Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Romanian Medical Journal
Serum and urine apolipoprotien A1 (ApoA1) as biomarkers in bladder cancer
...Show More Authors

Bladder cancer (BC) is the predominant malignant neoplasm in the urinary system and ranks as the tenth most prevalent malignant tumor worldwide. Compared with females, males displayed a four-fold more common incidence of bladder cancer. It mainly affects men. Bladder cancer is the fourth most prevalent neoplasm in males. The most important protein that makes up high density lipoprotein (HDL), ApoA-I apolipoprotein A1 is essential in regulating the right amount of cholesterol. Multiple inquiries have demonstrated that APOA1 plays a pivotal role in the progression, infiltration, and spread of tumors. Objectives. The objective of this study was to measure the level of urine to serum apolipoprotein A1 in patients suffering from bladder

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Some Results in Grűnwald-Letnikov Fractional Derivative and its Best Approximation
...Show More Authors
Abstract<p>In This paper, we have been approximated Grűnwald-Letnikov Derivative of a function having m continuous derivatives by Bernstein Chlodowsky polynomials with proving its best approximation. As well as we have been solved Bagley-Torvik equation and Fokker–Planck equation where the derivative is in Grűnwald-Letnikov sense.</p>
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri May 01 2015
Journal Name
2015 Ieee Congress On Evolutionary Computation (cec)
Differential evolution with adaptive repository of strategies and parameter control schemes
...Show More Authors

A new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reli

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Canadian Journal Of Physics
Synthesis, characterization, photoluminescence, and antibacterial activities of silica-graphene oxide composites
...Show More Authors

In this research, a novel thin film Si-GO10 and nanopowders Si-GO30 of silica-graphene oxide (GO) composite were prepared via the sol–gel method and deposited on glass substrates using spray pyrolysis. X-ray diffraction (XRD) results showed a relatively strong peak in the graphite layer that corresponds to the (002) plane. Transmission electron microscope (TEM) images showed that SiO2 nanoparticles were randomly distributed on the surface of GO plates, and the particle size in these nanopowders was below 50 nm. Field emission scanning electron microscopy (FESEM) analysis demonstrated that silica nanoparticles on the surface of GO plates exhibited almost spherical and rod-like nanoparticle shape, which in tur

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Flexible Budgets and its Variances under The Corona Pandemic Covid – 19
...Show More Authors

The research aims to explain the role of the flexible budget in assessing the feedback resulting from deviations by comparing the actual results with the planned performance in light of the economic crisis that the world witnessed during the spread of Corona disease. As most companies, including the Electronic Industries Company, face the problem of controlling production costs and are trying hard to reduce these costs to the lowest level starting from measuring these costs and allocating them and distributing them to products. This helps in controlling deviations and thus the flexible budget becomes a tool that helps in controlling elements Costs

View Publication Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The Correlation of P53 and MSI Immune Markers in Gastric Adenocarcinoma
...Show More Authors

العلاقة بين تعبير المعلمات المناعية ل (P53) وعدم استقرار الساتل الميكروي  (MSI) مع العوامل السريرية المرضية لسرطان المعدة الغدي باستخدام الكيمياء النسيجية المناعية. الخلاصة الخلفية: يحدث سرطان المعدة الغدي بسبب عدم استقرار الكروموسومات، وطفرات TP53، واختلال الصيغة الصبغية، والانتقالات، والجينات الورمية الأولية، والتغيرات الجينية المثبطة للورم.عدم استقرار الساتل الميكروي(MSI)  يسبب فشل إصلاح عدم تطابق الحم

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 13 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Nurses Knowledge and Performance Toward Physical Restraint at Critical Care Units
...Show More Authors

      Abstract:

Objective: The study was done to evaluate nurses’ knowledge and practices toward physical restraint at critical care unit

Methodology: Fifty nurses, who were selected by a non-probability (convenient) sampling method, participated in this descriptive study. The instrument of the study was knowledge parts of the questionnaire were initially developed in the U.S.A for nursing homes; in 2006 they were adopted for all hospital units by the original developers. The knowledge section of the questionnaire consisted of 20 items, which were used to measure knowledge of nurses towards the definition, indications and contra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2011
Journal Name
25th International Cartographic Conference
User generated content and formal data sources for integrating geospatial data
...Show More Authors

Today, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o

... Show More
Publication Date
Thu Jan 14 2021
Journal Name
Natural Volatiles And Essential Oils
Relationship between Toxoplasma gondii Antibodies and Blood Group in University Students
...Show More Authors

Background: Toxoplasma gondiiis an obligate intracellular protozoan that may infect nearly all warm-blooded animals, including humans. T gondiiis thought to infect one-third of the human population.The symptoms depending on the adequacy of the immune antiparasitic response. In humans, the main source of infection is through contact with the feces of infected cats, the final host in which the T. gondii completes its life cycle. Other source of infection occurs when drinking raw milk, ingestion of contaminated meat. Aim: This descriptive study estimated the seroprevalence and risk variables for Toxoplasma gondii infection forundergraduate students of a college of Pharmacy who were studying at University of Baghdad. The frequency rate ofToxopl

... Show More