Preferred Language
Articles
/
RuZ_gZ0BmraWrQ4dkFlk
Text encryption through bio-inspired DNA and RNA sequencing
...Show More Authors

Cryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Randomization is used in the encoding of DNA and in the scrambling of RNA to make each encryption instance different from the other. This method was tested with varying sizes of messages, and it has proved very efficient in terms of time between encryption and decryption. This approach has created new opportunities for the creation of new classes of secure cryptographic systems bio-inspired to get modern methods of digital communication.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
The authority of the ancient text in the poetry of Bashar bin Bard
...Show More Authors

Abstract

Heritage represents the center around which poets revolve around and take advantage of its inexhaustible specific, and the connotations that this heritage holds of various values, values ​​and ideas, and the poet Bashar bin Bard from prominent poets who were inspired by that heritage and the culture of the first Abbasid era and whoever and others was worthy of studying and tracking his potentials and capabilities Creativity is based on the inspiration of the legacy of his predecessors, and the development of this legacy and renewal in it. The research methodology required its division into two topics, the first topic, a description of the beauty of women, a description of wine, while the second topic is a description

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 05 2010
Journal Name
Journal Of College Of Education For Women
Conversation Analysis of Forum: a Selected Text from Paul S. Kemp Online Journal
...Show More Authors

Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit

... Show More
Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Anthropology and Representations of Magic in Arab Theatrical Text Harut and Marut's Play as a Model: وصال خلفة كاظم البكري
...Show More Authors

The research (Anthropology and Representations of magic in Arab Theatrical Text, Harut and Marut's play as a Model) is concerned with studying magic and the forms of its presence in the theatrical text in different human cultures where it belongs. The research consists of four chapters.
The first chapter includes the research problem that revolves around the following questions: (what is the mechanism of employing magic anthropology and its representations in the Arab theatrical text Harut and Marut's play as a model?), and the research importance which is attributed to the necessity of studying (magic) in the Arab theatrical text as it is considered the inauguration of one of the social phenomena that many researchers in the field o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 26 2024
Journal Name
Opera Medica Et Physiologica
The Impact of Global DNA Methylation and Hypoxia-Inducible Factor 1 Alpha Levels in the Progression of Breast Cancer
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Apr 18 2023
Journal Name
Jornal Of Al-muthanna For Agricultural Sciences
Effect of organic, mineral and bio-fertilizer and their interaction on growth, and some quality characters of potato Solanum tuberosum L. cv.(Burren).
...Show More Authors

RG Majeed, AS Ahmed, Jornal of Al-Muthanna for Agricultural Sciences, 2023

View Publication
Publication Date
Wed Aug 03 2022
Journal Name
Egyptian Journal Of Chemistry
A Novel Bio-electrochemical Cell with Rotating Cylinder Cathode for Cadmium Removal from Simulated Wastewater
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Cadmium Removal Using Bio-Electrochemical Reactor with Packed Bed Rotating Cylindrical Cathode: A Kinetics Study
...Show More Authors

   The kinetics of removing cadmium from aqueous solutions was studied using a bio-electrochemical reactor with a packed bed rotating cylindrical cathode. The effect of applied voltage, initial concentration of cadmium, cathode rotation speed, and pH on the reaction rate constant (k) was studied. The results showed that the cathodic deposition occurred under the control of mass transfer for all applied voltage values ​​used in this research. Accordingly, the relationship between logarithmic concentration gradient with time can be represented by a first-order kinetic rate equation. It was found that the rate constant (k) depends on the applied voltage, the initial cadmium concentration, the pH and the rotational speed of cathode. It

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
2nd International Conference On Materials Engineering & Science (iconmeas 2019)
A kinetic model for prodigiosin production by Serratia marcescens as a bio-colorant in bioreactor
...Show More Authors

View Publication
Scopus (20)
Crossref (21)
Scopus Crossref