Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Preparation , charactarazition and biological activity of some complexes of potassium 2-carbomethoxy amino-5- trithiocarbonate 1,3,4-thiadiazole
...Show More Authors

In this study a new ligand ,(potassium 2-carbomethoxy amino-5-trithiocarbonate 1,3,4-thiadiazole) (L) has been prepared from 2-carbomethoxy amino-5-mercapto 1,3,4-thiadiazole with CS2 in alkali media . The product has been isolated and characterized by appropriate physical measurements, vibrational and electronic spectroscopy. The ligand was used to prepare a number of complexes with some metal ions Co(II), Ni(II) and Cu(II). These complexes have been characterized by FT-IR, UV-Vis spectra, molar conductivity, magnetic susceptibility, melting points and atomic absorption measurements. The nickel and copper complexes have an octahedral geometry while cobalt complex has a tetrahedral geometry. The nature of bonding between the metal ion

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 20 2024
Journal Name
Future Medicinal Chemistry
New 4-amino-3-chloro benzoate ester derivatives as EGFR inhibitors: synthesis, in silico and biological analyses
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Oriental Journal Of Chemistry
Synthesis and antioxidant ability of new 5-amino-1, 2, 4-triazole derivatives containing 2, 6-dimethoxyphenol
...Show More Authors

4-amino-3-(4-(((4-hydroxy-3, 5dimethoxybenzyl) oxy) methyl) phenyl)-1, 2, 4-triazole-5-thione was synthesized by to method the first one from melt reaction of 4-(((4-hydroxy-3, 5-dimethoxybenzyl) oxy) methyl) benzoic acid with Thiocarbonyldihydrazide, the second method from convert the corresponded acid hydrazide to potassium 2-(4-(((4-hydroxy-3, 5-dimethoxybenzyl) oxy) methyl) benzoyl) hydrazinecarbodithioate salt then react with hydrazine hydrate. Newly Schiff base (7a-7f) were synthesized from reaction the 4-amino-1, 2, 4-triazol with substituted hydroxybenzaldehyde. The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2, 2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays

... Show More
Publication Date
Wed Jun 20 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis, Characterization and Antimicrobial Evaluation with DFT Study of New Two-Amino-4-(4-Chlorophenyl) Thiazole Derivatives
...Show More Authors

2-amino-4-(4-chloro phenyl)-1,3-thiazole (1) was synthesized by refluxing thiourea with para-chloro phenacyl bromide in absolute methanol. The condensation of amine compound (1)  with phenylisothiocyanate in the presence of pyridine will  produce 1-(4-(4-chlorophenyl)thiazol-2-yl)-3-phenylthiourea(2), which is  upon treatment with 2,4 dinitrophenyl hydrazine by conventional method, afforded 1- ( 4 - ( 4 – chlorophenyl ) thiazol – 2 – yl ) – 3 - phenylhydrazonamide,N' - ( 2 , 4 -dinitrophenyl) ,(3).The characterization of the titled compounds were performed utilizing FTIR spectroscopy, 1HNMR and CHNS elemental analysis, and by me

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of Medicinal And Chemical Sciences
Microwave synthesis schiff Base from Drug and 1,10-phenanthroline/8_Hydroxy quinoline as a Co- ligand with complexes:cytotoxic, Antimicrobial, and DNA Interaction Efficacy
...Show More Authors

Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Effect of applying selenium element and ascorbic acid on reducing the harmful effect of environmental stress on wheat plants irrigated by water contaminated with lead and cadmium
...Show More Authors

Scopus (4)
Scopus
Publication Date
Tue Aug 02 2016
Journal Name
European Academic Research
‘Resymbolization’ of a Text; a Relatively Different Perspective of Graham Greene’s The Quiet American
...Show More Authors

The Quiet American could be considered as one of Graham Greene’s most distinguished books; it is an epochal novel written during the phase of the cold war between the United States and the Soviet Union. The novel deals with the interference of the United States in Vietnam ten years before Vietnam’s war. The role the Americans played in arousing an inner political crisis in the country previous to her military invention. The book reflects that this action was not out of American government concern about Vietnamese people themselves but merely a political foreign affair. They wanted to stop communism from spreading widely and reducing its role in the East. This paper attempts to analyse the novel concentrating on the message Greene intend

... Show More
Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF