Results 11 to 20 of about 794,185 (285)

On Double Cyclic Codes over Finite Chain Rings for DNA Computing [PDF]

open access: yesEntropy
Let e be a fixed positive integer and n1,n2 be odd positive integers. The main objective of this article is to investigate the algebraic structure of double cyclic codes of length (n1,n2) over the finite chain ring Re = F4e+vF4e, where v2=0.
Shakir Ali   +4 more
doaj   +2 more sources

Error characterization and error correction approaches in combinatorial DNA-based storage [PDF]

open access: yesScientific Reports
Data storage in DNA has recently emerged as a promising archival solution, offering space-efficient and long-lasting digital storage. DNA’s ultra-high density and durability make it an attractive medium for long-term data storage.
Inbal Preuss   +5 more
doaj   +2 more sources

A New Method to Convert the DNA Sequence of Human to a QR Code [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2019
Data transmission, security and authenticity, nowadays is considered the major source of problems. To face these problems a suitable solution have to be forwarded . Steganography is forwarded  one of the solutions as a technique among many.
Sadoon Abdullah, Zahraa Abdulhamid
doaj   +1 more source

Codes for DNA sequence profiles [PDF]

open access: yes2015 IEEE International Symposium on Information Theory (ISIT), 2015
27 pages, 5 figures.
Han Mao Kiah   +2 more
openaire   +2 more sources

The new (liberal) eugenics [PDF]

open access: yes, 2013
Despite the Nazi horrors, in 1953 the new eugenics was founded, when Watson and Crick postulated the double helix of DNA as the basis of chemical heredity.
Jeremy Gibbons, Nicolas Wu, Ralf Hinze
core   +2 more sources

Codes for DNA storage channels [PDF]

open access: yes2015 IEEE Information Theory Workshop (ITW), 2015
32 pages, 5 ...
Han Mao Kiah   +2 more
openaire   +2 more sources

On the DNA codes

open access: yesMalaya Journal of Matematik, 2023
In this paper, by using three different methods, the DNA codes are obtained from some codes over a family of the rings $D_{i}=D_{1}\left[ w_{2},...,w_{i}\right]/\left\langle w_{i}^{2}-w_{i},w_{i}w_{j}-w_{j}w_{i}\right\rangle $, where $% i=2,...,r,j=1,2,...r$ and $D_{1}=F_{2}+uF_{2}+w_{1}(F_{2}+uF_{2}),u^{2}=0,w_{1}^{2}=w_{1},uw_{1}=w_{1}u, F_{2}=\{0,1\}
null Abdullah DERTLI   +1 more
openaire   +1 more source

A Biological-Inspired Cryptosystem based on DNA Cryptography and Morse Code Ciphering Technique

open access: yesASM Science Journal, 2022
Due to its prominent facility to hide colossal datasets with a high calibre of randomness and subsequent protection, the famous genomic Deoxyribonucleic Acid (DNA) has been presented as a hiding medium, known as DNA steganography.
Adithya B   +1 more
doaj   +1 more source

Reversible $$G^k$$-codes with applications to DNA codes

open access: yesDesigns, Codes and Cryptography, 2022
In this paper, we give a matrix construction method for designing DNA codes that come from group matrix rings. We show that with our construction one can obtain reversible $G^k$-codes of length $kn,$ where $k, n \in \mathbb{N},$ over the finite commutative Frobenius ring $R.$ We employ our construction method to obtain many DNA codes over $\mathbb{F}_4$
Adrian Korban   +2 more
openaire   +2 more sources

Reading the epigenetic code for exchanging DNA

open access: yeseLife, 2020
Three independent studies show that a protein called ZCWPW1 is able to recognize the histone modifications that initiate the recombination of genetic information during meiosis.
Mathilde Biot, Bernard de Massy
doaj   +1 more source

Home - About - Disclaimer - Privacy