Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Sun Jan 01 2017
Journal Name
Analytical Methods
Determination of pharmaceuticals in freshwater sediments using ultrasonic-assisted extraction with SPE clean-up and HPLC-DAD or LC-ESI-MS/MS detection
...Show More Authors

A robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.

View Publication
Scopus (26)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Smart Routing Management Framework Exploiting Dynamic Data Resources of Cross-Layer Design and Machine Learning Approaches for Mobile Cognitive Radio Networks: A Survey
...Show More Authors

View Publication
Scopus (20)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Oral Medicine And Oral Surgery
Evaluating dental implant stability using three devices Osstell<sup>®</sup>, Periotest<sup>®</sup>, and AnyCheck<sup>®</sup>: a clinical study
...Show More Authors

Introduction: Implant stability is usually measured with resonance frequency analysis (RFA) and damping capacity assessment (DCA). This study aimed to measure primary and secondary stabilities using 3 devices that are based on these methods, namely; RFA (Osstell®) and DCA (Periotest® and AnyCheck®) to assess the correlations of the measurements obtained by these devices and the correlations between implant stability and insertion torque. Material and Methods: This observational prospective study included 35 dental implants. The implant stability was measured using the 3 devices. Mann–Whitney U

... Show More
View Publication
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Controlled Release
Breast intraductal nanoformulations for treating ductal carcinoma in situ I: Exploring metal-ion complexation to slow ciclopirox release, enhance mammary persistence and efficacy
...Show More Authors

View Publication
Scopus (19)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Optics
The inter-planner parameter and the blue shift of band gap of titanium dioxide thin films prepared using the DC reactive magnetron sputtering
...Show More Authors

Titanium dioxide (TiO2) thin films were prepared under different pressures with values (15, 30, 60 and 120) Pa using the DC reactive magnetron homemade system with mixed gases of argon and oxygen in ratio (50:50). The result of X-ray diffraction patterns discovered that the structure of the deposited films was polycrystalline, including the phase of anatase. All the appeared peaks were matched to the planes (101), (004), (105), and (211) of diffracted states. Both the intensities and the number of the appeared peaks are declined according to the increased pressure, and the plane of (101) is be considered the preferential grown plane, it is taking a maximum texture factor. Both the lattice constant and the atomic inter-planer spacing take th

... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
SECURED SMART CARD SIMULATION
...Show More Authors

Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using  BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF SPORTS AWARENESS AMONG WOMEN AT THE UNIVERSITY OF BAGHDAD FOR THE PERIOD 2011-2016 AND STUDY THE FACTORS AFFECTING THEIR PARTICIPATION IN SPORTS ACTIVITIES: EVALUATION OF SPORTS AWARENESS AMONG WOMEN AT THE UNIVERSITY OF BAGHDAD FOR THE PERIOD 2011-2016 AND STUDY THE FACTORS AFFECTING THEIR PARTICIPATION IN SPORTS ACTIVITIES
...Show More Authors

The exercise of activities and sports are of great importance to public health and to maintain the ideal health weight as well as the psychological and mental comfort of humans. The aim of this study is to determine the contribution and participation of educated females in physical activities at the University of Baghdad hall for the years 2011-2016, and to show the factors that influence women's contribution to physical activities at the university by selecting 100 students of males and 100 females' students randomly. During the questioning questions and statistical analysis of the questioning to find out the reasons for the discouraging contribution of the women to the various physical activities and try to find solutions and r

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE SUSTANABLE MARKETING IMMUNITY OF TOURIST OF BUSINESS IN LIGHT OF THE PANDEMIC-CORONA (COVID-19) AN APPLIED RESEARCH IN TRAVEL AND TOURISM COMPANIES IN BAGHDAD: THE SUSTANABLE MARKETING IMMUNITY OF TOURIST OF BUSINESS IN LIGHT OF THE PANDEMIC-CORONA (COVID-19) AN APPLIED RESEARCH IN TRAVEL AND TOURISM COMPANIES IN BAGHDAD
...Show More Authors

The research aims to how to deal with certain situation to ensure the continuous competitive excellence of business market under the situation of covid-19, especially how to deal with major challenges, identifying the capabilities of tourism industry, investigating the ability of tourism agencies to resist the dynamic change of both internal as well as external environment to ensure their sustainability.

The important here as the paper notice, is how to be efficient and trying to find solutions in order to grow and survive through choosing certain strategies that aligned the critical issues.

Thus to achieve this level, many scenarios planed that could adopt in case of such pande

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 04 2026
Journal Name
Journal Of Juridical And Political Science
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the

... Show More
View Publication