To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
The search for wealth and money is a matter of ethics in the Islamic economy
God Almighty said: "We have honored the sons of Adam (and ridiculed the universe and what he said) mocked you
He said, "He who created you from the earth."
And he commanded you, and he said to him, "He who made you."
Land, and the amount of Rezko and
He said: "You love the money with great love."
And then guide him by exaggerating the ethics of Islam and its legislation in Tamkak and not exceeding it.
In order to darken the doors of inflation with wealth Vakar
And the hereafter and achieve satisfaction and fairness in all actions
To ensure that society has a right not to harm others and to abuse the interests of the economy
Is
The study aims to clarify the truth of hearing the dead, and then the statement of the legitimate judgment of the indoctrination, by reference to the evidence contained in that regard, and try to combine and reconcile those evidence, and the study finds that the most correct in the matter of hearing is to say hearing the dead in the will of God and how Almighty teaches , As up to that indoctrination of the dead is permissible, so as to combine evidence.
Many biochemical and physiological properties depend on the size of ions and the thermodynamic quantities of ion hydration. The diffusion coefficient (D) of lanthanide (III) ions (Ln+3) in solution assumed (1.558-1.618 ×10−9 m2 s−1) by Einstein–Smoluchowski relation. The association constant (KA) of Ln+3 ions was calculated (210.3-215.3 dm3 mole-1) using the Shedlovsky method, and the hydrodynamic radius calculated (1.515-1.569 ×10−10 m) by the Stokes-Einstein equation. The thermodynamic parameters (ΔGo, ΔSo) also calculated by used suitable relations, while ΔHo, values are obtained from the lit
... Show MoreSage (Salvia officinalis), belong to Labiatae family is indigenous to Iraq and other Mediterranean areas but now cultivated world- wide, principally for its use as culinary herb. In the present study preliminary screening for the important phytochemical natural product groups indicated the presence of flavonoid, saponin, hyrolysable and condensed tannin groups. The antibacterial activity of two concentrations 10 mg/ml and 100 mg/ml of chloroform and hydroalcoholic extracts from Salvia officinalis leaves was evaluated against four strains of gram negative bacteria (Escherichia coli, Pseudomonas arigenossa, Klebsiella pneumonia, and Proteus spp) and two str
... Show MoreSimple and sensitive spectrophotometric method is described based on the coupling reaction of tetracycline hydrochloride(TC. HCl) with diazotized 4-aminopyridine in bulk and pharmaceutical forms. Colored azo dye formed during this reaction is measured at 433 nm as a function of time. Factors affecting the reaction yield were studied and the conditions were optimized. The kinetic study involves initial rate and fixed time (10 minutes) procedures for constructing the calibration graphs to determine the concentration of (TC. HCl). The graphs were linear for both methods in concentration range of 10.0 to 100.0 µg.mL-1. The recommended procedure was applied successfully in the determination of (TC. HCl) in itscommercial formulations.
... Show MoreBeen manufacturing detector Altosalih optical pattern contact metal semiconductor through deposition poles of aluminum metal on the chips of crystal cadmium Tleraad (CdTe) with directional [111] and growing with laboratory and annealed at a temperature 80c for 30 minutes and eat Study of some electrical properties nailed and scoutNmadj ??????? copper with non ??????? models to see effect Alichoab well research deals impact Alichoab and frequency detector resistance
This research aims at identifying the Iraqi EFL students' academic buoyancy in reading and listening skills and then finding out the difference between the two skills; Furthermore, finding out the five predictors differences of each of the two scales. Two academic buoyancy scales used to collect data. After achieving the scales' psychometric characteristics, they are submitted to the study sample. The sample of (100) female students selected according to the stratified random method from the second class at the Department of English\ College of Education for Women\ University of Baghdad. The results show that the students have academic reading buoyancy and have not academic listening buoyancy; the difference between the two abilities shows
... Show MoreThe wall of the esophagus in Mabuya aurata septemaeniata as in high vertebrates consists of four layers, mucosa, submucosa,muscularis and serosa. Mucosa forms many unorganized short and long folds penetrate inside the esophageal cavity. Mucosa contains two sub layers, first one is lining epithelium which includes two types of cells, simple ciliated columnar epithelial cells and goblet cells, second one is lamina properia. Mucosa does not have muscularis mucosa. There is no esophageal glands within esophagus. Many special stains were used as (Periodic Acid Schiff (PAS)) to detect Carbohydrates in goblet cells. Alcian blue were used to detect the amount of goblet cells within lining epithelium. Alcian blue + PAS together confirm that the
... Show MoreThis study delves into the design optimization of a hydropower harvesting system, exploring various parameters and their influence on system performance. By modifying the variables within the model to suit different flow conditions, a judiciously optimized design is attainable. Notably, the lift force generated is found to be intricately linked to the strategic interplay of the bluff body's location, cylinder dimensions, and flow velocity. The findings culminate in the establishment of empirical equations, one for lift force and another for displacement, based on the force equation. Many energy harvesting approaches hinge on the reciprocating motion inherent to the structural system. The methodology developed in this study emerges as a pot
... Show More