To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
DBN Rashid, 2012 - Cited by 2
Synthesis of a new class of Schiff-base ligand with a tetrazole moiety to form polymeric metal complexes with CoII, NiII, ZnII, and CdII ions has been demonstrated. The ligand was synthesised by a multi-steps by treating 5-amino-2-chlorobenzonitrile and cyclohexane -1,3-dione, the 5,5'-(((1E,3E)-cyclohexane-1,3-diylidene)bis(azanylylidene))bis(2-chlorobenzonitrile) was obtained. The precursor (M) was prepared from the reaction 5,5'-(((1E,3E)-cyclohexane-1,3-diylidene)bis(azanylylidene))bis(2-chlorobenzonitrile) with NaN3 to obtained (1E,3E)-N1,N3-bis(4-chloro-3-(1H-tetrazol-5-yl)phenyl)cyclohexane-1,3-diimine (N). By reacting the precursor (M) with CS2
... Show MoreThis work aimed to use conventional PCR to identify Salmonella spp. that were isolated from diarrheal children and healthy and diarrheic dogs based on four virulence genes, hilA, stn, spvR, and marT. Sixteen Salmonella isolates including: 9 isolated from children's diarrhea from three species (S. Typhimurium, S. Enteritidis, S. Typhi) and seven isolated from dogs including (S. Typhimurium, S. Enteritidis, S. Muenchen), were identified primarily by several methods. The PCR products of the 16S rRNA gene were sequenced and examined using BLAST analysis to find differences and similarities between these Iraqi isolates and already-known global strains in order to construct the phylogenetic tree of S.
... Show MoreThis study was conducted to determine the fungal cause and bio control of damping off and root rot of wheat plants by using pseudomonas fluorescens under greenhouse and field conditions. Results showed isolation of eight species from the soil and roots to deferent region of Baghdad government. Rhizoctonia solani (Rs) and Fusarium solani (Fs) were the predominant damping off fungus with frequency 60 and 52% respectively. Led the using of bacteria formulations such as crud suspension , pure bacteria filtration and pure living cells in culture medium inhibit all type fungi with rates ranging from 84-96% , 80- 93% and 75-88% respectively. Rs and Fs were more pathogenesis under greenhouse conditions, with incidence of 80 and 68% and disease s
... Show MoreStudied competence spam to malicious moth figs at temperatures and Kagafat host different results showed that female intruder, despite their ability to shell larvae host and when densities of different, but it is able to lay eggs at a temperature of 14 + or -1 and finally urged the efficiency spam to malicious affected heavily host and that the greater the intensity of the host spam increased efficiency and its performance life
Background: The purpose of this study was to assess the relation among the ramal length and width with various cervical and cranio-facial measurements for a sample of Iraqi adults with different skeletal classes. Materials and method: The sample composed of 71 Iraqi adults (36 females and 35 males) with an age ranged between 17-30 years and had different skeletal mal-relations using SNA, SNB and ANB to differentiate between them and assorting them into CL.I, CL.II and CL.III mal-relation. Each individual was subjected to clinical examination and digital true lateral cephalometric radiograph that had been analyzed using AutoCAD 2007 software computer program to determine sixteen linear and ten angular measurements. Descriptive statistics wer
... Show MoreFrom 211 urine samples, Gram negative bacteria were isolated from only 61 urine samples with isolation percentage 28.9%. Escherichia coli were isolated percentage 70.49% while Klebsiella pneumoniae and Psendomonas aeruginosa were 8.19% and 6.55%, respectively.Proteus spp. Were isolated from 9 (14.75%), P. mirablis and P. vulgaris were isolates percentage 11.47% and 3.27%, respectively. Uroepithelial Cell Adhesin (UCA) fimbriae expression by P.mirabilis isolates was detected by the high capacity to adhesion to human uroepithetial cells, the isolate p.mirabilis U7 was adhesion to human uroepithelial cells mean no.30.2 bacteria/cell when grown on luria broth at 37C for 24h, but then grown it’s on luria agar at 37C for 24h the adhesion
... Show MoreThe economic development and intense competition may make economic units neglected the social aspect as a service workers and the environment, the community and focus on the economic side and achieve profitability only, which puts it in a position of accountability of trade unions and bodies, environment, health, civil society organizations and the focus of many studies accounting in order to clarify social activities and disclosed in the financial statements, increasing pressure from multiple parties calling for governments to issue laws and regulations oblige economic units to disclose complete and accurate information in a timely manner for all social activities and be subj
... Show MoreNew Schiff-base ligands bearing tetrazole moiety and their polymeric metal complexes with Co(II), Ni(II) and Cd(II) ions are reported. Ligands were prepared in a multiple-step reaction. The reaction of sodium 2,6- diformylphenolate and cyclohexane-1,3-dione with 5-amino-2-fluorobenzonitrile resulted in the isolation of two precursors sodium 2,6-bis((E)-(3-cyano-4-fluorophenylimino)methyl)-4-methylphenolate 1 and 5,5'- (1E,1'E)-cyclohexane-1,3-diylidenebis- (azan-1-yl-1-ylidene)bis(2-fluorobenzonitrile) 2, respectively. The reaction of precursors with azide gave the required ligands; sodium 2,6-bis((E)-(4-fluoro-3-(1H-tetrazol-5- yl)phenylimino)methyl)-4-methylphenolate (NaL) and (N,N'E,N,N'E)-N,N'-(cyclohexane-1,3-diylidene)bis(4- fluoro-3-
... Show MoreThe problem of the damage caused by terrorist acts has raised many difficulties in many countries, including Iraq, which requires the existence of a law that sets out sufficient rules for compensating the victims of terrorist acts, in order to compensate them for the harm they have not suffered. It may be difficult or impossible for them to identify causing damage, and therefore unable to obtain compensation by applying the traditional rules of liability that require proof of fault and identify the culprit. The security funds come as an appropriate alternative that pays compensation in such cases for victims to reparation for the damage they suffered. Therefore, this problem remains one of the most problems that Iraq suffers from it, which
... Show More