Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Sun Jun 25 2017
Journal Name
Biomedical And Pharmacology Journal
The Impact of Toxoplasma gondii on Mitochondrial DNA of Sub-fertile Men Sperms
...Show More Authors

Toxoplasmosis is the most common, widespread disease in the world which is caused by Toxoplasma gondii.The objective of the current study is to determine the effect of the Toxoplasma gondii infection on male sperm, especially on the mitochondria of sperm for men who suffer infertility and the possibility of a hereditary mutation. Sixty seminal fluid and serum samples were taken from sub- fertile patients who attended Teba center for in vitro fertilization / Babylon and similarly samples were also obtained from healthy individuals as a control group, their ages ranged from 20 to 60 years old during the period from 1st may /2016 till 25th January/2017. All samples subjected to the tests included Macroscopic and microscopic examination, molecu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The principals and techniques of geography text book for fourth secondary: The principals and techniques of geography text book for fourth secondary
...Show More Authors

Abstract
The curriculum is the major effective tool in achieving the goals of
education and society.

Many countries that want to reach the forefront of developed countries
through their curriculum have realized this fact. School text book, the
application assessment for knowing the rang of success or fail of this text
book in achieving the general aims. therefore this study aims at assessing the
principals and techniques of geography text book for fourth secondary class of
literary studying from the teachers point of view according to the fields of the
book, style of material, technical arrangement of the material, ethnical
arrangement the language of the book, style of the material, technical
arrang

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (32)
Crossref (18)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Pakistan Journal Of Biotechnology
Fragmentation of gallbladder stones using transformer streptococcus salivarius and measuring of RNA expression to cholesterol lowering genes
...Show More Authors

Recently, gallbladder stones have been contained bile salt saturated a proximal 70 % cholesterol. This led us to investigate how can use transformer Streptococcus salivarius with plasmid pMG36bsh to fragment cholesterol of gallstones in vitro. Total mRNA of S. salivarius was produced using easy-spinTM, total RNA extraction kit and PCR cDNA-RT to observe the change after percent pMG36bsh vector and prepare S. salivarius have two copies from bsh genes (cgh, bsh) to fragment gallstone in bacterial culture. Our data shows increase bacterial bsh expression help to reduce gallstones concentration in culture when bile salt presented as stimulating agent for the association bsh genes were 77% compare with wild type has the reducing concentration ra

... Show More
View Publication Preview PDF
Scopus (1)
Scopus
Publication Date
Fri Apr 05 2024
Journal Name
Tikret Journal Of Agricultural Sciences
Effect of adding Humic acid and spraying Boric acid on Growth and Yield of cauliflower Brassica oleracea var. botrytis
...Show More Authors

Publication Date
Wed Sep 25 2013
Journal Name
International Journal For Sciences And Technology
Synthesis, Characterization, And Antibacterial Activities Of Manganese (II),Cobalt(II), Copper(II) ,Iron (II), Nickel (II) And Cadmium(II) Mixed- Ligand Complexes Containing Amino Acid( L- Lysine) And 1,10-Phenanthroline
...Show More Authors

The research includes the synthesis and identification of the mixed ligands complexes of M(II) Ions in general composition [M(Lyn)2(phen)] Where L- lysine (C6H14N2O2) commonly abbreviated (LynH) as a primary ligand and 1,10-phenanthroline(C12H8N2) commonly abbreviated as "phen," as a secondary ligand . The ligands and the metal chlorides were brought in to reaction at room temperature in ethanol as solvent. The reaction required the following molar ratio [(1:1:2) (metal): phen:2 Lyn -] with M(II) ions, were M = Mn(II),Cu(II), Ni(II), Co(II), Fe(II) and Cd(II). Our research also includes studying the bio–activity of the some complexes prepared against pathogenic bacteria Escherichia coli(-),Staphylococcus(-) , Pseudomonas (-), Bacillus (-)

... Show More
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Publication Date
Tue Feb 14 2017
Journal Name
مجلة كلية التربية للعلوم الصرفة ابن الهيثم
synthesis and characterization of New Bidentate schiff base Ligand Type(NO)Donor Atoms Derived from isatin and 3-Amino benzoic acid and Its complexes with Co(||),Cu(||),Cd(||)and Hg(||)Ions
...Show More Authors

synthesis and characterization of New Bidentate schiff base Ligand Type(NO)Donor Atoms Derived from isatin and 3-Amino benzoic acid and Its complexes with Co(||),Cu(||),Cd(||)and Hg(||)Ions