To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
--The objective of the current research is to identify: 1) Preparing a scale level for e-learning applications, 2) What is the relationship between the applications of e-learning and the students of the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham – University of Baghdad. To achieve the research objectives, the researcher used the descriptive approach because of its suitability to the nature of the study objectives. The researcher built a scale for e-learning applications that consists of (40) items on the five-point Likrat scale (I agree, strongly agree, neutral, disagree, strongly disagree). He also adopted the scale of scientific values, and it consists of (40) items on a five-point scale as wel
... Show More
The emergence of artistic movements in Western countries was after the period of modernity. They have introduced a great dialectical problem at the level of thought and discourse, which necessitated a change in the course of the aesthetic discourse into new visions. Thus, the present research aims to identify the aesthetic discourse of pop artists' Art and its representations in the outputs of the students of the Department of Art Education. The theoretical framework included two sections: the first one, what is the aesthetic discourse and the second is the educational bases of the students' outputs. The procedures of the current research included the analytical descriptive approach. The research sample consisted of (4) outputs chosen ac
... Show MoreProvides the style of benchmarking the best possible use whenevaluating the performance and evaluation, as well as improved performance,due to its consistency with the principles of good evaluation of theperformance, an extension of the completion of several functions of the timeand cost less, thereby increasing the efficiency of the management of theinstitutions, especially institutions, the media, as it became public the future ofthe message sender to the same time Zaorosaúl new media is challenging thetraditional media of what distinguishes this new interactive media and mass ledto this transition . However, the media Aljdidhoosaúl traditional mediacontinue to coexist and reinforce each Menhmaalakhr, for his wealth offreedom of opin
... Show MoreBackground: This study was aimed to investigate the effect of three lingual button (Nickel free / rectangular base, Nickel free / round base and Composite) and bonding environment, wet and dry enamel surface, on: the shear bond strength (SBS) of light and self-cured Resin Modified Glass Ionomer Cements, and the debonding failure sites. Materials and method: One hundred twenty no-carious, free of cracks maxillary first premolar teeth were selected. Three types of orthodontic lingual buttons were used in this study: Nickel free / rectangular base, Nickel free / round base and Composite buttons. The teeth were divided into two groups of sixty teeth each. One group was used for testing the chemically cured GC Fuji Ortho Resin modified Glass Io
... Show MoreBoth traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs a
... Show MoreResults showed high efficiency of the predator Chrysoperla carnea (Stephens) to attack and consume nymphal instars and adults of cabbage aphid, Brevicoryne brassicae (L.).The total average of the nymphal instars consumed by the larval stage of predator were 308.67, 285.9, 198.77, 154.7 for 1st ,2nd ,3rd ,4th nymphal instars respectively .While it was 110,107.9 for apterae and alatae respectively . Also, predation efficiency increases with the progress of the larval instars up to the third (last) which was the most voracious .The 1st instar nymph consumed by the larvae of the predator were 47,80,181.67 nymphs ,with predation rate of 14.71% , 23.75% and 50.13% for 1st ,2nd and 3rd larval instars
Background: Oral anticoagulation medication, warfarin and non-vitamin k antagonist oral anticoagulants (NOAC) may require long term use which may affect patients’ satisfaction with their treatment and their quality of life (QOL). Objective: To compare the quality of life and treatment satisfaction among groups of patients using different anticoagulant therapies (warfarin and NOAC). Patients and methods: A cross-sectional study was performed at Ibn Al-Bitar Hospital for cardiac surgery in Baghdad in the period between December 2022 to May 2023. The study population included a convenient sample of patients receiving either warfarin or non-vitamin k antagonist oral anticoagulants treatment. The Arabic version of the short form 12
... Show More