Preferred Language
Articles
/
lhcqFY4BVTCNdQwCtjHQ
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Processing.

Scopus Crossref
View Publication
Publication Date
Sat Jun 01 2024
Journal Name
Al-nahrain Journal Of Science
The Association Between Immune-Histochemical Expressions of Program Death Ligand with some Aggressive Features of Prostate Cancer
...Show More Authors

Prostate cancer (PC), accounts for more than one-fourth of all cancer diagnoses, and the most frequently diagnosed cancer among men in 2022. The immunoglobulin (IG) Program death ligand-1(PD-1) cell surface receptor is predominantly expressed on the surface of many cells. The purpose of this study was to demonstrate the relationship between Program death ligand expression and some aggressive features of prostate cancer including perineural invasion, vascular invasion and necrosis. Thirty cases of prostate cancer with age range from 60 to 80 year old and 30 cases of normal prostate tissue with age under 25 year old were separated into two groups in a retrospective case-control

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Health Sciences
Molecular assessment of some cardiovascular genetic risk factors among Iraqi patients with ischemic heart diseases
...Show More Authors

Abstract Objective: The underlying molecular basis of ischemic heart diseases (IHDs) has not yet been studied among Iraqi people. This study determined the frequency and types of some cardiovascular genetic risk factors among Iraqi patients with IHDs. Methods: This is a cross-sectional study recruiting 56 patients with acute IHD during a 2-month period excluding patients >50 years and patients with documented hyperlipidemia. Their ages ranged between 18 and 50 years; males were 54 and females were only 2. Peripheral blood samples were aspirated from all patients for troponin I and DNA testing. Molecular analysis to detect 12 common cardiovascular genetic risk factors using CVD StripAssay® (ViennaLab Diagnostics GmbH, Austria) was performed

... Show More
View Publication
Publication Date
Thu Jun 29 2023
Journal Name
Journal Of University Of Babylon For Pure And Applied Sciences
Genetic Detection of IMP-1 Gene and its Relationship with Biofilm Formation in Klebsiella pneumonia
...Show More Authors

Background: Klebsiella pneumoniae were considered as normal flora of skin, and intestine. It can cause damage to human lungs; the danger of this bacterium is related to exposure to the hospital surroundings. materials and methods: the detection of Klebsiella pneumoniae on morphological and biochemical tests and then assured with VITEK 2 system. Resistance to antibiotics was determined by Kirby-Baeur method. And genotyping of IMP-1 in isolates was done by PCR technique, then biofilm formation was identified by Micro titer plate method. Results: The present study included a collecting of 50 specimens from different clinical specimens, (blood 40%, urine 30%, sputum 20%, wound infection 10%); 10 isolates were identified as K

... Show More
View Publication
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Parasitology International
Genetic polymorphism of Baylisascaris procyonis in host infrapopulations and component populations in the Central USA
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
Association of Glutathione–S-Transferase (GSTP1) Genetic Polymorphism in Iraqi Patients with Diabetes Mellitus Type2
...Show More Authors

Glutathione S-transferases (GSTs) are enzymes that included, in a more range of detoxifying reactions by conjugation of glutathione, to electrophilic material. Polymorphisms n the genes that responsible of GSTs affect, the function of the GSTs. GSTs play an active role in protection of cell against oxidative stress mechanism. Polymorphisms of GSTP1 at codon 105 amino acids forms GSTP1 important site for bind of hydrophobic electrophiles and the substitution of Ile/Val affect substrate specially catalytic activity of the enzyme and may correlate with reach to different diseases in human like diabetes mellitus type2 disease. Correlation between these polymorphisms and changes in the parameters file of diabetic patients has also bee

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Aug 25 2019
Journal Name
Civil Engineering Journal
Optimum Efficiency of PV Panel Using Genetic Algorithms to Touch Proximate Zero Energy House (NZEH)
...Show More Authors

By optimizing the efficiency of a modular simulation model of the PV module structure by genetic algorithm, under several weather conditions, as a portion of recognizing the ideal plan of a Near Zero Energy Household (NZEH), an ideal life cycle cost can be performed. The optimum design from combinations of NZEH-variable designs, are construction positioning, window-to-wall proportion, and glazing categories, which will help maximize the energy created by photovoltaic panels. Comprehensive simulation technique and modeling are utilized in the solar module I-V and for P-V output power. Both of them are constructed on the famous five-parameter model.  In addition, the efficiency of the PV panel is established by the genetic algorithm

... Show More
View Publication
Scopus (36)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Impact of Hindiya Dam on the Limnological Features of Euphrates River to the North of Babil Governorate, Iraq
...Show More Authors

          Five sites were chosen to the north of Babil Governorate in   order to identify the limnological features and the impact of the Hindiya Dam during 2019. Site2 was located near the dam to reflect the ecological features of this site, whereas other sites, S1 was located at the upstream of the dam as a control site. Moreover, the two other sites S3 and S4 were located down the dam. The results of  the  study  showed  a  close  correlation  between air and water temperature at all sites. Also there were significant differences in average of thirteen out of eighteen water parameters.Water temperature, total alkalinity, bicarbonate, DO, POS, TH and Mg+2  ions  decreased from 22.76˚C, 203.33 mg/L,

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref