Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Thu Oct 01 2020
Journal Name
Biochemical & Cellular Archives
RAPID SPECTROPHOTOMETRIC ESTIMATION OF TRACE AMOUNTS OF MEFENAMIC ACID BASED DISPERSIVE LIQUID-LIQUID MICROEXTRACTION OF IN PHARMACEUTICAL PREPARATIONS.
...Show More Authors

A dispersive liquid-liquid microextraction combines with UV-V is spectrophotometry for the preconcentration and determination of Mefenamic acid in pharmaceutical preparation was developed and introduced. The proposed method is based on the formation of charge transfer complexation between mefenamic acid and chloranil as an n-electron donor and a p-acceptor, respectively to form a violet chromogen complex measured at 542 nm. The important parameters affecting the efficiency of DLLME were evaluated and optimized. Under the optimum conditions, the calibration graphs of standard and drug, were ranged 0.03-10 µg mL-1. The limits of detection, quantification and Sandell's sensitivity were calculated. Good recoveries of MAF Std. and drug at 0.05,

... Show More
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Mouth Rinses on Surface Roughness of Two Methacrylate-Based and Siloraine-Based Composite Resins
...Show More Authors

Background: Various fluids in the oral environment can affect the surface roughness of resin composites. This in vitro study was conducted to determine the influence of the mouth rinses on surface roughness of two methacrylate-based resin (nanofilled and packable composite) and siloraine-based resin composites.

Materials and methods: Disc-shaped specimens (12 mm in diameter and 2mm in height) were prepared from three types of composi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ULATRAVIOLET ABSORBANCE SEPECTRA FOR ANTIBIOTIC DERIVATIVES (AMINO GLYCOSIDES) USED IN MEDICAL AND PHARMACEUTICAL INDUSTRY: ULATRAVIOLET ABSORBANCE SEPECTRA FOR ANTIBIOTIC DERIVATIVES (AMINO GLYCOSIDES) USED IN MEDICAL AND PHARMACEUTICAL INDUSTRY
...Show More Authors

Ultraviolet spectrophotometric studies for antibiotic (amino glycoside) derivatives including, Neomycin, Streptomycin, Gentamycin and Kanamycin with special reagents, which are benzoyl chloride; benzene sulfonyl chloride, toluenesulfonyl chloride and phthalic anhydride were made. Amino glycosides derivatives were followed through measurements of the ultraviolet absorbance (A) from which the absorptivity (ε) of the complexes was deduced and molar absorbances using Ultraviolet for products and calculate the number of reagents molecule that combine to amino glycosides.

View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
Detection of Parvovirus B19 DNA in pregnant Sudanese women attending The Military hospital using Nested PCR technique : Detection of Parvovirus B19 DNA in pregnant Sudanese women
...Show More Authors

Background: Parvovirus B19 is a human pathogenic virus associated with a wide range of clinical conditions. During pregnancy congenital infection with parvovirus B19 can be associated with poor outcome, including miscarriage, fetal anemia and non-immune hydrops.  

Objective: The study aimed to determine the prevalenceof Parvovirus B19 DNA in pregnant women attending the Military hospital in Khartoum, demonstrating the association between the virus and poor pregnancy outcomes.

Subjects and methods: This study was a cross sectional study, testing pregnant Sudanese women whole blood samples (n= 97) for the presence of Parvovirus B1

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Mon May 02 2022
Journal Name
Lark Journal
Iraq Wars: From A literary text to Social Context
...Show More Authors

This article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th

... Show More
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The Written Text in Conceptual Art (An Analytical Study)
...Show More Authors

The tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).

The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?

The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The absurdity of Orientalist thought and its deviation in interpretation Quranic text View and critique
...Show More Authors

The absurdity of Orientalist thought and its deviation in interpretation
Quranic text
View and critique

View Publication Preview PDF