Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Content Based Image Retrieval Based on Feature Fusion and Support Vector Machine
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of Robotics
Real-Time SLAM Mobile Robot and Navigation Based on Cloud-Based Implementation
...Show More Authors

This study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database

... Show More
View Publication
Scopus (15)
Crossref (10)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Chemical And Process Engineering Research
SYNTHESIS, Spectroscopic Characterization and Evaluation (Antibacterial & (GOT, G pT) Enzyme )Activity of Mixed Ligand Complexes of M(II) with Amino Acid (L-Asparagine) and Schiff Bases Derived from (Sulfamethoxazo Drug with 2,4Dimethoxybenzaldehyde)
...Show More Authors

The research includes the synthesis and identification of the mixed ligands complexes of M 2 Ions in general composition ,[M(Leu) 2 (SMX)] Where L leucine (C 6 H 13 NO 2 )symbolized (LeuH) as a primary ligand and Sulfamethoxazole C 10 H 11 N 3 O 3 S) symbolized (SMX)) as a secondary ligand . The ligands and the metal chlorides were brought in to reaction at room temperature in(v/v) ethanol /water as solvent containing NaOH. The reaction required the following [(metal: 2(Na Leu --): (SMX )] molar ratios with M(II) ions, Were M (  Mn ( II),Co (II),Ni(II),Cu( II),Zn (II),Cd(II)and Hg( The UV Vis and magnetic moment data revealed an octahedral geometry around M(II), The conductivity data show a non electrolytic nature of the complexes . The

... Show More
Preview PDF
Publication Date
Tue Mar 21 2023
Journal Name
Biomedical And Pharmacology Journal
Development and Validation of HPLC Method For the Detection of Fusidic Acid Loaded in Non-ionic and Cationic Nanoemulsion-Based Gels
...Show More Authors

Fusidic acid (FA) is a well-known pharmaceutical antibiotic used to treat dermal infections. This experiment aimed for developing a standardized HPLC protocol to determine the accurate concentration of fusidic acid in both non-ionic and cationic nano-emulsion based gels. For this purpose, a simple, precise, accurate approach was developed. A column with reversed-phase C18 (250 mm x 4.6 mm ID x 5 m) was utilized for the separation process. The main constituents of the HPLC mobile phase were composed of water: acetonitrile (1: 4); adjusted at pH 3.3. The flow rate was 1.0 mL/minute. The optimized wavelength was selected at 235 nm. This approach achieved strong linearity for alcoholic solutions of FA when loaded at a serial concentrati

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Dna Repair
The interactions between DNA methylation machinery and long non-coding RNAs in tumor progression and drug resistance
...Show More Authors

DNA methylation is one of the main epigenetic mechanisms in cancer development and progression. Aberrant DNA methylation of CpG islands within promoter regions contributes to the dysregulation of various tumor suppressors and oncogenes; this leads to the appearance of malignant features, including rapid proliferation, metastasis, stemness, and drug resistance. The discovery of two important protein families, DNA methyltransferases (DNMTs) and Ten-eleven translocation (TET) dioxygenases, respectively, which are responsible for deregulated transcription of genes that play pivotal roles in tumorigenesis, led to further understanding of DNA methylation-related pathways. But how these enzymes can target specific genes in different malignancies;

... Show More
View Publication
Scopus (16)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
Optimizing genetic prediction: Define-by-run DL approach in DNA sequencing
...Show More Authors

Abstract: The utility of DNA sequencing in diagnosing and prognosis of diseases is vital for assessing the risk of genetic disorders, particularly for asymptomatic individuals with a genetic predisposition. Such diagnostic approaches are integral in guiding health and lifestyle decisions and preparing families with the necessary foreknowledge to anticipate potential genetic abnormalities. The present study explores implementing a define-by-run deep learning (DL) model optimized using the Tree-structured Parzen estimator algorithm to enhance the precision of genetic diagnostic tools. Unlike conventional models, the define-by-run model bolsters accuracy through dynamic adaptation to data during the learning process and iterative optimization

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Place Sexuality in the Arabic Text Theatre
...Show More Authors

     It is doubtless that the sexual place has some common indicators due to the masculine and feminine bodies which may be natural or deviated (homosexual). The female has an act of voice in the imaginary masculine place whereas the male has an act of image recognized in the parental mind in both the secular and sacred place. Those places create different limits and perceptions according to the auditory and visual readings in search of identity, text and body in the feminine dramatic text.

    The research includes four chapters; the first, the methodological framework, involves the problem which is centralized in the following enquiry: What is the relationship between the place and the term of

... Show More
View Publication Preview PDF
Crossref