Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Sun Jun 25 2017
Journal Name
Biomedical And Pharmacology Journal
The Impact of Toxoplasma gondii on Mitochondrial DNA of Sub-fertile Men Sperms
...Show More Authors

Toxoplasmosis is the most common, widespread disease in the world which is caused by Toxoplasma gondii.The objective of the current study is to determine the effect of the Toxoplasma gondii infection on male sperm, especially on the mitochondria of sperm for men who suffer infertility and the possibility of a hereditary mutation. Sixty seminal fluid and serum samples were taken from sub- fertile patients who attended Teba center for in vitro fertilization / Babylon and similarly samples were also obtained from healthy individuals as a control group, their ages ranged from 20 to 60 years old during the period from 1st may /2016 till 25th January/2017. All samples subjected to the tests included Macroscopic and microscopic examination, molecu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Advances In Physics Theories And Applications
Synthesis, Characterization, And Antibacterial Activities Of Manganese (II), Cobalt(II), Iron (II), Nickel (II) , zinc (II) And Cadmium(II) Mixed- Ligand Complexes Containing Amino Acid(L-Valine) And Saccharin
...Show More Authors

new six mixed ligand complexes of some transition metal ions Manganese (II), Cobalt(II), Iron (II), Nickel (II) , and non transition metal ion zinc (II) And Cadmium(II) with L-valine (Val H ) as a primary ligand and Saccharin (HSac) as a secondary ligands have been prepared. All the prepared complexes have been characterized by molar conductance, magnetic susceptibility infrared, electronic spectral, Elemental microanalysis (C.H.N) and AA . The complexes with the formulas [M(Val)2(HSac)2] M= Mn (II) , Fe (II) , Co(II) ,Ni(II), Cu (II),Zn(II) and Cd(II) L- Val H= (C5H11NO2) , C7H5NO3S The study shows that these complexes have octahedral geometry; The metal complexes have been screened for their in microbiological activities against bacteria.

... Show More
Publication Date
Fri Mar 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of [N-(4-Methoxybenzoyl amino)-thioxomethyl ]Methionine acid (MbM) and It's Complexes with Some Divalent Transition Metals Ions (Mn , Co , Ni , Cu , Zn , Cd and Hg)
...Show More Authors

In this work , the ligand [N-(4-Methoxybenzoyl amino)-thioxomethyl] Methionine acid  has been synthesized by the reaction of 4- Methoxybenzoyl isothiocyanate with methionine acid . The metal complexes were prepared through the reaction of metals chlorides of Co(II) , Ni(II), Cu(II), Zn(II) and Cd(II) in ethanol as solvent . The ligand (MbM) and its metal complexes have been characterized by elemental analysis (CHNS), IR, 1H-13CNMR and UV- Vis spectra, magnetic susceptibility measurements, molar conductivity, melting points and atomic absorption. The metal-ligand ratio was determined by mole ratio method. The suggested structures for the Co(II), Ni(II), Cd(II) and Zn(II) complexes are tetrahedral geometry and  the Cu(II) complex

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Publication Date
Thu Jan 01 2009
Journal Name
Arab Journal Of Gasteroenterology
Serum HCV-RNA levels in patients with chronic hepatitis C: correlation with histological features.
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Communications In Computer And Information Science
Automatically Recognizing Emotions in Text Using Prediction by Partial Matching (PPM) Text Compression Method
...Show More Authors

In this paper, we investigate the automatic recognition of emotion in text. We perform experiments with a new method of classification based on the PPM character-based text compression scheme. These experiments involve both coarse-grained classification (whether a text is emotional or not) and also fine-grained classification such as recognising Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method significantly outperforms the traditional word-based text classification methods. The results show that the PPM compression based classification method is able to distinguish between emotional and nonemotional text with high accuracy, between texts invo

... Show More
View Publication
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Nov 30 2024
Journal Name
Asia Pacific Journal Of Molecular Biology And Biotechnology
Random amplified polymorphic DNA-based polymerase chain reaction is an effective tool to examine the genotoxic effects of some food colors
...Show More Authors

A large number of natural or synthetic dyes have been removed from both national and international lists of permitted food colors because of their mutagenic or carcinogenic activity. Therefore, this study aimed to use the Random Amplified Polymorphic DNA-Based Polymerase Chain Reaction (RAPD-PCR) assay as a feasible method to evaluate the ability of some food colors as genotoxin-induced DNA damage and mutations. Lactiplantibacillus plantarum was used as a bioindicator to determine the genotoxic effects by RAPD-PCR using M13 primer after treatment with some synthetic dyes currently used as food color additives, including Sunset Yellow, Carmoisine, and Tartrazine. Besides qualitative analysis, the bioinformatic GelJ software was used for clus

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jul 19 2024
Journal Name
Baghdad Science Journal
The correlation between micro-RNA 146a and IL-17 in the serum of Iraqi patients with cystic echinococcosis
...Show More Authors

داء المشوكات الكيسي (CE) هو مرض وبائي يسبب مرضًا خطيرًا وخسائر اقتصادية في معظم بلدان العالم. MiRNAs هي عامل جيني ضروري لتنظيم الاستجابة المناعية من خلال قدرته على التدخل في التعبير الخلوي ؛ واحد هذه الحوامض النووية الدقيقة -146 أ. هدفت الدراسة الحالية تقييم إذا كان بإمكاننا استخدام microRNA 146a كمؤشر حيوي للكشف عن    CEو تحديد العلاقة بين التعبير الجيني microRNA 146a و IL-17 في مرضى CE.حيث اشتملت الدراسة على 50 مريضًا من CE تم إد

... Show More
View Publication
Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref