DNA digital data storage is the process of encoding and decoding binary data to and from synthesized strands of DNA. While DNA as a storage medium has enormous potential because of its high storage density, its practical use is currently severely limited because of its high cost and very slow read and write times.
Human Beings have always tried to simplify the way of storing data maintaining both security and speed of access. This decade (2011-2020) is focusing on improving data storage devices. New technologies like SSDs (Solid State Drives), technical upgrades in SATA or IDE HDDs (Hard Disk Drives), etc with Terra Bytes of storage capabilities have come to light in recent past. However, DNA Data Storage technology is the next generation of storage technique, which has a lots of storage capability. DNA Data Stor-age will reinvent the way of storing data. This paper discusses about this storage mechanism and emphasizes on the on-going re-search in this field.
Data is what we live for so until human race is currently producing data it needs to be stored somewhere but the things or storage devices developed so far are just not enough even the so called cloud would get out of shape some time so the natural solution to the problem is the solution that existed long before humanity ever started thinking-- DNA ,after all it stores the data equivalent to what can produce a whole human being.
Human Beings have always tried to simplify the way of storing data maintaining both security and speed of access. This decade (2011-2020) is focusing on improving data storage devices. New technologies like SSDs (Solid State Drives), technical upgrades in SATA or IDE HDDs (Hard Disk Drives), etc with Terra Bytes of storage capabilities have come to light in recent past. However, DNA Data Storage technology is the next generation of storage technique, which has a lots of storage capability. DNA Data Stor-age will reinvent the way of storing data. This paper discusses about this storage mechanism and emphasizes on the on-going re-search in this field.
Data is what we live for so until human race is currently producing data it needs to be stored somewhere but the things or storage devices developed so far are just not enough even the so called cloud would get out of shape some time so the natural solution to the problem is the solution that existed long before humanity ever started thinking-- DNA ,after all it stores the data equivalent to what can produce a whole human being.
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyAM Publications
Data security is now a crucial issue now in our day to day life. The protection of personal identity, personal finances depend on the protection of important and irreplaceable information. Cryptography is the science of converting some readable information into something unreadable format, which are hard to decipher. In modern times, cryptography has adopted a new medium: human DNA. At a time when conventional cryptography has been losing strength to more advanced cryptanalysis, DNA cryptography has added more elements of confusion and diffusion. The use of DNA sequences to encrypt data has strengthened the existing classical encryption algorithms. Thus, DNA cryptography has added another dimension to conventional cryptography. In the present paper the authors have made a systematics study on DNA encryption algorithms and how it can be used along with standard classical encryption algorithms.
This documentation is made for my final year project , on Data Storage in DNA.-
contains--------------------
Introduction
History
Dna storage System
Proposed System
Working of DNA Digital Data
Advantages
Disadvantages
Conclusion
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyAM Publications
Data security is now a crucial issue now in our day to day life. The protection of personal identity, personal finances depend on the protection of important and irreplaceable information. Cryptography is the science of converting some readable information into something unreadable format, which are hard to decipher. In modern times, cryptography has adopted a new medium: human DNA. At a time when conventional cryptography has been losing strength to more advanced cryptanalysis, DNA cryptography has added more elements of confusion and diffusion. The use of DNA sequences to encrypt data has strengthened the existing classical encryption algorithms. Thus, DNA cryptography has added another dimension to conventional cryptography. In the present paper the authors have made a systematics study on DNA encryption algorithms and how it can be used along with standard classical encryption algorithms.
This documentation is made for my final year project , on Data Storage in DNA.-
contains--------------------
Introduction
History
Dna storage System
Proposed System
Working of DNA Digital Data
Advantages
Disadvantages
Conclusion
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS ijwmn
A number of various techniques have been already developed for providing security in sensor networks. It
may be anticipated that these techniques provide less secure sensor network which has numerous adverse
effects associated with them. Thus there is a sufficient scope for improvement of secure electronic
communication, as the proficiency of attacks is growing rapidly in wireless sensor networks. DNA
steganography is a technique of covered writing, which provides secure system in sensor network to some
extent. Steganography is more effective over cryptography as later one only conceals information but
steganography obscures the information, as well as camouflage the data to various attackers. DNA
steganography is an inventive approach to reduce the popularity of public key cryptography over the
wireless sensor networks. In the proposed work, a secret key is introduced which is purely based on DNA
sequence named as DNA stego key and is only known to sender and receiver. This DNA stego key is used to
hide information and is stored in a carrier. The proposed technique is implemented using java to verify its
correctness.
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSijwmn
A number of various techniques have been already developed for providing security in sensor networks. It may be anticipated that these techniques provide less secure sensor network which has numerous adverse effects associated with them. Thus there is a sufficient scope for improvement of secure electronic communication, as the proficiency of attacks is growing rapidly in wireless sensor networks. DNA steganography is a technique of covered writing, which provides secure system in sensor network to some
extent. Steganography is more effective over cryptography as later one only conceals information but steganography obscures the information, as well as camouflage the data to various attackers. DNA steganography is an inventive approach to reduce the popularity of public key cryptography over the wireless sensor networks. In the proposed work, a secret key is introduced which is purely based on DNA
sequence named as DNA stego key and is only known to sender and receiver. This DNA stego key is used to
hide information and is stored in a carrier. The proposed technique is implemented using java to verify its
correctness
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS ijwmn
A number of various techniques have been already developed for providing security in sensor networks. It
may be anticipated that these techniques provide less secure sensor network which has numerous adverse
effects associated with them. Thus there is a sufficient scope for improvement of secure electronic
communication, as the proficiency of attacks is growing rapidly in wireless sensor networks. DNA
steganography is a technique of covered writing, which provides secure system in sensor network to some
extent. Steganography is more effective over cryptography as later one only conceals information but
steganography obscures the information, as well as camouflage the data to various attackers. DNA
steganography is an inventive approach to reduce the popularity of public key cryptography over the
wireless sensor networks. In the proposed work, a secret key is introduced which is purely based on DNA
sequence named as DNA stego key and is only known to sender and receiver. This DNA stego key is used to
hide information and is stored in a carrier. The proposed technique is implemented using java to verify its
correctness.
Instead of installing and maintaining software, you simply access it via the Internet, freeing yourself from complex software and hardware management. SaaS applications are sometimes called Web-based software, on-demand software, or hosted software. Whatever the name, SaaS applications run on a SaaS provider's servers.
Home Security System using Arduino & GSM Aditya Nag
The need for home security alarm systems nowadays is a serious demand. As
the number of crimes is increasing every day, there has to be something that
will keep us safe. We are all aware of the high end security systems present in
the market but they are not easily available to everyone. We therefore intend to
provide a solution by constructing a cost efficient electronic system that has the
capability of sensing the motion of the intruders, also detecting LPG gas
leakage (cooking gas) and setting on the alarm. The basic idea behind this
project is that all the bodies generate some heat energy in the form of infrared
which is invisible to human eyes. But, it can be detected by the electronic motion
sensor. The project involves the use of Arduino, a motion sensor, a gas
sensor,buzzer, LCD display and a simple program. The sensor detects any
motion in its permissible range and triggers the alarm by calling the owner and
sending him a message. It will also send the signal to Arduino which processes
the signal and set off the alarm along with a detection message on display. With
this system, we can easily set up a security alarm in our home for unwanted
intruders and gas leakage.
Application Of Python in Medical ScienceAditya Nag
Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation. Its language constructs, as well as its object-oriented approach, aim to help programmers write clear, logical code for small and large-scale projects.
An enterprise committed to the vision of transforming modern-day businesses and amplify their growth trajectory by equipping them with innovative and futuristic tools. With the motto We Connect. You Grow.”, we aim to help businesses operate more efficiently and grow faster. Our product APPSeCONNECT is a next generation integration platform which connects various business applications and enables seamless data exchange between them. Trusted by over 1000 Businesses across 75 Countries, we have benefitted organizations in their quest for unprecedented growth.
A certain level of stress is normal. And positive stress responses from events such as changing schools and meeting new friends can actually help students learn and grow. But when exposed to repeated stressful events without the tools to manage feelings, stress can become emotionally and physically toxic. This guide explains the symptoms of stress in students from elementary school through college and provides strategies teachers and parents can use to help.
A certain level of stress is normal. And positive stress responses from events such as changing schools and meeting new friends can actually help students learn and grow. But when exposed to repeated stressful events without the tools to manage feelings, stress can become emotionally and physically toxic. This guide explains the symptoms of stress in students from elementary school through college and provides strategies teachers and parents can use to help.
Trivia Quiz App is an android based application, and enables the user to undertake a series of questions on Java language. The app is user friendly, and the user shall find it extremely easy to answer the multiple-choice questions. At the end of the quiz, a result-report is generated which states the score. The app also presents an option to the current user to play the question-round again or quit in between. Don't need register simply give any user name it will saved automatically and you can login again with same user name don’t have to worry about the past score. The application helps the user to increase his/her knowledge. Since Smartphone mobiles are being widely used by general population and students, the Trivia app can provide on the Student's mobile.
Product Functions
Trivia system is accessed by entering the user name which is added to the database. Quiz is started by displaying one question with four options each based on computer programming. If the answer is correct, +1 score is incremented for correct answer and no negative marks for wrong answers .After that question's answer quiz application will finally direct you to the score page. Final score will be displayed
Operating environment for the system is as listed below.
Operating system: Android.
Database: Local database
Platform: Android Studio,
Toolkit: Software Development Toolkit(SDK)
What have I learnt
The application Triva Quiz Android Mobile application has been implemented successfully on different Android devices and this enhanced my confidence in Android development. This is the first time that I am developing an Android Application and this gave me an idea of an Android Application Development, it helped me learn its database and how to use API's in Android Development and I would like to learn more about its development in the coming days and would like to try and develop more apps in Android.
.
Sentiment analysis is the interpretation and classification of emotions (positive, negative and neutral) within text data using text analysis techniques. Sentiment analysis allows businesses to identify customer sentiment toward products, brands or services in online conversations and feedback
DNA digital data storage is the process of encoding and decoding binary data to and from synthesized strands of DNA. While DNA as a storage medium has enormous potential because of its high storage density, its practical use is currently severely limited because of its high cost and very slow read and write times.
5G is the 5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. CONTENTS
A brief introduction on data storage and DNA storage
INTRODUCTION
01
Includes a brief explanation about DNA and Digital Storage in
DNA .
WHAT IS DNA?
02
Includes Methods, Picture explanation, Codes for encrypting
data, Secret algorithm, Advantages, Disadvantages.
HOW IS DATASTORED IN
DNA?03
.
CONCLUSION04
4. INTRODUCTION
1. The demand for data storage devices is increasing day by day as more and more
data is generated every day.
2. As the data increases, the current data storage technology would not be
enough to store data in future as data is growing every day.
3. New York Genome Center have come up with a new way to encode digital data in
DNA to create the highest density large scale data storage scheme ever invented.
4. capable of storing 215 petabytes (215 million gigabytes) in a single gram of
DNA(It means it could store every bit of datum ever recorded by humans in a
container about the size and weight of a couple of pickup trucks) and it could
potentially last for hundreds of thousands of years.
6. WHAT IS DNA?
Deoxyribonucleic
acid ( DNA) is a molecule that carries the
genetic information that used in thegrowth,
development, of all livingorganisms.
The two DNA strands are called
polynucleotides since they are composed of
simpler monomer units called nucleotides.
Each nucleotide is composed of one of four
nitrogen-containing nucleobases — cytosine
(C), guanine (G), adenine (A) or thymine (T).
7. D I G I T A L
STORAGE IN DNA
• DNA digital data storage refers to any process to
store digital data in the base sequence of DNA.
• This technology uses artificial DNA made using
commercially available oligonucleotide synthesis
machines for storage and DNA sequencing
machines for retrieval.
• This type of storage system is more compact than
current magnetic tape or hard drive storage systems
due to the data density of the DNA.
• Currently it was reported that in 1gram of DNA 215
petabytes (215 million gigabytes) could be stored.
9. How is Data stored in DNA
further these ATGC
sequences are synthesized
into DNA molecules. And
to read this information
back from DNA,
sequencing of DNA
fragments is done by using
various algorithms
an algorithm called a DNA
Fountain which randomly
packaged the strings into
droplets,
In most of the techniques
the random access of the
data is possible.
In all methods, firstly the
information is converted
into digital form if not.
. Various encoding
techniques are also used in
data storing in DNA, like
Huffman coding..
The data is converted into
binary codes, this process
is called as binarization and
these binary codes are
further converted into A, T,
G, C sequence with the
help of a device, and this
process of conversion is
called as DNA encoding.
DNA
1
2
3
4
5
6
10.
11. Huffman
Coding(varying
the length of
symbols used for
representing a
character)
The Comma
Code(Frames
are separated
with comma’s)
The
Alternating
Code
Comma-Free
Code(Frames
are not
separated with
comma’s)
Improved
Huffman
Coding
Scheme
DNA secret
writing
algorithm
12. DNA secret writing algorithm
• Secret writing is used to prevent illegal access of information
by unauthorized parties.
• Cryptography and steganography are two methods used for
secret writing.
• One Time Pad (OTP) generated keys are used as
encryption key.
13. ADVANTAGES
• It is ultra compact
• It can last hundreds of thousands of
years if kept in a cool, dry place.
• As long as human societies are
reading and writing DNA, they will be
able to decode it.
• DNA won’t degrade over time like
cassette tapes and CDs, and it won’t
become obsolete.
14. DISADVANTAGES
I
High cost.
Many types of
errors are
associated
with the
current
machines
dealing with
DNA.
.
DNA is significantly harder
and slower to read than
conventional computer
transistors i.e., in terms of
access speed it is actually
less RAM-like than our
average computer SSD or
spinning magnetic hard-
drive.
Time required to rebuild the
needed DNA sequence; need
to update all the files when
the reference sequence is
changed
15. CONCLUSION
As DNA can retain data
for millions of years, it is
possible to store data for
a long time.
Byusing DNA
multiplication, we can
create number of
copies of important data
and can be distributed
to servers
Thus, using DNA for
data storage, it is
possible to store huge
amount of data in very
less size.
Parallel reading of files
is also possible enabling
users to read multiple
files at the same time.