Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
SECURED SMART CARD SIMULATION
...Show More Authors

Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using  BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
the role of time management in facilitate the work requirements for employees of the administrative department at the ministry of higher education and scientific research
...Show More Authors

The aim of the present study is to provide the adequate knowledge about the role of time management in facilitate the work requirements for employees of the administrative department at the Ministry of Higher Education and Scientific Research. The research depend on studying four important dimensions which are (time planning, time organization, time direction and time observation). In addition to study other five dimensions which are (new procedures, clear procedures, short procedures, the available information and the simplicity of the methods

used).Questionnaire sheets consist of (38 questions) distributed to (170) employees and (146)  sheets only were considered in the study. SPSS program was used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 02 2018
Journal Name
Iraqi Journal Of Physics
Nonlinear optical properties of polymer [PMMA] thin films doped with dye lasing compounds, Rhodamine 6G and Acriflavine in chloroform solvent by using dip coating method
...Show More Authors

The fluorescence emission of Rhodamine 6G (R6G) and Acriflavine dyes in PMMA polymer have been studied by changing the irradiation and exposure time of laser light to know the effect of this parameter. It was found that the fluorescence intensity decreases in the polymer samples doped dyes as the exposure time increases and then reaches stabilization at long times, this behavior called photobleaching, which have been shown in liquid phase less than solid phase. Using 2nd harmonic with wavelength 530 nm laser, the photobleaching effect in the two dye-doped polymers different solvent but same was studied. It was observed that photobleaching of by different solution and by using dip spin coating the photobleaching seem in liquid phase more

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Modern Sport
The effect of an educational curriculum using virtual reality glasses in improving some kinetic abilities and learning freestyle swimming for first-year primary school students
...Show More Authors

هدفت الدراسة الى الاهتمام واستغلال ماهو جديد من تقنيات واجهزة حديثة في تعليم السباحة الحرة عن طريق توجيه الاطفال على تطوير مداركهم واستيعابهم بالتطور التكنولوجي الذي يتناوله العالم ،قامت الباحثتان باعداد منهج تعليمي باستخدام نظارة الواقع الافتراضي وذالك بتوفير بيئة مشابهة للبيئة الحقيقية تحاكي مدارك عقول الاطفال في عالم افتراضي لتتكون صورة كاملة عن مهارات السباحة الحرة ،ومن هنا اتت المشكلة نتيجة تعل

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 05 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An evaluation of canal transportation and centering ability at different levels of root canals prepared by self-adjusting file using computed tomography (A comparative study)
...Show More Authors

Background: The new concepts and technologies continue to change the dynamics of endodontic practices in the world. Rapid and significant changes in techniques, instrument design, and the type of metals used to manufacture endodontic instruments which have been made during the last few years in an attempt to overcome canal preparation errors. The purpose of this study is to measure and compare canal transportation and centering ability of Self Adjusting File with two rotary nickel-titanium (Ni-Ti) systems, ProTaper and BioRaCe at different levels. Material and Methods: Forty five distal roots of mandibular first molars with moderate curvature were selected using Schneider method. Roots were divided randomly into 3 groups of 15 each and were

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Australian Journal Of Basic And Applied Sciences
Electrochemical interferences of Mn<sup>2+</sup> with Hg<sup>2+</sup>, Cd<sup>2+</sup> and Cu<sup>2+</sup> at different modified GCE
...Show More Authors

Glassy carbon electrode (GCE) was modified with carbon nanotubes CNT and C60 by attachment and solution evaporation techniques, respectively. CNT/Li+/GCE and C60/Li+/GCE were prepared by modifying CNT/GCE and C60/GCE in Li+ solution via cyclic voltammetry (CV) potential cycling. The sensing characteristics of the modified film electrodes, demonstrated in this study for interference of Mn2+ in different heavy metals ion esp. Hg2+, Cd2+ and Cu2+. The interfering effect was investigated that exert positive interference on the redox peaks of Mn2+. The modification of GCE with nano materials and Li+ act an enhancement for the redox current peaks to observe the effect of interference for Mn2+ in 1:1 ratio with different heavy metals ion.

Scopus (3)
Scopus
Publication Date
Thu Mar 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Radiological Evaluation of the Anatomic Characteristic of Lingual Foramina and Their Vascular Canals in the Anterior Region of the Mandible Using Cone Beam Computed Tomography
...Show More Authors

Background: presence of lingual vascular foramina and canals in the interforaminal region may increase the risk ofsurgical complications during implant placement or any surgical procedure in this area. Aim of this study is the radiological evaluation of the anatomic characteristic of the lingual foramina and their vascular canals in the anterior of the mandible using cone beam computed tomography. Materials and Methods: Prospective study including 72 Iraqi subjects (31 male and 41 female) ranging from 20 to 59 years, all subjects attended Al-Sharaa dental clinic in AL-Najaf AL-Ashraf city, scanned with CBCT from September 2016 to February 2017. Using 3dimentional and sagittal cross section to detect lingual foramina and their vascular canal

... Show More
View Publication
Crossref (1)
Crossref