To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
The impact of a Schiff base namely 2-((thiophen-2-ylmethylene)amino)benzenethiol to corrode mild steel in 1 M HCl resolved was evaluated using different weight loss technique and scanning electron microscopy (SEM).different weight measurements to expand that the 2-((thiophen-2-ylmethylene) amino) benzenethiol inhibits the corrosion of mild steel through adsorbing of top for mild steel and block the active locality. The inhibitive impacts of 2-((thiophen-2-ylmethylene)amino)benzenethiol increase with increasing concentration and decrease with increasing temperature. SEM to checking revealed that the alloy surface was quite unaffected and formed protective film on its surface. The investigated
... Show MoreThe laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show MoreThe aim: Infection with the hepatitis B virus (HBV) caused by blood transfusion is a big problem throughout the world. The aim of study is to determine the faster and more accurate methods for detection of hepatitis B infections by serological screening and PCR- amplification. Materials and methods: A total of 140528 donors were tested for HBsAg and total anti-HBc from January to October 2021 in Iraq’s National Blood Transfusion Center; however, only 100 samples with HBsAg (-) and anti-HBc (+) were collected and tested for HBV DNA using quantitative real-time PCR. Results: From 2015 to 2021, the percentage of HBsAg positive donors was 0.33 percent in 2015, 0.32 percent in 2016, 0.30 percent in 2017, 0.28 percent in 2018, 0.23 pe
... Show MoreThe oncolytic viruses are promising form of cancer therapy which is based on the selectively killing of the cancer cells. This study was aimed to investigate the role of Newcastle disease virus (NDV) Iraqi strain AD2141 in apoptosis. Firstly, the virulence of AD2141 was detected in embryonated chicken eggs after 48hrs of infection. It was observed a hemorrhage in the skin of infected embryos that led to death. Then, the ability of this strain for regression cancer cell lines was examined. By using cytotoxicity test, it was found 128 HAU/ml of AD2141 had a potent inhibition against growth of RD and AMN3 after 72hrs of exposure time; the inhibition rate was 86.8% and 86.98% respectively. Moreover, the apoptotic activity of AD2141 was exami
... Show MoreThis study was carried out to assess genetic diversity of ten cultivars of Rice (Oryza sativa L.). One of DNA markers based on Polymerase Chain Reaction (PCR) was used namely DAF markers (DNA Amplification Fingerprint). Six primers were tested, the results showed, that no amplification products using the primers OPD.14 and OPM.5. Two primers (OPX.8 and OPT.2) produced monomorphic band across all cultivars, while only two primers generated polymorphic bands. The number of total bands produced from one of them (OPN.7) were sixteen. Also this primer produced ten polymorphic profiles (DAF patterns) which were unique to the ten cultivars that could be distinguished. The number of total bands generated by primer OPX.1 were thirteen and this prim
... Show MoreIn latest decades, genetic methods have developed into a potent tool in a number of life-attaching applications. In research looking at demographic genetic diversity, QTL detection, marker-assisted selection, and food traceability, DNA-based technologies like PCR are being employed more and more. These approaches call for extraction procedures that provide efficient nucleic acid extraction and the elimination of PCR inhibitors. The first and most important stage in molecular biology is the extraction of DNA from cells. For a molecular scientist, the high quality and integrity of the isolated DNA as well as the extraction method's ease of use and affordability are crucial factors. The present study was designed to establish a simple, fast
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show More