International Journal of Bioinformatics and Biomedical Engineering
Articles Information
International Journal of Bioinformatics and Biomedical Engineering, Vol.2, No.3, May 2016, Pub. Date: Jun. 17, 2016
Protein Sequence Safe Transfer Using Graph Operation
Pages: 46-50 Views: 2223 Downloads: 1362
Authors
[01] M. Yamuna, School of Advanced Sciences, Vellore Institute of Technology, Vellore, India.
[02] K. Karthika, School of Advanced Sciences, Vellore Institute of Technology, Vellore, India.
Abstract
Any change in genetic instruction leads to malfunctioning of mRNA. Malfunctioning of mRNA induces various diseases like mutation identification of these usually done using DNA samples. In such situation for demand of genetic privacy safe transfer of the data is mandatory. Graph theory has applications in various fields, there are numerous property that a graph satisfies. In this paper we provide a new technique to safe transfer, details of a protein sequence as a weighted graph using graph operation and graph domination.
Keywords
Genetic, Protein, DNA, Graphs
References
[01] https://msdn.microsoft.com/en-us/library/windows/desktop/aa381939%28v=vs.85%29.aspx.
[02] Monika Polak, Urszula Romanczuk, Vasyl Ustimenko, Aneta Wroblewska. (2013). On the Applications of Extremal Graph Theory to Coding Theory and Cryptography, Electronic Notes in Discrete Mathematics Vol. 43, pp. 329–342.
[03] Wael Mahmoud Al Etaiwi. (2014). Encryption Algorithm Using Graph Theory, Journal of Scientific Research & Reports, 3(19), pp. 2519–2527.
[04] Yamuna, M. Sankar, A. Siddarth Ravichandran, Harish V. (2013). Encryption of a Binary String Using Music Notes and Graph theory, International Journal of Engineering & Technology, Vol. 5(3), pp. 2920–2925.
[05] Claerhout, B. DeMoor, G. J. E. (2005). Privacy Protection for Clinical and Genomic Data, the Use of Privacy – Enhancing Techniques in Medicine, International Journal of Medical Informatics, 74, pp. 257–265.
[06] Ida Madieha Azmi. (2011). Bioinformatics and Genetic Privacy: The Impact of the Personal Data Protection Act 2010, Computer law & security review, 27, pp. 394–401.
[07] Clementine Gritti, Willy Susilo, Thomas Plantard, Khin Than Win. (2015). Privacy – Preserving Encryption Scheme Using DNA Parentage Test, Theoretical Computer Science, 580, pp. 1–13.
[08] Mete Akgun, Osman Bayrak, A. Bugra Ozer, Samil Sairoglu. (2015). Privacy Preserving Processing of Genomic Data: A Survey, Journal of Biomedical Informatics, 56, pp. 103–111.
[09] http://medical-dictionary.thefree dictionary.com/DNA.
[10] http://encyclopedia.thefreedictionary.com/Protein+sequence.
[11] http://en.wikipedia.org/wiki/Graph_%28mathematics%29.
[12] Burton, T. Sumner, D. (2006). Domination Dot Critical Graphs, Discrete Math. 306, pp. 11-18.
[13] Yamuna, M. Karthika, K. (2011). Excellent – Domination Dot Stable Graphs, International Journal of Engineering Science, Advanced Computing and Bio – Technology, 2(4), pp. 209-216.
[14] https://en.wikipedia.Org/wiki/DNA_codon_table.
600 ATLANTIC AVE, BOSTON,
MA 02210, USA
+001-6179630233
AIS is an academia-oriented and non-commercial institute aiming at providing users with a way to quickly and easily get the academic and scientific information.
Copyright © 2014 - American Institute of Science except certain content provided by third parties.