Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
Enforcement for the groups SL(2,125) and SL(2,3125)
...Show More Authors

The group for the multiplication of closets is the set G|N of all closets of N in G, if G is a group and N is a normal subgroup of G. The term “G by N factor group” describes this set. In the quotient group G|N, N is the identity element. In this paper, we procure K(SL(2,125)) and K(SL(2,3125)) from the character table of rational representations for each group.

View Publication
Scopus (11)
Scopus Clarivate Crossref
Publication Date
Tue Mar 10 2020
Journal Name
Journal Of Inverse And Ill-posed Problems
Direct and inverse source problems for degenerate parabolic equations
...Show More Authors
Abstract<p>Degenerate parabolic partial differential equations (PDEs) with vanishing or unbounded leading coefficient make the PDE non-uniformly parabolic, and new theories need to be developed in the context of practical applications of such rather unstudied mathematical models arising in porous media, population dynamics, financial mathematics, etc. With this new challenge in mind, this paper considers investigating newly formulated direct and inverse problems associated with non-uniform parabolic PDEs where the leading space- and time-dependent coefficient is allowed to vanish on a non-empty, but zero measure, kernel set. In the context of inverse analysis, we consider the linear but ill-pose</p> ... Show More
View Publication
Scopus (27)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Interdisciplinary Mathematics
Score for the groups SL(2,121) and SL(2,169)
...Show More Authors

A factor group is a mathematical group obtained by aggregating similar elements of a larger group using an equivalence relation that preserves some of the group structure. In this paper, the factor groups K(SL(2,121)) and K(SL(2,169)) computed for each group from the character table of rational representations.

View Publication
Scopus (11)
Scopus Clarivate Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Iraqi Journal Of Physics
The solar eclipse and its relation with higree months
...Show More Authors

The solar eclipse occurs at short time before the crescent birth moment when the moon near any one of moon orbit nodes It is important to determine the synchronic month which is used to find Higree date. The 'rules' of eclipses are: 

Y= ± 0.997  of Earth radius , the solar eclipse is central and 0.997 < |Y| < 1.026 the umbra cone touch the surface of the Earth, where Y is the least distance from the axis of the moon's shadow to the center of the Earth in units of the equatorial radius of the Earth.

A new model have been designed, depend on the horizontal coordinates of the sun, moon, the distances Earth-Moon (rm), Earth-sun (rs) and |Y| to determine the date and times of total solar eclipse and the geogra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
Production mechanisms and their implications for Iraqi theater techniques
...Show More Authors

Theatrical production mechanisms were determined according to the extents of the theatrical performance, the directing plan, and the ideas that the theatrical performance seeks to convey to the audience. Accordingly, theatrical production mechanisms differ between one theatrical performance and another according to the requirements of each of them and the surrounding circumstances that accompany the production of theatrical performance, and in order to search for production mechanisms and their repercussions on the show. Theatrical The current research was divided into four chapters, namely (Chapter One - Methodology), which identified the research problem in the following question: What are the production mechanisms and their implicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Cloud Manufacturing framework for controlling and monitoring of machines
...Show More Authors

Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.

In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Operations Rescheduling Strategies, Policies, and Methods: A Philosophic Approach
...Show More Authors

When scheduling rules become incapable to tackle the presence of a variety of unexpected disruptions frequently occurred in manufacturing systems,  it is necessary to develop a reactive schedule which can absorb the effects of such disruptions. Such responding requires efficient strategies, policies, and methods to controlling production & maintaining high shop performance. This can be achieved through rescheduling task which defined as an essential operating function to efficiently tackle and response to uncertainties and unexpected events. The framework proposed in this study consists of rescheduling approaches, strategies, policies, and techniques, which represents a guideline for most manufacturing companies operatin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 21 2019
Journal Name
Journal Of The College Of Education For Women
Zanjan , Name and Origin: A Glimpse of Its History
...Show More Authors

The aim of study is to shed light on an Islamic city which is unknown for a lot of people, it can have an old history in Parisian country and many events happen with it , This city is characterized with political, military, economic scientific ,and social features, This city is called Zanjan and it is one of the most important cities because it dates back to the period of post history and it has a good geographic location whereas it was, passage for trade caravans to pass through as well its land which was specialized in agriculture and industry. the study follows chronological order of historical events for the city, one of the most significant conclusions is to think that this city does belong to artifacts and it is an old city and it

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Anatomical and Palynological study of Ricinus communisL.from Euphorbiaceaein Iraq
...Show More Authors

  The anatomical study showed the epidermis leaves of Ricinus communis L.glabrous and withparacytic pattern, also the midrib of leavescomposedfrom a pyramidal shapearea with a circular tip like ascamel humpfrom the upper side consisting of supported collenchyma tissue, and the cross section of leaf petiole formed as an ovate shape as for the cross section of stem was a circular, also observed many druces crystaland aleuron grains that are spread in the cortex area. Pollen grain appeared under a scanning electron microscope that tricolporate, either the surface pattern was reticulate and the shape of pollen grain prolate spheroidal to subprolate

View Publication Preview PDF
Publication Date
Thu May 03 2018
Journal Name
Kne Engineering
Clarity and Visual Ratios of the Vibrant Place Making
...Show More Authors

Clarity and Visual Ratios of the Vibrant Place Making

View Publication Preview PDF
Clarivate Crossref