Preferred Language
Articles
/
ZRbWvYoBVTCNdQwCcKSK
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.

Publication Date
Tue Dec 29 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis, Characterization, and Antibacterial Evaluation of New Vanillic Acid Derivatives
...Show More Authors

View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Spectroscopic of Some new Metal Ions Complexes's with [N-(4-Methoxy Benzoyl Amino)-Thioxo Methyl] Leucine
...Show More Authors

 A new ligand [N-(4-methoxy benzoyl amino)-thioxo methyl ] leucine  (MBL) was prepared from the reaction of (4-methoxy benzoyl isothiocyanate with leucine acid in molar ratio (l:l), it was characterized by elemental analysis (C.H.N.S), FT-IR, UV-Vis, 1H and 13CNMR. The complexes of the bivalent ions (Mn, Fe, Co, Ni, Cu, Zn, Cd and Hg ) have been prepared and characterized too.       The structural was established by elemental analysis (C.H.N.S), FT-IR, UV-Vis spectra,  conductivity measurements atomic absorption and magnetic susceptibility and determination of molar ration (M:L). The complexes showed characteristic behavior of tetrahedral geometry around the metal ions except with (Cu) complex

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 16 2010
Journal Name
Al-mustansiriyah
Synthesis, Spectroscopic and Biological Studies of Some Metal Complexes with 1, 2 bis-(ortho amino phenyl thiol)-ethane.
...Show More Authors

Publication Date
Tue Jan 01 2013
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Synthesis and Spectroscopic of Some new Metal Ions Complexes's with [N-(4-Methoxy Benzoyl Amino)-Thioxo Methyl] Leucine
...Show More Authors

A new ligand [N-(4-methoxy benzoyl amino)-thioxo methyl ] leucine (MBL) was prepared from the reaction of (4-methoxy benzoyl isothiocyanate with leucine acid in molar ratio (l:l), it was characterized by elemental analysis (C.H.N.S), FT-IR, UV-Vis, 1H and 13C-NMR. The complexes of the bivalent ions (Mn, Fe, Co, Ni, Cu, Zn, Cd and Hg ) have been prepared and characterized too. The structural was established by elemental analysis (C.H.N.S), FT-IR, UV-Vis spectra, conductivity measurements atomic absorption and magnetic susceptibility and determination of molar ration (M:L). The complexes showed characteristic behavior of tetrahedral geometry around the metal ions except with (Cu) complex showed square planer.

Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Synthesis and Characterization of New 2-amino-5-chlorobenzothiazole Derivatives Containing Different Types of Heterocyclic as Antifungal Activity
...Show More Authors

Nine new compounds of 2-amino-5-chlorobenzothiazole derivatives were synthesized. These new compounds were formed through the reaction of 2-amino-5-chlorobenzothiazole 1 with ethyl chloroacetate and KOH, which gave an ester derivative 2, followed by refluxing compound 2 with hydrazine hydrate to afford hydrazide derivative 3. The reaction of compound 3 with CS2 and KOH gave 1,3,4-oxadiazole-2-thiol derivative 4, and then the reaction of compound 2 with thiosemicarbazide to produce compound 5  then treated it with 4%NaOH led to ring closure to provide 1,2,4-triazole-3-thiol derivative

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Nanoelectronics And Optoelectronics
Hypothetical Design of Carbon Nanotube Materials Based on [8]Circulene
...Show More Authors

B3LYP/6-31G, DFT method was applied to hypothetical study the design of six carbon nanotube materials based on [8]circulene, through the use of cyclic polymerization of two and three molecules of [8]circulene. Optimized structures of [8]circulene have saddle-shaped. Design of six carbon nanotubes reactions were done by thermodynamically calculating (Δ S, Δ G and Δ H) and the stability of these hypothetical nanotubes depending on the value of HOMO energy level. Nanotubes obtained have the most efficient gap energy, making them potentially useful for solar cell applications.

Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Pharmacy And Biological Sciences
Genetic Polymorphism of Iraqi Leishmania tropica Isolates Based on HSP70Gene
...Show More Authors

Leishmaniasis is one of the important parasitic diseases, affecting mainly low social class people indeveloping countries, and is more prevalent and endemic in the tropical and subtropical regions of old worldand new world. Despite ofbroad distribution in Iraq,little known about the geneticcharacteristics of thecausative agents. So this study was aimed to evaluate the genetic varietyoftwo IraqiLeishmaniatropicaisolatesbased on heat shock protein gene sequence 70 (HSP70) in comparison with universal isolates recordedsequences data. After amplification and sequencing of HSP70 gene,the obtainedresults were alignment alongwith homologous Leishmania sequences retrieved from NCBI by using BLAST. The analysis results showedpresence of particular g

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
A Crime Data Analysis of Prediction Based on Classification Approaches
...Show More Authors

Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref