To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreObjective: The study aims to determine the effect of Toxoplasma gondii infection on the
genetic sequence of breast cancer patients in the Medical City Hospital – Tumor Unit /
Iraq-Baghdad.
Methodology: A study was carried out in the City of Medicine / Oncology Unit / Baghdad,
during the period 1st June 2016 to 15
th March 2017. Forty samples of tissue and serum
were collected from patients who complaining from Breast cancer and infected with
Toxoplasmosis. Forty sera samples were taken from patients complaining from parasitic
infection only; without breast cancer as control group. Data is analyzed by using of
descriptive and inferential data analysis methods.
Results: The results show that there is an effe
The Ligand 6,6--(1,2-benzenediazo) bis (3-aminobenzoicacid) derived from o-phenylenediamine and 3-aminobenzoicacid was synthesized. The prepared ligand was identified by Microelemental Analysis, 1HNMR, FT-IR and UV-Vis spectroscopic techniques. Treatment of the ligand with the following metal ions (CoII, NiII, CuII and ZnII ) in aqueous ethanol with a 1:1 M:L ratio and at optimum pH. Characterization of these compounds has been done on the basis of elemental analysis, electronic data, FT-IR and UV-Vis, as well as magnetic susceptibility and conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range (1×10-4 - 3×10-4 M). H
... Show MoreAdversity and psychosocial stress are involved in aging through the following pathways. psychological stress enhances the nerve system to secrete endocrine mediators (hormones). Mitochondrial respiration mediates energy production stimulated by binding to these hormones to their receptors. Energy produced by mitochondria accelerates metabolism and, in its turn, leads to increases in reactive oxygen species (ROS) of free radicals. Cellular stress and accumulation of damage can result from an excess of ROS. Accumulation of damage comprises damages in telomeric and nontelomeric DNA, in addition to mitochondrial DNA. Mitochondrial DNA damage plays an important role in increasing the pathway of p53/p21. The expression of the PGC-1α gene
... Show MoreMixed ligand metal complexes are synthesized from oxalic acid with Schiff base, and the Schiff base was obtained from trimethoprim and acetylacetone. The synthesized complexes were of the type [M(L1)(L2)], where the metal, M, is Ni(II), Cu(II), Cr(III), and Zn(II), L1 corresponds to the trimethoprim ((Z)-4-((4-amino-5-(3,4,5-trimethoxybenzyl)pyrimidine-2-yl)imino)pentane-2-one) as the first ligand and L2 represent the oxalate anion ( ) as a second ligand. Characterization of the prepared compounds was performed by elemental analysis, molar conductivity, magnetic measurements, 1H-NMR, 13C-NMR, FT-IR, and Ultraviolet-visible (UV-Vis) spectral studies. The recorded infrared data is reinforced with density functional theory (DFT) calcul
... Show MoreMixed ligand metal complexes are synthesized from oxalic acid with Schiff base, and the Schiff base was obtained from trimethoprim and acetylacetone. The synthesized complexes were of the type [M(L1)(L2)], where the metal, M, is Ni(II), Cu(II), Cr(III), and Zn(II), L1 corresponds to the trimethoprim ((Z)-4-((4-amino-5-(3,4,5- trimethoxybenzyl)pyrimidine-2-yl)imino)pentane-2-one) as the first ligand and L2 represent the oxalate anion (𝐶𝑂 ) as a second ligand. Characterization of the prepared compounds was performed by elemental analysis, molar conductivity, magnetic measurements, 1H-NMR, 13C-NMR, FT-IR, and Ultraviolet-visible (UV-Vis) spectral studies. The recorded infrared data is reinforced with density functional th
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show More