To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
The flavonoglycone hesperidin is recognized as a potent anti-inflammatory, anticancer, and antioxidant agent. However, its poor bioavailability is a crucial bottleneck regarding its therapeutic activity. Gold nanoparticles are widely used in drug delivery because of its unique properties that differ from bulk metal. Hesperidin loaded gold nanoparticles were successfully prepared to enhance its stability and bioactive potential, as well as to minimize the problems associated with its absorption. The free radical scavenging activities of hesperidin, gold nanoparticles, and hesperidin loaded gold nanoparticles were compared with that of Vitamin C and subsequently evaluated in vitro using 2,2-diphenyl-1-picrylhydrazyl assay. The antioxi
... Show MoreCarrageenan extract is a compound of sulfated polyglycan that is taken out from red seaweeds. Being hydrocolloid in nature, carrageenan has gelling, emulsifying and thickening properties allowing it to be commonly used in the oral healthcare products and cosmetics. Due to its bioactive compounds, carrageenan has been shown to have antimicrobial, antiviral, and antitumor properties. The purpose of this work is to study the probable use of carrageenan on the diseases that are related to oral cavity and on the genomic DNA in in vitro experimental model
In this study, the effects of k-carrageenan on four different cell lines related to the cancer and normal cells which cultured on selective media were done. Moreover, the eff
... Show MoreFoliar application and seed soaking has been used as a means of supplying supplemental doses of nutrients, plant hormones, stimulants, and organic components. the effects of these applications have included yield increases, and improved drought tolerance, and enhanced crop quality, so A field experiment was carried out during spring seasons in 2019 and 2020 for styding Seed soaking and Foliar Application of Ascorbic acid, Citric acid and Humic acid on Growth, Yield and Active Components IN Maize. Randomized complete block design in split plots arrangement was used with three replicates. Main-plots were for seeds soaking with ascorbic, citric (100 mg l-1) frequently and humic at (1 ml l-1). Sub-plots were for vegetative parts nutrition with
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreOn the basis of known coumarin-based prodrug system, a novel coumarin-based mutual prodrug of 5-fluorouracil and dichloroacetic acid was designed, synthesized and evaluated as a promising oral chemotherapeutic agent basing on in vitro stability study in HCl buffer (pH 1.2) and in phosphate buffer (pH 7.4), as well as in vitro release study in human serum. The chemical structure of prodrug was confirmed by analyzing its FTIR, 1H NMR, 13C NMR and MS-ESI spectra. The results of in vitro kinetic study indicated that the prodrug was significantly stable in HCl and in phosphate buffers, and was hydrolyzed in human serum followed pseudo first order kinetics.
Keywords: Coumarin-bas
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show More