Improving DNA Computing Using Evolutionary Techniques
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 3
Abstract
the field of DNA Computing has attracted many biologists and computer scientists as it has a biological interface, small size and substantial parallelism. DNA computing depends on DNA molecules’ biochemical reactions which they can randomly anneal and they might accidentally cause improper or unattractive computations. This will inspire opportunities to use evolutionary computation via DNA. Evolutionary Computation emphasizes on probabilistic search and optimization methods which are mimicking the organic evolution models. The research work aims at offering a simulated evolutionary DNA computing model which incorporates DNA computing with an evolutionary algorithm. This evolutionary approach provides the likelihood for increasing dimensionality through replacing the typical filtering method by an evolutionary one. Thus, via iteratively increasing and recombination a population of strands, eliminating incorrect solutions from the population, and choosing the best solutions via gel electrophoresis, an optimal or near-optimal solution can be evolved rather than extracted from the initial population.
Authors and Affiliations
Godar Ibrahim, Tarik Rashid, Ahmed Sadiq
A Qualitative Comparison of NoSQL Data Stores
Due to the proliferation of big data with large volume, velocity, complexity, and distribution among remote servers, it became obvious that traditional relational databases are unsuitable for meeting the requirements of...
A Self-organizing Location and Mobility-Aware Route Optimization Protocol for Bluetooth Wireless
Bluetooth allows multi-hop ad-hoc networks that contain multiple interconnected piconets in a common area to form a scatternet. Routing is one of the technical issues in a scatternet because nodes can arrive and leave at...
Detection and Classification of Mu Rhythm using Phase Synchronization for a Brain Computer Interface
Phase synchronization in a brain computer interface based on Mu rhythm is evaluated by means of phase lag index and weighted phase lag index. In order to detect and classify the important features reflected in brain sign...
BHA-160: Constructional Design of Hash Function based on NP-hard Problem
Secure hash function is used to protect the integrity of the message transferred on the unsecured network. Changes on the bits of the sender’s message are recognized by the message digest produced by the hash function. H...
A Survey on Techniques to Detect Malicious Activites on Web
The world wide web is more vulnerable for malicious activities. Spam–advertisements, Sybil attacks, Rumour propagation, financial frauds, malware dissemination, and Sql injection are some of the malicious activities on w...