Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Techniques مجلة التقني
A STUDY OF SOME TECHNICAL AND ECONOMICAL PARAMETERS FOR MACHINERY UNIT (NEW HOLLAND &DISC PLOW) BY USING THREE DIFFERENT TILT ANGLES دراسة بعض المؤشرات الفنية والأقتصادية للوحدة الميكنية (الجرار نيوهولاند مع المحراث القرصي الثلاثي القلاب) بأستخدام زوايا ميل مختلفة للأقراص
...Show More Authors

Publication Date
Mon Aug 19 2024
Journal Name
Journal Of Metastable And Nanocrystalline Materials
The Structural, Magnetic, and Electrochemical Properties of Composite PAni/Co<sub>0.2</sub>Mn<sub>0.8</sub>Fe<sub>2</sub>O<sub>4</sub>
...Show More Authors

The current work concerns preparing cobalt manganese ferrite (Co0.2Mn0.8Fe2O4) and decorating it with polyaniline (PAni) for supercapacitor applications. The X-ray diffraction findings (XRD) manifested a broad peak of PAni and a cubic structure of cobalt manganese ferrite with crystal sizes between 21 nm. The pictures were taken with a field emission scanning electron microscope (FE-SEM), which evidenced that the PAni has nanofibers (NFs) structures, grain size 33 – 55 nm, according to the method of preparation, where the hydrothermal method was used. The magnetic measurements (VSM) that were conducted at room temperature showed that the samples had definite magnetic properties. Additionally, it was noted that the saturation magnetizatio

... Show More
View Publication
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
¬The Role of the European Union in Conflicts Resolution in the Eastern Neighborhood: Selected Models
...Show More Authors

The launch of the EU’s Eastern Partnership in 2009 intended to signal a new, elevated level of EU engagement with its Eastern neighborhood. Yet there remain several long-simmering and potentially destabilizing conflicts in the region, with which EU engagement thus far has been sporadic at best. The Union’s use of its Common Security and Defense Policy (CSDP) in the region and to help solve these disputes has been particularly ad hoc and inconsistent, wracked by inter-institutional incoherence and undermined by Member States’ inability to agree on a broad strategic vision for engagement with the area.

The three CSDP missions deployed to the region thus far have all suffered from this incoherence to various extents. In particu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image
...Show More Authors

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of some Metal Complexes with (3Z ,5Z, 8Z)-2-azido-8-[azido(3Z,5Z)-2-azido-2,6bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H1,7-dioxa-3,4,5-triazonine – 2,6 – dica
...Show More Authors

  The reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III)  ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 22 2025
Journal Name
Al–bahith Al–a'alami
US Policy Image Regarding the Middle East Region as Reported by the Iraqi Newspapers (An Analytical Study of the Public Opinion in Editorials: Al-Sabah, Al-Mashriq and Tariq Al-Shaab Papers Over the Period from 1st of July to 30th of September 2013)
...Show More Authors

The present study is an attempt to throw light on the nature of the US policy regarding the Middle East region as portrayed by AI-Sabah, Al-Mashriq and Tariq Al-Shaab papers over a period of three months from 1st of July to 30th of September 2013.

In writing this study, a number of goals have been set by the researcher. These goals may include but in no way limited to the nature of the US image as carried by the above three papers, the nature of the topics tackled by them and the nature of the Arab countries which received more and extensive coverage than others.

A qualitative research approach is proposed for the study. This approach has allowed the researcher to arrive at definite answers for the possible questions rais

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 22 2025
Journal Name
Al–bahith Al–a'alami
THE ISSUES OF YOUTH IN THE TALK SHOWS IN THE IRAQI SATELLITE CHANNELS:: (An Analytical Study of the Shabab wa Banat Program at Al-Sumaria TV Channel and of the Hala Shabab at Al-Iraqia TV Channel) (A Research Drawn from a Master’s Thesis)
...Show More Authors

The purpose of this research is to identify the youth issues in Talk Shows in the Iraqi satellite channels via monitoring a sample of episodes of the Talk Shows  episodes which are concerned and analyzed the youth issues in the Iraqi satellite channels, namely, «Hala Shabab Program» at Al-Iraqia satellite Channel and «Shabab wa Banat Program» at Al-Sumaria satellite Channel by recording and re-watching them again. This research is classified as one of descriptive researches. The survey method was adopted in this study.

For this purpose, the researcher prepared an analysis form. The researcher de

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 11 2017
Journal Name
Journal: Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of some Metal Complexes with (3Z ,5Z, 8Z)-2-azido-8-[azido(3Z,5Z)-2-azido-2,6- bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide(L-AZ) .
...Show More Authors

The reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5- dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2- azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III) ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and Hg(II)] has been i

... Show More