Team:Hong Kong-CUHK/Project
From 2010.igem.org
(Difference between revisions)
(4 intermediate revisions not shown) | |||
Line 62: | Line 62: | ||
#menubar{ | #menubar{ | ||
font-size:55%; | font-size:55%; | ||
- | } | + | } |
+ | |||
body.page-Team_Hong_Kong-CUHK_Project h1.firstHeading { display:none; } | body.page-Team_Hong_Kong-CUHK_Project h1.firstHeading { display:none; } | ||
body.page-Team_Hong_Kong-CUHK_Project #menubar { top:0px; } | body.page-Team_Hong_Kong-CUHK_Project #menubar { top:0px; } | ||
Line 324: | Line 325: | ||
<!--Begin Logo--> | <!--Begin Logo--> | ||
<div class="logo-module"> | <div class="logo-module"> | ||
- | <a href=" | + | <a href="https://2010.igem.org/Team:Hong_Kong-CUHK" id="logo"></a> |
</div> | </div> | ||
<!--End Logo--> | <!--End Logo--> | ||
Line 363: | Line 364: | ||
<p><span class="inset-right">Quick fact: <br /><br />In our system, 1g of <em>E. coli</em> can store max 931,322 GB data. <br /><br />In comparison, typical hard disk can store 1-4GB/gram.</span></p> | <p><span class="inset-right">Quick fact: <br /><br />In our system, 1g of <em>E. coli</em> can store max 931,322 GB data. <br /><br />In comparison, typical hard disk can store 1-4GB/gram.</span></p> | ||
<p>As the leakage of national confidential information and personal privacy become more and more serous, we believe that this biological cryptography can help protect the important information of the mankind. The innovative cryptography system heralds a new era of information security.</p> | <p>As the leakage of national confidential information and personal privacy become more and more serous, we believe that this biological cryptography can help protect the important information of the mankind. The innovative cryptography system heralds a new era of information security.</p> | ||
- | |||
<p> </p> | <p> </p> | ||
<p><span class="dropcap-blue">T</span></p> | <p><span class="dropcap-blue">T</span></p> | ||
Line 369: | Line 369: | ||
<p>With the advancement of electronic engineering after the World War II, more complex ciphers are developed, which plays a pivotal role in the security system of this information explosive age. However mathematical advances result in the weakening or even attack on the ciphers. It makes us rethink whether data storage and encryption in computer is the only way to ensure data safety</p> | <p>With the advancement of electronic engineering after the World War II, more complex ciphers are developed, which plays a pivotal role in the security system of this information explosive age. However mathematical advances result in the weakening or even attack on the ciphers. It makes us rethink whether data storage and encryption in computer is the only way to ensure data safety</p> | ||
<p>Using bacteria as the information storage device is not a new idea, Bancroft’s group [1] had long proposed the storage of information in DNA early in 2001. Yachie’s group[2] had also been working on the bacterial data storage method in Bacillus subtilis in 2007. In contrast to electronic data storage, the nature of bacterial data storage depends on the bacteria one would pick – Bacillus subtilis would create extra copies of the data, inserting into their genomes which would further safeguard the information; Deinococcus radiodurans, one of the most radioresistant organisms known, would survive even under the electromagnetic pulse and radiation after the nuclear attack. But how are we actually improving the security system by simply storing information in bacteria?</p> | <p>Using bacteria as the information storage device is not a new idea, Bancroft’s group [1] had long proposed the storage of information in DNA early in 2001. Yachie’s group[2] had also been working on the bacterial data storage method in Bacillus subtilis in 2007. In contrast to electronic data storage, the nature of bacterial data storage depends on the bacteria one would pick – Bacillus subtilis would create extra copies of the data, inserting into their genomes which would further safeguard the information; Deinococcus radiodurans, one of the most radioresistant organisms known, would survive even under the electromagnetic pulse and radiation after the nuclear attack. But how are we actually improving the security system by simply storing information in bacteria?</p> | ||
- | <p><a href=" | + | <p><a href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_principle">Next: Principle</a></p> |
<div class="article-ratings"> | <div class="article-ratings"> | ||
Line 390: | Line 390: | ||
<ul class="menu" > | <ul class="menu" > | ||
<li class="item1" > | <li class="item1" > | ||
- | <a class="bullet" href=" | + | <a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK" > |
<span> | <span> | ||
Home | Home | ||
Line 399: | Line 399: | ||
</li> | </li> | ||
<li class="item167 parent active" > | <li class="item167 parent active" > | ||
- | <a class="bullet subtext" href=" | + | <a class="bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project" > |
<span> | <span> | ||
Project <em>iGEM 2010</em> | Project <em>iGEM 2010</em> | ||
Line 411: | Line 411: | ||
<li class="item171" > | <li class="item171" > | ||
- | <a class="bullet" href=" | + | <a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project" > |
<span> | <span> | ||
Introduction | Introduction | ||
Line 421: | Line 421: | ||
<li class="item185" > | <li class="item185" > | ||
- | <a class="bullet" href=" | + | <a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_principle" > |
<span> | <span> | ||
Principle | Principle | ||
+ | </span> | ||
+ | </a> | ||
+ | |||
+ | |||
+ | </li> | ||
+ | |||
+ | <li class="item191" > | ||
+ | <a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_results" > | ||
+ | <span> | ||
+ | Results | ||
</span> | </span> | ||
</a> | </a> | ||
Line 431: | Line 441: | ||
<li class="item187" > | <li class="item187" > | ||
- | <a class="bullet" href=" | + | <a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_biosafety" > |
<span> | <span> | ||
Biosafety | Biosafety | ||
Line 441: | Line 451: | ||
<li class="item189" > | <li class="item189" > | ||
- | <a class="bullet" href=" | + | <a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_ethics" > |
<span> | <span> | ||
Ethics | Ethics | ||
Line 451: | Line 461: | ||
<li class="item190" > | <li class="item190" > | ||
- | <a class="bullet" href=" | + | <a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_human-practice" > |
<span> | <span> | ||
Human Practice | Human Practice | ||
Line 464: | Line 474: | ||
</li> | </li> | ||
<li class="item162 parent" > | <li class="item162 parent" > | ||
- | <a class="bullet subtext" href=" | + | <a class="bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Team" > |
<span> | <span> | ||
Team <em>CUHK2010</em> | Team <em>CUHK2010</em> | ||
Line 474: | Line 484: | ||
</li> | </li> | ||
<li class="item182" > | <li class="item182" > | ||
- | <a class="bullet subtext" href=" | + | <a class="bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Parts" > |
<span> | <span> | ||
Parts <em>Submitted</em> | Parts <em>Submitted</em> | ||
Line 484: | Line 494: | ||
</li> | </li> | ||
<li class="item180" > | <li class="item180" > | ||
- | <a class="bullet" href=" | + | <a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Model" > |
<span> | <span> | ||
Modeling | Modeling | ||
Line 493: | Line 503: | ||
</li> | </li> | ||
<li class="item175" > | <li class="item175" > | ||
- | <a class="bullet" href=" | + | <a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Notebook" > |
<span> | <span> | ||
Notebook | Notebook | ||
Line 502: | Line 512: | ||
</li> | </li> | ||
<li class="item168" > | <li class="item168" > | ||
- | <a class="bullet" href=" | + | <a class="bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Sponsors" > |
<span> | <span> | ||
Sponsors | Sponsors |
Latest revision as of 21:24, 27 October 2010