SlideShare una empresa de Scribd logo
1 de 40
Descargar para leer sin conexión
Nucleotide Cryptology: Hidden
          Messages
Slides By: Kelsey Knox, Dylan
Goodrich, Janet Page, Spenser Davis,
 Hayk Barseghyan, John Madrigal,
      and Mariam Barseghyan
Concept
We were inspired by Alan Turing’s coding and
 decoding work he did for the military. We have
 developed an idea to create a code out of human
 DNA, insert that DNA into a cell and then insert
 the cell into a individual, creating a secure way to
 transfer information. The message is doubly
 protected by its encryption and then by its ability
 to be indistinguishable from the individual’s
 normal cells. We are using Nucleotide Cryptology
 to send hidden messages.
Encrypting with DNA

            By: Janet Page
   In the spirit of Alan Turing, we would like to offer a
    new method in which to encode messages.
   Unlike other codes, our code will be biological, and
    will be encrypted in DNA itself.
    Our method involves encoding a message using
    some sort of encryption with nucleotide sequences
    and implanting this sequence into the body of the
    messenger.
   The receiving end will know where to look for this
    particular message.
How can we convert English into
        nucleotide sequences?
   Easiest method is a simple cipher: each
    English letter corresponds to a sequence of
    four nucleotides


   Instead, we would like to use a cipher loosely
    based on a Vigenère Cipher, which would use
    4 different conversions which switch off with
    every letter.
Sample Cipher




                Encryption
The Coding

By: Dylan Goodrich
Layers of Protection
Code Existence
– Awareness of the code is likely to take a while due
  to the novelty of the idea
Identifying “carriers”
– Will be difficult to determine who has the code on
  their person. Could pretend to give people code
  so they do not know whether or not they have it.
  Reduces likelihood of betrayal or accidents
Layers of Protection
Location on the body
– Will be difficult to isolate location of the injected
  cell colony. Could pretend to inject a carrier
  multiple times to prevent them from giving away
  relative location.
Primer sequence
– As discussed before the primer sequence is
  needed to isolate the area of DNA that contains
  the message. Can be made highly variable and
  complex
Human Protection
Tumor Prevention
– Potential DNA code sequences will need to be
  tested to make sure that it does not induce
  uncontrolled proliferation within the carrier, thus
  putting him at risk.
– DNA still needs to be able to allow for moderate
  cell replication to ensure safety of the cells
  containing the code
Human Protection
“Self Destruct”
– Carrier cells will need to be highly sensitive to
  biological changes. If a person carrying a code
  dies then the cells with the code must be
  destroyed to prevent a prolonged search for them
– If the enemy knows this then this will prevent
  them from killing carriers. Abuse or
  malnourishment may also stress the cells into
  dying, preventing these tactics against the carriers
  as well.
The Chemistry

By: Spenser Davis
The Chemistry Behind
          Nucleotide Cryptology
• Before the injection of code, the data must be
  implemented into the genetic code of the
  messenger/storage person. DNA is extracted
  through a blood sample and an appropriate
  locus is determined for code insertion. It is
  important to choose a locus that does not
  code for any vital proteins, etc. Once chosen,
  the code will be inserted via PCR based site-
  directed mutagenesis (picture shown below).
The Chemistry Behind
            Nucleotide Cryptology
• The basic procedure requires the synthesis of a short
  DNA primer. This synthetic primer contains the desired
  mutation and is complementary to the template DNA
  around the mutation site so it can hybridize with the
  DNA in the gene of interest. The mutation may be a
  single base change (a point mutation), multiple base
  changes, deletion or insertion. The single-stranded
  primer is then extended using a DNA Polymerase,
  which copies the rest of the gene. The gene thus
  copied contains the mutated site, and is then
  introduced into a host cell as a vector and cloned.
  Finally, mutants are selected.
The Chemistry Behind
               Nucleotide Cryptology
• The original method using single-primer extension is inefficient due
  to a lower yield of mutants. The resulting mixture may contain both
  the original unmutated template as well as the mutant strand,
  producing a mix population of mutant and non-mutant progenies.
  The mutants may also be counter-selected due to presence of
  mismatch repair system which favors the methylated template
  DNA. Many approaches have since been developed to improve the
  efficiency of mutagenesis. The mutagenesis therefore would involve
  two sets of mutated primers flanking the desired region. And the
  selection method we could employ would be to include a simple
  antibiotic resistance gene in our mutation, then screen and select
  for mutants by plating on antibiotic+ plates and selecting surviving
  plaques. The DNA selected from the plaques would then be
  injected into the code carrier person.
The Chemistry Behind
               Nucleotide Cryptology
• The code decrypter would need to know the relative location of the
  cells in the body for extraction. Death will causes cell mitosis to fail
  and will thus ensure safe code delivery. Upon extraction of the
  code, the decrypter also needs to know either the primer sequence
  or the locus of interest to amplify via PCR then discover the
  sequence using gene probing microarrays. The way this works is as
  follows: pretend my code is AGTCGTC. This will only adhere to its
  complement TCAGCAG (let's ignore sticky ends and partial
  adherence for now). Microarray wells will contain randomized gene
  sequences such as: AGCTAGCA, AGTCTCGA, GCTAGCT, etc. However,
  only the true complement will bind to the coded sequence. It is in
  this way that the decrypter can uncover the true code. With a
  decryption key (cipher) already predetermined, the decrypter can
  decipher the message.
Biological Computing

    By John Madrigal
Moore’s Law
      • Technological trend
        where the amount of
        transistors doubles
        every 18 months
      • Experts believe that we
        are nearing a plateau
        and eventual block of
        continuing this trend
DNA Computing
• the use of DNA instead of
  silicon chips to solve
  complex mathematical
  problems
• Research has been done
  to find a way to move
  past current computer
  technology for the future
   – Bacteria computer solves
     Hamiltonian Path Problem
From Hidden Messages to
Memories: Alternative uses for
   Nucleotide Cryptology

      By: Hyak Barseghyan
Memories Stored In DNA
The human brain has the ability to store and
transmit memories using images. There is a
specialized area in the brain called the
Hippocampus that is involved in the storage and
generation of memories. The way memories are
stored is still not quite understood. However, it is
speculated that visual or any other stimuli that a
person perceives is accompanied by the production
of proteins in the brain that are involved in
generation of new neuronal connections.
It is possible to design a gene by genetic
engineering and insert it into human cells using
ballistics. A special air pressurized gun will shoot
millions of copies of the desired gene into cells.
Some of the engineered sequence will incorporate
into the cell's genome. The inserted recombinant
DNA in the cells will be transcribed and translated
into a protein which will later be carried out from
the cell into the bloodstream and taken into the
brain, and will become involved in memory
generation and retrieval.
Depending on the design of the gene and its
product the person will see different images
appear in his/her imagination, starting from
known pieces of art to any other custom
generated memories. This technology will be
crucial in using human genetic programming in
information storage. Retrieval of the information
can be performed using any human subject
since the mechanism is the same from person to
person.
Amplified Natural Intelligence: More
 Applications for Biological Coding

        By: Miriam Barseghyan
• In our modern society technological advances
  are not shocking anymore. It is expected for
  various electronics to be further developed in
  order to achieve better device capabilities.
  However, while on the path creating Artificial
  Intelligence, we tend to neglect our own
  intellectual development.
• Behavioral modifications, particularly
  education, do tend to improve the level of
  human intelligence. However, this process is
  slow and requires constant work. As the new
  generations of computers that come out with
  improved functionality, it would be possible to
  create human beings with improved analytical
  and logical power.
• In the core of the model of creation of humans with
  Amplified Natural Intelligence (ANI) lies the concept of
  decoding a given code (by Alan Turing) and those of
  physiology and molecular biology. To achieve the
  proposed goal Human Genetic Engineering (HGE) is
  necessary. Genes need to be modified at an embryonic
  level in order to produce functional cells postnatally.
  Retroviral transfecton would be the core technique
  utilized in procedure. Through this technique, extra
  genes coding for Nerve Growth Factors (NGF) and
  molecules guiding axonal patterning, such as molecules
  from the Ephrin family, as well as genetic information
  coding for molecules that increase neuronal synaptic
  connectivity will be inserted into the embryonic
  genome during the early stages of embryonic
  development.
• The inserted code will be decoded by the
  natural mechanisms of the organism to
  produce exogenous molecules. These
  molecules will further amplify the effects of
  the endogenous molecules involved in
  nervous system development. Thus,
  neurogenesis along with axonal and synaptic
  efficient patterning will contribute to creation
  of ANI.
The Ethics

By: Kelsey Knox
“Genethics”: the idea that problems for humanity and the world
posed by the new genetic technology are novel and consequently a new kind
of ethics is needed (1)

As our project deals with inserting modified
 DNA into a human cell, and then putting that
 cell back in a human, ethical issues
 surrounding gene technologies are a major
 consideration.

  1. http://bioinformatics.istge.it/bcd
     /ForAll/Ethics/welcome.html
  2. Photo via
     http://thetechnologicalcitizen.co
     m/?p=1022
Potential “genethical” issues
• “playing god”
• Unsure consequences
• Informed consent
• Ownership of genetic
  code
• Objectification/devaluat
  ion of the individual

Más contenido relacionado

La actualidad más candente

Sage - serial analysis of gene expression
Sage - serial analysis of gene expressionSage - serial analysis of gene expression
Sage - serial analysis of gene expressionSwati Pawar
 
Whole Genome Sequencing Analysis
Whole Genome Sequencing AnalysisWhole Genome Sequencing Analysis
Whole Genome Sequencing AnalysisEfi Athieniti
 
Next generation sequencing
Next generation sequencingNext generation sequencing
Next generation sequencingDayananda Salam
 
next generation sequencing (recent collection2018)
next generation sequencing (recent collection2018) next generation sequencing (recent collection2018)
next generation sequencing (recent collection2018) Newborn Screening KW
 
Knowing Your NGS Upstream: Alignment and Variants
Knowing Your NGS Upstream: Alignment and VariantsKnowing Your NGS Upstream: Alignment and Variants
Knowing Your NGS Upstream: Alignment and VariantsGolden Helix Inc
 
Massively Parallel Signature Sequencing (MPSS)
Massively Parallel Signature Sequencing (MPSS) Massively Parallel Signature Sequencing (MPSS)
Massively Parallel Signature Sequencing (MPSS) Bharathiar university
 
Bioinformatics tools for NGS data analysis
Bioinformatics tools for NGS data analysisBioinformatics tools for NGS data analysis
Bioinformatics tools for NGS data analysisDespoina Kalfakakou
 
Experimentos de nubes científicas: Medical Genome Project
Experimentos de nubes científicas: Medical Genome ProjectExperimentos de nubes científicas: Medical Genome Project
Experimentos de nubes científicas: Medical Genome ProjectFundación Ramón Areces
 
Next Generation Sequencing of DNA
Next Generation Sequencing of DNANext Generation Sequencing of DNA
Next Generation Sequencing of DNAmaryamshah13
 
A decade into Next Generation Sequencing on marine non-model organisms: curre...
A decade into Next Generation Sequencing on marine non-model organisms: curre...A decade into Next Generation Sequencing on marine non-model organisms: curre...
A decade into Next Generation Sequencing on marine non-model organisms: curre...Alexander Jueterbock
 
Examining gene expression and methylation with next gen sequencing
Examining gene expression and methylation with next gen sequencingExamining gene expression and methylation with next gen sequencing
Examining gene expression and methylation with next gen sequencingStephen Turner
 
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...EMC
 
Impact_of_gene_length_on_DEG
Impact_of_gene_length_on_DEGImpact_of_gene_length_on_DEG
Impact_of_gene_length_on_DEGLong Pei
 
Clinical Application of RNA Sequencing - Bladder Cancer
Clinical Application of RNA Sequencing - Bladder CancerClinical Application of RNA Sequencing - Bladder Cancer
Clinical Application of RNA Sequencing - Bladder CancerUSD Bioinformatics
 
2011 jeroen vanhoudt_ngs
2011 jeroen vanhoudt_ngs2011 jeroen vanhoudt_ngs
2011 jeroen vanhoudt_ngsDin Apellidos
 
20160219 - S. De Toffol - Dal Sanger al NGS nello studio delle mutazioni BRCA
20160219 - S. De Toffol -  Dal Sanger al NGS nello studio delle mutazioni BRCA �20160219 - S. De Toffol -  Dal Sanger al NGS nello studio delle mutazioni BRCA �
20160219 - S. De Toffol - Dal Sanger al NGS nello studio delle mutazioni BRCA Roberto Scarafia
 

La actualidad más candente (20)

Sage - serial analysis of gene expression
Sage - serial analysis of gene expressionSage - serial analysis of gene expression
Sage - serial analysis of gene expression
 
Whole Genome Sequencing Analysis
Whole Genome Sequencing AnalysisWhole Genome Sequencing Analysis
Whole Genome Sequencing Analysis
 
Next generation sequencing
Next generation sequencingNext generation sequencing
Next generation sequencing
 
Sage technology
Sage technologySage technology
Sage technology
 
next generation sequencing (recent collection2018)
next generation sequencing (recent collection2018) next generation sequencing (recent collection2018)
next generation sequencing (recent collection2018)
 
Knowing Your NGS Upstream: Alignment and Variants
Knowing Your NGS Upstream: Alignment and VariantsKnowing Your NGS Upstream: Alignment and Variants
Knowing Your NGS Upstream: Alignment and Variants
 
Massively Parallel Signature Sequencing (MPSS)
Massively Parallel Signature Sequencing (MPSS) Massively Parallel Signature Sequencing (MPSS)
Massively Parallel Signature Sequencing (MPSS)
 
