Preferred Language
Articles
/
ijs-7640
mRNA Approach Image Encryption Using LUC Algorithm

      Bioinformatics is one of the computer science and biology sub-subjects concerned with the processes applied to biological data, such as gathering, processing, storing, and analyzing it. Biological data (ribonucleic acid (RNA), deoxyribonucleic acid (DNA), and protein sequences) has many applications and uses in many fields (data security, data segmentation, feature extraction, etc.). DNA sequences are used in the cryptography field, using the properties of biomolecules as the carriers of the data. Messenger RNA (mRNA) is a single strand used to make proteins containing genetic information. The information recorded from DNA also carries messages from DNA to ribosomes in the cytosol. In this paper, a new encryption technique based on (mRNA) amino acids to increase the diffusion of the algorithm was proposed, also using the LUC algorithm with finite field arithmetic to increase the complexity of the algorithm. The results show high resistance against well-known attacks on the proposed method. For Entropy, the achieved value for the encrypted images was above 7.998. The range of peak signal to noise ratio (PSNR) between plain and encrypted images was below 8.7. Finally, the unified average change intensity (UACI) was close to 0.335. The number of changing pixel rates (NPCR) was close to 0.996, which is considered a good result.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Al–bahith Al–a'alami
Spiritual Communication in Sufi Discourse- A communicative –Semiotic Approach to the Sufi Symbolic Image

This paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The n

... Show More
View Publication
Publication Date
Sun Jul 03 2011
Journal Name
Journal Of The Faculty Of Medicine Baghdad
mRNA in situ hybridization analysis of VEGF in chronic lymphocytic leukemia

Background: Several factors render chronic lymphocytic leukemia (CLL) an interesting subject for study by researchers. These include marked progress in understanding the molecular biology of normal and neoplastic lymphocytes and recent advances in molecular genetics techniques. Among molecular markers, vascular endothelial growth factor (VEGF), have been widely studied.
Objective: The aim of the study is to evaluate the role of VEGF in the pathogenesis of CLL and its role in disease progression.
Patients, materials and methods: A retrospective cross-sectional study was done on 60 patients with chronic lymphocytic leukemia (45 males & 15 females) compared with 20 controls (anemic patients), all recr

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Int. J. Advance Soft Compu. Appl,
Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Steganography Encryption Secret Message in Video Raster Using DNA and Chaotic Map

       Recently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Data Mining, Modelling And Management
Association rules mining using cuckoo search algorithm

Association rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.

Scopus (7)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
Crossref
View Publication
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Evaluation Tv- Image Quality for Different Cable Signal Transmission Resistance Based on Contrast Edge Algorithm

Some degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of The Faculty Of Medicine Baghdad
mRNA in situ hybridization analysis of MMP-9 in chronic lymphocytic leukemia

Background: Several factors render chronic lymphocytic leukemia (CLL) an interesting subject for study by researchers. These include marked progress in understanding the molecular biology of normal and neoplastic lymphocytes and recent advances in molecular genetics techniques. Among molecular markers, matrix metalloproteinase-9 (MMP-9), have been widely studied.
Objectives: The aim of the study is to evaluate the role of MMP-9 in the pathogenesis of CLL and to assess its prognostic role.
Patients and methods: A retrospective cross-sectional study done on 60 patients with chronic lymphocytic leukemia compared with 20 controls (anemic patients), all recruited at the Medical City Teaching Hospital laboratories from January 2004 to De

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Tue Oct 01 2024
Journal Name
International Immunopharmacology
mRNA vaccination reduces the thrombotic possibility in COVID-19: Inflammation risk estimates

Thrombosis is a common clinical feature associated with morbidity and mortality in coronavirus disease-2019 (COVID-19) patients. Cytokine storm in COVID-19 increases patients' systemic inflammation, which can cause multiple health consequences. In this work, we aimed to indicate the effect of Pfizer-BioNTech vaccination on the modulation of monocyte chemoattractant protein-3 (MCP-3), matrix metalloproteinase 1 (MMP-1), and tumor necrosis factor-alpha (TNF-α) levels, and other systemic inflammatory biomarkers that associates with COVID-19 severity in patients who suffers from thrombosis consequences. For this purpose, ninety people were collected from Ibn Al-Nafees Hospital and divided into three groups each of which contained 30 people, 15

... Show More
Scopus Clarivate Crossref
View Publication