Difference between revisions of "Team:Groningen/Model"

Line 15: Line 15:
 
<p>
 
<p>
  
<div class="split"><div class="left flone"> The AI model explores the behaviour of the people who use, or try to abuse,
+
<div class="split"><div class="left fltwo"> The AI model explores the behaviour of the people who use, or try to abuse,
 
the CryptoGErM system. The people are modelled in a multi-agent simulation using genetic algorithms.  
 
the CryptoGErM system. The people are modelled in a multi-agent simulation using genetic algorithms.  
 
This model helps us to predict the  
 
This model helps us to predict the  
Line 23: Line 23:
 
</a></li></ul></p></div>
 
</a></li></ul></p></div>
  
<div class="right flone"><img src="https://static.igem.org/mediawiki/2016/4/40/T--Groningen--layersguy.png" /></div></div>
+
<div class="right flone"><img src="https://static.igem.org/mediawiki/2016/c/cc/T--Groningen---modelling---hacker-.jpeg" /></div></div>
 
 
 
</p>
 
</p>
Line 41: Line 41:
 
</a></li></ul></p></div>
 
</a></li></ul></p></div>
  
<div class="left flone"><img src="https://static.igem.org/mediawiki/2016/4/40/T--Groningen--layersguy.png" /></div></div>
+
<div class="left flone"><img src="https://static.igem.org/mediawiki/2016/1/11/T--Groningen---modelling---eikemutation-.jpeg" /></div></div>
  
 
 
Line 62: Line 62:
 
</a></li></ul></p></div>
 
</a></li></ul></p></div>
  
<div class="right flone"><img src="https://static.igem.org/mediawiki/2016/4/40/T--Groningen--layersguy.png" /></div></div>
+
<div class="right flone"><ihttps://static.igem.org/mediawiki/2016/2/20/T--Groningen---modelling---whatifmutation-.jpeg" /></div></div>
  
 
</p>
 
</p>
Line 79: Line 79:
 
</a></li></ul></p></div>
 
</a></li></ul></p></div>
  
<div class="left flone"><img src="https://static.igem.org/mediawiki/2016/4/40/T--Groningen--layersguy.png" /></div></div>
+
<div class="left flone"><img src="https://static.igem.org/mediawiki/2016/e/ee/T--Groningen---modelling---decodingcosts-.png" /></div></div>
  
 
</p>
 
</p>

Revision as of 12:11, 19 October 2016

CryptoGE®M
Team
Project
Biology
Computing
Human Practice
Acknowledgements

Modelling

We modelled several aspects of the CryptoGErM system. These models are described and explained in detail in the following articles:

Belief-Desire-Intention

The AI model explores the behaviour of the people who use, or try to abuse, the CryptoGErM system. The people are modelled in a multi-agent simulation using genetic algorithms. This model helps us to predict the and intentions of the users and intruders of our system.

Random mutations in Bacillus subtilis

The data stored in the CryptoGErM system might be endangered by random mutations in the DNA. This article contains research of the literature on known mutation rates of B. subtilis under the special conditions and treatments that will be applied.

Random mutations modelling

In this section we computationally modelled the probaility of random mutation causing our message in the DNA to be corrupted.

Decoding fidelity

In the decoding fidelity section we explore how accurate the current sequencing techniques are and how strong our decoy encryption security layer is.

Searching for an optimal strain

We modelled the protein-DNA interactions in oder to search for an optimal strain for our photoswitchable antibiotic experiments.


Oop top