Preferred Language
Articles
/
jih-1947
Cryptography with Dynamic DNA Depending on Edge Detection
...Show More Authors

Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Alexandria Engineering Journal
U-Net for genomic sequencing: A novel approach to DNA sequence classification
...Show More Authors

The precise classification of DNA sequences is pivotal in genomics, holding significant implications for personalized medicine. The stakes are particularly high when classifying key genetic markers such as BRAC, related to breast cancer susceptibility; BRAF, associated with various malignancies; and KRAS, a recognized oncogene. Conventional machine learning techniques often necessitate intricate feature engineering and may not capture the full spectrum of sequence dependencies. To ameliorate these limitations, this study employs an adapted UNet architecture, originally designed for biomedical image segmentation, to classify DNA sequences.The attention mechanism was also tested LONG WITH u-Net architecture to precisely classify DNA sequences

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Effects of Q-switched Nd: YAG laser irradiation on the aqueous solution of human albumin and calf-thymus double strand DNA (ctds)
...Show More Authors

Q-switched lasers widely used in management skin diseases and
sometimes its effect may be inadequate or associated with
cytotoxicity. The current study aimed to investigate the effect of
Q-switched Nd:YAG laser upon cellular elements using in vitro
experimental model. Aqueous solutions of human albumin and pure
calf thymus double strand deoxyribonucleic acid (ctdsDNA)
irradiated with Q-switched Nd:YAG laser at different rates (1, 3 Hz)
and time exposure (up to 60 seconds) using 532 nm (400 mJ) and
1064 (1200 mJ) nm wavelength with fixed spot size of 4 mm. The
effect of laser irradiation on the albumin solution also studied in the
presence of elemental salts of copper, zinc and iron.
Q-switched laser irrad

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Mon Nov 19 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cryptography by Using"Hosoya"Polynomials for"Graphs Groups of Integer Modulen and"Dihedral Groups with'Immersion"Property
...Show More Authors

      In this paper we used Hosoya polynomial ofgroupgraphs Z1,...,Z26 after representing each group as  graph and using Dihedral group to"encrypt the plain texts with the immersion property which provided Hosoya polynomial to immerse the cipher text in another"cipher text to become very"difficult to solve.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (28)
Crossref (15)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Real-Time Cloth Simulation on Virtual Human Character Using Enhanced Position Based Dynamic Framework Technique
...Show More Authors

     Cloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications.   This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Dynamic Capabilities on competitive advantage Analytical research in Iraqi Cement State Company
...Show More Authors

       The current research aims to diagnose the nature of the relation between dynamic capabilities as an independent variable and competitive advantage as a respondent variable, and identify the role of each of them in achieving the required performance of the organizations and adapt to the rapid environmental changes. The research was applied to the Iraqi Cement State Company one of the formations of the Iraqi Ministry of Industry and Minerals, and based on the importance of the subject matter of the research and the importance of the research sample and company of inquiry, The researcher adopted the descriptive analytical method in completing his research. The sample of the research was Intention

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Employing Leadership Practices in Educational Institutions According to the Organizational Structure of DNA
...Show More Authors

DNA, as the basis of every living cell, is one of the most important and influential scientific discoveries. This research aims to identify and compare the organizational DNA to the leadership practices of school principals in the Sultanate of Oman and to reveal the similarity between principals’ leadership practices and the structure of DNA. In addition, it intends to identify any statistically significant differences between the responses of the participants due to the study variables: gender, job title and experience. A questionnaire was designed and data were collected from a randomly selected sample composed of (100) teachers in the Sultanate of Oman. The study found limitless diversity in the characteristics of DNA of leadership

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Automatic Detection and Recognition of Car Plates Based on Cascade Classifier
...Show More Authors

The study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Dynamic Role of PD-1, Vitamin D, RANKL, and Sclerostin in Iraqi Patients with Systemic Lupus Erythematosus
...Show More Authors

Systemic lupus erythematosus (SLE) is a chronic, autoimmune disease, with a wide range of clinical symptoms. Some studies have indicated the association between RANKL, Sclerostin, PD-1, and vitamin D concentrations and the pathogenesis of SLE. The current study aimed to evaluate the role of RANKL, Sclerostin, PD-1 and vitamin D in the pathogenesis of SLE. The study included 180 females diagnosed SLE patients and healthy control (60 females as early diagnosed patients without treatment, 60 females as patients under treatment with (prednisolone, and hydroxychloroquine), and 60 females healthy as a control group, with ages ranging from 20 to 45 years. The serum concentration levels of RANKL, Sclerostin, PD-1 and vitamin D were assessed by E

... Show More
View Publication
Crossref