Preferred Language
Articles
/
-oaET4YBIXToZYALG4E-
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of the present algorithm is simple, and the running operations required small execution time for encryption-decryption sensing data. Hence, a developed algorithm called DPRESENT was introduced to improve the complexity of the cipher text based on the PRESENT algorithm and DNA cryptography technique for developing a lightweight cipher algorithm. The NIST suite showed that the proposed algorithm tests presented high level of randomness and complexity. The execution time for the proposed algorithm was kept minimal as the current cipher algorithm. The developed algorithm is a new trend that can be applied for different lightweight cryptosystems to achieve the trade-off among complexity and speed as a robust cipher algorithm.

Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Chemical And Pharmaceutical Research
Studies on the interaction and effect of Mn(II), Fe(II), Co(II), Ni(II),Cu(II), Zn(II) and Cd(II) mixed- ligand complexes of cephalexin mono hydrate and furan-2-carboxylic acid to different DNA sources
...Show More Authors

To evaluate the Interaction of Mn(II), Fe(II), Co(II), Ni(II),Cu(II), Zn(II) And Cd(II) Mixed- Ligand Complexes of cephalexin mono hydrate (antibiotics) And Furan-2-Carboxylic Acid To The Different DNA Sources. All the metal complexes were observed to cleave the DNA. A difference in the bands of complexes .The cleavage efficiency of the complexes compared with that of the control is due to their efficient DNA-binding ability and the other factors like solubility and bond length between the metal and ligand may also increase the DNA-binding ability. The ligands (Cephalexin mono hydrate (antibiotics) and Furan-2- Carboxylic acid and there newly synthesized metal complexes shows good antimicrobial activities and Binding DNA , thus, can be used

... Show More
Publication Date
Thu Apr 30 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
The use of physical exercises specialized for with aids of developing explosive power for arms and legs and their effect on free throw and jump shooting skills for advanced basketball players
...Show More Authors

The research aims to develop physical exercises with auxiliary training tools that work to develop the explosive power of the arms and legs, and then find out their effect on the accuracy of shooting from free throw and correction from jumping of advanced basketball players, as the researchers found a problem that these players have weakness in the skill of throwing Free throwing and shooting by jumping calculated with two points as a result of adopting unhealthy physical and technical positions, which led to a lack of focus and accuracy, and thus negatively affected the performance technique of free throw and jump shot, as most teams use traditional exercises without the use of auxiliary training tools, and this topic gave researchers the

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
Comparison between Reference Infliximab (Remicade) and its Biosimilar (Remsima) in Patients with Ankylosing Spondylitis: A Field-based Pharmacoeconomic Study
...Show More Authors

Background: Ankylosing spondylitis is a chronic inflammatory disease that mostly involves the spine and sacroiliac joints. It is associated with a decreased quality of life. Biological medicines such as infliximab and its biosimilar are the mainstay treatments for active ankylosing spondylitis.

Objective: The study objective was to conduct a pharmacoeconomic study comparing the cost-effectiveness of the reference infliximab with its biosimilar in ankylosing spondylitis patients visiting public hospitals.

Subjects and Method: This is a two-center pharmacoeconomic study performed at two large teaching governmental hospitals in Baghdad, Iraq, which s

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Fri May 12 2023
Journal Name
Bulletin Of The Chemical Society Of Ethiopia
SYNTHESIS, CHARACTERIZATION, ANTIMICROBIAL STUDIES, AND MOLECULAR DOCKING STUDIES OF TRANSITION METAL COMPLEXES FORMED FROM A BENZOTHIAZOLE-BASED AZO LIGAND
...Show More Authors

The azo ligand obtained from the diazotization reaction of 2-aminobenzothiazole and 4- nitroaniline yielded a novel series of complexes with Co(II), Ni(II), Cu(II), and Zn(II) ions. The complexes were investigated using spectral techniques such as UV-Vis, FT-IR, 1H and 13C NMR spectroscopic analyses, LC-MS and atomic absorption spectrometry, electrical conductivity, and magnetic susceptibility. The molar ratio of the synthesized compounds was determined using the ligand exchange ratio, which revealed the metal-ligand ratios in the isolated complexes were 1:2. The synthesized complexes were tested for antimicrobial activity against S. aureus, E. coli, C. albicans, and C. tropicalis bacterial species. Additionally, their binding affinities we

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
Nanomedicine: Nanotechnology, Biology And Medicine
Listeria innocua Dps as a nanoplatform for bioluminescence based photodynamic therapy utilizing Gaussia princeps luciferase and zinc protoporphyrin IX
...Show More Authors

View Publication Preview PDF
Scopus (21)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Wed Nov 23 2022
Journal Name
Dental Hypotheses
Remineralization of Dentine Caries Using Moringa Oleifera Based Nano-Silver Fluoride: A Single-Blinded, Randomized, Active-Controlled Clinical Trial
...Show More Authors

View Publication
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESIS OF THE NEW NAPROXEN SELECTIVE ELECTRODE BASED ON IMPRINTED POLYMER USING DIFFERENT MONOMERS AND ITS DETERMINATION AT PHARMACEUTICAL PREPARATION: SYNTHESIS OF THE NEW NAPROXEN SELECTIVE ELECTRODE BASED ON IMPRINTED POLYMER USING DIFFERENT MONOMERS AND ITS DETERMINATION AT PHARMACEUTICAL PREPARATION
...Show More Authors

ABSTRACT

Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
Optimum Dimensions of Hydraulic Structures and Foundation Using Genetic Algorithm coupled with Artificial Neural Network
...Show More Authors

      A model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure aga

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Counting Functions to Generate The Primes in the RSA Algorithm and Diffie-Hellman Key Exchange
...Show More Authors

        The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods  depended on selecting the primes p and q in order  to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article   gives  new construction  of the  RSA  algorithm and DH key  exchange using the

primes p,qfrom areal number x.

View Publication Preview PDF
Crossref