Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Phonological features   For spoken text in the language
...Show More Authors

This research attempted to take advantage of modern techniques in the study of the superstructural phonetic features of spoken text in language using phonetic programs to achieve more accurate and objective results, far from being limited to self-perception and personal judgment, which varies from person to person.
    It should be noted that these phonological features (Nabr, waqf, toning) are performance controls that determine the fate of the meaning of the word or sentence, but in the modern era has received little attention and attention, and that little attention to some of them came to study issues related to the composition or style Therefore, we recommend that more attention should be given to the study of

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Effect of Acetic Acid on Electrochemical Behavior of Sealed AA2319-T3 Al-Alloys Anodized in Phosphoric Acid Electrolytes
...Show More Authors

Abstract

      The present study investigates the effect of acetic acid on corrosion behavior and its potential of hydrothermally sealed anodized AA2319-Al-alloys. Anodizing treatment was performed in stagnant phosphoric acid electrolyte with or without addition of acetic acid. Hydrothermal sealing was carried out in boiling water for each anodized specimen. The open circuit potential of the unsealed and sealed anodized samples was examined using open circuit potential measurement for the purpose of starting in scanning polarization diagrams. The potentiostatic polarization technique measurements were performed to assess corrosion behavior and sealing quality (i.e., degree of sealing) of

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Indian Journal Of Public Health
Green and Efficient Composition and Diagnosis of Pentdentate Schiff Base Donative Metal Complexes: Antimicrobial, Antifungal, Antioxidant Screening and DNA Binding
...Show More Authors

Background: Enforcement of sustainable and green chemistry protocols has seen colossal surge in recent times, the development of an effective, eco-friendly, simple and novel methodologies towards the synthesis of valuable synthetic scaffolds and drug intermediates. Recent advances in technology have now a more efficient means of heating reactions that made microwave energy. Efforts to synthesize novel heterocyclic molecules of biological importance are in continuation. Microwave irradiation is well known to promote the synthesis of a variety of organic and inorganic compounds. The aim of current study was to conceivea mild base mediated preparation of novel Schiff base of 2-Acetylpheno with trimethoprim drug (H2TPBD) and its complexes w

... Show More
Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Agricultural Sciences 47 (1)‏
Effect of irrigation intervals and foliar of salicylic acid on growth and yield of Potato
...Show More Authors

Publication Date
Tue Dec 31 2019
Journal Name
Research On Crops
Influence of foliar application of ascorbic acid and atonik on growth and yield of potato
...Show More Authors

View Publication
Scopus (13)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 11 2024
Journal Name
J. Agric. And Veterinary Sci
Effect of adding humic acid and phosphate fertilizer levels on growth and yield of lettuce
...Show More Authors

Publication Date
Sat Jun 01 2024
Journal Name
Alexandria Engineering Journal
U-Net for genomic sequencing: A novel approach to DNA sequence classification
...Show More Authors

The precise classification of DNA sequences is pivotal in genomics, holding significant implications for personalized medicine. The stakes are particularly high when classifying key genetic markers such as BRAC, related to breast cancer susceptibility; BRAF, associated with various malignancies; and KRAS, a recognized oncogene. Conventional machine learning techniques often necessitate intricate feature engineering and may not capture the full spectrum of sequence dependencies. To ameliorate these limitations, this study employs an adapted UNet architecture, originally designed for biomedical image segmentation, to classify DNA sequences.The attention mechanism was also tested LONG WITH u-Net architecture to precisely classify DNA sequences

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref