Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 10 2022
Journal Name
Journal Of Biomimetics, Biomaterials And Biomedical Engineering
Synthesis, Molecular Modeling, DNA Damage Interaction, and Antioxidant Potential of Hesperidin Loaded on Gold Nanoparticles
...Show More Authors

The flavonoglycone hesperidin is recognized as a potent anti-inflammatory, anticancer, and antioxidant agent. However, its poor bioavailability is a crucial bottleneck regarding its therapeutic activity. Gold nanoparticles are widely used in drug delivery because of its unique properties that differ from bulk metal. Hesperidin loaded gold nanoparticles were successfully prepared to enhance its stability and bioactive potential, as well as to minimize the problems associated with its absorption. The free radical scavenging activities of hesperidin, gold nanoparticles, and hesperidin loaded gold nanoparticles were compared with that of Vitamin C and subsequently evaluated in vitro using 2,2-diphenyl-1-picrylhydrazyl assay. The antioxi

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jun 19 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Pharmacological Effects of Kappa Carrageenan on Different Human Cell Lines and Genomic DNA: An in vitro study
...Show More Authors

Carrageenan extract is a compound of sulfated polyglycan that is taken out from red seaweeds. Being hydrocolloid in nature, carrageenan has gelling, emulsifying and thickening properties allowing it to be commonly used in the oral healthcare products and cosmetics. Due to its bioactive compounds, carrageenan has been shown to have antimicrobial, antiviral, and antitumor properties. The purpose of this work is to study the probable use of carrageenan on the diseases that are related to oral cavity and on the genomic DNA in in vitro experimental model

In this study, the effects of k-carrageenan on four different cell lines related to the cancer and normal cells which cultured on selective media were done. Moreover, the eff

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Oct 28 2020
Journal Name
International Journal Of Agricultural And Statistical Sciences 16
Effect of nano-fertilizers and amino acids on the growth and yield of broccoli
...Show More Authors

Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Study of Seed Soaking and Foliar Application of Ascorbic Acid, Citric Acid and Humic Acid on Growth, Yield and Active Components In Maize
...Show More Authors

Foliar application and seed soaking has been used as a means of supplying supplemental doses of nutrients, plant hormones, stimulants, and organic components. the effects of these applications have included yield increases, and improved drought tolerance, and enhanced crop quality, so A field experiment was carried out during spring seasons in 2019 and 2020 for styding Seed soaking and Foliar Application of Ascorbic acid, Citric acid and Humic acid on Growth, Yield and Active Components IN Maize. Randomized complete block design in split plots arrangement was used with three replicates. Main-plots were for seeds soaking with ascorbic, citric (100 mg l-1) frequently and humic at (1 ml l-1). Sub-plots were for vegetative parts nutrition with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Design, Synthesis and Kinetic Study of Coumarin-Based Mutual Prodrug of 5-Fluorouracil and Dichloroacetic acid
...Show More Authors

On the basis of known coumarin-based prodrug system, a novel coumarin-based mutual prodrug of 5-fluorouracil and dichloroacetic acid was designed, synthesized and evaluated as a promising oral chemotherapeutic agent basing on in vitro stability study in HCl buffer (pH 1.2) and in phosphate buffer (pH 7.4), as well as in vitro release study in human serum. The chemical structure of prodrug was confirmed by analyzing its FTIR, 1H NMR, 13C NMR and MS-ESI spectra. The results of in vitro kinetic study indicated that the prodrug was significantly stable in HCl and in phosphate buffers, and was hydrolyzed in human serum followed pseudo first order kinetics.

Keywords: Coumarin-bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2023
Journal Name
Biomass Conversion And Biorefinery
Lactic acid-based deep eutectic solvents and activated carbon for soap removal from crude biodiesel
...Show More Authors

View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More