• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lan Wenfei, Xing Zhibao, Huang Jun, Qiang Xiaoli. The DNA Self-Assembly Computing Model for Solving Perfect Matching Problem of Bipartite Graph[J]. Journal of Computer Research and Development, 2016, 53(11): 2583-2593. DOI: 10.7544/issn1000-1239.2016.20150312
Citation: Lan Wenfei, Xing Zhibao, Huang Jun, Qiang Xiaoli. The DNA Self-Assembly Computing Model for Solving Perfect Matching Problem of Bipartite Graph[J]. Journal of Computer Research and Development, 2016, 53(11): 2583-2593. DOI: 10.7544/issn1000-1239.2016.20150312

The DNA Self-Assembly Computing Model for Solving Perfect Matching Problem of Bipartite Graph

More Information
  • Published Date: October 31, 2016
  • Biological systems are far more complex and robust than systems we can engineer today, and Because of its advantages of stability and specificity, DNA molecules have been used for the construction of nano-scale structures. With the development of DNA molecule self-assembly strategy, lots of programmable DNA tiles are constructed and used for solving NP problems. The tile assembly model, a formal model of crystal growth, is a highly distributed parallel model of natures self-assembly with the traits of highly distributed parallel, massive storage density and low power consumption. In the system, a function can be computed by deterministic assembly and identified two important quantities: the number of tile types and the assembly speed of the computation. Here a DNA self-assembly model for perfect matching problem of bipartite graph is demonstrated, and a 10-vertices bipartite graph is used as an example to illustrate this model. The computation is nondeterministic and each parallel assembly is executed in time linear in the input. The result shows that the successful solutions can be found among the many parallel assemblies, and it requires only a constant number of different tile types: 14.
  • Related Articles

    [1]Zhang Zhongya, Wu Wenling, Zou Jian. Quantum Differential Collision Key Recovery Attack of Multi-Round EM Structure[J]. Journal of Computer Research and Development, 2021, 58(12): 2811-2818. DOI: 10.7544/issn1000-1239.2021.20200427
    [2]Zhang Yukun, Yuan Xiao. Quantum Error Mitigation: A Review[J]. Journal of Computer Research and Development, 2021, 58(9): 1843-1855. DOI: 10.7544/issn1000-1239.2021.20210367
    [3]Li Zichen, Xie Ting, Zhang Juanmei, Xu Ronghua. Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem[J]. Journal of Computer Research and Development, 2019, 56(12): 2694-2701. DOI: 10.7544/issn1000-1239.2019.20180874
    [4]Wang Tiefeng, Cai Ying, Zhang Yujie. Reputation-Based Defense Scheme Against Pollution Attacks on Network Coding[J]. Journal of Computer Research and Development, 2016, 53(11): 2491-2499. DOI: 10.7544/issn1000-1239.2016.20150502
    [5]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [6]Hu Jianli, Zhou Bin, Wu Quanyuan, Li Xiaohua. A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks[J]. Journal of Computer Research and Development, 2011, 48(12): 2235-2241.
    [7]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [9]Lou Oujun, Wang Xianghai, Wang Zhengxuan. Research on Quantization-Based Robust Video Watermarking Technique Against Geometrical Attacks[J]. Journal of Computer Research and Development, 2007, 44(7): 1211-1218.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (1160) PDF downloads (564) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return