To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
Lighting is a very important element of treatment if the color contains many imaging system (digital cameras) and the unit of light and the light within these units are not strong , but usefel when the light is low , in different lighting intensities conditions image quality will not persist good enough and image may become dark or slightly exposed to light which leads to lower the details in image where we can not modify contrast or light ness to compensate thr decrease without losing the light and dark deatials . So we went in this research to study the variation colored texts written on the painting and lighting cases of non –regular ( a few) and different distances . As the diversity of these texts written on the board a
... Show MoreDNA methylation is one of the main epigenetic mechanisms in cancer development and progression. Aberrant DNA methylation of CpG islands within promoter regions contributes to the dysregulation of various tumor suppressors and oncogenes; this leads to the appearance of malignant features, including rapid proliferation, metastasis, stemness, and drug resistance. The discovery of two important protein families, DNA methyltransferases (DNMTs) and Ten-eleven translocation (TET) dioxygenases, respectively, which are responsible for deregulated transcription of genes that play pivotal roles in tumorigenesis, led to further understanding of DNA methylation-related pathways. But how these enzymes can target specific genes in different malignancies;
... Show MoreAbstract: The utility of DNA sequencing in diagnosing and prognosis of diseases is vital for assessing the risk of genetic disorders, particularly for asymptomatic individuals with a genetic predisposition. Such diagnostic approaches are integral in guiding health and lifestyle decisions and preparing families with the necessary foreknowledge to anticipate potential genetic abnormalities. The present study explores implementing a define-by-run deep learning (DL) model optimized using the Tree-structured Parzen estimator algorithm to enhance the precision of genetic diagnostic tools. Unlike conventional models, the define-by-run model bolsters accuracy through dynamic adaptation to data during the learning process and iterative optimization
... Show MoreIt is doubtless that the sexual place has some common indicators due to the masculine and feminine bodies which may be natural or deviated (homosexual). The female has an act of voice in the imaginary masculine place whereas the male has an act of image recognized in the parental mind in both the secular and sacred place. Those places create different limits and perceptions according to the auditory and visual readings in search of identity, text and body in the feminine dramatic text.
The research includes four chapters; the first, the methodological framework, involves the problem which is centralized in the following enquiry: What is the relationship between the place and the term of
... Show MoreThe research includes the synthesis and identification of the mixed ligands complexes of M 2 Ions in general composition ,[M(Leu) 2 (SMX)] Where L leucine (C 6 H 13 NO 2 )symbolized (LeuH) as a primary ligand and Sulfamethoxazole C 10 H 11 N 3 O 3 S) symbolized (SMX)) as a secondary ligand . The ligands and the metal chlorides were brought in to reaction at room temperature in(v/v) ethanol /water as solvent containing NaOH. The reaction required the following [(metal: 2(Na Leu --): (SMX )] molar ratios with M(II) ions, Were M ( Mn ( II),Co (II),Ni(II),Cu( II),Zn (II),Cd(II)and Hg( The UV Vis and magnetic moment data revealed an octahedral geometry around M(II), The conductivity data show a non electrolytic nature of the complexes . The
... Show MoreLiterary translation is one of the most difficult types of translation ,because it conveys feelings that differ from one person to another, and since the language constitutes an obstacle to understanding the Andalusian excerpts, the translators resorted to translating it, and this was a second start to the text, different from its first start, is said from the tongue of the Al-washah , The muwashshah is a poetic art that appeared in Andalusia after the Arabs entered it ,characterized by special system It differs from the traditional Arabic poem, as it has a beginning represented in the beginning of the muwashshah and several equal parts ending with differentrhymes.
... Show MoreNew bidentate Schiff base ligand (L) namely [(Z)-3-(2-oxoindolin-3ylildeneamino)benzoic acid] type (NO) was prepared via condensation of isatin and 3-amino benzoic acid in ethanol as a solvent in existence of drops of (glac. CH3COOH). The new ligand (L) was characterized base on elemental microanalysis, FT-IR, UV-Vis, 1H-NMR spectra along with melting point. Ligand complexes in general formula [M(L)2Cl2]. H2O, where: MII = Co, Cu, Cd, and Hg; L= C15H10 N2O3 were synthesized and identified by FT-IR, UV-Vis, 1H-NMR (for Cd complex only) spectra, atomic absorption, chloride content along with molar conductivity and magnetic susceptibility. It was found that the ligand behaves as bidentate on complexation via (N) atom of imine group an
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More