Bioinformatics tools for NGS data analysis
Bioinformatics tools for NGS data analysisBioinformatics tools for NGS data analysis
Bioinformatics tools for NGS data analysis
 
Ngs introduction
Ngs introductionNgs introduction
Ngs introduction
 
Experimentos de nubes científicas: Medical Genome Project
Experimentos de nubes científicas: Medical Genome ProjectExperimentos de nubes científicas: Medical Genome Project
Experimentos de nubes científicas: Medical Genome Project
 
Next Generation Sequencing of DNA
Next Generation Sequencing of DNANext Generation Sequencing of DNA
Next Generation Sequencing of DNA
 
A decade into Next Generation Sequencing on marine non-model organisms: curre...
A decade into Next Generation Sequencing on marine non-model organisms: curre...A decade into Next Generation Sequencing on marine non-model organisms: curre...
A decade into Next Generation Sequencing on marine non-model organisms: curre...
 
Examining gene expression and methylation with next gen sequencing
Examining gene expression and methylation with next gen sequencingExamining gene expression and methylation with next gen sequencing
Examining gene expression and methylation with next gen sequencing
 
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
 
Impact_of_gene_length_on_DEG
Impact_of_gene_length_on_DEGImpact_of_gene_length_on_DEG
Impact_of_gene_length_on_DEG
 
Clinical Application of RNA Sequencing - Bladder Cancer
Clinical Application of RNA Sequencing - Bladder CancerClinical Application of RNA Sequencing - Bladder Cancer
Clinical Application of RNA Sequencing - Bladder Cancer
 
155 dna microarray
155 dna microarray155 dna microarray
155 dna microarray
 
2011 jeroen vanhoudt_ngs
2011 jeroen vanhoudt_ngs2011 jeroen vanhoudt_ngs
2011 jeroen vanhoudt_ngs
 
20160219 - S. De Toffol - Dal Sanger al NGS nello studio delle mutazioni BRCA
20160219 - S. De Toffol -  Dal Sanger al NGS nello studio delle mutazioni BRCA �20160219 - S. De Toffol -  Dal Sanger al NGS nello studio delle mutazioni BRCA �
20160219 - S. De Toffol - Dal Sanger al NGS nello studio delle mutazioni BRCA
 
Illumina sequencing introduction
Illumina sequencing introductionIllumina sequencing introduction
Illumina sequencing introduction
 

Destacado

Industrialization robotics
Industrialization roboticsIndustrialization robotics
Industrialization roboticsArtSci_center
 
Stigmercy W Mcasalegno
Stigmercy W McasalegnoStigmercy W Mcasalegno
Stigmercy W McasalegnoArtSci_center
 
Buccheri j 177_final
Buccheri j 177_finalBuccheri j 177_final
Buccheri j 177_finalArtSci_center
 
Microsoft word blogs-rozalin rabieian hrs177
Microsoft word   blogs-rozalin rabieian hrs177Microsoft word   blogs-rozalin rabieian hrs177
Microsoft word blogs-rozalin rabieian hrs177ArtSci_center
 
Mani nilchiani parsons_artsci_midterm-1
Mani nilchiani parsons_artsci_midterm-1Mani nilchiani parsons_artsci_midterm-1
Mani nilchiani parsons_artsci_midterm-1ArtSci_center
 
6 Midterm Presentation
6  Midterm Presentation6  Midterm Presentation
6 Midterm PresentationArtSci_center
 
Neural Pulsars: Kevin Haywood
Neural Pulsars: Kevin HaywoodNeural Pulsars: Kevin Haywood
Neural Pulsars: Kevin HaywoodArtSci_center
 
Pablo p art_sci_midterm
Pablo p art_sci_midtermPablo p art_sci_midterm
Pablo p art_sci_midtermArtSci_center
 
Hnrs 177 midterm ppt
Hnrs 177 midterm pptHnrs 177 midterm ppt
Hnrs 177 midterm pptArtSci_center
 
Water interface 3999
Water interface 3999Water interface 3999
Water interface 3999ArtSci_center
 
Miracle Berries Presentation
Miracle Berries PresentationMiracle Berries Presentation
Miracle Berries PresentationArtSci_center
 
Jeremy p 5570_b_midterm
Jeremy p 5570_b_midtermJeremy p 5570_b_midterm
Jeremy p 5570_b_midtermArtSci_center
 
Israel maximillian 177_final
Israel maximillian 177_finalIsrael maximillian 177_final
Israel maximillian 177_finalArtSci_center
 
Jen-Ling Nieh Blog compilation
Jen-Ling Nieh Blog compilationJen-Ling Nieh Blog compilation
Jen-Ling Nieh Blog compilationArtSci_center
 

Destacado (18)

Industrialization robotics
Industrialization roboticsIndustrialization robotics
Industrialization robotics
 
Stigmercy W Mcasalegno
Stigmercy W McasalegnoStigmercy W Mcasalegno
Stigmercy W Mcasalegno
 
Desma9 f 2009
Desma9 f 2009Desma9 f 2009
Desma9 f 2009
 
Jung e 177_final
Jung e 177_finalJung e 177_final
Jung e 177_final
 
Buccheri j 177_final
Buccheri j 177_finalBuccheri j 177_final
Buccheri j 177_final
 
Microsoft word blogs-rozalin rabieian hrs177
Microsoft word   blogs-rozalin rabieian hrs177Microsoft word   blogs-rozalin rabieian hrs177
Microsoft word blogs-rozalin rabieian hrs177
 
Mani nilchiani parsons_artsci_midterm-1
Mani nilchiani parsons_artsci_midterm-1Mani nilchiani parsons_artsci_midterm-1
Mani nilchiani parsons_artsci_midterm-1
 
6 Midterm Presentation
6  Midterm Presentation6  Midterm Presentation
6 Midterm Presentation
 
Neural Pulsars: Kevin Haywood
Neural Pulsars: Kevin HaywoodNeural Pulsars: Kevin Haywood
Neural Pulsars: Kevin Haywood
 
DESMA 9: Memory
DESMA 9: MemoryDESMA 9: Memory
DESMA 9: Memory
 
Pablo p art_sci_midterm
Pablo p art_sci_midtermPablo p art_sci_midterm
Pablo p art_sci_midterm
 
Hnrs 177 midterm ppt
Hnrs 177 midterm pptHnrs 177 midterm ppt
Hnrs 177 midterm ppt
 
Water interface 3999
Water interface 3999Water interface 3999
Water interface 3999
 
Miu Ling Proposal
Miu Ling ProposalMiu Ling Proposal
Miu Ling Proposal
 
Miracle Berries Presentation
Miracle Berries PresentationMiracle Berries Presentation
Miracle Berries Presentation
 
Jeremy p 5570_b_midterm
Jeremy p 5570_b_midtermJeremy p 5570_b_midterm
Jeremy p 5570_b_midterm
 
Israel maximillian 177_final
Israel maximillian 177_finalIsrael maximillian 177_final
Israel maximillian 177_final
 
Jen-Ling Nieh Blog compilation
Jen-Ling Nieh Blog compilationJen-Ling Nieh Blog compilation
Jen-Ling Nieh Blog compilation
 

Similar a Turing nucleotidecryptology

dnambdbdndndnfnefndnicroarray-201001142025.pdf
dnambdbdndndnfnefndnicroarray-201001142025.pdfdnambdbdndndnfnefndnicroarray-201001142025.pdf
dnambdbdndndnfnefndnicroarray-201001142025.pdfAzharAzhar63
 
DNA microarray
DNA microarrayDNA microarray
DNA microarraymanojjeya
 
Genetic technology presentation
Genetic technology presentationGenetic technology presentation
Genetic technology presentationNoorNoor138
 
DNA MICROARRAY TECHNOLOGY FOR PRINCIPLE OF DRUG DISCOVERY
DNA  MICROARRAY  TECHNOLOGY FOR  PRINCIPLE OF DRUG DISCOVERYDNA  MICROARRAY  TECHNOLOGY FOR  PRINCIPLE OF DRUG DISCOVERY
DNA MICROARRAY TECHNOLOGY FOR PRINCIPLE OF DRUG DISCOVERYDhanashri Prakash Sonavane
 
A comprehensive study of microarray
A comprehensive study of microarrayA comprehensive study of microarray
A comprehensive study of microarrayPRABAL SINGH
 
Microarray
MicroarrayMicroarray
Microarrayjain7177
 
Bioinformatics group presentation
Bioinformatics group presentationBioinformatics group presentation
Bioinformatics group presentationNaeem Ahmed
 
Bioinformatics group presentation
Bioinformatics group presentationBioinformatics group presentation
Bioinformatics group presentationNaeem Ahmed
 
cloning and sub-cloning
cloning and sub-cloningcloning and sub-cloning
cloning and sub-cloningSandhya Talla
 
Microarray technology, biochip, DNA chip
Microarray technology, biochip, DNA chip Microarray technology, biochip, DNA chip
Microarray technology, biochip, DNA chip KAUSHAL SAHU
 
605T_Phamaceutical biotecnology_unit 2.pptx
605T_Phamaceutical biotecnology_unit 2.pptx605T_Phamaceutical biotecnology_unit 2.pptx
605T_Phamaceutical biotecnology_unit 2.pptxAkhilesh Kumar
 

