DNA Base Data Hiding Algorithm Mohammad Reza Abbasy, Pourya Nikfard, Ali Ordi, and Mohammad Reza Najaf Torkaman

Size: px
Start display at page:

Download "DNA Base Data Hiding Algorithm Mohammad Reza Abbasy, Pourya Nikfard, Ali Ordi, and Mohammad Reza Najaf Torkaman"

Transcription

1 DNA Base Data Hiding Algorithm Mohammad Reza Abbasy, Pourya Nikfard, Ali Ordi, and Mohammad Reza Najaf Torkaman Advanced Informatics School (AIS), International Campus, Universiti Teknologi Malaysia (UTM), Kuala Lumpur. {ramohammad2, npourya2, oali2, ABSTRACT Proposing an algorithm by using software point of view for the purpose of implementing data hiding based on DNA sequences to increase the complexity is the main target of this paper. The implementation of algorithm is applicable because of some interesting characteristics of DNA sequences. Both of DNA s features and Binary Coding Technology beside Complementary Pairing Rules are explained through the paper. Since, both of a secret message (M) and DNA reference sequence is needed. Data hiding is started by applying three different and separate steps to prepare M. The receiver will apply the process of identifying and extracting the original message (M) which had been hidden in DNA reference sequence. As the security of the algorithm is crucial part, it will appear in security issue s section. KEYWORDS DNA sequence; data hiding; DNA base pairing rules; complementary pairing rules; DNA binary coding. 1 INTRODUCTION In order to protect data through the unsecure networks like the Internet, using various types of data protection is necessary. One of the famous ways to protect data through the Internet is data hiding. Because of the increasing number of Internet users, utilizing data hiding or Steganographic techniques is inevitable. Eliminating the role of the intruder and authorizing the receiver, are eventual goals of these techniques. Thus, the role of data hiding has become more eminent nowadays. Before employing biological properties of DNA sequences, usually embedding a secret message into the host images was the traditional way of data hiding [1, 2, 3, 4, and 5]. Unfortunately, this had some liabilities. The most important ones was the detection of the distortions of the image when the host image changed to some degrees. This spot was the best spot to start the wholly detection of the secret message through the image. With advent of biological aspects of DNA sequences to the computing areas, new data hiding methods have been proposed by researchers, based on DNA sequences [6, 7, 8, 9, and 10]. The key portion of their work is, utilizing biological characteristics of DNA sequences. In order to convert binary data into amino acids as a DNA sequence, the base pairing rules must be used. Synthesizing nucleotides in real environment (biology) is done in constant rules: 183

2 Purine Adenine (A) always pairs with the pyrimidine Thymine (T) Pyrimidine Cytosine (C) always pairs with the purine Guanine (G) Always, those rules are done naturally because the opportunities to synthesize hydrogen bonds between A and T (two bonds), and also between C and G (three bonds) is different, basically (hydrogen bonds have been shown with dotted lines in Fig1). These concepts are named Watson-Crick base pairing rules when they discovered DNA s fundamental structure as a Noble prize [13]. Figure 1. Synthesizing basic nucleotides naturally In binary computing area, it is possible to change the natural rules by own decision. For example, in biology A is synthesized to T while we can assume A to C or A to G, and so on, as we prefer. Increasing the complexity of the algorithm is the main purpose of the changing the rules. In this paper, the authors consider A=00, T=01, C=10, and G=11 to convert binary message to DNA sequences. A way to increase the complexity is complementary pair rule. Complementary pair rule is a unique equivalent pair which is assigned to every nucleotides base pair. As an example, complementary rule is applied on strand in below [16]: Complementary rule: ((AC) (CG) (GT) (TA)) DNA strand: AATGC Applying complementary rule on DNA strand: CCATG Increasing the complexity is the main purpose of using those rules, in this paper. It means that, finding the original message by intruder needs extra calculations because there are four basic alphabets therefore four likelihood of complementary rule for every DNA sequences. So, the final number of possible those rules are =24. On the other hand, the possibility to happen a correct guess is. Extra information and findings for some basic definitions can be obtained in molecular biology reference books [11, 12, and 13]. 2 RELATED WORKS For the purpose of clarifying the algorithm in current paper, introducing some backgrounds of the knowledge is necessary [8, 11, 12, and 13]. The most important part of each DNA base data hiding algorithm is, manipulating four letters which has been called as nucleotides in biology. The letters are A, C, G, and T. Any composition from them will make a sequence. For instance, two DNA sequences have been appeared in [16]. They mentioned sequences from 184

3 European Bioinformatics Institute (which is known as EBI Database) [15] for the purpose of extracting DNA sequences of Litmus and Balsaminaceae. So, Litmus with 154 nucleotides and Balsaminaceae with 2283 are shown in below, respectively: Litmus: ATCGAATTCGCGCTGAGTCACAA TTCGCGCTGAGTCACAATTCGCGC TGAGTCACAATTGTGACTCAGCCG CGAATTCCTGCAGCCCCGAATTCC GCATTGCAGAGATAATTGTATTTA AGTGCCTGCTCGATACAATAAACG CCATTTGACC. Balsaminaceae: TTTTTATTATTTTTTTTCATTTTTT TCTCAGTTTTTAGCACATATCATT ACATTTTATTTTTTCATTACTTCTA TCATTCTATCTATAAAATCGATTA TTTTTATCACTTATTTTTCTAATTT CCATATTTCATCTAATGATTATATT ACATTAAAGAAATCG. Even though data can be shown by DNA nucleotides, but representing to binary was emerged in 1999 by Rauhe and et al. [17]. They represented numbers by using binary DNA sequences in figure 1. The creativity of their work was in how they could separate binary sequences from each other. All binary sequences are illustrated in form of s{0 1}e. An arbitrary DNA bits has been concatenated between two terminations, s and e, as start and end, respectively. Annealing and ligation are the way of concatenating DNA bits between s and e. Both of terminations and DNA bits have been made by annealing complementary oligonucleotides. In order to concatenate on both sides, having sticky ends (A, Ā, X, Ȳ) are necessary. The sticky end A(Ā) acts as a variable for correct concatenation of bits and terminations. For subsequent cloning, the sticky ends X and Ȳ should be used. In 2000 Leier and et al. [8] brought a robust technique by utilizing a special key strand. They called it, primer. Primer has key role to decrypt a coded strand. Using a public DNA strand was utilized as a reference sequence in their DNA based encryption technique. In this scheme, the receiver must also be informed about the reference sequence. Namely, the receiver will receive a selected primer and an encrypted strand. The intruder is not able to decrypt the binary data without knowing about both of primer and reference strand, certainly. A primer is a complementary subset from a sort of DNA strand. Normally, the primer is called a short substring. For example, assume S is a DNA strand: Figure 2. Assembly of DNA binary strands [8]. S= ATGCTTAGTTCCATCGGAGACTAATGGCCTA and two primers ATCAA and GATTAC. So ATCAA and GATTAC are complementary substring of TAGTT and CTAATG, correspondingly. Definitely, a complementary rule is needed to handle the manipulations, correctly. For this reason, they defined a 185

4 complementary rule which is A-T, T-A, C-G, and finally G-C. Accomplishing those states in biology is done by a series of chemical mechanisms to combine primers with a DNA strand. Indicating the right position of the primers also is shown by a fluorescent chemical substance. When hybridization occurs among primers and substrings of the reference DNA reference sequence, it will become bright, obviously. Except bright places, remaining are dim sections. The exact message of bright portion is binary data 1 and naturally, a dim portion is referred to the binary data 0. So, according to the above, the proper output of the hybridization is: Therefore, the final secret message in form of binary is If the sender prefers to complicate that proposed technique, it can send one part of primers to the legitimate receiver. For the purpose of recovering primers, the receiver must apply PCR. PCR is another chemical scheme which has been known as Polymerase Chain Reaction, scientifically. It can recover primers correctly [16]. Considering a certain substring from DNA sequence as a character was proposed by Peterson in 2001 [9]. By substituting three successive nucleotides as a character, he could hide data in DNA sequence, appropriately. For instance, A =GGC, B =ATG, and so on. So, for this scheme we face to 64 symbols that can be possibly encrypted. The main liability of this method is the frequency for both of E and I in an English message. Because of those holes, an intruder can apply a cryptanalysis technique base on frequencies of the most repetitive letters in English and subsequently extracts the secret message, simply. The next scheme in 2002 [18] needs some backgrounds before explaining. An arrangement of nucleotides determines a protein. The responsibility of the proteins is almost every activity in cells. Transcription is the process by which RNA is created, an intermediary copy of the instruction contained in DNA. Naturally, RNA has four bases. They are adenine (A), cytosine (C), uracil (U) and guanine (G). The RNA copy is related to mrna (abstract of messenger RNA) by throwing away the coming among sequences of RNA. On mrna, each codon has three nucleotides for the purpose of representing which amino acid must be assigned in the next position. All different amino acids have been listed in Table 1. They are: Phe, Leu, Ile, Val, Ser, Pro, Thr, Ala, Tyr, His, Gln, Asn, Lys, Asp, Glu, Cys, Trp, Arg, Met and Gly. Each codon binds a set of three nucleotides into an anticodon which is called trna molecule (transfer RNA). The responsibility of the trna is, translating nucleic acid into protein. Totally, there are forty separate trna molecules which each one has a binding for one of amino acids, as represented in Table

5 Apposite trna is bound to codon on the mrna. When the STOP codon was seen, the translation is completed, and then a protein is released. Because of the codon redundancy, Shimanovsky et al. [18] utilized from that feature to hide data in mrna. In general, each mrna codon has been composed of three nucleotides. The likely nucleotides are: U, C, A, and G. Therefore, there are many different probable combinations to form each mrna codon, whereas in Table 1, there are only twenty different amino acids. It is because of some codons might be mapped to the same amino acids. For instance, the codons UUA, CUU, CUA and UUG are mapped to the same amino acid Leu. 3 PROPOSED METHOD This section is divided into two phases. The first one is, embedding and the second one is, extracting the original message. At the end of the method, a snapshot of the project will appear. 3.1 Phase1: Embedding Secret Message In order to explain embedding phase, separating the phases into some successive and vivid sub-phases, is the best way of proposing current method. In below, sub-phases have been shown, respectively. Feasibility of embedding information in the mrna codon is because of the redundancy. For example, if the codon must be encrypted with UUA, while the secret message if four, it is possible to use the codon UUG in order to replace the original. It is feasible because UUG is the fourth codon of all the codons whose mapping amino acid is Leu. Even though previous replacement does not have any effect on the results of transcription, but it modifies the nucleotides of the original sequence, that might probably trigger unidentified consequences. Although the previous beginning schemes utilize distinct biological features for hiding data in DNA sequences, they are not cost-effective and efficient to employ. In this paper, we apply a scheme to hide data in DNA strands based on a software point of view to improve them. M= Message Convert Binary to DNA Nucleotides M =DNA Sequence from M Applying Complementary Rules on M M = New Form of M Finding Index of each Couple of Nucleotides in DNA Reference Sequence M =Secret Message Figure 3. Phase 1: embedding secret message Obviously, there is an original message M which the sender decides to send via a network to another client who is called receiver. So, there are three sub-phases to provide the final form of M which is M and send it to receiver. The first sub-phase is, converting by DNA base pairing rules. The product is M. M contains nucleotides sequences. By applying DNA base pairing rules, the 187

6 message can convert from binary to DNA sequence. Not only DNA base pairing helps to encrypt the message from binary to DNA sequence but also it is applied to decrypt the secret message to original one, truly. The next (second) sub-phase is, applying complementary rules. Increasing the complexity is the real and exact purpose of this step. By applying the complementary rules, the new form of the M which is M emerges. Now, M is appeared. As mentioned before, both of sender and receiver have a DNA reference sequence from a large number of possibilities base on EBI [14] or NCBI [15] database. It means that, they have selected the same DNA reference sequence, exactly. The exact role of the third sub-phase is, extracting the index of each couple nucleotides in DNA reference sequence, numerically. When all the indexes have been extracted, M has been made, properly. M is precisely the secret message with some changes through the embedding phase. Now, sender can send the message (M ) to receiver. Clarification of the current phase is continued by demonstrating an example, step by step. In this example, assume original message M= should be sent to the receiver. DNA Reference Sequence: AT 1 CG 2 AA 3 TT 4 CG 5 CG 6 CT 7 GA 8 GT 9 C A 10 CA 11 AT 12 TC 13 GC 14 GC 15 TG 16 AG 17 T G 18 AA 19 CC 20 M= Sub-phase 1 (A= 00, T= 01, C= 10, G= 11): M = CTGAAG Sub-phashe 2 ((AC) (CG) (GT) (TA)): M = GATCCT Sub-phase 3 (Indexes): M =8137 Now, embedding phase is finally completed. Then, sender sends 8,13,7 to the receiver. In the next section, the receiver will apply the extracting phase for extracting the original message by using three consecutive phases. 3.2 Phase2: Extracting Original Message Now, receiver takes the secret message in form of some numbers. For the purpose of extracting the original message from DNA reference sequence, phase two with its sub-phases will extract the original message, correctly. M =Secret Message Finding Index of each Couple of Nucleotides in DNA Reference Sequence M = Previous Form of M Applying Complementary Rules on M M =DNA Sequence from M Convert Binary to DNA Nucleotides M= Message Figure 4. Phase2: extracting original message So, the first sub-phase manipulates the M. Because of the nature of the secret message which is some sorts of numbers (exact positions (indexes) of the original message on DNA reference sequence), extracting the message starts by finding the indexes on DNA reference sequence one by one according to the numbers which sender has sent in form of the current secret message. M is the exact product of the first sub-phase. Consequently, the second sub-phase applies complementary rules on M in order to extracting M, correctly. The importance of the M is the form of it. M is the last form of message, based on DNA nucleotides. Converting the M to the M is the third sub-phase. 188

