To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MorePhase change materials are extensively studied for use in low-, mid-, and high-temperature applications due to their melting and solidification temperatures, latent heat, and thermophysical properties. This work aims to explore the energy stored, or released and their duration for the energy storage unit formed of a phase change material surrounding a tube within which a hot or cold, single or Two-Phase fluid flows, serving as a heat source or sink. The 3D axial transient thermal analysis of the energy storage unit is performed using the finite element method via a MATLAB-developed computer program. The effects of single- or Two-Phase fluid flow on temperature distribution, solidification, melting duration, and energy stored within phase ch
... Show MoreA mercury porosimeter has been used to measure the intrusion volume of the three types mercury positive lead acid-battery plates. The intrusion volumes were used to calculate the pore diameter, pore volume, pore area, and pore size distribution. The variation of the pore area in positive lead acid-battery plates as well as of the pore volume has the following sequence. Paste positive > Uncured positive > Cured positive
KE Sharquie, AA Noaimi, EA Al-Janabi, Our Dermatology Online, 2014 - Cited by 11
This study investigates the application of hydraulic acid fracturing to enhance oil production in the Mishrif Formation of the Al-Fakkah oilfield due to declining flow rates and wellhead pressures resulting from asphaltene deposition and inadequate permeability. Implementing acid fracturing, an established technique for low-permeability carbonate reserves, was essential due to the inadequacy of prior solvent cleaning and acidizing efforts. The document outlines the protocols established prior to and following the treatment, emphasizing the importance of careful oversight to guarantee safety and efficacy. In the MiniFrac treatment, 150 barrels of #30 cross-linked gel were injected at 25 barrels per minute, followed by an overflush wi
... Show MoreABSTRACT. 4-Sulfosalicylic acid (SSA) was used as a ligand to prepare new triphenyltin and dimethyl-tin complexes by condensation with the corresponding organotin chloride salts. The complexes were identified by different techniques, such as infrared spectra (tin and proton), magnetic resonance, and elemental analyses. The 119Sn-NMR was studied to determine the prepared complexes' geometrical shape. Two methods examined the antioxidant activity of (SSA) and prepared complexes; Free radical scavenging activity (DPPH) and CUPRRAC methods. Tri and di-tin complexes gave high percentage inhibition than ligands with both methods due to tin moiety; the triphenyltin carboxylate complex was the best compared with the others. Also, antibacter
... Show MoreThe inhibitive power of Polyvinyl Alcohol (PVA) was investigated toward the corrosion of carbon steel in 0.2N H2SO4 solution in the temperature range of 30-60˚C and PVA concentration range of 150-2000 ppm.
The corrosion rate was measured using both the weight loss and the electrochemical techniques. The weight loss results showed that PVA could serve as a corrosion inhibitor but its inhibition power was found to be low for the corrosion of carbon steel in the acidic media. Electrochemical analysis of the corrosion process of carbon steel in an electrochemical corrosion cell was investigated using 3-Electrode corrosion cell. Polarization technique was used for carbon steel corrosion in 0.2N H