Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Applications
Massively Parallel Processing-Basically any problem that can be turned into a Hamiltonian problem and other complex problems can be solved. Storage and Associative Memory-A truly content addressable memory occurs when a data entry can be directly retrieved from storage by entering an input that most closely resembles it over other entries in memory. This contrasts with a conventional computer memory, where the specific address of a word must be known to retrieve it.
DNA computers could fight cancer-New computers made of biological molecules that react to DNA hold the promise to diagnose and treat diseases such as cancer by operating like doctors inside the body, Israeli scientists said.[8]
DNA2DNA Applications-Another area of DNA computation exists where conventional computers clearly have no current capacity to compete. This is the concept of DNA2DNA computations such as DNA sequencing; DNA fingerprinting; DNA mutation detection or population screening; and Other fundamental operations on DNA.
Implications to Biology, Chemistry, and Medicine-A particular area within the natural and applied sciences that may benefit from advances in DNA computation is combinatorial chemistry.
DNA's Role in Computer Science- DNA based computers may postpone certain expected thermodynamic obstacles to computation as well as questioning theories of computation based on electronic and mechanical models.
This can be quite useful in figuring out how to route telephone calls, plane trips. It is also been claimed that DNA can be used to solve optimization problems involving business management. It is even said that DNA can be used in devising the wiring schematics for circuits. DNA computers can be used to control chemical and biological systems in a way thats analogous to the way we use electronic computers to control electrical and mechanical systems.
Another application being mentioned nowadays is that DNA computing can do cryptography. [2,5] It is used in various security applications
Method to encrypt the plaintext using DNA, so that it could be send securely over a network. Encryption
Step1:The binary data, text or image, is used under the form of ASCII code (in decimal format). Step2:These numbers are then grouped in blocks and encrypted in using a traditional method (eg. DES, will form a 2 level encryption). Step3:This encoded message is then changed to binary format. Step4: Then these digits are grouped into two and substituted as A for 00, T for 01, G for 10, and C for 11. Step5: We then fit the primers on either side of this message. Primers will act as stoppers and detectors for the message. This has to be given to the receiver prior to the communication. Step6: This message is followed by our own DNA sequence followed by another stopper/primer. Step7: This message is then flanked by many sequences of DNA or by confining it to a microdot in the micro-array. Step8: If considered as a pseudo method: this sequence is transferred to the receiver through the Internet. Else the micro-array is sent physically (though time consuming).
Decryption
This message can then be recovered only by an intended recipient who both can find it, and who knows the sequences of the PCR primers employed, and also the encryption key (2 level encryption used). For this method: Step1. The DNA sequence is searched for the primers (start primer and end primer). The message in-between them is retrieved and the next DNA sequence before the next primer (our DNA) is retrieved. Step2. The ATGC characters are substituted accordingly (00,01,10,11 respectively). Step3. They are then converted into ASCII code and then the message is retrieved.
Experiments in DNA Steganography have been conducted by Carter Bancroft and his team at the Mt. Sinai School of Medicine to encrypt hidden messages within microdots.
The principles used in this experiment used a simple code to convert the letters of the alphabet into combinations of the four bases which make up DNA and create a strand of DNA based on that code. A piece of DNA spelling out the message to be hidden is synthetically created which contains the secret encrypted message in the middle plus short marker sequences at the ends of the message. The encoded piece of DNA is then placed into a normal piece of human DNA which is then mixed with DNA strands of similar length. The mixture is then dried on to paper that can be cutup into microdots with each dot containing billions of strands of DNA. Not only is the microdot difficult to detect on the plain message medium but only one strand of those billions within the microdot contains the message.
The key to decrypting the message lies in knowing which markers on each end of the DNA are the correct ones which mean there must be some sort of shared secret that is transmitted previously for this type of transmission to work successfully. Once the strand is determined via identifying the markers, the recipient uses polymerase chain reaction to multiply only the DNA which contains the message and applies the simple code to finally decode the true message. [2] Utilizing these methods, Bancroft and his team were successfully able to encode and decode the famous message June 6 Invasion: Normandy within a microdot placed in the full stops on a posted typed letter. [11]
The DNA microdot team does see this technology having applications in another field however that of authentication. With the amount of plant and animal genetic engineering that is taking place today and will continue to do so in the future, this methodology would allow engineers to place DNA authentication stamps within organisms they are working with to easily detect counterfeits or copyright infringements.
DNA authentication have already been used for such items as the official clothing from the Sydney Olympic Games, sports collectibles and limited edition art markets such as original animation cells distributed by the Hanna Barbara group of artists.
In the case of the clothing used in the Sydney Olympic Games, a Canadian company named DNA Technologies was able to showcase its DNA-tagging abilities on the world stage in the summer of 2000. All Olympic merchandise from shirts and hats to pins and coffee mugs
were tagged with special ink that contained DNA taken from an unnamed Australian athlete. DNA was taken via saliva samples from the athlete and mixed into existing ink compounds which was in turn used in the regular merchandise manufacturing process. A hand held scanner is then used to scan the inked area of the clothing to determine if a piece of merchandise is authentic or not. As it is estimated that the human genome is roughly 3 billion base pairs in size, and the samples taken were from a random athlete from a Olympic team of hundreds, the possibility of counterfeiting this merchandise is difficult to say the least. For the Sydney games, DNA inks were applied too nearly 50 million items at a cost
of about five cents each, including licensing, databasing , and back-end support.
There are possibilities of this type of technology to be used in the arenas of currency and other such brandable items where existing authentication methods such as holograms are proving ineffective and costly. DNA-tagging is much cheaper in comparison and ultimately more difficult to thwart.
11.Future Scope
Its different way of thinking about computing. Its different way of thinking about chemistry, says Dr. Corn, a chemistry professor at the University of Wisconsin at Madison who is collaborating on a DNA-computer project with three other Madison faculty members: Lloyd M. Smith, a chemistry professor, Max G. Lagally, a materials-science professor, and Anne E. Condon, a computer science professor. The Wisconsin approach would use the gold-plated square of glass as something akin (related blood) to a conventional memory chip. As many as a trillion individual strands of DNA would be anchored (fixed firmly) to the glass, each strand containing information being stored in the DNA computer. A rival approach, pioneered by Leonard M. Adleman allows the bits of DNA to float freely in a test-tube. Dr. Adleman, in 1994 solved the traveling salesman problem using his test-tube approach. The TSP on a large scale is effectively unsolvable by conventional computer systems (its theoretically possible, but would take an extremely long time). His work was picked up by Dr. Donald Beaver, among others, who analyzed the approach and organized it into a highly accessible web page which includes concise annotated bibliography. One major contributor to this page is the research group of Dr. Richard Lipton, Dan Bonech and Christopher Dunworth-a professor of computer science and two graduate students at Princeton University. They are currently using a DNA computer to break the governments DES. In Liptons article speeding up computation via molecular biology he shows how DNA can be used to construct a Turing machine, a universal computer capable of performing any calculation. While it currently exists only in theory, its possible that in years to come computers based on work of Adleman, Lipton, and others will come to replace traditional silicon-based machines. In other words of Dr. Goodman its clearly theoretically possible, the question is whether the chemical operations can actually be done with a low-enough error frequency.