SlideShare a Scribd company logo
1 of 14
Download to read offline
Overview   Problem Setup And Analysis            Tuning the Errors   Conclusion   Sources




           Bio-op Errors in DNA Computing
                 A Sensitivity Analysis

                                         Daniel Bilar

                                    University of New Orleans
                                  Department of Computer Science
                                   New Orleans, Louisiana, USA


                                    May 27, 2009
                                   ACIS SNPD ’09
                            Catholic University of Daegu
                             Daegu, Republic of Korea
Overview         Problem Setup And Analysis   Tuning the Errors   Conclusion   Sources



Talk Roadmap

       Motivation DNA Computing
       Parallelizable combinatorial problems such as Hamiltonian Path,
       DES code breaking and knapsack problems [1, 2, 3] can be solved
       Error rates of biological operation range from 10−5 to 0.05 [4]

       Sensitivity Analysis on DNA Algorithm
       Simulate DNA algorithm for Shortest Common Superstring
       Problem
       Perform sensitivity analysis for each step of algorithm
       Goal is to make algorithm error resistant

       Tuning the Errors
       Good Encoding focus on input data error-resistance
       Multiplexing focus on operation error-resistance
       Constant Volume Transformation focus on algorithm as a whole
       error-resistance
Overview             Problem Setup And Analysis   Tuning the Errors   Conclusion   Sources



Chosen Problem

       Shortest Common Superstring Problem
       NP-Complete Combinatorial Problem Given an alphabet Σ, a
       finite set R of strings from Σ∗ (the set of all words over Σ) and a
       positive integer K, find a string w ∈ Σ∗ with length |w| ≤ K such that
       each string x ∈ R is a substring of w.

       Gloor’s Algorithm [5]
           1   Encode all the strings x1 , x2 , . . . , xn ∈ R as DNA strands
           2   Generate all possible solutions which are DNA strands w of
               length less than or equal to K
           3   Iteratively refine solution Let xj be a string of R. From our
               solution population, select only the ones which contain xj as a
               sub-string. Let this be our new solution population. Repeat this
               step for each string xi ∈ R, 1 ≤ i ≤ n
           4   Return result if our solution population is non-empty, return
               ’Yes’ and the solution string(s). Otherwise, return ’No’
Overview                   Problem Setup And Analysis                Tuning the Errors                  Conclusion                Sources



Empirical Error Rates

           Step                          Bio-op                       Type I Error                    Type II Error
           1) Encoding sub-strings       Synthesizing through se-     NA                              Wrong letter is bonded
                                         quential coupling                                            (0.05)
           2) Generate solution pop-     Synthesizing through se-     NA                              Wrong letter is bonded
           ulation                       quential coupling                                            (0.05)
           3) Match sub-strings to so-   Extraction using affinity      Correct   match is   not rec-   Incorrect match is recog-
           lution population             purification                  ognized   as match   (0.05)     nized as match (10−6 )
           4) Detect and output final     Sequencing using poly-       Correct   match is   not rec-   Incorrect match is recog-
           solution                      merase chain reaction and    ognized   as match   (0.05)     nized as match (10−5 )
                                         gel electrophoresis

                                            Table: Error rates of bio-operations [4][6]



       Gloor’s Algorithm [5]

            1 Encode all the strings x1 , x2 , . . . , xn ∈ R as DNA strands
            2 Generate all possible solutions which are DNA strands w of length less than
                or equal to K
            3 Iteratively refine solution Let xj be a string of R. From our solution
                population, select only the ones which contain xj as a sub-string. Let this be our
                new solution population. Repeat this step for each string xi ∈ R, 1 ≤ i ≤ n
            4 Return result if our solution population is non-empty, return ’Yes’ and the
                solution string(s). Otherwise, return ’No’
Overview              Problem Setup And Analysis             Tuning the Errors           Conclusion             Sources



Experiment and Results

           Step                                Type I Error Levels               Type II Error Levels
           1) Encoding sub-strings             NA                                0.05, 0.005
           2) Generate solution pop-           NA                                0.05, 0.005, 0.0005, 0.00005
           ulation
           3) Match sub-strings to so-         0.05, 0.005, 0.0005, 0.00005      NA
           lution population
                                Table: Bio-op error levels for factorial experiments



       Setup
       Algorithm implementation of all possible solutions of length K ≤ 6
       and chosen sub-string matches gg, t, cg, tg, tgg
       Factorial experiment varied error rates for three bio-ops

       Result
       Hit rate most sensitive to the type II errors in step 1. In conjunction
       with lower type I error of step 3, pushed hit rate above the 90% mark
       Lesson is encoding and extraction steps most important
Overview           Problem Setup And Analysis             Tuning the Errors       Conclusion   Sources



Targeting Input Data: Good Encoding Overview

       Target Input Data
       False encoding of search strings most sensitive factor. Practical mechanism
       that produces error is hybridization stringency (number of complementary
       base pairs that have to match for DNA oligonucleotides to bond)


       Deaton’s Upper Bound [7]
       Studied Hamiltonian Path Problem
       Found upper bound of number of vertices that can be encoded in
       oligonucleotides of length n without producing mismatches
                                                 t    n                       n
                                          |C|         2   (q − 1) ≤ q         2

                                                i=0
                                                      i

       where t is the number of errors that occur in hybridization, q is cardinality of
       the alphabet (q = 4 for DNA), and |C| is the number of vertices.
       Mismatch-free defined as every codeword being a distance greater than t
       from any other codeword
       If the Hamming bound satisfied, no type II matching errors
Overview            Problem Setup And Analysis             Tuning the Errors       Conclusion   Sources



Targeting Input Data: Good Encoding Discussion
       Deaton’s Upper Bound [7]
       Upper bound of number of vertices that can be encoded in oligonucleotides
       of length n without producing mismatches
                                                  t    n                       n
                                           |C|         2   (q − 1) ≤ q 2
                                                 i=0
                                                       i

       where t is the number of errors that occur in hybridization, q is cardinality of
       the alphabet (q = 4 for DNA), and |C| is the number of vertices.
       Mismatch-free defined as every codeword being a distance greater than t
       from any other codeword
       If the Hamming bound satisfied, no type II matching errors

       Discussion
       Biological pendant of the Hamming error-correcting code
       Requires mismatch-free encoding, may not be possible for a given
       problem
       Conclusion Added error flexibility has to be bought with carefully designed
       oligonucleotide encoding.
Overview           Problem Setup And Analysis   Tuning the Errors     Conclusion         Sources



Targeting Operation: Multiplexing Overview
       Target Operations
       System rebound from error assuming a certain number of faulty inputs

       von Neumann’s Multiplexing [8]
       Given input error rate and operation error rate ǫ, critical level of input must
       be determined for a desired output error rate ψ. Interpret group of inputs
       higher than critical level δ as a positive state, lower than critical level as
       negative state.

       DNA computing adaption
       For every bio-op with error rate ǫ, fix your output error rate ψ to a desirable
       level by replicating the inputs N times. Given N, find your critical level δ
       using
                                       1     −k
                                                               √
                             ρ(N) = √      e  2 , with k = 0.62  N
                                       2πk
       Interval zone (δ, 1 − δ) is one of uncertainty, where the error rate may or
       may not have been achieved. If at least the fraction 1 − δ of inputs remains
       the same, operation produces a positive result. If at most fraction δ of your
       inputs is same, operation produces negative result
Overview              Problem Setup And Analysis          Tuning the Errors          Conclusion             Sources



Targeting Operation: Multiplexing Discussion

           N      1000              2000           3000           5000        10000           20000
           ρ(N)   2.7 ∗ 10−2        2.6 ∗ 10−3     2.5 ∗ 10−4     4 ∗ 10−6    1.6 ∗ 10−10     2.8 ∗ 10−19
             Table: Given bio-op error rate ǫ = 0.005, probability of uncertainty as a function of N



       DNA computing adaption
       For every bio-op with error rate ǫ, fix your output error rate ψ to a desirable
       level by replicating the inputs N times. Given N, find your critical level δ.
       Interval zone (δ, 1 − δ) is one of uncertainty, where the error rate may or
       may not have been achieved. If at least fraction 1 − δ of inputs remains the
       same, operation produces positive result. If at most fraction δ, operation
       produces negative result

       Discussion
       N becomes very large to decrease the probability of uncertainty
       Multiplexing helps stabilize errors in algorithms with little data dependencies.
       In some situations, multiplexing amplifies errors (divide-and-conquer
       algorithms)
       Suggests reformulation of algorithms to suit m.o. of DNA computing
Overview           Problem Setup And Analysis   Tuning the Errors   Conclusion         Sources



Targeting Algorithm: Constant Volume Overview
       Target Algorithm
       Previous two approaches concentrated on improving the operand and
       statistically improving error rate of operation
       Broader view of adapting algorithm to the particularities of DNA computing

       Boneh’s Transform Approach [6]
       Classify problems as Decreasing Volume’ if number of strings decrease as the
       algorithm executes, ‘Constant Volume’ if number remains the same and
       ‘Mixed’ otherwise. DNA algorithms are ‘Decreasing Volume’, transform into
       ‘Constant Volume’

       Modification of bio-op steps 3 and 4 from Table 1
       Step 3* Let s be the number of extraction steps, and let the initial solution
       population be 2n strings. Double the solution population every n steps using
                                                                        s

       a PCR (a DNA amplification technique) operation.
       Step 4* Pick m strands at random from the final solution population and
       check whether at least one of them is the desired solution. If not, report
       failure.
Overview            Problem Setup And Analysis       Tuning the Errors      Conclusion   Sources



Targeting Algorithm: Constant Volume Discussion
       Modification of bio-op steps 3 from Table 1
       Step 3* Let s be the number of extraction steps, and let the initial solution
       population be 2n strings. Double solution population every n steps using
                                                                         s

       a PCR (a DNA amplification technique) operation.

       Keeping Constant Volume
       Assume worst-case only one solution in 2n population, let Ps be probability
       that solution survived extraction and is in final population.
                                              s
       Crucial step of bounding Ps Every n steps, solution population is doubled.
       Hence, through growth process every s/n steps, chances increase that
       solution will survive all extractions
                                                 s
                            Ps = 2 − α− n , with α being the type I error

       Discussion
       Assumes PCR operation is error-free; accommodate by reducing α
       Unmanageable for constant-volume algorithms, since quasi-exponential
       bio-mass growth
Overview         Problem Setup And Analysis           Tuning the Errors         Conclusion   Sources



Concluding Thoughts



                               Figure: Yolshimhi hapsida! “Let’s do our best”



       Why bother with problem and DNA Computing?
       Universally programmable DNA computers [9, 10]
       Assumptions crucial Accept basic premise (e.g. DNA computing -
       operations inherently probabilistic)
       Each distinct computing environment may require particular
       algorithmic approach (digital, DNA, hypercomputing, quantum [11])

       Thank you
       Thank you very much for your time and consideration of these ideas
       and for the opportunity to speak at SNPD 09 at the Catholic
       University of Daegu ⌣¨
Overview            Problem Setup And Analysis        Tuning the Errors           Conclusion             Sources



References I

           L. Adleman, “Molecular Computation of Solutions to Combinatorial Problems,” Science,
           no. 266, pp. 1021–1024, 1994.
           L. Adleman, P. Rothemund, and et al, “On Applying Molecular Computation to the Data
           Encryption Standard,” Journal of Computational Biology, vol. 6, no. 1, pp. 53–63, 1999.
           E. B. Baum and D. Boneh, “Running Dynamic Programming Algorithms on a DNA Computer,”
           in DNA-Based Computers II: DIMACS, vol. 44, pp. 77–87, 1999.
           K. Langohr, “Sources of Error in DNA Computation,” tech. rep., University of Western
           Ontario, 1997.
           G. Gloor, L. Kari, and et al, “Towards a DNA Solution to the Shortest Common Superstring
           Problem,” in INTSYS ’98: Proceedings of the IEEE International Joint Symposia on
           Intelligence and Systems, p. 140, IEEE Computer Society, 1998.
           D. Boneh and R. Lipton, “TR-491-95: Making DNA Computers Error Resistant,” tech. rep.,
           Princeton University (NJ), 1995.
           R. Deaton and R. Murphy, “Good Encodings for DNA-based Solutions to Combinatorial
           Problems,” in DNA-Based Computers II: DIMACS, vol. 44, pp. 247–258, 1999.
           J. v. Neuman, “Probabilistic Logics and the Synthesis of Reliable Organisms From Unreliable
           Components,” Annals of Mathematics Studies, no. 34, 1956.
           X. Su and L. M. Smith, “Demonstration of a Universal Surface DNA Computer,” Nucleic
           Acids Research, vol. 32, no. 10, pp. 3115–3123, 2004.
Overview            Problem Setup And Analysis        Tuning the Errors          Conclusion            Sources



References II




           Y. Benenson, B. Gil, and et al., “An autonomous Molecular Computer for Logical Control of
           Gene Expression,” Nature, vol. 429, no. 6990, pp. 423–429, 2004.
           M. J. Biercuk and H. Uys, “Optimized dynamical decoupling in a model quantum memory,”
           Nature, vol. 458, pp. 996–1000, 2009.

More Related Content

Viewers also liked

NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~
NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~
NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~Kazuyuki Kato
 
Litigating Flawed Forensic Science at Every Stage
Litigating Flawed Forensic Science at Every StageLitigating Flawed Forensic Science at Every Stage
Litigating Flawed Forensic Science at Every StageAdam Tebrugge
 
MacMAD Photos Presentation
MacMAD Photos PresentationMacMAD Photos Presentation
MacMAD Photos Presentationbos45
 
Wrongful Conviction Presentation
Wrongful Conviction PresentationWrongful Conviction Presentation
Wrongful Conviction PresentationMsRenee84
 
Crim 215 wrongful convictions
Crim 215 wrongful convictions Crim 215 wrongful convictions
Crim 215 wrongful convictions katherinehaberl
 
Disertación sobre el caso mediático de O. J. Simpson
Disertación sobre el caso mediático de O. J. SimpsonDisertación sobre el caso mediático de O. J. Simpson
Disertación sobre el caso mediático de O. J. SimpsonTavusFox
 
