Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Wed Jun 01 2016
Journal Name
Lap Lambert Academic Publishing
Schiff Base And Ligand Metal Complexes of Some Amino Acids and Drug
...Show More Authors

Schiff Base And Ligand Metal Complexes of Some Amino Acids and Drug

Publication Date
Sat Jan 06 2024
Journal Name
International Journal Of Applied Engineering & Technology
A PROPOSED LIGHTWEIGHT BLOCK CIPHER SYSTEM EMPLOYING DNA CODES
...Show More Authors

Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Jul 03 2008
Journal Name
مجلة التقني المجلد الحادي والعشرون العدد3
THE EFFECT OF ULTRA VIOLET, SOME AMINO ACIDS AND VITAMINS ON THE SUSCEPTIBILITY TO SOME ANTIBIOTICS AGAINST STAPHYLOCOCCUS AUREUS
...Show More Authors

Abstract: This research was performed to study the effect of some amino acids and vitamins on the growth of bacteria Staphylococcus aureas and its sensitivity against UV light. The results showed low inhibition in bacterial growth because amino acids repairs the damges caused by UV light. Besides the effect of two groups of antibiotics (β-lactame and tetracycline) on the growth of S. aureus and the possible interference of amino acids and vitamins in the activity of the antibiotics against this bacteria in the presence of UV light were studied. The result show increase in the sensitivity towards these antibiotics and provided protection against the antibiotics.

Publication Date
Sun Dec 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Effect of Hydroxychloroquine Drugs on Amino Acids in the Kidneys of White Mice (Mus musculas)
...Show More Authors

Hydroxychloroquine (HQC) and chloroquine drugs belong to a class of drugs known as 4-aminoquinoline, its structure weak bases due to the presence of the essential side chain, and this chain contributes to the accumulation of drugs in the intracellular parts. A 21 mice were taken and divided into three groups, the first group (A) was the control group that administered oral distilled water for 30 days, and the second group (B) treated group that was dose with 15 mg/kg/day of drug for 30 days, and the third group (C) was the treated group by injected drug with a concentration of 30 mg/kg/day for 30 days also. The result of amino acids studied in the kidney of adult white mice (Mus musculus) showed the presence of (18) amino acid represented:

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis of Liquid Crystal Mesogenes Derived From Isophthalic Acid and Terephthalic Acid
...Show More Authors

Two series of bent and liner core mesogen containing 1,2,4-traizole ring [VI]a,g and series were synthesized by many steps starting from esterification of isophthalic acid and terephathalic acid with methanol to yield diester compound [I]a,b which was converted to their acid hydrazide [II]a,b and the acid hydrazide reacted with ammonium thiocyanate or diester reacted with thiosemicarbazide to yield compounds [III]a,b. Then cyclization by 4% NaOH to yielded 1,2,4 traizole-3- thiol compounds [IV]a,b , afterword adding hydrazine hydrate to yield compounds [V]a,b. These compounds condensated with different substituted aldehyde to give new Schiff bases[VI]a,b ,[VII]a,b . Also , reaction acid hydrazide [II]a,b with aldehyde [VII] to yielded Schif

... Show More
Scopus (1)
Scopus
Publication Date
Thu Jul 02 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis of Liquid Crystal Mesogenes Derived From Isophthalic Acid and Terephthalic Acid
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 27 2023
Journal Name
Drug Development & Registration
Cytotoxic Effect of 6-Ethyl-Chenodeoxycholic Acid and Cabazitaxel on PC-3 Cells
...Show More Authors

Introduction. Chemotherapy with Cabazitaxel (CBZ) is a typical first-line treatment option for naïive castration-resistant prostate cancer resistant to docetaxel. On the other hand, Cabazitaxel's therapeutic success is constrained by chemoresistance and side effects.

Aim. To assess whether 6 alpha-ethylchenodeoxycholic acid (6-ECDCA), a selective agonist for bile acid receptors will enhance the efficacy of CBZ in androgen-independent prostate cancer cells.

Materials and methods. The 3-(4,5-Dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) viability assay was used to assess the cytotoxicity of 6-ECDCA and CBZ medicines or t

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
The role and importance of amino acids within plants: A review
...Show More Authors

Scopus (61)
Scopus
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref