期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
DNA Computing with Water Strider Based Vector Quantization for Data Storage Systems
1
作者 A.Arokiaraj Jovith S.Rama Sree +4 位作者 Gudikandhula Narasimha Rao K.Vijaya Kumar Woong Cho Gyanendra Prasad Joshi Sung Won Kim 《Computers, Materials & Continua》 SCIE EI 2023年第3期6429-6444,共16页
The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of data.To accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can b... The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of data.To accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be employed,which encodes and decodes binary data to and from synthesized strands of DNA.Vector quantization(VQ)is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression efficiency.This article introduces a newDNAComputingwithWater StriderAlgorithm based Vector Quantization(DNAC-WSAVQ)technique for Data Storage Systems.The proposed DNAC-WSAVQ technique enables encoding data using DNA computing and then compresses it for effective data storage.Besides,the DNAC-WSAVQ model initially performsDNA encoding on the input images to generate a binary encoded form.In addition,aWater Strider algorithm with Linde-Buzo-Gray(WSA-LBG)model is applied for the compression process and thereby storage area can be considerably minimized.In order to generate optimal codebook for LBG,the WSA is applied to it.The performance validation of the DNAC-WSAVQ model is carried out and the results are inspected under several measures.The comparative study highlighted the improved outcomes of the DNAC-WSAVQ model over the existing methods. 展开更多
关键词 dna computing data storage image compression vector quantization ws algorithm space saving
下载PDF
Closed circle DNA algorithm of change positive-weighted Hamilton circuit problem 被引量:5
2
作者 Zhou Kang Tong Xiaojun Xu Jin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期636-642,共7页
Chain length of closed circle DNA is equal. The same closed circle DNA's position corresponds to different recognition sequence, and the same recognition sequence corresponds to different foreign DNA segment, so clos... Chain length of closed circle DNA is equal. The same closed circle DNA's position corresponds to different recognition sequence, and the same recognition sequence corresponds to different foreign DNA segment, so closed circle DNA computing model is generalized. For change positive-weighted Hamilton circuit problem, closed circle DNA algorithm is put forward. First, three groups of DNA encoding are encoded for all arcs, and deck groups are designed for all vertices. All possible solutions are composed. Then, the feasible solutions are filtered out by using group detect experiment, and the optimization solutions are obtained by using group insert experiment and electrophoresis experiment. Finally, all optimization solutions are found by using detect experiment. Complexity of algorithm is concluded and validity of DNA algorithm is explained by an example. Three dominances of the closed circle DNA algorithm are analyzed, and characteristics and dominances of group delete experiment are discussed. 展开更多
关键词 closed circle dna computing model change positive-weighted Hamilton circuit problem group insert experiment group delete experiment.
下载PDF
Job shop scheduling problem based on DNA computing
3
作者 Yin Zhixiang Cui Jianzhong Yang Yan Ma Ying 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期654-659,共6页
To solve job shop scheduling problem, a new approach-DNA computing is used in solving job shop scheduling problem. The approach using DNA computing to solve job shop scheduling is divided into three stands. Finally, o... To solve job shop scheduling problem, a new approach-DNA computing is used in solving job shop scheduling problem. The approach using DNA computing to solve job shop scheduling is divided into three stands. Finally, optimum solutions are obtained by sequencing A small job shop scheduling problem is solved in DNA computing, and the "operations" of the computation were performed with standard protocols, as ligation, synthesis, electrophoresis etc. This work represents further evidence for the ability of DNA computing to solve NP-complete search problems. 展开更多
关键词 dna computing job shop scheduling problem WEIGHTED tournament.
下载PDF
Quantum demonstration of a bio-molecular solution of the satisfiability problem on spin-based ensemble
4
作者 任婷婷 冯芒 +1 位作者 张云龙 罗军 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第12期5173-5178,共6页
DNA computation (DNAC) has been proposed to solve the satisfiability (SAT) problem due to operations in parallel on extremely large numbers of strands. This paper attempts to treat the DNA-based bio-molecular solu... DNA computation (DNAC) has been proposed to solve the satisfiability (SAT) problem due to operations in parallel on extremely large numbers of strands. This paper attempts to treat the DNA-based bio-molecular solution for the SAT problem from the quantum mechanical perspective with a purpose to explore the relationship between DNAC and quantum computation (QC). To achieve this goal, it first builds up the correspondence of operations between QC and DNAC. Then it gives an example for the case of two variables and three clauses for details of this theory. It also demonstrates a three-qubit experiment for solving the simplest SAT problem with a single variable on a liquid-state nuclear magnetic resonance ensemble to verify this theory. Some discussions are made for the potential application and for further exploration of the present work. 展开更多
关键词 dna computation liquid-state nuclear magnetic resonance SAT problem quantum computation
下载PDF
Amino Acid Encryption Method Using Genetic Algorithm for Key Generation
5
作者 Ahmed S.Sakr M.Y.Shams +1 位作者 Amena Mahmoud Mohammed Zidan 《Computers, Materials & Continua》 SCIE EI 2022年第1期123-134,共12页
In this new information era,the transfer of data and information has become a very important matter.Transferred data must be kept secured from unauthorized persons using cryptography.The science of cryptography depend... In this new information era,the transfer of data and information has become a very important matter.Transferred data must be kept secured from unauthorized persons using cryptography.The science of cryptography depends not only on complex mathematical models but also on encryption keys.Amino acid encryption is a promising model for data security.In this paper,we propose an amino acid encryption model with two encryption keys.The first key is generated randomly using the genetic algorithm.The second key is called the protein key which is generated from converting DNA to a protein message.Then,the protein message and the first key are used in the modified Playfair matrix to generate the cypher message.The experimental results show that the proposed model survives against known attacks such as the Brute-force attack and the Ciphertext-only attack.In addition,the proposed model has been tested over different types of characters including white spaces and special characters,as all the data is encoded to 8-bit binary.The performance of the proposed model is compared with other models using encryption time and decryption time.The model also balances all three principles in the CIA triad. 展开更多
关键词 CRYPTOGRAPHY amino acid genetic algorithm playfair deep learning dna computing
下载PDF
PM3 computation for the DNA complementary base paircross-linked by the metabolite of Benzo[a] pyrene
6
《Chinese Science Bulletin》 SCIE CAS 1998年第2期175-175,共1页
关键词 BASE PM3 computation for the dna complementary base paircross-linked by the metabolite of Benzo[a PYRENE dna
原文传递
Symmetric-key cryptosystem with DNA technology 被引量:14
7
作者 LU MingXin LAI XueJia +1 位作者 XIAO GuoZhen QIN Lei 《Science in China(Series F)》 2007年第3期324-333,共10页
DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into crypto... DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred to as DNA symmetric-key cryptosystem (DNASC). In DNASC, both encryption and decryption keys are formed by DNA probes, while its ciphertext is embedded in a specially designed DNA chip (microarray). The security of this system is mainly rooted in difficult biology processes and problems, rather than conventional computing technology, thus it is unaffected by changes from the attack of the coming quantum computer. The encryption process is a fabrication of a specially designed DNA chip and the decryption process is the DNA hybridization. In DNASC, billions of DNA probes are hybridized and identified at the same time, thus the decryption process is conducted in a massive, parallel way. The great potential in vast parallelism computation and the extraordinary information density of DNA are displayed in DNASC to some degree. 展开更多
关键词 symmetric-key encryption dna cryptography dna computing
原文传递
Logic-Gated Plasmonic Nanodevices Based on DNA-Templated Assembly
8
作者 Fengsong Liu Qiao Jiang +7 位作者 Qing Liu Na Li Zihong Han Chao Liu Zhaoran Wang Yunfei Jiao Jiashu Sun Baoquan Ding 《CCS Chemistry》 CAS 2021年第3期985-993,共9页
Life has evolved numerous elegant molecular machines that recognize biological signals and affect mechanical changes precisely to achieve specific and versatile biofunctions.Inspired by nature,synthetic molecular mach... Life has evolved numerous elegant molecular machines that recognize biological signals and affect mechanical changes precisely to achieve specific and versatile biofunctions.Inspired by nature,synthetic molecular machines could be designed rationally to realize nanomechanical operations and autonomous computing.We constructed logic-gated plasmonic nanodevices through coassembly of two gold nanorods(AuNRs)and computing elements on a tweezer-shaped DNA origami template.After recognition of various molecular inputs,such as DNA strands,glutathione,or adenosine,the geometry and plasmonic circular dichroism(CD)signals of the AuNR–origami nanodevices produced corresponding changes.Then we designed and characterized a set of modular Boolean logic-gated nanodevices(YES,NOT,AND,OR)and proceeded to construct a complicated 3-input circuit capable of performing Boolean OR-NOT-AND operations.Our plasmonic logic devices transduced external inputs into conformational changes and near-infrared(NIR)chiral outputs.This DNA-based self-assembly strategy holds great potential for applications in programmable optical modulators,molecular information processing,and bioanalysis. 展开更多
关键词 dna origami self-assembly logic gate chiral plasmonic nanostructure dna computing
原文传递
Aqueous COmputing:A Survey with an Invitation to Participate
9
作者 TomHead XiaChen 《Journal of Computer Science & Technology》 SCIE EI CSCD 2002年第6期672-681,共10页
The concept of aqueous computing is presented here, first in full generality,and afterward, using an implementation in a specific enzymatic technology. Aqueous computing arosein the context of biomolecular (DNA) compu... The concept of aqueous computing is presented here, first in full generality,and afterward, using an implementation in a specific enzymatic technology. Aqueous computing arosein the context of biomolecular (DNA) computing, but the concept is independent of the specifics ofits biochemical origin. Alternate technologies for realizing aqueous computing are being consideredfor future implementation. A solution of an instance of the Boolean satisfiability problem, (SAT),is reported here that provides a new example of an aqueous computation that has been carried outsuccessfully. This small instance of the SAT problem is sufficiently complex to allow our currentenzymatic technology to be illustrated in detail. The reader is invited to participate in the richinterdisciplinary activity required by wet lab computing. A project is suggested to the reader fordetermining the three-colorings of a graph. The basic operations required for this project areexhibited in the solution of the SAT example reported here. 展开更多
关键词 aqueous computing biomolecular computing dna computing enzymaticcomputing fluid memory graph three-colorings
原文传递
Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things
10
作者 Vivek V.Jog Senthil Murugan,T. 《International Journal of Intelligent Computing and Cybernetics》 EI 2017年第2期241-256,共16页
Purpose-Due to the connectivity of the multiple devices and the systems on the same network,rapid development has become possible in Internet of Things(IoTs)for the last decade.But,IoT is mostly affected with severe s... Purpose-Due to the connectivity of the multiple devices and the systems on the same network,rapid development has become possible in Internet of Things(IoTs)for the last decade.But,IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors,devices and system.In order to handle the security challenges,literature presents a handful of security protocols for IoT.The purpose of this paper is to present a threat profiling and elliptic curve cryptography(ECC)-based mutual and multi-level authentication for the security of IoTs.This work contains two security attributes like memory and machine-related attributes for maintaining the profile table.Also,the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol.Furthermore,three entities like,IoT device,server and authorization centre(AC)performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks.Finally,DPWSim is utilized for simulation of IoT and verification of proposed protocol to show that the protocol is secure against passive and active attacks.Design/methodology/approach-In this work,the authors have presented a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs.This work contains two security attributes like memory and machine-related attributes for maintaining the profile table.Also,the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol.Furthermore,three entities like,IoT device,server and AC performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks.Findings-DPWSim is utilized for simulation of IoT and verification of the proposed protocol to show that this protocol is secure against passive and active attacks.Also,attack analysis is carried out to prove the robustness of the proposed protocol against the password guessing attack,impersonation attack,server spoofing attack,stolen verifier attack and reply attack.Originality/value-This paper presents a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. 展开更多
关键词 SECURITY AUTHENTICATION Internet of Things(IoT) Manufacturing systems Networked control dna computing Elliptic curve cryptography(ECC) Profile table
原文传递
Wavelet transform-based steganographic method for secure data communication using OFDM system
11
作者 Sanjay I.Nipanikar V.Hima Deepthi 《International Journal of Intelligent Computing and Cybernetics》 EI 2017年第3期362-386,共25页
Purpose–Fueled by the rapid growth of internet,steganography has emerged as one of the promising techniques in the communication system to obscure the data.Steganography is defined as the process of concealing the da... Purpose–Fueled by the rapid growth of internet,steganography has emerged as one of the promising techniques in the communication system to obscure the data.Steganography is defined as the process of concealing the data or message within media files without affecting the perception of the image.Media files,like audio,video,image,etc.,are utilized to embed the message.Nowadays,steganography is also used to transmit the medical information or diagnostic reports.The paper aims to discuss these issues.Design/methodology/approach–In this paper,the novel wavelet transform-based steganographic method is proposed for secure data communication using OFDM system.The embedding and extraction process in the proposed steganography method exploits the wavelet transform.Initially,the cost matrix is estimated by the following three aspects:pixel intensity,edge transformation and wavelet transform.The cost estimation matrix provides the location of the cover image where the message is to be entrenched.Then,the wavelet transform is utilized to embed the message into the cover image according to the cost value.Subsequently,in the extraction process,the wavelet transform is applied to the embedded image to retrieve the message efficiently.Finally,in order to transfer the secret information over the channel,the newly developed wavelet-based steganographic method is employed for the OFDM system.Findings–The experimental results are evaluated and performance is analyzed using PSNR and MSE parameters and then compared with existing systems.Thus,the outcome of our wavelet transform steganographic method achieves the PSNR of 71.5 dB which ensures the high imperceptibility of the image.Then,the outcome of the OFDM-based proposed steganographic method attains the higher PSNR of 71.07 dB that proves the confidentiality of the message.Originality/value–In the authors’previous work,the embedding and extraction process was done based on the cost estimation matrix.To enhance the security throughout the communication system,the novel wavelet-based embedding and extraction process is applied to the OFDM system in this paper.The idea behind this method is to attain a higher imperceptibility and robustness of the image. 展开更多
关键词 Data mining dna computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部