To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreStylistics is the analysis of the language of literary texts integrated within various approaches to create a framework of different devices that describe and distinct a particular work. Therefore, feminist stylistics relied on theories of feminist criticism tries to present a counter- image of a woman both in language use and society, to draw attention , raise awareness and change ways that gender represents. Feminist stylistic analysis is related not only to describe sexism in a text, but also to analyze the way that point of view, agency, metaphor, and transitivity choices are unanticipatedly and carefully connected to issues of gender(Mills,1995:1) &nb
... Show MoreThe experiment was carried out to study the effect of variety and gibberellic acid in concentration (0 and 50)mg.lat-1 and BL in five concentration (0, 0.50 ,1 ,2 and 3)mg.ltr-1 and their interaction in some chemical Characteristics and total chlorophyll for Dill plant . the experiment designed according Randomized Complete Block Design (RCBD) and three replicates per treatment, compared to the average using less significant difference at the level of probability (0.05) , the results showed the following:- The effect of brassinolide with it,s concentrations led to obtain a significant increase in all the studied characteristics, so the superiority of the concentration of 2 mg.L-1 of brassinolide in each of Ca, Mg,Fe, and total chlorophyll T
... Show MoreIn this study, a proposed process for the utilization of hydrogen sulphide separated with other gases from omani natural gas for the production of sulphuric acid by wet sulphuric acid process (WSA) was studied. The processwas simulated at an acid gas feed flow of 5000 m3/hr using Aspen ONE- V7.1-HYSYS software. A sensitivity analysis was conducted to determine the optimum conditions for the operation of plant. This included primarily the threepacked bed reactors connected in series for the production of sulphur trioxidewhich represented the bottleneck of the process. The optimum feed temperature and catalyst bed volume for each reactor were estimated and then used in the simulation of the whole process for tw
... Show MoreNew simple and sensitive spectrophotometric methods for the determination of paracetamol in aqueous medium were developed. The first method is based on coupling of paracetamol with p-amino-2-hydroxy sodium benzoate (AHB) in the presence of sodium periodate, as oxidizing agent, to form a brownish-orange compound which shows a λmax at 470 nm. The molar absorptivity (εmax) of the colored product was found to be (3371) l. mole1. cm-1 and Sandel’s index 0.0449 μg. cm-2. The method follows Beer’s law in the concentration range of 12.5-500.0 μg of paracetamol in a final volume of 25 ml (0.5-20.0) μg. ml-1 with relative standard deviation percent (RSD%) ranged between 0.26-4.71% and accuracy, expressed by recovery percent, 95-106% for five
... Show MoreAntiviral medications may be the best choices for COVID-19 treatment until particular therapeutic treatments become available. Tamiflu (oseltamivir) is a neuraminidase inhibitor licensed for the management and defense against influenza types A and B. Oseltamivir-based medication combinations are currently being used to treat COVID-19 patients who also have the new coronavirus 1 SARS-CoV-2. 1 Oseltamivir administration was related with a less time spent in the hospital, quicker recovery 1 and discharge, and a decreased mortality rate. Docking is a modern computational method for identifying a hit molecule by assessing the binding ability of molecular medicines within the binding target pocket. In this work, we chose 21 ligand compounds that
... Show MoreAmino acids were analyzed in stomach regions of males & females of Felis catus (Domestic Cat) & Sciurus carolinesis (Eastern Gray Squirrel ), where it was stated that there are (18) amino acids as following : Aspartic acid (Asp), Glutamic acid (Gla), Serine (Ser), Arginine (Arg), Aspargine ( Asn), Cysteine (Cys), Alanine (Ala), Proline (Pro), Glyscine (Gly), Threonine (Thr), Tyrosine (Tyr), Valine (Val), Methionine (Met), Histidine ( His), Isoleucine (ile), Leucine (leu), Phenylalanine (Phe ) and Lysine (lys). Results have shown there are significant differences in concentration of amino acids between different region of stomach between males & females of Felis catus in part and between males & females of Sciurus carolinesis (Eastern Gray S
... Show MoreIn this work, lanthanium (III) complexes were synthesized using by Schiff base ligand (L) derived from benzaldehyde and o-aminoaniline with five amino acids (AA) from glycine (Gly), L-alanine (Ala), L-valine (Val), L-asparagine (Asp) and DL- phenylalanine (Phe). The Schiff base ligand has been characterized by elemental analysis, (MASS, FTIR, 1HNMR, 13CNMR, UV-VIS) electronic spectra. The structures of the new complexes have been described of analysis of elements, molar conductivity, (UV-Vis electronic, FTIR, mass) spectra also magnetic moment. The molar conductivity values of the complexes indicat this every of complexes are electrolytes and other analytical studies reveal octahedral geometry for La (III) ion. The Schiff base ligand, five
... Show More