Preferred Language
Articles
/
RuZ_gZ0BmraWrQ4dkFlk
Text encryption through bio-inspired DNA and RNA sequencing
...Show More Authors

Cryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Randomization is used in the encoding of DNA and in the scrambling of RNA to make each encryption instance different from the other. This method was tested with varying sizes of messages, and it has proved very efficient in terms of time between encryption and decryption. This approach has created new opportunities for the creation of new classes of secure cryptographic systems bio-inspired to get modern methods of digital communication.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 19 2024
Journal Name
Baghdad Science Journal
The correlation between micro-RNA 146a and IL-17 in the serum of Iraqi patients with cystic echinococcosis
...Show More Authors

داء المشوكات الكيسي (CE) هو مرض وبائي يسبب مرضًا خطيرًا وخسائر اقتصادية في معظم بلدان العالم. MiRNAs هي عامل جيني ضروري لتنظيم الاستجابة المناعية من خلال قدرته على التدخل في التعبير الخلوي ؛ واحد هذه الحوامض النووية الدقيقة -146 أ. هدفت الدراسة الحالية تقييم إذا كان بإمكاننا استخدام microRNA 146a كمؤشر حيوي للكشف عن    CEو تحديد العلاقة بين التعبير الجيني microRNA 146a و IL-17 في مرضى CE.حيث اشتملت الدراسة على 50 مريضًا من CE تم إد

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Phonological and Suggestive Rhythm in the Context of the Quranic Text: The Phonological and Suggestive Rhythm in the Context of the Quranic Text
...Show More Authors

Abstract
The perpetuity of the Quranic discourse required being suitable for all ages.
Accordingly, the method of the Glorious Quran a pre request for the conscious
investigation and realization in order to detect the core of the texts, as the Quranic
discourse is considered a general address for the humanity as a whole. For this
reason, the progress of the concerned studies neceiated that it should cope with the
current development in the age requirements and its cultural changes within ages.
The texts of the Glorious Quran lightened the human reason as being the
Creator’s miracle for it is characterized by certain merits that makes it different from

poetry and prose. It is a unique texture in its rheto

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Optical information verification and authentication: Exploring sparsity constraints and optical encryption for enhanced security
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Thesis
Design and Implementation proposed Encoding and Hiding Text in an Image
...Show More Authors

NAA Mustafa, University of Sulaimani, Ms. c Thesis, 2010 - Cited by 4

View Publication
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
Performance assessment of biological treatment of sequencing batch reactor using artificial neural network technique.
...Show More Authors

Artificial Neural Network (ANN) model's application is widely increased for wastewater treatment plant (WWTP) variables prediction and forecasting which can enable the operators to take appropriate action and maintaining the norms. It is much easier modeling tool for dealing with complex nature WWTP modeling comparing with other traditional mathematical models. ANN technique significance has been considered at present study for the prediction of sequencing batch reactor (SBR) performance based on effluent's (BOD5/COD) ratio after collecting the required historical daily SBR data for two years operation (2015-2016) from Baghdad Mayoralty and Al-Rustamiya WWTP office, Iraq. The prediction was gotten by the application of a feed-forwa

... Show More
Publication Date
Sun Dec 02 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Improvement of Domestic Wastewater Treated Effluent from Sequencing Batch Reactor Using Slow Sand Filtration
...Show More Authors

The effluent quality improvement being discharged from wastewater treatment plants is essential to maintain an environment and healthy water resources. This study was carried out to evaluate the possibility of intermittent slow sand filtration as a promising tertiary treatment method for the sequencing batch reactor (SBR) effluent. Laboratory scale slow sand filter (SSF) of 1.5 UC and 0.1 m/h filtration rate, was used to study the process performance. It was found that SSF IS very efficient in oxidizing organic matter with COD removal efficiency up to 95%, also it is capable of removing considerable amounts of phosphate with 76% and turbidity with 87% removal efficiencies. Slow sand filter efficiently reduced the mass of suspended

... Show More
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Fri Jun 23 2023
Journal Name
Al-mustansiriyah Journal Of Science
Image Encryption Using New Non-Linear Stream Cipher Cryptosystem
...Show More Authors

In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.

Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref