2022
DOI: 10.1109/tcbb.2020.3011582
|View full text |Cite
|
Sign up to set email alerts
|

Designing Uncorrelated Address Constrain for DNA Storage by DMVO Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
50
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

5
5

Authors

Journals

citations
Cited by 51 publications
(53 citation statements)
references
References 56 publications
0
50
1
Order By: Relevance
“…In addition, the increase of the lower bounds of the coding sets directly leads to improvements of the coding rate. The coding rate is defined as R = log 4 M / n ( Cao et al, 2020 ), where n is the length of coded DNA and M is the number of the DNA coding set. For example, the values used in previous work ( Limbachiya et al, 2018 ) are n = 9 and d = 4, R = log 4 199 /9 ≈ 0.42.…”
Section: Designing Of Lower Bounds Of Coding Setsmentioning
confidence: 99%
“…In addition, the increase of the lower bounds of the coding sets directly leads to improvements of the coding rate. The coding rate is defined as R = log 4 M / n ( Cao et al, 2020 ), where n is the length of coded DNA and M is the number of the DNA coding set. For example, the values used in previous work ( Limbachiya et al, 2018 ) are n = 9 and d = 4, R = log 4 199 /9 ≈ 0.42.…”
Section: Designing Of Lower Bounds Of Coding Setsmentioning
confidence: 99%
“…It is also a significant research problem to effectively apply related techniques in the fields of medicine and healthcare. Cao et al combined Brownian multi-verse optimizer (BMVO) algorithm [ 7 ] and a Damping Multi-Verse Optimizer (DMVO) algorithm [ 8 ] with DNA storage to show us how closely future disease prediction is linked to DNA storage. Recently, deep-learning methods have been applied for ECG signal processing and heart disease diagnosis.…”
Section: Introductionmentioning
confidence: 99%
“…Technology applied to image encryption includes chaotic systems [1][2][3][4][5][6][7][8], cellular automatons [9][10][11], substitution boxes [12][13][14], DNA encoding [15][16][17][18][19][20], elliptic curves [21][22][23][24], finite-precision error [25], Galois field [26] and quantum computing [27,28]. The chaotic system is most popular in the field of image encryption and is continuously improved, such as symmetric chaotic maps [29] and adaptive chaotic maps [30,31].…”
Section: Introductionmentioning
confidence: 99%