To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
The research was carried out in lathhouse on one-year-old apple seedlings of the Ibrahimi variety in the Karma-Fallujah region for the 2021 growing season to study the effect of methods of adding nano-fertilizer and humic acid on seedling growth. A two-factor experiment was designed according to a randomized complete block design, with three replicates and two seedlings per experimental unit, so the number of seedlings was 54. The first factor includes NPK nanofertilizer at three levels (0- and 2-ml L-1 foliar spray and 5 ml L-1 soil application). The second factor is humic acid at three levels (0 and 5 g of seedlings - 1 foliar spray and 10 g of seedlings - 1 soil application). The results of the study show that the NPK nano-fertil
... Show MoreNew complexes of Cu (ll), Ni (ll), Co (ll), and Zn (ll) wi th 2-amino-5-p-Fiouro Phenyl 1, 3, 4-Thiadiazole have been synthesized. The products were isolated, studied and characterized by physical measurements, ie,(Ff-IR), UV-Vis and the melting points were determined. The new Schiff base (L) has been used to prepare some complexes. The prepared complexes were identified and their structural geometry were suggested
The amine group (NH2) and the carboxyl group (COOH-) are the fundamental components of amino acids. They regulate several essential physiological functions of organisms and are found in all forms of life, including humans, plants, and microorganisms. Furthermore, they serve as vital energy sources and also act as neurotransmitters. An analysis of the kidneys of Pterocles alchata, an Iraqi Pin-tailed sandgrouse, revealed the presence of 18 specific amino acids. The data indicate that there were no significant differences in the total amounts of amino acids among the three renal lobes. The concentrations in the anterior, middle, and posterior lobes were measured to be 14.154 ą97. 273, 12.437 ą87. 255, and 11.882 ą88. 157 correspondingly, w
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreSteps were taken to obtain the Kojic acid crystals from local fungal isolation A. flavus WJF81 by separating the fermentation products from the fungus mycelium from the production plant at the centrifuge at a speed of 5000 cycles for 10 minutes. The extraction was followed by ethyl acetate then supernatant concentrate by using rotary evaporator, and dried with heat oven 37ºC. Long, yellowish, pristine acid crystals were obtained that examined the optical microscope with a magnification force of 10x and 40x. The melting point of kojic acid was determined between 152.9-153.5 °C Results of the diagnosis of Kojic acid by applying High pressure liquid chromatography HPLC technique showed that the acid was at one peak, which was close to the
... Show MoreIn this study water-soluble N-Acetyl Cysteine Capped-Cadmium Telluride QDs (NAC/CdTe nanocrystals) using N-acetyl cysteine as a stabilizer were prepared to investigate the utility of quantum dots (QDs) in distinguishing damaged DNA, (extracted from blood samples of leukaemia patients), from intact DNA (extracted from blood samples of healthy individuals) to be used for biosensing application. Based on the optical characterization of the prepared QDs, the XRD results revealed the formation of the NAC-CdTe-QDs with a grain size of 7.1nm. Whereas, the SEM test showed that the spherical size of the NAC-CdTe-QDs lies within 11~33nm. NAC-CdTe-QDs have superior PL emission properties at of 550nm and UV-Vis absorption peak at 300nm. The energy gap
... Show More