Similar a Turing nucleotidecryptology (20)

Microbial physiology in genomic era
Microbial physiology in genomic eraMicrobial physiology in genomic era
Microbial physiology in genomic era
 
DNA Microarray notes.pdf
DNA Microarray notes.pdfDNA Microarray notes.pdf
DNA Microarray notes.pdf
 
DNA Microarray notes.pdf
DNA Microarray notes.pdfDNA Microarray notes.pdf
DNA Microarray notes.pdf
 
Gene cloning
Gene cloningGene cloning
Gene cloning
 
dnambdbdndndnfnefndnicroarray-201001142025.pdf
dnambdbdndndnfnefndnicroarray-201001142025.pdfdnambdbdndndnfnefndnicroarray-201001142025.pdf
dnambdbdndndnfnefndnicroarray-201001142025.pdf
 
DNA microarray
DNA microarrayDNA microarray
DNA microarray
 
Genetic technology presentation
Genetic technology presentationGenetic technology presentation
Genetic technology presentation
 
DNA MICROARRAY TECHNOLOGY FOR PRINCIPLE OF DRUG DISCOVERY
DNA  MICROARRAY  TECHNOLOGY FOR  PRINCIPLE OF DRUG DISCOVERYDNA  MICROARRAY  TECHNOLOGY FOR  PRINCIPLE OF DRUG DISCOVERY
DNA MICROARRAY TECHNOLOGY FOR PRINCIPLE OF DRUG DISCOVERY
 
Gene cloning
Gene cloningGene cloning
Gene cloning
 
A comprehensive study of microarray
A comprehensive study of microarrayA comprehensive study of microarray
A comprehensive study of microarray
 
DNA microarray
DNA microarrayDNA microarray
DNA microarray
 
Microarray
MicroarrayMicroarray
Microarray
 
Bioinformatics group presentation
Bioinformatics group presentationBioinformatics group presentation
Bioinformatics group presentation
 
Bioinformatics group presentation
Bioinformatics group presentationBioinformatics group presentation
Bioinformatics group presentation
 
Unit 9 Manipulating Dna
Unit 9 Manipulating DnaUnit 9 Manipulating Dna
Unit 9 Manipulating Dna
 
cloning and sub-cloning
cloning and sub-cloningcloning and sub-cloning
cloning and sub-cloning
 
Dna chip
Dna chipDna chip
Dna chip
 
Microarray technology, biochip, DNA chip
Microarray technology, biochip, DNA chip Microarray technology, biochip, DNA chip
Microarray technology, biochip, DNA chip
 
Genetic Technology.pptx
Genetic Technology.pptxGenetic Technology.pptx
Genetic Technology.pptx
 
605T_Phamaceutical biotecnology_unit 2.pptx
605T_Phamaceutical biotecnology_unit 2.pptx605T_Phamaceutical biotecnology_unit 2.pptx
605T_Phamaceutical biotecnology_unit 2.pptx
 

Más de ArtSci_center

Más de ArtSci_center (20)

Lee s 177_final
Lee s 177_finalLee s 177_final
Lee s 177_final
 
Eiesenhardt l 177_final
Eiesenhardt l 177_finalEiesenhardt l 177_final
Eiesenhardt l 177_final
 
Borowski hnrs 177 final blog compilation
Borowski   hnrs 177 final blog compilationBorowski   hnrs 177 final blog compilation
Borowski hnrs 177 final blog compilation
 
Turing fibonacci numbers
Turing fibonacci numbersTuring fibonacci numbers
Turing fibonacci numbers
 
Xia j 177_final
Xia j 177_finalXia j 177_final
Xia j 177_final
 
Turing ai rosie
Turing ai rosieTuring ai rosie
Turing ai rosie
 
Turing wwii
Turing wwiiTuring wwii
Turing wwii
 
Ward e 177_final
Ward e 177_finalWard e 177_final
Ward e 177_final
 
Tu nancy 177_final_small
Tu nancy 177_final_smallTu nancy 177_final_small
Tu nancy 177_final_small
 
Madrigal j 177_final
Madrigal j 177_finalMadrigal j 177_final
Madrigal j 177_final
 
Lai g 177_final
Lai g 177_finalLai g 177_final
Lai g 177_final
 
Huang s 117_final
Huang s 117_finalHuang s 117_final
Huang s 117_final
 
Goodrich d 177_final
Goodrich d 177_finalGoodrich d 177_final
Goodrich d 177_final
 
Davis spenser 177_final
Davis spenser 177_finalDavis spenser 177_final
Davis spenser 177_final
 
Davis m 177_final
Davis m 177_finalDavis m 177_final
Davis m 177_final
 
Blog one
Blog oneBlog one
Blog one
 
Barseghyan m 177_final
Barseghyan m 177_finalBarseghyan m 177_final
Barseghyan m 177_final
 
Barseghyan h 177_final
Barseghyan h 177_finalBarseghyan h 177_final
Barseghyan h 177_final
 
Wylie h art_sci_midterm
Wylie h art_sci_midtermWylie h art_sci_midterm
Wylie h art_sci_midterm
 
Paweena p art_sci_midterm-1
Paweena p art_sci_midterm-1Paweena p art_sci_midterm-1
Paweena p art_sci_midterm-1
 

Último

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Último (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Turing nucleotidecryptology

  • 2. Slides By: Kelsey Knox, Dylan Goodrich, Janet Page, Spenser Davis, Hayk Barseghyan, John Madrigal, and Mariam Barseghyan
  • 3. Concept We were inspired by Alan Turing’s coding and decoding work he did for the military. We have developed an idea to create a code out of human DNA, insert that DNA into a cell and then insert the cell into a individual, creating a secure way to transfer information. The message is doubly protected by its encryption and then by its ability to be indistinguishable from the individual’s normal cells. We are using Nucleotide Cryptology to send hidden messages.
  • 4. Encrypting with DNA By: Janet Page
  • 5. In the spirit of Alan Turing, we would like to offer a new method in which to encode messages.  Unlike other codes, our code will be biological, and will be encrypted in DNA itself.  Our method involves encoding a message using some sort of encryption with nucleotide sequences and implanting this sequence into the body of the messenger.  The receiving end will know where to look for this particular message.
  • 6. How can we convert English into nucleotide sequences?  Easiest method is a simple cipher: each English letter corresponds to a sequence of four nucleotides  Instead, we would like to use a cipher loosely based on a Vigenère Cipher, which would use 4 different conversions which switch off with every letter.
  • 7. Sample Cipher Encryption
  • 9. Layers of Protection Code Existence – Awareness of the code is likely to take a while due to the novelty of the idea Identifying “carriers” – Will be difficult to determine who has the code on their person. Could pretend to give people code so they do not know whether or not they have it. Reduces likelihood of betrayal or accidents
  • 10. Layers of Protection Location on the body – Will be difficult to isolate location of the injected cell colony. Could pretend to inject a carrier multiple times to prevent them from giving away relative location. Primer sequence – As discussed before the primer sequence is needed to isolate the area of DNA that contains the message. Can be made highly variable and complex
  • 11. Human Protection Tumor Prevention – Potential DNA code sequences will need to be tested to make sure that it does not induce uncontrolled proliferation within the carrier, thus putting him at risk. – DNA still needs to be able to allow for moderate cell replication to ensure safety of the cells containing the code
  • 12. Human Protection “Self Destruct” – Carrier cells will need to be highly sensitive to biological changes. If a person carrying a code dies then the cells with the code must be destroyed to prevent a prolonged search for them – If the enemy knows this then this will prevent them from killing carriers. Abuse or malnourishment may also stress the cells into dying, preventing these tactics against the carriers as well.
  • 14. The Chemistry Behind Nucleotide Cryptology • Before the injection of code, the data must be implemented into the genetic code of the messenger/storage person. DNA is extracted through a blood sample and an appropriate locus is determined for code insertion. It is important to choose a locus that does not code for any vital proteins, etc. Once chosen, the code will be inserted via PCR based site- directed mutagenesis (picture shown below).
  • 15.
  • 16. The Chemistry Behind Nucleotide Cryptology • The basic procedure requires the synthesis of a short DNA primer. This synthetic primer contains the desired mutation and is complementary to the template DNA around the mutation site so it can hybridize with the DNA in the gene of interest. The mutation may be a single base change (a point mutation), multiple base changes, deletion or insertion. The single-stranded primer is then extended using a DNA Polymerase, which copies the rest of the gene. The gene thus copied contains the mutated site, and is then introduced into a host cell as a vector and cloned. Finally, mutants are selected.
  • 17.
  • 18. The Chemistry Behind Nucleotide Cryptology • The original method using single-primer extension is inefficient due to a lower yield of mutants. The resulting mixture may contain both the original unmutated template as well as the mutant strand, producing a mix population of mutant and non-mutant progenies. The mutants may also be counter-selected due to presence of mismatch repair system which favors the methylated template DNA. Many approaches have since been developed to improve the efficiency of mutagenesis. The mutagenesis therefore would involve two sets of mutated primers flanking the desired region. And the selection method we could employ would be to include a simple antibiotic resistance gene in our mutation, then screen and select for mutants by plating on antibiotic+ plates and selecting surviving plaques. The DNA selected from the plaques would then be injected into the code carrier person.
  • 19. The Chemistry Behind Nucleotide Cryptology • The code decrypter would need to know the relative location of the cells in the body for extraction. Death will causes cell mitosis to fail and will thus ensure safe code delivery. Upon extraction of the code, the decrypter also needs to know either the primer sequence or the locus of interest to amplify via PCR then discover the sequence using gene probing microarrays. The way this works is as follows: pretend my code is AGTCGTC. This will only adhere to its complement TCAGCAG (let's ignore sticky ends and partial adherence for now). Microarray wells will contain randomized gene sequences such as: AGCTAGCA, AGTCTCGA, GCTAGCT, etc. However, only the true complement will bind to the coded sequence. It is in this way that the decrypter can uncover the true code. With a decryption key (cipher) already predetermined, the decrypter can decipher the message.
  • 20.
  • 21. Biological Computing By John Madrigal
  • 22. Moore’s Law • Technological trend where the amount of transistors doubles every 18 months • Experts believe that we are nearing a plateau and eventual block of continuing this trend
  • 23. DNA Computing • the use of DNA instead of silicon chips to solve complex mathematical problems • Research has been done to find a way to move past current computer technology for the future – Bacteria computer solves Hamiltonian Path Problem
  • 24. From Hidden Messages to Memories: Alternative uses for Nucleotide Cryptology By: Hyak Barseghyan
  • 25. Memories Stored In DNA The human brain has the ability to store and transmit memories using images. There is a specialized area in the brain called the Hippocampus that is involved in the storage and generation of memories. The way memories are stored is still not quite understood. However, it is speculated that visual or any other stimuli that a person perceives is accompanied by the production of proteins in the brain that are involved in generation of new neuronal connections.
  • 26.
  • 27. It is possible to design a gene by genetic engineering and insert it into human cells using ballistics. A special air pressurized gun will shoot millions of copies of the desired gene into cells. Some of the engineered sequence will incorporate into the cell's genome. The inserted recombinant DNA in the cells will be transcribed and translated into a protein which will later be carried out from the cell into the bloodstream and taken into the brain, and will become involved in memory generation and retrieval.
  • 28.
  • 29. Depending on the design of the gene and its product the person will see different images appear in his/her imagination, starting from known pieces of art to any other custom generated memories. This technology will be crucial in using human genetic programming in information storage. Retrieval of the information can be performed using any human subject since the mechanism is the same from person to person.
  • 30.
  • 31. Amplified Natural Intelligence: More Applications for Biological Coding By: Miriam Barseghyan
  • 32. • In our modern society technological advances are not shocking anymore. It is expected for various electronics to be further developed in order to achieve better device capabilities. However, while on the path creating Artificial Intelligence, we tend to neglect our own intellectual development.
  • 33. • Behavioral modifications, particularly education, do tend to improve the level of human intelligence. However, this process is slow and requires constant work. As the new generations of computers that come out with improved functionality, it would be possible to create human beings with improved analytical and logical power.
  • 34.
  • 35. • In the core of the model of creation of humans with Amplified Natural Intelligence (ANI) lies the concept of decoding a given code (by Alan Turing) and those of physiology and molecular biology. To achieve the proposed goal Human Genetic Engineering (HGE) is necessary. Genes need to be modified at an embryonic level in order to produce functional cells postnatally. Retroviral transfecton would be the core technique utilized in procedure. Through this technique, extra genes coding for Nerve Growth Factors (NGF) and molecules guiding axonal patterning, such as molecules from the Ephrin family, as well as genetic information coding for molecules that increase neuronal synaptic connectivity will be inserted into the embryonic genome during the early stages of embryonic development.
  • 36.
  • 37. • The inserted code will be decoded by the natural mechanisms of the organism to produce exogenous molecules. These molecules will further amplify the effects of the endogenous molecules involved in nervous system development. Thus, neurogenesis along with axonal and synaptic efficient patterning will contribute to creation of ANI.
  • 39. “Genethics”: the idea that problems for humanity and the world posed by the new genetic technology are novel and consequently a new kind of ethics is needed (1) As our project deals with inserting modified DNA into a human cell, and then putting that cell back in a human, ethical issues surrounding gene technologies are a major consideration. 1. http://bioinformatics.istge.it/bcd /ForAll/Ethics/welcome.html 2. Photo via http://thetechnologicalcitizen.co m/?p=1022
  • 40. Potential “genethical” issues • “playing god” • Unsure consequences • Informed consent • Ownership of genetic code • Objectification/devaluat ion of the individual