOn Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
More informationCellular Respiration Worksheet 1. 1. What are the 3 phases of the cellular respiration process? Glycolysis, Krebs Cycle, Electron Transport Chain.
Cellular Respiration Worksheet 1 1. What are the 3 phases of the cellular respiration process? Glycolysis, Krebs Cycle, Electron Transport Chain. 2. Where in the cell does the glycolysis part of cellular
More informationExploring the Efficiency of Big Data Processing with Hadoop MapReduce
Exploring the Efficiency of Big Data Processing with Hadoop MapReduce Brian Ye, Anders Ye School of Computer Science and Communication (CSC), Royal Institute of Technology KTH, Stockholm, Sweden Abstract.
More informationThe Structure, Replication, and Chromosomal Organization of DNA
Michael Cummings Chapter 8 The Structure, Replication, and Chromosomal Organization of DNA David Reisman University of South Carolina History of DNA Discoveries Friedrich Miescher Isolated nuclein from
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
More informationSecret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
More informationContributing Efforts of Various String Matching Methodologies in Real World Applications
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-I E-ISSN: 2347-2693 Contributing Efforts of Various String Matching Methodologies in Real World Applications
More informationSH-Sim: A Flexible Simulation Platform for Hybrid Storage Systems
, pp.61-70 http://dx.doi.org/10.14257/ijgdc.2014.7.3.07 SH-Sim: A Flexible Simulation Platform for Hybrid Storage Systems Puyuan Yang 1, Peiquan Jin 1,2 and Lihua Yue 1,2 1 School of Computer Science and
More informationDesign and Analysis of Mobile Learning Management System based on Web App
, pp. 417-428 http://dx.doi.org/10.14257/ijmue.2015.10.1.38 Design and Analysis of Mobile Learning Management System based on Web App Shinwon Lee Department of Computer System Engineering, Jungwon University,
More informationA Service Revenue-oriented Task Scheduling Model of Cloud Computing
Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,
More informationCHAPTER 6: RECOMBINANT DNA TECHNOLOGY YEAR III PHARM.D DR. V. CHITRA
CHAPTER 6: RECOMBINANT DNA TECHNOLOGY YEAR III PHARM.D DR. V. CHITRA INTRODUCTION DNA : DNA is deoxyribose nucleic acid. It is made up of a base consisting of sugar, phosphate and one nitrogen base.the
More informationA Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
More informationSurvey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 5 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationDNA, RNA, Protein synthesis, and Mutations. Chapters 12-13.3
DNA, RNA, Protein synthesis, and Mutations Chapters 12-13.3 1A)Identify the components of DNA and explain its role in heredity. DNA s Role in heredity: Contains the genetic information of a cell that can
More informationTeacher Guide: Have Your DNA and Eat It Too ACTIVITY OVERVIEW. http://gslc.genetics.utah.edu
ACTIVITY OVERVIEW Abstract: Students build an edible model of DNA while learning basic DNA structure and the rules of base pairing. Module: The Basics and Beyond Prior Knowledge Needed: DNA contains heritable
More informationAlgorithms in Computational Biology (236522) spring 2007 Lecture #1
Algorithms in Computational Biology (236522) spring 2007 Lecture #1 Lecturer: Shlomo Moran, Taub 639, tel 4363 Office hours: Tuesday 11:00-12:00/by appointment TA: Ilan Gronau, Taub 700, tel 4894 Office
More informationInternet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
More informationComputer Systems Structure Main Memory Organization
Computer Systems Structure Main Memory Organization Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Storage/Memory
More informationA Tutorial in Genetic Sequence Classification Tools and Techniques
A Tutorial in Genetic Sequence Classification Tools and Techniques Jake Drew Data Mining CSE 8331 Southern Methodist University jakemdrew@gmail.com www.jakemdrew.com Sequence Characters IUPAC nucleotide
More informationA Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm
Journal of Information & Computational Science 9: 16 (2012) 4801 4809 Available at http://www.joics.com A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm
More informationOptimization of Distributed Crawler under Hadoop
MATEC Web of Conferences 22, 0202 9 ( 2015) DOI: 10.1051/ matecconf/ 2015220202 9 C Owned by the authors, published by EDP Sciences, 2015 Optimization of Distributed Crawler under Hadoop Xiaochen Zhang*
More informationMain Memory & Backing Store. Main memory backing storage devices
Main Memory & Backing Store Main memory backing storage devices 1 Introduction computers store programs & data in two different ways: nmain memory ntemporarily stores programs & data that are being processed
More informationASCII Code. Numerous codes were invented, including Émile Baudot's code (known as Baudot
ASCII Code Data coding Morse code was the first code used for long-distance communication. Samuel F.B. Morse invented it in 1844. This code is made up of dots and dashes (a sort of binary code). It was
More informationEncoding Text with a Small Alphabet
Chapter 2 Encoding Text with a Small Alphabet Given the nature of the Internet, we can break the process of understanding how information is transmitted into two components. First, we have to figure out
More informationDNA and Forensic Science
DNA and Forensic Science Micah A. Luftig * Stephen Richey ** I. INTRODUCTION This paper represents a discussion of the fundamental principles of DNA technology as it applies to forensic testing. A brief
More informationModern Accounting Information System Security (AISS) Research Based on IT Technology
, pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and
More informationCloud based Holdfast Electronic Sports Game Platform
Case Study Cloud based Holdfast Electronic Sports Game Platform Intel and Holdfast work together to upgrade Holdfast Electronic Sports Game Platform with cloud technology Background Shanghai Holdfast Online
More informationAn Implementation of a High Capacity 2D Barcode
An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development
More informationChapter 11: Molecular Structure of DNA and RNA
Chapter 11: Molecular Structure of DNA and RNA Student Learning Objectives Upon completion of this chapter you should be able to: 1. Understand the major experiments that led to the discovery of DNA as
More informationZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:
More informationCLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
More informationDNA. Discovery of the DNA double helix
DNA Replication DNA Discovery of the DNA double helix A. 1950 s B. Rosalind Franklin - X-ray photo of DNA. C. Watson and Crick - described the DNA molecule from Franklin s X-ray. What is DNA? Question:
More informationGenetics Test Biology I
Genetics Test Biology I Multiple Choice Identify the choice that best completes the statement or answers the question. 1. Avery s experiments showed that bacteria are transformed by a. RNA. c. proteins.
More informationDNA Mapping/Alignment. Team: I Thought You GNU? Lars Olsen, Venkata Aditya Kovuri, Nick Merowsky
DNA Mapping/Alignment Team: I Thought You GNU? Lars Olsen, Venkata Aditya Kovuri, Nick Merowsky Overview Summary Research Paper 1 Research Paper 2 Research Paper 3 Current Progress Software Designs to
More informationSubject Area(s) Biology. Associated Unit Engineering Nature: DNA Visualization and Manipulation. Associated Lesson Imaging the DNA Structure
Subject Area(s) Biology Associated Unit Engineering Nature: DNA Visualization and Manipulation Associated Lesson Imaging the DNA Structure Activity Title Inside the DNA Header Image 1 ADA Description:
More informationGenetics Module B, Anchor 3
Genetics Module B, Anchor 3 Key Concepts: - An individual s characteristics are determines by factors that are passed from one parental generation to the next. - During gamete formation, the alleles for
More informationAn Automated Function Test Framework for Business Workflow Test Based on Data File
, pp.136-141 http://dx.doi.org/10.14257/astl.2014.45.26 An Automated Function Test Framework for Business Workflow Test Based on Data File Zhenyu Liu, Qiang Chen, and Lizhi Cai Shanghai Key Laboratory
More informationCONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
More informationPolar Covalent Bonds and Hydrogen Bonds
Lesson 6.1: Polar Covalent Bonds and Hydrogen Bonds The last section of code will add hydrogen bonding functionality between molecules. To do so, we have to understand the chemistry of polar covalent bonds
More informationSecure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
More informationPrimary Memory. Input Units CPU (Central Processing Unit)
Basic Concepts of Computer Hardware Primary Memory Input Units CPU (Central Processing Unit) Output Units This model of the typical digital computer is often called the von Neuman compute Programs and
More informationANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING Sonam Mahajan 1 and Maninder Singh 2 1 Department of Computer Science Engineering, Thapar University, Patiala, India 2 Department of Computer Science Engineering,
More informationImproving Cloud Security Using Data Partitioning And Encryption Technique
Improving Cloud Security Using Data Partitioning And Encryption Technique Mr. Akash Kanade Department of Computer Engineering JSPM s JSCOE Pune, India akash.kanade1@gmail.com Ms. Rohini Mule Department
More informationCHAPTER 5. Obfuscation is a process of converting original data into unintelligible data. It
CHAPTER 5 5.1. Introduction Obfuscation is a process of converting original data into unintelligible data. It is similar to encryption but it uses mathematical calculations or programming logics. Encryption
More informationAcademic Nucleic Acids and Protein Synthesis Test
Academic Nucleic Acids and Protein Synthesis Test Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. 1. Each organism has a unique combination
More informationMIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
More informationStructure and Function of DNA
Structure and Function of DNA DNA and RNA Structure DNA and RNA are nucleic acids. They consist of chemical units called nucleotides. The nucleotides are joined by a sugar-phosphate backbone. The four
More informationHow To Encrypt With Dna
, pp.215-222 http://dx.doi.org/10.14257/ijbsbt.2014.6.5.22 Message Transmission Based on DNA Cryptography: Review Tausif Anwar 1, Dr. Sanchita Paul 2 and Shailendra Kumar Singh 3 1 Dept. of Computer Science
More informationForensic DNA Testing Terminology
Forensic DNA Testing Terminology ABI 310 Genetic Analyzer a capillary electrophoresis instrument used by forensic DNA laboratories to separate short tandem repeat (STR) loci on the basis of their size.
More informationDNA Scissors: Introduction to Restriction Enzymes
DNA Scissors: Introduction to Restriction Enzymes Objectives At the end of this activity, students should be able to 1. Describe a typical restriction site as a 4- or 6-base- pair palindrome; 2. Describe
More information