7 Transforming from DNA nucleotides to the binary is the responsibility of the last sub-phase. Now, the receiver has truly extracted the original message M. Those steps are demonstrated through the example in below: DNA Reference Sequence: AT 1 CG 2 AA 3 TT 4 CG 5 CG 6 CT 7 GA 8 GT 9 C A 10 CA 11 AT 12 TC 13 GC 14 GC 15 TG 16 AG 17 T G 18 AA 19 CC 20 M =8137 Sub-phase 1 (Indexes): M = GATCCT Sub-phase 2 ((AC) (CG) (GT) (TA)): M = CTGAAG Sub-phase 3 (A= 00, T= 01, C= 10, G= 11): M= So, the receiver extracted the original message, accurately by using a simple algorithm. In the next section, security and liabilities of the algorithm will inspect, briefly. 3.3 Presenting Results The final picture of the design phases of the prototype is presenting results. The GUI contains two separated parts. The first (left) is, embedding secret message and second (right) is, extracting secret message. Through the each part, there are some sub-phases to complete the intention of the parts. In the left side, in order to complete the embedment, first, original message decoded to the binary. The second step is, converting binary message to the DNA strands by rules: A=00, T=01, C=10 and G=11. The results of this step can be seen in first output textbox. As we mentioned, we use complementary rules to increase the complexity by DNA basic synthetic rules which it says only A-C, C-G, G-T and T-A can have a chance to synthesize together. Then, DNA reference sequence is seen which both of Alice and Bob have shared between themselves. The usage of DNA reference sequence is, finding the index of each couple of nucleotide. At the end of the embedment phase, the secret message can be seen in group box of the secret message. Indexes are represented by numbers. Then Alice clicks the button send to Bob, for sending the secret message to Bob. Now, extraction phase is started. In side of extraction, Bob must extract the secret message. So, Bob clicks the extraction button and the software starts to recover the secret message. First, indexes are found through the DNA reference sequence (which had shared between Alice and Bob) and corresponding to each index, its couple nucleotide is extracted. The output is a DNA sequence. By applying complementary rules, the previous DNA sequence is converted to the right DNA sequence after binary coding in embedment phase. After that, for each nucleotide, the corresponding binary symbol put to the binary original message textbox. As we know, every eight bits represents a character. So, by separating all the eight bits, the final characters will appear correctly. 4 SECURITY ISSUES In terms of security, each intruder must be aware from the following information, correctly. Without this fundamental information, possibility of 189

8 extracting original message is near to zero, scientifically. They are: DNA reference sequence: there are 163 million DNA reference sequence on EBI database. Therefore, the likelihood of making a doing well conjecture by attacker is. Binary coding rule: as mentioned, the sender is free to select any equivalent binary form for every nucleotide. It means that, A can be 00, 01, 10, or 11 ; C can be 00, and so on. In other words, all the binary coding rules are =24. So, the likelihood of making correct guess by attacker is. Complementary pairing rule: like binary coding rule, there is =24 complementary alphabet among basic nucleotides. Therefore, the possibility of making successful attack is. Eventually, the final probability of making a correct and successful guess by attacker is. 5 CONCLUSION At the end of the project, it is sensible which data hiding with DNA sequences is a potential and promising way of hiding secret message within DNA sequences. Different type of environment to manipulate the data was the best part of the project. It means that, regardless the basic concepts of Steganography (robustness, capacity, visibility, and performance), utilizing biology concepts could bring new properties to solve ancient difficulties of algorithm such as complexity besides performance. At the beginning of the project, the most important question which reader thought about it was how it is possible to convert binary data to biology and genetics area? As we showed, DNA coding technology helped us to transform binary bits to DNA nucleotides well. Considering DNA characteristics brings new ideas in data hiding. DNA sequences are potential to implement new data hiding techniques or even transforming previous schemes to new one. In this paper, a reference DNA sequence has been shared between sender and receiver. Not only this DNA reference sequence can be retrieved from EBI [15] or NCBI [14] databases but it can also be simply selected from any database. Therefore, by considering any sort of database, there are 163 million targets to select it. Virtually, guessing the correct DNA sequence by attacker is unachievable. The crucial feature of the DNA sequences is visibility. Finding secret message in a DNA sequence is difficult because the visibility of the sequences is very low. Therefore, attacker cannot find out whether this sequence is a fake or not. In comparison with previous techniques, such as in images, not only implementing this method is not difficult but also it is formidable to detect, as well. 190

9 6 REFERENCES 1. C.C. Chang, C.C. Lin, C.S. Tseng, W.L. Tai, Reversible hiding in DCT-based compressed images, Information Sciences 177 (2007) 2. C.C. Chang, W.C. Wu, Y.H. Chen, Joint coding and embedding techniques for multimedia images, Information Sciences 178 (2008) 3. C.H. Huang, J.L. Wu, Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes, Information Sciences 179 (2009) 4. H.H. Tsai, D.W. Sun, Color image watermark extraction based on support vector machines, Information Sciences 177 (2007) 5. H.W. Tseng, C.P. Hsieh, Prediction-based reversible data hiding, Information Sciences 179 (2009) 6. C.C. Chang, T.C. Lu, Y.F. Chang, R.C.T. Lee, Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium, International Journal of Innovative Computing, Information and Control 3 (2007) 7. C.T. Clelland, V. Risca, C. Bancroft, Hiding messages in DNA microdots, Nature 399 (1999) 8. A. Leier, C. Richter, W. Banzhaf, H. Rauhe, Cryptography with DNA binary strands, BioSystems 57 (2000) 9. I. Peterson, Hiding in DNA, Muse (2001) 10.B. Shimanovsky, J. Feng, M. Potkonjak, Hiding data in DNA, in: Revised Papers from the 5th International Workshop on Information Hiding, Lecture Notes in Computer Science 2578 (2002) 11.B. Alberts, D. Bray, J. Lewis, M. Raff, K. Roberts, J.D. Watson, Molecular Biology of the Cell, Garland Publishing, New York & London, (1994) 12. A.L. Lehninger, D.L. Nelson, M.M. Cox, Principles of Biochemistry, Worth, New York, (2000) 13.J. Watson, N. Hopkins, J. Roberts, J. Steitz, Molecular Biology of the Gene, fourth ed., Benjamin Cummings, Menlo Park, CA, (1987) 14. National Center for Biotechnology Information, European Bioinformatics Institute, H.J. Shiu, K.L. Ng, J.F. Fang, R.C.T. Lee, C.H. Huang, Information Sciences, Volume 180, Issue 11, 1 June( 2010) 17. Rauhe, H., Vopper, G., Banzhaf, W., Howard, J.C., (1999) 18. B. Shimanovsky, J. Feng, M. Potkonjak, Hiding data in DNA, in: Revised Papers from the 5th International Workshop on Information Hiding, Lecture Notes in Computer Science 2578 (2002) 191

10 Table 1. The mapping of codon to amino acid [18]. UUU Phe UCU Ser UAU Tyr UGU Cys UUA Leu UCA Ser UAA Stop UGA Stop CUU Leu CCU Pro CAU His CGU Arg CUA Leu CCA Pro CAA Gln CGA Arg AUU Ile ACU Thr AAU Asn AGU Ser AUA Ile ACA Thr AAA Lys AGA Arg GUU Val GCU Ala GAU Asp GGU Gly GUA Val GCA Ala GAA Glu GGA Gly UUC Phe UCC Ser UAC Tyr UGC Cys UUG Leu UCG Ser UAG Stop UGG Trp CUC Leu CCC Pro CAC His CGC Arg CUG Leu CCG Pro CAG Gln CGG Arg AUG Ile ACC Thr AAC Asn AGC Ser AUG Start ACG Thr AAG Lys AGG Arg GUC Val GCC Ala GAC Asp GGC Gly GUG Val GCG Ala GAG Glu GGG Gly Figure 5. Screenshot of Prototype GUI Showing Embedment and Extraction phases. 192

1. DNA, RNA structure. 2. DNA replication. 3. Transcription, translation

1. DNA, RNA structure. 2. DNA replication. 3. Transcription, translation 1. DNA, RNA structure 2. DNA replication 3. Transcription, translation DNA and RNA are polymers of nucleotides DNA is a nucleic acid, made of long chains of nucleotides Nucleotide Phosphate group Nitrogenous

More information

Biomolecules: lecture 6

Biomolecules: lecture 6 Biomolecules: lecture 6 - to learn the basics on how DNA serves to make RNA = transcription - to learn how the genetic code instructs protein synthesis - to learn the basics on how proteins are synthesized

More information

Level 2 Biology, 2017

Level 2 Biology, 2017 91159 911590 2SUPERVISOR S Level 2 Biology, 2017 91159 Demonstrate understanding of gene expression 2.00 p.m. Wednesday 22 November 2017 Credits: Four Achievement Achievement with Merit Achievement with

More information

Fishy Amino Acid Codon. UUU Phe UCU Ser UAU Tyr UGU Cys. UUC Phe UCC Ser UAC Tyr UGC Cys. UUA Leu UCA Ser UAA Stop UGA Stop

Fishy Amino Acid Codon. UUU Phe UCU Ser UAU Tyr UGU Cys. UUC Phe UCC Ser UAC Tyr UGC Cys. UUA Leu UCA Ser UAA Stop UGA Stop Fishy Code Slips Fish 1 GGTTATAGAGGTACTACC Fish 2 GGCTTCAGAGGTACTACC Fish 3 CATAGCAGAGGTACTACC Fish 4 GGTTATTCTGTCTTATTG Fish 5 GGCTTCTCTGTCTTATTG Fish 6 CATAGCGCTGCAACTACC Fishy Amino Acid Codon UUU Phe

More information

Bioinformatics CSM17 Week 6: DNA, RNA and Proteins

Bioinformatics CSM17 Week 6: DNA, RNA and Proteins Bioinformatics CSM17 Week 6: DNA, RNA and Proteins Transcription (reading the DNA template) Translation (RNA -> protein) Protein Structure Transcription - reading the data enzyme - transcriptase gene opens

More information

Biomolecules: lecture 6

Biomolecules: lecture 6 Biomolecules: lecture 6 - to learn the basics on how DNA serves to make RNA = transcription - to learn how the genetic code instructs protein synthesis - to learn the basics on how proteins are synthesized

More information

ANCIENT BACTERIA? 250 million years later, scientists revive life forms

ANCIENT BACTERIA? 250 million years later, scientists revive life forms ANCIENT BACTERIA? 250 million years later, scientists revive life forms Thursday, October 19, 2000 U.S. researchers say they have revived bacteria that have been dormant for more then 250 million years,

More information

Protein Synthesis. Application Based Questions

Protein Synthesis. Application Based Questions Protein Synthesis Application Based Questions MRNA Triplet Codons Note: Logic behind the single letter abbreviations can be found at: http://www.biology.arizona.edu/biochemistry/problem_sets/aa/dayhoff.html

More information

Degenerate Code. Translation. trna. The Code is Degenerate trna / Proofreading Ribosomes Translation Mechanism

Degenerate Code. Translation. trna. The Code is Degenerate trna / Proofreading Ribosomes Translation Mechanism Translation The Code is Degenerate trna / Proofreading Ribosomes Translation Mechanism Degenerate Code There are 64 possible codon triplets There are 20 naturally-encoding amino acids Several codons specify

More information

CONVERGENT EVOLUTION. Def n acquisition of some biological trait but different lineages

CONVERGENT EVOLUTION. Def n acquisition of some biological trait but different lineages CONVERGENT EVOLUTION Def n acquisition of some biological trait but different lineages Living Rock cactus Baseball plant THE QUESTION From common ancestor or independent acquisition? By Lineage By Convergence

More information

How life. constructs itself.

How life. constructs itself. How life constructs itself Life constructs itself using few simple rules of information processing. On the one hand, there is a set of rules determining how such basic chemical reactions as transcription,

More information

Deoxyribonucleic Acid DNA. Structure of DNA. Structure of DNA. Nucleotide. Nucleotides 5/13/2013

Deoxyribonucleic Acid DNA. Structure of DNA. Structure of DNA. Nucleotide. Nucleotides 5/13/2013 Deoxyribonucleic Acid DNA The Secret of Life DNA is the molecule responsible for controlling the activities of the cell It is the hereditary molecule DNA directs the production of protein In 1953, Watson

More information

The combination of a phosphate, sugar and a base forms a compound called a nucleotide.

The combination of a phosphate, sugar and a base forms a compound called a nucleotide. History Rosalin Franklin: Female scientist (x-ray crystallographer) who took the picture of DNA James Watson and Francis Crick: Solved the structure of DNA from information obtained by other scientist.

More information

iclicker Question #28B - after lecture Shown below is a diagram of a typical eukaryotic gene which encodes a protein: start codon stop codon 2 3

iclicker Question #28B - after lecture Shown below is a diagram of a typical eukaryotic gene which encodes a protein: start codon stop codon 2 3 Bio 111 Handout for Molecular Biology 4 This handout contains: Today s iclicker Questions Information on Exam 3 Solutions Fall 2008 Exam 3 iclicker Question #28A - before lecture Which of the following

More information

Important points from last time

Important points from last time Important points from last time Subst. rates differ site by site Fit a Γ dist. to variation in rates Γ generally has two parameters but in biology we fix one to ensure a mean equal to 1 and the other parameter

More information

p-adic GENETIC CODE AND ULTRAMETRIC BIOINFORMATION

p-adic GENETIC CODE AND ULTRAMETRIC BIOINFORMATION p-adic GENETIC CODE AND ULTRAMETRIC BIOINFORMATION Branko Dragovich http://www.phy.bg.ac.yu/ dragovich dragovich@ipb.ac.rs Institute of Physics, Mathematical Institute SASA, Belgrade 6th International

More information

IMAGE HIDING IN DNA SEQUENCE USING ARITHMETIC ENCODING Prof. Samir Kumar Bandyopadhyay 1* and Mr. Suman Chakraborty

IMAGE HIDING IN DNA SEQUENCE USING ARITHMETIC ENCODING Prof. Samir Kumar Bandyopadhyay 1* and Mr. Suman Chakraborty Volume 2, No. 4, April 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info IMAGE HIDING IN DNA SEQUENCE USING ARITHMETIC ENCODING Prof. Samir Kumar Bandyopadhyay

More information

7.016 Problem Set 3. 1 st Pedigree

7.016 Problem Set 3. 1 st Pedigree 7.016 Problem Set 3 Question 1 The following human pedigree shows the inheritance pattern of a specific disease within a family. Assume that the individuals marrying into the family for all generations

More information

(a) Which enzyme(s) make 5' - 3' phosphodiester bonds? (c) Which enzyme(s) make single-strand breaks in DNA backbones?

(a) Which enzyme(s) make 5' - 3' phosphodiester bonds? (c) Which enzyme(s) make single-strand breaks in DNA backbones? EXAMPLE QUESTIONS AND ANSWERS 1. Topoisomerase does which one of the following? (a) Makes new DNA strands. (b) Unties knots in DNA molecules. (c) Joins the ends of double-stranded DNA molecules. (d) Is

More information

Human Gene,cs 06: Gene Expression. Diversity of cell types. How do cells become different? 9/19/11. neuron

Human Gene,cs 06: Gene Expression. Diversity of cell types. How do cells become different? 9/19/11. neuron Human Gene,cs 06: Gene Expression 20110920 Diversity of cell types neuron How do cells become different? A. Each type of cell has different DNA in its nucleus B. Each cell has different genes C. Each type

More information

A Zero-Knowledge Based Introduction to Biology

A Zero-Knowledge Based Introduction to Biology A Zero-Knowledge Based Introduction to Biology Konstantinos (Gus) Katsiapis 25 Sep 2009 Thanks to Cory McLean and George Asimenos Cells: Building Blocks of Life cell, membrane, cytoplasm, nucleus, mitochondrion

More information

UNIT I RNA AND TYPES R.KAVITHA,M.PHARM LECTURER DEPARTMENT OF PHARMACEUTICS SRM COLLEGE OF PHARMACY KATTANKULATUR

UNIT I RNA AND TYPES R.KAVITHA,M.PHARM LECTURER DEPARTMENT OF PHARMACEUTICS SRM COLLEGE OF PHARMACY KATTANKULATUR UNIT I RNA AND TYPES R.KAVITHA,M.PHARM LECTURER DEPARTMENT OF PHARMACEUTICS SRM COLLEGE OF PHARMACY KATTANKULATUR RNA, as previously mentioned, is an acronym for ribonucleic acid. There are many forms

More information

Protein Synthesis: Transcription and Translation

Protein Synthesis: Transcription and Translation Review Protein Synthesis: Transcription and Translation Central Dogma of Molecular Biology Protein synthesis requires two steps: transcription and translation. DNA contains codes Three bases in DNA code

More information

Chemistry 121 Winter 17

Chemistry 121 Winter 17 Chemistry 121 Winter 17 Introduction to Organic Chemistry and Biochemistry Instructor Dr. Upali Siriwardane (Ph.D. Ohio State) E-mail: upali@latech.edu Office: 311 Carson Taylor Hall ; Phone: 318-257-4941;

More information

Folding simulation: self-organization of 4-helix bundle protein. yellow = helical turns

Folding simulation: self-organization of 4-helix bundle protein. yellow = helical turns Folding simulation: self-organization of 4-helix bundle protein yellow = helical turns Protein structure Protein: heteropolymer chain made of amino acid residues R + H 3 N - C - COO - H φ ψ Chain of amino

More information

Codon Bias with PRISM. 2IM24/25, Fall 2007

Codon Bias with PRISM. 2IM24/25, Fall 2007 Codon Bias with PRISM 2IM24/25, Fall 2007 from RNA to protein mrna vs. trna aminoacid trna anticodon mrna codon codon-anticodon matching Watson-Crick base pairing A U and C G binding first two nucleotide

More information

Honors packet Instructions

Honors packet Instructions Honors packet Instructions The following are guidelines in order for you to receive FULL credit for this bio packet: 1. Read and take notes on the packet in full 2. Answer the multiple choice questions

More information

PROTEIN SYNTHESIS Study Guide

PROTEIN SYNTHESIS Study Guide PART A. Read the following: PROTEIN SYNTHESIS Study Guide Protein synthesis is the process used by the body to make proteins. The first step of protein synthesis is called Transcription. It occurs in the

More information

Just one nucleotide! Exploring the effects of random single nucleotide mutations

Just one nucleotide! Exploring the effects of random single nucleotide mutations Dr. Beatriz Gonzalez In-Class Worksheet Name: Learning Objectives: Just one nucleotide! Exploring the effects of random single nucleotide mutations Given a coding DNA sequence, determine the mrna Based

More information

Chapter 10. The Structure and Function of DNA. Lectures by Edward J. Zalisko

Chapter 10. The Structure and Function of DNA. Lectures by Edward J. Zalisko Chapter 10 The Structure and Function of DNA PowerPoint Lectures for Campbell Essential Biology, Fifth Edition, and Campbell Essential Biology with Physiology, Fourth Edition Eric J. Simon, Jean L. Dickey,

More information

UNIT (12) MOLECULES OF LIFE: NUCLEIC ACIDS

UNIT (12) MOLECULES OF LIFE: NUCLEIC ACIDS UNIT (12) MOLECULES OF LIFE: NUCLEIC ACIDS Nucleic acids are extremely large molecules that were first isolated from the nuclei of cells. Two kinds of nucleic acids are found in cells: RNA (ribonucleic

More information

Basic Biology. Gina Cannarozzi. 28th October Basic Biology. Gina. Introduction DNA. Proteins. Central Dogma.

Basic Biology. Gina Cannarozzi. 28th October Basic Biology. Gina. Introduction DNA. Proteins. Central Dogma. Cannarozzi 28th October 2005 Class Overview RNA Protein Genomics Transcriptomics Proteomics Genome wide Genome Comparison Microarrays Orthology: Families comparison and Sequencing of Transcription factor

More information

CMPS 6630: Introduction to Computational Biology and Bioinformatics. Gene Prediction

CMPS 6630: Introduction to Computational Biology and Bioinformatics. Gene Prediction CMPS 6630: Introduction to Computational Biology and Bioinformatics Gene Prediction Now What? Suppose we want to annotate a genome according to genetic traits. Given a genome, where are the genes? Given

More information

PRINCIPLES OF BIOINFORMATICS

PRINCIPLES OF BIOINFORMATICS PRINCIPLES OF BIOINFORMATICS BIO540/STA569/CSI660, Fall 2010 Lecture 3 (Sep-13-2010) Primer on Molecular Biology/Genomics Igor Kuznetsov Department of Epidemiology & Biostatistics Cancer Research Center

More information

Describe the features of a gene which enable it to code for a particular protein.

Describe the features of a gene which enable it to code for a particular protein. 1. Answers should be written in continuous prose. Credit will be given for biological accuracy, the organisation and presentation of the information and the way in which the answer is expressed. Cancer

More information

CISC 1115 (Science Section) Brooklyn College Professor Langsam. Assignment #6. The Genetic Code 1

CISC 1115 (Science Section) Brooklyn College Professor Langsam. Assignment #6. The Genetic Code 1 CISC 1115 (Science Section) Brooklyn College Professor Langsam Assignment #6 The Genetic Code 1 Deoxyribonucleic acid, or DNA, is a molecule that contains the instructions used in the development and functioning

More information

Lecture 19A. DNA computing

Lecture 19A. DNA computing Lecture 19A. DNA computing What exactly is DNA (deoxyribonucleic acid)? DNA is the material that contains codes for the many physical characteristics of every living creature. Your cells use different

More information

Enduring Understanding

Enduring Understanding Enduring Understanding The processing of genetic information is imperfect and is a source of genetic variation. Objective: You will be able to create a visual representation to illustrate how changes in

More information

PGRP negatively regulates NOD-mediated cytokine production in rainbow trout liver cells

PGRP negatively regulates NOD-mediated cytokine production in rainbow trout liver cells Supplementary Information for: PGRP negatively regulates NOD-mediated cytokine production in rainbow trout liver cells Ju Hye Jang 1, Hyun Kim 2, Mi Jung Jang 2, Ju Hyun Cho 1,2,* 1 Research Institute

More information

INTRODUCTION TO THE MOLECULAR GENETICS OF THE COLOR MUTATIONS IN ROCK POCKET MICE

INTRODUCTION TO THE MOLECULAR GENETICS OF THE COLOR MUTATIONS IN ROCK POCKET MICE The Making of the The Fittest: Making of the Fittest Natural Selection Natural and Adaptation Selection and Adaptation Educator Materials TEACHER MATERIALS INTRODUCTION TO THE MOLECULAR GENETICS OF THE

More information

DNA sentences. How are proteins coded for by DNA? Materials. Teacher instructions. Student instructions. Reflection

DNA sentences. How are proteins coded for by DNA? Materials. Teacher instructions. Student instructions. Reflection DNA sentences How are proteins coded for by DNA? Deoxyribonucleic acid (DNA) is the molecule of life. DNA is one of the most recognizable nucleic acids, a double-stranded helix. The process by which DNA

More information

Station 1: DNA Structure Use the figure above to answer each of the following questions. 1.This is the subunit that DNA is composed of. 2.

Station 1: DNA Structure Use the figure above to answer each of the following questions. 1.This is the subunit that DNA is composed of. 2. 1. Station 1: DNA Structure Use the figure above to answer each of the following questions. 1.This is the subunit that DNA is composed of. 2.This subunit is composed of what 3 parts? 3.What molecules make

More information

7.013 Problem Set

7.013 Problem Set 7.013 Problem Set 4-2013 Question 1 The following human pedigree shows the inheritance of a specific disease. Please note: The filled squares or circles represent the abnormal phenotype. The individuals

More information

Bioinformation by Biomedical Informatics Publishing Group

Bioinformation by Biomedical Informatics Publishing Group Study of codon bias perspective of fungal xylanase gene by multivariate analysis Smriti Shrivastava, Raju Poddar, Pratyoosh Shukla*, Kunal Mukhopadhyay Department of Biotechnology, Birla Institute of Technology

More information

BIOL591: Introduction to Bioinformatics Comparative genomes to look for genes responsible for pathogenesis

BIOL591: Introduction to Bioinformatics Comparative genomes to look for genes responsible for pathogenesis BIOL591: Introduction to Bioinformatics Comparative genomes to look for genes responsible for pathogenesis Reading: (1) Scenario 2: (Course web site) Read this first! (2) Perna, N. T., G. Plunkett, 3rd,

More information

DNA Begins the Process

DNA Begins the Process Biology I D N A DNA contains genes, sequences of nucleotide bases These Genes code for polypeptides (proteins) Proteins are used to build cells and do much of the work inside cells DNA Begins the Process

More information

Molecular Level of Genetics

Molecular Level of Genetics Molecular Level of Genetics Most of the molecules found in humans and other living organisms fall into one of four categories: 1. carbohydrates (sugars and starches) 2. lipids (fats, oils, and waxes) 3.

More information

Emergence of the Canonical Genetic Code

Emergence of the Canonical Genetic Code Emergence of the Canonical Genetic Code Fall 2009 Emergent States of Matter Term Essay Samuel O. Skinner Abstract I will review literature that expands the theory that the canonical genetic code was not

More information

Basic concepts of molecular biology

Basic concepts of molecular biology Basic concepts of molecular biology Gabriella Trucco Email: gabriella.trucco@unimi.it What is life made of? 1665: Robert Hooke discovered that organisms are composed of individual compartments called cells

More information

BIOSTAT516 Statistical Methods in Genetic Epidemiology Autumn 2005 Handout1, prepared by Kathleen Kerr and Stephanie Monks

BIOSTAT516 Statistical Methods in Genetic Epidemiology Autumn 2005 Handout1, prepared by Kathleen Kerr and Stephanie Monks Rationale of Genetic Studies Some goals of genetic studies include: to identify the genetic causes of phenotypic variation develop genetic tests o benefits to individuals and to society are still uncertain

More information

Chapter 13 From Genes to Proteins

Chapter 13 From Genes to Proteins Chapter 13 From Genes to Proteins True/False Indicate whether the sentence or statement is true(a) or false(b). 1. RNA nucleotides contain the sugar ribose. 2. Only DNA molecules contain the nitrogen base

More information

Gene Prediction. Srivani Narra Indian Institute of Technology Kanpur

Gene Prediction. Srivani Narra Indian Institute of Technology Kanpur Gene Prediction Srivani Narra Indian Institute of Technology Kanpur Email: srivani@iitk.ac.in Supervisor: Prof. Harish Karnick Indian Institute of Technology Kanpur Email: hk@iitk.ac.in Keywords: DNA,

More information

Evolution of protein coding sequences

Evolution of protein coding sequences Evolution of protein coding sequences Kinds of nucleo-de subs-tu-ons Given 2 nucleo-de sequences, how their similari-es and differences arose from a common ancestor? We assume A the common ancestor: Single

More information

Chapter 10. The Structure and Function of DNA. Lectures by Edward J. Zalisko

Chapter 10. The Structure and Function of DNA. Lectures by Edward J. Zalisko Chapter 10 The Structure and Function of DNA PowerPoint Lectures for Campbell Essential Biology, Fifth Edition, and Campbell Essential Biology with Physiology, Fourth Edition Eric J. Simon, Jean L. Dickey,

More information

Materials Protein synthesis kit. This kit consists of 24 amino acids, 24 transfer RNAs, four messenger RNAs and one ribosome (see below).

Materials Protein synthesis kit. This kit consists of 24 amino acids, 24 transfer RNAs, four messenger RNAs and one ribosome (see below). Protein Synthesis Instructions The purpose of today s lab is to: Understand how a cell manufactures proteins from amino acids, using information stored in the genetic code. Assemble models of four very

More information

Topic 2.7 Replication, Transcription & Translation

Topic 2.7 Replication, Transcription & Translation Topic 2.7 Replication, Transcription & Translation INTRO http://images.rapgenius.com/82b71adf0d8d1d8997ee95debc1fb8b5.1000x437x1.png The central dogma of biology describes how information from DNA is able

More information

Basic concepts of molecular biology

Basic concepts of molecular biology Basic concepts of molecular biology Gabriella Trucco Email: gabriella.trucco@unimi.it Life The main actors in the chemistry of life are molecules called proteins nucleic acids Proteins: many different

More information

7.013 Exam Two

7.013 Exam Two Recitation Section or TA: 7.013 Exam Two -- 2007 Exam starts at 11:05 am and ends at 11:55 am. There are 11 pages including this cover page. Please write your name on each page. Only writing on the FRONT

More information

Inheritance of Traits

Inheritance of Traits Cookbooks describe the ingredients and steps needed to make many kinds of dishes. Some cookbooks contain hundreds of recipes. However, someone needs to use the cookbook in order to create the dishes. Without