On the meaning of the likelihood ratio: is a large number always an indicati...
On the meaning of the likelihood ratio:  is a large number always an indicati...On the meaning of the likelihood ratio:  is a large number always an indicati...
On the meaning of the likelihood ratio: is a large number always an indicati...hindahaned
 
Forensic sciences and miscarriages of justice copia
Forensic sciences and miscarriages of justice   copiaForensic sciences and miscarriages of justice   copia
Forensic sciences and miscarriages of justice copiaRodrigo Omar Leyva
 
Ethically Litigating Forensic Science Cases: Daubert, Dna and Beyond
Ethically Litigating Forensic Science Cases: Daubert, Dna and BeyondEthically Litigating Forensic Science Cases: Daubert, Dna and Beyond
Ethically Litigating Forensic Science Cases: Daubert, Dna and BeyondAdam Tebrugge
 
D. Mayo: The Science Wars and the Statistics Wars: scientism, popular statist...
D. Mayo: The Science Wars and the Statistics Wars: scientism, popular statist...D. Mayo: The Science Wars and the Statistics Wars: scientism, popular statist...
D. Mayo: The Science Wars and the Statistics Wars: scientism, popular statist...jemille6
 
Laminas Exposicion Final Daniel Rojas Teatredo Criminalistica
Laminas Exposicion Final Daniel Rojas Teatredo CriminalisticaLaminas Exposicion Final Daniel Rojas Teatredo Criminalistica
Laminas Exposicion Final Daniel Rojas Teatredo Criminalisticadanielrojas1909
 
Mayo: 2nd half “Frequentist Statistics as a Theory of Inductive Inference” (S...
Mayo: 2nd half “Frequentist Statistics as a Theory of Inductive Inference” (S...Mayo: 2nd half “Frequentist Statistics as a Theory of Inductive Inference” (S...
Mayo: 2nd half “Frequentist Statistics as a Theory of Inductive Inference” (S...jemille6
 
DNA Evidence with Ancestry
DNA Evidence with AncestryDNA Evidence with Ancestry
DNA Evidence with Ancestrybos45
 
Liberal order in a postwestern world
Liberal order in a postwestern worldLiberal order in a postwestern world
Liberal order in a postwestern worldjechavar
 
Złote wyprzedaże opinie - forum telefon | zlotewyprzedaze.pl
Złote wyprzedaże opinie - forum telefon | zlotewyprzedaze.plZłote wyprzedaże opinie - forum telefon | zlotewyprzedaze.pl
Złote wyprzedaże opinie - forum telefon | zlotewyprzedaze.plPiotr Fillowicz
 
DNA evidence: International Framework
DNA evidence: International Framework DNA evidence: International Framework
DNA evidence: International Framework afiodorova
 
Statistical approaches for the interpretation of DNA evidence
Statistical approaches for the  interpretation of DNA  evidenceStatistical approaches for the  interpretation of DNA  evidence
Statistical approaches for the interpretation of DNA evidencehindahaned
 

Viewers also liked (20)

NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~
NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~
NetCommonsのユーザIDとパスワードでどこでもログイン~OpenIDの秘密~
 
Litigating Flawed Forensic Science at Every Stage
Litigating Flawed Forensic Science at Every StageLitigating Flawed Forensic Science at Every Stage
Litigating Flawed Forensic Science at Every Stage
 
MacMAD Photos Presentation
MacMAD Photos PresentationMacMAD Photos Presentation
MacMAD Photos Presentation
 
Wrongful Conviction Presentation
Wrongful Conviction PresentationWrongful Conviction Presentation
Wrongful Conviction Presentation
 
Crim 215 wrongful convictions
Crim 215 wrongful convictions Crim 215 wrongful convictions
Crim 215 wrongful convictions
 
Disertación sobre el caso mediático de O. J. Simpson
Disertación sobre el caso mediático de O. J. SimpsonDisertación sobre el caso mediático de O. J. Simpson
Disertación sobre el caso mediático de O. J. Simpson
 
On the meaning of the likelihood ratio: is a large number always an indicati...
On the meaning of the likelihood ratio:  is a large number always an indicati...On the meaning of the likelihood ratio:  is a large number always an indicati...
On the meaning of the likelihood ratio: is a large number always an indicati...
 
Junk Science On Trial
Junk Science On TrialJunk Science On Trial
Junk Science On Trial
 
Forensic sciences and miscarriages of justice copia
Forensic sciences and miscarriages of justice   copiaForensic sciences and miscarriages of justice   copia
Forensic sciences and miscarriages of justice copia
 
Wrongful Convictions
Wrongful ConvictionsWrongful Convictions
Wrongful Convictions
 
Oj simpson
Oj simpsonOj simpson
Oj simpson
 
Ethically Litigating Forensic Science Cases: Daubert, Dna and Beyond
Ethically Litigating Forensic Science Cases: Daubert, Dna and BeyondEthically Litigating Forensic Science Cases: Daubert, Dna and Beyond
Ethically Litigating Forensic Science Cases: Daubert, Dna and Beyond
 
D. Mayo: The Science Wars and the Statistics Wars: scientism, popular statist...
D. Mayo: The Science Wars and the Statistics Wars: scientism, popular statist...D. Mayo: The Science Wars and the Statistics Wars: scientism, popular statist...
D. Mayo: The Science Wars and the Statistics Wars: scientism, popular statist...
 
