Severity: Warning
Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3122
Function: getPubMedXML
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
Cryptography is a method for preventing illegitimate access to information and data. In this paper, a bio-inspired cryptographic DNA system has been proposed. The proposed method consists of three phases: encryption, key generation and decryption. The scheme is proposed, from reproducing the normal procedures in the genetic encoding, transcription and translation and some of the inverse procedures have been used for the encryption and decryption of the data. And also for the encryption and decryption algorithms, it concentrates on the Central Dogma of Molecular Biology (CMDB).Thus, to store in the memory storage, a Bidirectional Associative Memory Neural Network (BAMNN) is used by recognizing and restoring the set of keys in present mode, and it is used educated in the randomized important generation information. Here, Whale Optimization Algorithm (WOA) is the highest fit weight vector. The proposed bio-instrumented encrypting system consists of adequate encoding as well as the decryption times, even though when the data is correlated in larger sizes in the current systems. Different safety attacks analyze the efficiency of the cryptosystem. This paper explored efficiency of the WOA algorithm by changing the number of hidden and input neurons. The proposed method is compared with traditional cryptographic techniques results in 55 and 67% increased processing time for encryption process and decryption process respectively.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1016/j.biosystems.2020.104207 | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!