More information

CHAPTER 12- RISE OF GENETICS I. DISCOVERY OF DNA A. GRIFFITH (1928) 11/15/2016

CHAPTER 12- RISE OF GENETICS I. DISCOVERY OF DNA A. GRIFFITH (1928) 11/15/2016 CHAPTER 12- RISE OF GENETICS KENNEDY BIOL. 1AB I. DISCOVERY OF DNA DNA WAS FIRST DISCOVERED IN 1898 BY MIESHNER. HE USED PROTEASE TO DIGEST THE PROTEIN AWAY FROM WHITE BLOOD CELLS. HE DESCRIBED WHAT HE

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION ARTICLE NUMBER: 16045 Highly heterogeneous mutation rates in the hepatitis C virus genome Ron Geller, Úrsula Estada, Joan B. Peris, Iván Andreu, Juan-Vicente Bou, Raquel Garijo, José M. Cuevas, Rosario

More information

Chapter 3: Information Storage and Transfer in Life

Chapter 3: Information Storage and Transfer in Life Chapter 3: Information Storage and Transfer in Life The trapped scientist examples are great for conceptual purposes, but they do not accurately model how information in life changes because they do not

More information

Translating the Genetic Code. DANILO V. ROGAYAN JR. Faculty, Department of Natural Sciences

Translating the Genetic Code. DANILO V. ROGAYAN JR. Faculty, Department of Natural Sciences Translating the Genetic Code DANILO V. ROGAYAN JR. Faculty, Department of Natural Sciences An overview of gene expression Figure 13.2 The Idea of A Code 20 amino acids 4 nucleotides How do nucleic acids

More information

Mechanisms of Genetics

Mechanisms of Genetics 2.B.6.A of nucleic acids and the principles of Mendelian Genetics. The student is expected to (A) identify components of DNA, and describe how information for specifying the traits of an organism is carried

More information

Daily Agenda. Warm Up: Review. Translation Notes Protein Synthesis Practice. Redos

Daily Agenda. Warm Up: Review. Translation Notes Protein Synthesis Practice. Redos Daily Agenda Warm Up: Review Translation Notes Protein Synthesis Practice Redos 1. What is DNA Replication? 2. Where does DNA Replication take place? 3. Replicate this strand of DNA into complimentary

More information

Name Date Class. The Central Dogma of Biology

Name Date Class. The Central Dogma of Biology Concept Mapping The Central Dogma of Biology Complete the events chain showing the events that occur as DNA codes for RNA, which guides the synthesis of proteins, the central dogma of biology. These terms

More information

Bioinformatics 1. Sepp Hochreiter. Biology, Sequences, Phylogenetics Part 1. Bioinformatics 1: Biology, Sequences, Phylogenetics

Bioinformatics 1. Sepp Hochreiter. Biology, Sequences, Phylogenetics Part 1. Bioinformatics 1: Biology, Sequences, Phylogenetics Bioinformatics 1 Biology, Sequences, Phylogenetics Part 1 Sepp Hochreiter 3 Credits (plus 3 Credits for exercises) Examination at the end of the class Master Bioinformatics and Computer Science Script

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Exam Chapter 17 Genes to Proteins Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. The following questions refer to Figure 17.1, a simple metabolic

More information

If stretched out, the DNA in chromosome 1 is roughly long.

If stretched out, the DNA in chromosome 1 is roughly long. Introduction to Molecular Genetics (http://chemwiki.ucdavis.edu/wikitexts/sacramento_city_college/scc%3a_chem_309_(bennett)/chapters/17% 3A_ucleic_Acids) (http://www.nature.com/scitable/topicpage/ribosomes-transcription-and-translation-14120660)

More information

Today in Astronomy 106: polymers to life

Today in Astronomy 106: polymers to life Today in Astronomy 106: polymers to life Translation: the current fashion in protein manufacture. The chicken-egg problem Protein-based primitive life? RNA World Emergence of the genetic code. How long

More information

FROM MOLECULES TO LIFE

FROM MOLECULES TO LIFE Chapter 7 (Strickberger) FROM MOLECULES TO LIFE Organisms depended on processes that transformed materials available outside of the cell into metabolic products necessary for cellular life. These processes

More information

Problem Set 3

Problem Set 3 Name: 1 Topic 1. 2007 7.013 Problem Set 3 Due before 5 PM on FRIDAY, March 16, 2007. Turn answers in to the box outside of 68-120. PLEASE WRITE YOUR ANSWERS ON THIS PRINTOUT. You have been studying transcription

More information

Why are proteins important?

Why are proteins important? PROTEIN SYNTHESIS Why are proteins important? proteins help build cell structures some proteins are enzymes that promote biological reactions Proteins are found in muscles, blood, bones, etc.. RNA RNA

More information

Trends in the codon usage patterns of Chromohalobacter salexigens genes

Trends in the codon usage patterns of Chromohalobacter salexigens genes www.bioinformation.net Hypothesis Volume 8(22) Trends in the codon usage patterns of Chromohalobacter salexigens genes Rajkumari Sanjukta 1 *, Mohammad Samir Farooqi 1 *, Naveen Sharma 1, Anil Rai 1, Dwijesh

More information

Bioinformatics. ONE Introduction to Biology. Sami Khuri Department of Computer Science San José State University Biology/CS 123A Fall 2012

Bioinformatics. ONE Introduction to Biology. Sami Khuri Department of Computer Science San José State University Biology/CS 123A Fall 2012 Bioinformatics ONE Introduction to Biology Sami Khuri Department of Computer Science San José State University Biology/CS 123A Fall 2012 Biology Review DNA RNA Proteins Central Dogma Transcription Translation

More information

FROM MOLECULES TO LIFE

FROM MOLECULES TO LIFE Chapter 7 (Strickberger) FROM MOLECULES TO LIFE Organisms depended on processes that transformed materials available outside of the cell into metabolic products necessary for cellular life. These processes

More information

Today in Astronomy 106: the important polymers and from polymers to life

Today in Astronomy 106: the important polymers and from polymers to life Today in Astronomy 106: the important polymers and from polymers to life Replication or mass production of nucleic acids and proteins Interdependence: which came first, protein mass production or nucleic-acid

More information

Forensic Science: DNA Evidence Unit

Forensic Science: DNA Evidence Unit Day 2 : Cooperative Lesson Topic: Protein Synthesis Duration: 55 minutes Grade Level: 10 th Grade Forensic Science: DNA Evidence Unit Purpose: The purpose of this lesson is to review and build upon prior

More information

NAME:... MODEL ANSWER... STUDENT NUMBER:... Maximum marks: 50. Internal Examiner: Hugh Murrell, Computer Science, UKZN

NAME:... MODEL ANSWER... STUDENT NUMBER:... Maximum marks: 50. Internal Examiner: Hugh Murrell, Computer Science, UKZN COMP710, Bioinformatics with Julia, Test One, Thursday the 20 th of April, 2017, 09h30-11h30 1 NAME:...... MODEL ANSWER... STUDENT NUMBER:...... Maximum marks: 50 Internal Examiner: Hugh Murrell, Computer

More information

CH107 Mock Exam 2. 3) Which of the following is a purine base? Purines = adenine, guanine A) Uracil B) Adenine C) Thymine D) Cysteine E) Orotate

CH107 Mock Exam 2. 3) Which of the following is a purine base? Purines = adenine, guanine A) Uracil B) Adenine C) Thymine D) Cysteine E) Orotate 100 pts. 1-34 2pts, 35-40 8pts. (choose 4 of 6) 1) What are the components of DNA? A) Ribonucleic acid, B) Amino group, phosphate group, pentose sugar C) Sugar-phosphate backbone D) fructose sugar, nitrogen

More information

THE GENETIC CODE Figure 1: The genetic code showing the codons and their respective amino acids

THE GENETIC CODE Figure 1: The genetic code showing the codons and their respective amino acids THE GENETIC CODE As DNA is a genetic material, it carries genetic information from cell to cell and from generation to generation. There are only four bases in DNA and twenty amino acids in protein, so

More information

Genes & Inheritance Series: Set 1. Copyright 2005 Version: 2.0

Genes & Inheritance Series: Set 1. Copyright 2005 Version: 2.0 Genes & Inheritance Series: Set 1 Copyright 2005 Version: 2.0 Genes in Eukaryote Cells Eukaryotes have genetic information stored in chromosomes in the nucleus of each cell: Cytoplasm: The nucleus controls

More information

UNIT (12) MOLECULES OF LIFE: NUCLEIC ACIDS

UNIT (12) MOLECULES OF LIFE: NUCLEIC ACIDS UIT (12) MLECULE F LIFE: UCLEIC ACID ucleic acids are extremely large molecules that were first isolated from the nuclei of cells. Two kinds of nucleic acids are found in cells: RA (ribonucleic acid) is

More information

Genes and Proteins. Objectives

Genes and Proteins. Objectives Genes and Proteins Lecture 15 Objectives At the end of this series of lectures, you should be able to: Define terms. Explain the central dogma of molecular biology. Describe the locations, reactants, and

More information

UNIT 4. DNA, RNA, and Gene Expression

UNIT 4. DNA, RNA, and Gene Expression UNIT 4 DNA, RNA, and Gene Expression DNA STRUCTURE DNA is the primary material that causes recognizable, inheritable characteristics in related groups of organisms. DNA is the GENETIC MATERIAL Contain

More information

Lecture #18 10/17/01 Dr. Wormington

Lecture #18 10/17/01 Dr. Wormington Lecture #18 10/17/01 Dr. Wormington DNA Replication The Story So Far Semiconservative Hydrolysis of 5' dntp 3' HO N 4 pn 3 pn 2 pn 1 p5'... + PP i 2P i Provides Energy for Phosphodiester Bond Formation

More information

It has not escaped our notice that the specific paring we have postulated immediately suggest a possible copying mechanism for the genetic material

It has not escaped our notice that the specific paring we have postulated immediately suggest a possible copying mechanism for the genetic material 5-carbon sugar hosphate functional group Nitrogenous base 2 types urines = 2 rings 5 & 6 member N containing ring yrimidines = 1 ring 6 member N containing ring Geometry and space requires complimentary

More information

Multi-Layer Data Encryption using Residue Number System in DNA Sequence

Multi-Layer Data Encryption using Residue Number System in DNA Sequence International Journal of Computer Applications (975 8887) Multi-Layer Data Encryption using Residue Number System in DNA Sequence M. I. Youssef Faculty Of Engineering, Department Of Electrical Engineering

More information

Keywords: DNA methylation, deamination, codon usage, genome, genomics

Keywords: DNA methylation, deamination, codon usage, genome, genomics A PECULIAR CODON USAGE PATTERN REVEALED AFTER REMOVING THE EFFECT OF DNA METHYLATION Xuhua Xia Department of Biology, University of Ottawa E-mail: xxia@uottawa.ca Keywords: DNA methylation, deamination,

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Ch 17 Practice Questions MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Garrod hypothesized that "inborn errors of metabolism" such as alkaptonuria

More information

PROTEIN SYNTHESIS WHAT IS IT? HOW DOES IT WORK?

PROTEIN SYNTHESIS WHAT IS IT? HOW DOES IT WORK? PROTEIN SYNTHESIS WHAT IS IT? HOW DOES IT WORK? Learning Outcomes All: Will be able to describe simple steps in protein synthesis: Transcription and Translation and be able to distinguish between them.

More information

Student Exploration: RNA and Protein Synthesis Due Wednesday 11/27/13

Student Exploration: RNA and Protein Synthesis Due Wednesday 11/27/13 http://www.explorelearning.com Name: Period : Student Exploration: RNA and Protein Synthesis Due Wednesday 11/27/13 Vocabulary: Define these terms in complete sentences on a separate piece of paper: amino

More information

Keywords: Staphylococcal phage, Synonymous codon usage, Translational selection, Mutational bias, Phage therapy.

Keywords: Staphylococcal phage, Synonymous codon usage, Translational selection, Mutational bias, Phage therapy. www.bioinformation.net Hypothesis Volume 8(24) Synonymous codon usage in forty staphylococcal phages identifies the factors controlling codon usage variation and the phages suitable for phage therapy Arghya

More information

MOLECULAR EVOLUTION AND PHYLOGENETICS

MOLECULAR EVOLUTION AND PHYLOGENETICS MOLECULAR EVOLUTION AND PHYLOGENETICS 1 Molecular Basis of Evolution 1.1. Evolutionary Tree of Life From the time of Charles Darwin, it has been a dream for many biologists to reconstruct the evolutionary

More information

7.014 Quiz II 3/18/05. Write your name on this page and your initials on all the other pages in the space provided.

7.014 Quiz II 3/18/05. Write your name on this page and your initials on all the other pages in the space provided. 7.014 Quiz II 3/18/05 Your Name: TA's Name: Write your name on this page and your initials on all the other pages in the space provided. This exam has 10 pages including this coversheet. heck that you

More information

Review of Central Dogma; Simple Mendelian Inheritance

Review of Central Dogma; Simple Mendelian Inheritance Review of Central Dogma; Simple Mendelian Inheritance Problem Set #1 Answers: 1. 5'-ACCGTTATGAC-3' 2. No. You would also need to know if this organism has a double stranded DNA genome. Assuming that it

More information

GENETICS and the DNA code NOTES

GENETICS and the DNA code NOTES GENETICS and the DNA code NOTES BACKGROUND DNA is the hereditary material of most organisms. It is an organic compound made of two strands, twisted around one another to form a double helix. Each strand

More information

Flow of Genetic Information

Flow of Genetic Information Flow of Genetic Information Transcription and Translation Links to the Next Generation Standards Scientific and Engineering Practices: Asking Questions (for science) and Defining Problems (for engineering)

More information

1/4/18 NUCLEIC ACIDS. Nucleic Acids. Nucleic Acids. ECS129 Instructor: Patrice Koehl

1/4/18 NUCLEIC ACIDS. Nucleic Acids. Nucleic Acids. ECS129 Instructor: Patrice Koehl NUCLEIC ACIDS ECS129 Instructor: Patrice Koehl Nucleic Acids Nucleotides DNA Structure RNA Synthesis Function Secondary structure Tertiary interactions Wobble hypothesis DNA RNA Replication Transcription

More information

NUCLEIC ACIDS. ECS129 Instructor: Patrice Koehl

NUCLEIC ACIDS. ECS129 Instructor: Patrice Koehl NUCLEIC ACIDS ECS129 Instructor: Patrice Koehl Nucleic Acids Nucleotides DNA Structure RNA Synthesis Function Secondary structure Tertiary interactions Wobble hypothesis DNA RNA Replication Transcription

More information