Laminas Exposicion Final Daniel Rojas Teatredo Criminalistica
Laminas Exposicion Final Daniel Rojas Teatredo CriminalisticaLaminas Exposicion Final Daniel Rojas Teatredo Criminalistica
Laminas Exposicion Final Daniel Rojas Teatredo Criminalistica
 
Mayo: 2nd half “Frequentist Statistics as a Theory of Inductive Inference” (S...
Mayo: 2nd half “Frequentist Statistics as a Theory of Inductive Inference” (S...Mayo: 2nd half “Frequentist Statistics as a Theory of Inductive Inference” (S...
Mayo: 2nd half “Frequentist Statistics as a Theory of Inductive Inference” (S...
 
DNA Evidence with Ancestry
DNA Evidence with AncestryDNA Evidence with Ancestry
DNA Evidence with Ancestry
 
Liberal order in a postwestern world
Liberal order in a postwestern worldLiberal order in a postwestern world
Liberal order in a postwestern world
 
Złote wyprzedaże opinie - forum telefon | zlotewyprzedaze.pl
Złote wyprzedaże opinie - forum telefon | zlotewyprzedaze.plZłote wyprzedaże opinie - forum telefon | zlotewyprzedaze.pl
Złote wyprzedaże opinie - forum telefon | zlotewyprzedaze.pl
 
DNA evidence: International Framework
DNA evidence: International Framework DNA evidence: International Framework
DNA evidence: International Framework
 
Statistical approaches for the interpretation of DNA evidence
Statistical approaches for the  interpretation of DNA  evidenceStatistical approaches for the  interpretation of DNA  evidence
Statistical approaches for the interpretation of DNA evidence
 

Similar to Bio-op Errors in DNA Computing

Hossein Taghavi : Codes on Graphs
Hossein Taghavi : Codes on GraphsHossein Taghavi : Codes on Graphs
Hossein Taghavi : Codes on Graphsknowdiff
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabSneheshDutta
 
Energy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sourcesEnergy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sourcesIDES Editor
 
Truncated boolean matrices for dna
Truncated boolean matrices for dnaTruncated boolean matrices for dna
Truncated boolean matrices for dnaIJCSEA Journal
 
A method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesA method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesAlexander Decker
 
On clusteredsteinertree slide-ver 1.1
On clusteredsteinertree slide-ver 1.1On clusteredsteinertree slide-ver 1.1
On clusteredsteinertree slide-ver 1.1VitAnhNguyn94
 
Algorithm review
Algorithm reviewAlgorithm review
Algorithm reviewchidabdu
 
Noisy Optimization Convergence Rates (GECCO2013)
Noisy Optimization Convergence Rates (GECCO2013)Noisy Optimization Convergence Rates (GECCO2013)
Noisy Optimization Convergence Rates (GECCO2013)Jialin LIU
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Loss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic CodingLoss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic CodingIJERA Editor
 
Lecture7 cross validation
Lecture7 cross validationLecture7 cross validation
Lecture7 cross validationStéphane Canu
 
Truncated Boolean Matrices for DNA Computation
Truncated Boolean Matrices for DNA ComputationTruncated Boolean Matrices for DNA Computation
Truncated Boolean Matrices for DNA ComputationIJCSEA Journal
 
第四次课程 Chap8
第四次课程 Chap8第四次课程 Chap8
第四次课程 Chap8Emma2013
 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoderijsrd.com
 
Java中的Float&Double以及Ieee754研究V1.0
Java中的Float&Double以及Ieee754研究V1.0Java中的Float&Double以及Ieee754研究V1.0
Java中的Float&Double以及Ieee754研究V1.0Zianed Hou
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection철 김
 

Similar to Bio-op Errors in DNA Computing (20)

Hossein Taghavi : Codes on Graphs
Hossein Taghavi : Codes on GraphsHossein Taghavi : Codes on Graphs
Hossein Taghavi : Codes on Graphs
 
ma92008id393
ma92008id393ma92008id393
ma92008id393
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlab
 
Energy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sourcesEnergy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sources
 
Truncated boolean matrices for dna
Truncated boolean matrices for dnaTruncated boolean matrices for dna
Truncated boolean matrices for dna
 
A method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesA method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codes
 
On clusteredsteinertree slide-ver 1.1
On clusteredsteinertree slide-ver 1.1On clusteredsteinertree slide-ver 1.1
On clusteredsteinertree slide-ver 1.1
 
Algorithm review
Algorithm reviewAlgorithm review
Algorithm review
 
Noisy Optimization Convergence Rates (GECCO2013)
Noisy Optimization Convergence Rates (GECCO2013)Noisy Optimization Convergence Rates (GECCO2013)
Noisy Optimization Convergence Rates (GECCO2013)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
error control coding
error control coding error control coding
error control coding
 
coba dl.pdf
coba dl.pdfcoba dl.pdf
coba dl.pdf
 
Loss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic CodingLoss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic Coding
 
Lecture7 cross validation
Lecture7 cross validationLecture7 cross validation
Lecture7 cross validation
 
Truncated Boolean Matrices for DNA Computation
Truncated Boolean Matrices for DNA ComputationTruncated Boolean Matrices for DNA Computation
Truncated Boolean Matrices for DNA Computation
 
第四次课程 Chap8
第四次课程 Chap8第四次课程 Chap8
第四次课程 Chap8
 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoder
 
Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)
 
Java中的Float&Double以及Ieee754研究V1.0
Java中的Float&Double以及Ieee754研究V1.0Java中的Float&Double以及Ieee754研究V1.0
Java中的Float&Double以及Ieee754研究V1.0
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection
 

More from namblasec

Defending against Adversarial Cyberspace Participants
Defending against Adversarial Cyberspace ParticipantsDefending against Adversarial Cyberspace Participants
Defending against Adversarial Cyberspace Participantsnamblasec
 
On self-reproducing computer programs
On self-reproducing computer programsOn self-reproducing computer programs
On self-reproducing computer programsnamblasec
 
Using a novel behavioral stimuli-response framework to defend against adversa...
Using a novel behavioral stimuli-response framework to defend against adversa...Using a novel behavioral stimuli-response framework to defend against adversa...
Using a novel behavioral stimuli-response framework to defend against adversa...namblasec
 
Monitoring Smart Grid Operations and Maintaining Missions Assurance
Monitoring Smart Grid Operations and Maintaining Missions AssuranceMonitoring Smart Grid Operations and Maintaining Missions Assurance
Monitoring Smart Grid Operations and Maintaining Missions Assurancenamblasec
 
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayadaKnown Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayadanamblasec
 

More from namblasec (6)

Defending against Adversarial Cyberspace Participants
Defending against Adversarial Cyberspace ParticipantsDefending against Adversarial Cyberspace Participants
Defending against Adversarial Cyberspace Participants
 
On self-reproducing computer programs
On self-reproducing computer programsOn self-reproducing computer programs
On self-reproducing computer programs
 
Using a novel behavioral stimuli-response framework to defend against adversa...
Using a novel behavioral stimuli-response framework to defend against adversa...Using a novel behavioral stimuli-response framework to defend against adversa...
Using a novel behavioral stimuli-response framework to defend against adversa...
 
Monitoring Smart Grid Operations and Maintaining Missions Assurance
Monitoring Smart Grid Operations and Maintaining Missions AssuranceMonitoring Smart Grid Operations and Maintaining Missions Assurance
Monitoring Smart Grid Operations and Maintaining Missions Assurance
 
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayadaKnown Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
 
Cloud2009
Cloud2009Cloud2009
Cloud2009
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Bio-op Errors in DNA Computing

  • 1. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Bio-op Errors in DNA Computing A Sensitivity Analysis Daniel Bilar University of New Orleans Department of Computer Science New Orleans, Louisiana, USA May 27, 2009 ACIS SNPD ’09 Catholic University of Daegu Daegu, Republic of Korea
  • 2. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Talk Roadmap Motivation DNA Computing Parallelizable combinatorial problems such as Hamiltonian Path, DES code breaking and knapsack problems [1, 2, 3] can be solved Error rates of biological operation range from 10−5 to 0.05 [4] Sensitivity Analysis on DNA Algorithm Simulate DNA algorithm for Shortest Common Superstring Problem Perform sensitivity analysis for each step of algorithm Goal is to make algorithm error resistant Tuning the Errors Good Encoding focus on input data error-resistance Multiplexing focus on operation error-resistance Constant Volume Transformation focus on algorithm as a whole error-resistance
  • 3. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Chosen Problem Shortest Common Superstring Problem NP-Complete Combinatorial Problem Given an alphabet Σ, a finite set R of strings from Σ∗ (the set of all words over Σ) and a positive integer K, find a string w ∈ Σ∗ with length |w| ≤ K such that each string x ∈ R is a substring of w. Gloor’s Algorithm [5] 1 Encode all the strings x1 , x2 , . . . , xn ∈ R as DNA strands 2 Generate all possible solutions which are DNA strands w of length less than or equal to K 3 Iteratively refine solution Let xj be a string of R. From our solution population, select only the ones which contain xj as a sub-string. Let this be our new solution population. Repeat this step for each string xi ∈ R, 1 ≤ i ≤ n 4 Return result if our solution population is non-empty, return ’Yes’ and the solution string(s). Otherwise, return ’No’
  • 4. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Empirical Error Rates Step Bio-op Type I Error Type II Error 1) Encoding sub-strings Synthesizing through se- NA Wrong letter is bonded quential coupling (0.05) 2) Generate solution pop- Synthesizing through se- NA Wrong letter is bonded ulation quential coupling (0.05) 3) Match sub-strings to so- Extraction using affinity Correct match is not rec- Incorrect match is recog- lution population purification ognized as match (0.05) nized as match (10−6 ) 4) Detect and output final Sequencing using poly- Correct match is not rec- Incorrect match is recog- solution merase chain reaction and ognized as match (0.05) nized as match (10−5 ) gel electrophoresis Table: Error rates of bio-operations [4][6] Gloor’s Algorithm [5] 1 Encode all the strings x1 , x2 , . . . , xn ∈ R as DNA strands 2 Generate all possible solutions which are DNA strands w of length less than or equal to K 3 Iteratively refine solution Let xj be a string of R. From our solution population, select only the ones which contain xj as a sub-string. Let this be our new solution population. Repeat this step for each string xi ∈ R, 1 ≤ i ≤ n 4 Return result if our solution population is non-empty, return ’Yes’ and the solution string(s). Otherwise, return ’No’
  • 5. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Experiment and Results Step Type I Error Levels Type II Error Levels 1) Encoding sub-strings NA 0.05, 0.005 2) Generate solution pop- NA 0.05, 0.005, 0.0005, 0.00005 ulation 3) Match sub-strings to so- 0.05, 0.005, 0.0005, 0.00005 NA lution population Table: Bio-op error levels for factorial experiments Setup Algorithm implementation of all possible solutions of length K ≤ 6 and chosen sub-string matches gg, t, cg, tg, tgg Factorial experiment varied error rates for three bio-ops Result Hit rate most sensitive to the type II errors in step 1. In conjunction with lower type I error of step 3, pushed hit rate above the 90% mark Lesson is encoding and extraction steps most important
  • 6. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Targeting Input Data: Good Encoding Overview Target Input Data False encoding of search strings most sensitive factor. Practical mechanism that produces error is hybridization stringency (number of complementary base pairs that have to match for DNA oligonucleotides to bond) Deaton’s Upper Bound [7] Studied Hamiltonian Path Problem Found upper bound of number of vertices that can be encoded in oligonucleotides of length n without producing mismatches t n n |C| 2 (q − 1) ≤ q 2 i=0 i where t is the number of errors that occur in hybridization, q is cardinality of the alphabet (q = 4 for DNA), and |C| is the number of vertices. Mismatch-free defined as every codeword being a distance greater than t from any other codeword If the Hamming bound satisfied, no type II matching errors
  • 7. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Targeting Input Data: Good Encoding Discussion Deaton’s Upper Bound [7] Upper bound of number of vertices that can be encoded in oligonucleotides of length n without producing mismatches t n n |C| 2 (q − 1) ≤ q 2 i=0 i where t is the number of errors that occur in hybridization, q is cardinality of the alphabet (q = 4 for DNA), and |C| is the number of vertices. Mismatch-free defined as every codeword being a distance greater than t from any other codeword If the Hamming bound satisfied, no type II matching errors Discussion Biological pendant of the Hamming error-correcting code Requires mismatch-free encoding, may not be possible for a given problem Conclusion Added error flexibility has to be bought with carefully designed oligonucleotide encoding.
  • 8. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Targeting Operation: Multiplexing Overview Target Operations System rebound from error assuming a certain number of faulty inputs von Neumann’s Multiplexing [8] Given input error rate and operation error rate ǫ, critical level of input must be determined for a desired output error rate ψ. Interpret group of inputs higher than critical level δ as a positive state, lower than critical level as negative state. DNA computing adaption For every bio-op with error rate ǫ, fix your output error rate ψ to a desirable level by replicating the inputs N times. Given N, find your critical level δ using 1 −k √ ρ(N) = √ e 2 , with k = 0.62 N 2πk Interval zone (δ, 1 − δ) is one of uncertainty, where the error rate may or may not have been achieved. If at least the fraction 1 − δ of inputs remains the same, operation produces a positive result. If at most fraction δ of your inputs is same, operation produces negative result
  • 9. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Targeting Operation: Multiplexing Discussion N 1000 2000 3000 5000 10000 20000 ρ(N) 2.7 ∗ 10−2 2.6 ∗ 10−3 2.5 ∗ 10−4 4 ∗ 10−6 1.6 ∗ 10−10 2.8 ∗ 10−19 Table: Given bio-op error rate ǫ = 0.005, probability of uncertainty as a function of N DNA computing adaption For every bio-op with error rate ǫ, fix your output error rate ψ to a desirable level by replicating the inputs N times. Given N, find your critical level δ. Interval zone (δ, 1 − δ) is one of uncertainty, where the error rate may or may not have been achieved. If at least fraction 1 − δ of inputs remains the same, operation produces positive result. If at most fraction δ, operation produces negative result Discussion N becomes very large to decrease the probability of uncertainty Multiplexing helps stabilize errors in algorithms with little data dependencies. In some situations, multiplexing amplifies errors (divide-and-conquer algorithms) Suggests reformulation of algorithms to suit m.o. of DNA computing
  • 10. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Targeting Algorithm: Constant Volume Overview Target Algorithm Previous two approaches concentrated on improving the operand and statistically improving error rate of operation Broader view of adapting algorithm to the particularities of DNA computing Boneh’s Transform Approach [6] Classify problems as Decreasing Volume’ if number of strings decrease as the algorithm executes, ‘Constant Volume’ if number remains the same and ‘Mixed’ otherwise. DNA algorithms are ‘Decreasing Volume’, transform into ‘Constant Volume’ Modification of bio-op steps 3 and 4 from Table 1 Step 3* Let s be the number of extraction steps, and let the initial solution population be 2n strings. Double the solution population every n steps using s a PCR (a DNA amplification technique) operation. Step 4* Pick m strands at random from the final solution population and check whether at least one of them is the desired solution. If not, report failure.
  • 11. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Targeting Algorithm: Constant Volume Discussion Modification of bio-op steps 3 from Table 1 Step 3* Let s be the number of extraction steps, and let the initial solution population be 2n strings. Double solution population every n steps using s a PCR (a DNA amplification technique) operation. Keeping Constant Volume Assume worst-case only one solution in 2n population, let Ps be probability that solution survived extraction and is in final population. s Crucial step of bounding Ps Every n steps, solution population is doubled. Hence, through growth process every s/n steps, chances increase that solution will survive all extractions s Ps = 2 − α− n , with α being the type I error Discussion Assumes PCR operation is error-free; accommodate by reducing α Unmanageable for constant-volume algorithms, since quasi-exponential bio-mass growth
  • 12. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources Concluding Thoughts Figure: Yolshimhi hapsida! “Let’s do our best” Why bother with problem and DNA Computing? Universally programmable DNA computers [9, 10] Assumptions crucial Accept basic premise (e.g. DNA computing - operations inherently probabilistic) Each distinct computing environment may require particular algorithmic approach (digital, DNA, hypercomputing, quantum [11]) Thank you Thank you very much for your time and consideration of these ideas and for the opportunity to speak at SNPD 09 at the Catholic University of Daegu ⌣¨
  • 13. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources References I L. Adleman, “Molecular Computation of Solutions to Combinatorial Problems,” Science, no. 266, pp. 1021–1024, 1994. L. Adleman, P. Rothemund, and et al, “On Applying Molecular Computation to the Data Encryption Standard,” Journal of Computational Biology, vol. 6, no. 1, pp. 53–63, 1999. E. B. Baum and D. Boneh, “Running Dynamic Programming Algorithms on a DNA Computer,” in DNA-Based Computers II: DIMACS, vol. 44, pp. 77–87, 1999. K. Langohr, “Sources of Error in DNA Computation,” tech. rep., University of Western Ontario, 1997. G. Gloor, L. Kari, and et al, “Towards a DNA Solution to the Shortest Common Superstring Problem,” in INTSYS ’98: Proceedings of the IEEE International Joint Symposia on Intelligence and Systems, p. 140, IEEE Computer Society, 1998. D. Boneh and R. Lipton, “TR-491-95: Making DNA Computers Error Resistant,” tech. rep., Princeton University (NJ), 1995. R. Deaton and R. Murphy, “Good Encodings for DNA-based Solutions to Combinatorial Problems,” in DNA-Based Computers II: DIMACS, vol. 44, pp. 247–258, 1999. J. v. Neuman, “Probabilistic Logics and the Synthesis of Reliable Organisms From Unreliable Components,” Annals of Mathematics Studies, no. 34, 1956. X. Su and L. M. Smith, “Demonstration of a Universal Surface DNA Computer,” Nucleic Acids Research, vol. 32, no. 10, pp. 3115–3123, 2004.
  • 14. Overview Problem Setup And Analysis Tuning the Errors Conclusion Sources References II Y. Benenson, B. Gil, and et al., “An autonomous Molecular Computer for Logical Control of Gene Expression,” Nature, vol. 429, no. 6990, pp. 423–429, 2004. M. J. Biercuk and H. Uys, “Optimized dynamical decoupling in a model quantum memory,” Nature, vol. 458, pp. 996–1000, 2009.