To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
An automatic text summarization system mimics how humans summarize by picking the most significant sentences in a source text. However, the complexities of the Arabic language have become challenging to obtain information quickly and effectively. The main disadvantage of the traditional approaches is that they are strictly constrained (especially for the Arabic language) by the accuracy of sentence feature functions, weighting schemes, and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature tha
... Show MoreBlockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a
... Show MoreToday in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreThis work includes the synthesis and identification of ligand {3-((4-acetylphenyl)amino)-5,5-dimethylcyclohex2-en-1-one} (HL* ) by the treatment of 5,5-dimethylcyclohexane-1,3-dione with 4-aminoacetophenone under reflux. The ligand (HL* ) was identified via FTIR, Mass spectrum, elemental analysis (C.H.N.), 1H and 13C-NMR spectra, UV-Vis spectroscopy, TGA and melting point. The complexes were synthesized from ligand (HL* ) mixed with 3-aminophenol (A) and metal ion M(II), where M(II) = (Mn, Co, Ni, Cu, Zn and Cd) at alkaline medium to produce complexes of general formula [M(L* )(A)] with (1:1:1) molar ratio. These complexes were detected via FT-IR spectra, UV-Vis spectroscopy as well as elemental analysis (A.A) and melting point, conductivit
... Show MoreThis work includes the synthesis and identification of ligand {3-((4-acetylphenyl)amino)-5,5-dimethylcyclohex2-en-1-one} (HL* ) by the treatment of 5,5-dimethylcyclohexane-1,3-dione with 4-aminoacetophenone under reflux. The ligand (HL* ) was identified via FTIR, Mass spectrum, elemental analysis (C.H.N.), 1H and 13C-NMR spectra, UV-Vis spectroscopy, TGA and melting point. The complexes were synthesized from ligand (HL* ) mixed with 3-aminophenol (A) and metal ion M(II), where M(II) = (Mn, Co, Ni, Cu, Zn and Cd) at alkaline medium to produce complexes of general formula [M(L* )(A)] with (1:1:1) molar ratio. These complexes were detected via FT-IR spectra, UV-Vis spectroscopy as well as elemental analysis (A.A) and melting point, conductivit
... Show MoreThe action of high repeated trucks load associated with dramatically elevated ambient temperatures leads to the most harmful distress in asphalt pavements occurred in Iraq known as rutting. Essentially, it is produced from the accumulation of irrecoverable strains, which mainly occurred in the asphalt layers. That visually demonstrated as a longitudinal depression in the wheel paths as well as small upheavals to the sides. Poly Phosphoric Acid (PPA) has been used as a means of producing modified asphalt binders and the interest to use it has increased in recent years. The PPA provides modified asphalt binder, which is relatively cheaply produced compared to polymer-modified asphalt. In this paper, PPA was used by three-percentages 1
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Polarization is an important property of light, which refers to the direction of electric field oscillations. Polarization modulation plays an essential role for polarization encoding quantum key distribution (QKD). Polarization is used to encode photons in the QKD systems. In this work, visible-range polarizers with optimal dimensions based on resonance grating waveguides have been numerically designed and investigated using the COMSOL Multiphysics Software. Two structures have been designed, namely a singlelayer metasurface grating (SLMG) polarizer and an interlayer metasurface grating (ILMG) polarizer. Both structures have demonstrated high extinction ratios, ~1.8·103 and 8.68·104 , and the bandwidths equal to 45 and 55 nm for th
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show More