To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DNA sequences. These DNA sequences are converted to RNA sequences. Finally, the RNA sequences are converted to the amino acid, where this sequence is considered as ciphertext to be sent to the receiver. The decryption phase also includes six steps, which are the same encryption steps but in reverse order. It starts with converting amino acid to RNA sequences, then converting RNA sequences to DNA sequences and converting them to their equivalent complementary DNA. After that, DNA sequences are converted to binary values and to their equivalent ASCII values. The final step is converting ASCII values to alphabet characters that are considered plaintext. For evaluation purposes, six text files with different sizes have been used as a test material. Performance evaluation is calculated based on encryption time and decryption time. The achieved results are considered as good and fast, where the encryption and decryption times needed for a file with size of 1k are equal to 2.578 ms and 2.625 ms respectively, while the encryption and decryption times for a file with size of 20k are equal to 268.422 ms and 245.469 ms respectively.
Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show MoreThe compound [G1] was prepared from the reaction of thiosemicarbazide with para-hydroxyphenylmethyl ketone in ethanol as a solvent. Then by sequence reactions prepared [G2] and [G3] compounds. The compound [G4] reaction with ethyl acetoacetoneto synthesized compound [G6] and acetyl acetone to synthesized compound [G5]. Reaction the [G3] with two different types of aldehydes in the present of pipredine to form new alkenes compounds [G7]and [G8].The compound [G3] reacted with hydrazine hydrate to formation[G4] with present the hydrazine hydrade 80% in (10) ml of absolute ethanol. Latter the compound [G4]reacted with different aldehydes with present the glacial acetic acid and the solvent was ethanol to formed the Schiff bases compounds[G9] an
... Show MoreThe primary aim of this paper, is to introduce the rough probability from topological view. We used the Gm-topological spaces which result from the digraph on the stochastic approximation spaces to upper and lower distribution functions, the upper and lower mathematical expectations, the upper and lower variances, the upper and lower standard deviation and the upper and lower r th moment. Different levels for those concepts are introduced, also we introduced some results based upon those concepts.
The research sheds light on an important religious sect that played a fundamental role in the structure of the Iraqi society in general and the Baghdadi society in particular, in which the Jews in general and the Jewish women in particular played an active role in the culture and heritage of Baghdadi society. The educational, cultural and artistic activity of Jewish literacy is a model for study.
The main aim of conducting this research is to identify the applications of Smart libraries in the Arab world. The Researcher relied on the documentary and Survey approach to collect information and data through the Internet, and to get to know these libraries. Then the Research came in three sections dealing with the first topic: The general framework of the study. The second topic deals with: introducing Smart libraries and indicating their types and characteristics. The Third topic dealt with the requirements of Smart libraries'application by identifying the basic components of it (Smart building, Smart Librarian , Smart devices, systems and software, Smart information sources,and Smart beneficiaries), and dealt with Smart libraries appl
... Show More