The chase procedure is an indispensable tool for several database applications, where its termina... more The chase procedure is an indispensable tool for several database applications, where its termination guarantees decidability of these tasks. Most previous studies have focused on the skolem chase variant and its termination. It is known that the standard chase variant is more powerful in termination analysis provided a database is given. But all-instance termination analysis presents a challenge, since the critical database and similar techniques do not work. The interest of this paper is on the following question: How to devise a framework in which various known decidable classes of finite skolem chase can all be properly extended by the technique of standard chase? To address this question, we develop a novel technique to characterize the activeness of all possible cycles of a certain length in the standard chase procedure, which leads to the formulation of a parameterized class called k-SAFE(cycle), which guarantees all-instance, allpath termination, where the parameter takes a ...
The chase procedure for existential rules is an indispensable tool for several database applicati... more The chase procedure for existential rules is an indispensable tool for several database applications, where its termination guarantees decidability of these tasks. Most previous studies have focused on the Skolem chase variant and its termination analysis. It is known that the restricted chase variant is more powerful in termination analysis provided a database is given. But all-instance termination presents a challenge since the critical database and similar techniques do not work. We develop a novel technique to characterize the activeness of all possible cycles of a certain length for restricted chase, which leads to the formulation of a parameterized class of finite restricted chase, called k-\(\mathsf {safe}(\varPhi )\). This approach is applicable to any class of finite Skolem chase identified with a condition of acyclicity. More generally, we show that the approach can be applied to the entire hierarchy of bounded rule sets previously only defined for Skolem chase. Experiment...
of the most significant drawbacks that the previously proposed watermarking schemes are suffered ... more of the most significant drawbacks that the previously proposed watermarking schemes are suffered from, is size of the watermark picture which should be of limited length. One possible way out of this bottleneck is going into molecular layers. In this regard, We present the first watermarking model in DNA computing. This scheme can be implemented on an in-vivo computer. The proposed scheme uses the bacteriophage lambda genome for coding watermark image (owner-related information) and the Escherichia coli (E. coli) bacteria genome for coding the host image. The presented coding scheme is based on the silent mutation of codons which produces harmless bacteria and phages. The significant advantage of this scheme over other methods is that the process of embedding the watermark image in the host image takes place naturally in the process of infecting E. coli cells using bacteriophage lambda in lysogenic cycle. The owner of the watermark image can easily extract his information using the ...
Interaction of drugs with proteins, especially Serum albumin (SA), has a great significance in ph... more Interaction of drugs with proteins, especially Serum albumin (SA), has a great significance in pharmacology. SA can affect the biological activity and toxicity of drug. The binding parameters are helpful in the study of pharmacokinetics and the design of therapeutic dosages. Determination of the impact of various factors such as chemical modifications which may occur in vivo is also important when drug binds with albumin to a significant degree. In this study, the effect of some modifications on protein stability, ...
The chase procedure for existential rules is an indispensable tool for several database applicati... more The chase procedure for existential rules is an indispensable tool for several database applications, where its termination guarantees the decidability of these tasks. Most previous studies have focused on the skolem chase variant and its termination analysis. It is known that the restricted chase variant is a more powerful tool in termination analysis provided a database is given. But all-instance termination presents a challenge since the critical database and similar techniques do not work. In this paper, we develop a novel technique to characterize the activeness of all possible cycles of a certain length for the restricted chase, which leads to the formulation of a framework of parameterized classes of the finite restricted chase, called $k$-$\mathsf{safe}(\Phi)$ rule sets. This approach applies to any class of finite skolem chase identified with a condition of acyclicity. More generally, we show that the approach can be applied to the hierarchy of bounded rule sets previously ...
International Journal of Advanced Computer …, 2012
Genetically engineered machines take advantage of the computational power of DNA and seem to be p... more Genetically engineered machines take advantage of the computational power of DNA and seem to be promising in the future of computers. In this paper a solution has been proposed and simulated for securing images in the context of DNA computing. A total of ...
Summary DNA computing is promising in providing primitives of classical cryptography since it pro... more Summary DNA computing is promising in providing primitives of classical cryptography since it provides a variety of advantages over conventional silicon-based computing paradigms. These advantages include massive parallelism and data hiding capability ...
ABSTRACT The ever-growing penetration of communication networks, digital and Internet technologie... more ABSTRACT The ever-growing penetration of communication networks, digital and Internet technologies in our everyday lives has the transmission of text data, as well as multimedia data such as images and videos, possible. Digital images have a vast usage in a number of applications, including medicine and providing security authentication, for example. This applicability becomes evident when images, such as walking or people's facial features, are utilized in their identification. Considering the required security level and the properties of images, different algorithms may be used. After key generation using logistic chaos signals, a scrambling function is utilized for image agitation in both horizontal and vertical axes, and then a block-chaining mode of operation may be applied to encrypt the resultant image. The results demonstrate that using the proposed method drastically degrades the correlation between the image components and also the entropy is increased to an acceptable level. Therefore, the image will become greatly resistant to differential attacks. However, the increasing scrambling rounds and the decreasing number of bits of the blocks result in increasing the entropy and decreasing the correlation.
The chase procedure is an indispensable tool for several database applications, where its termina... more The chase procedure is an indispensable tool for several database applications, where its termination guarantees decidability of these tasks. Most previous studies have focused on the skolem chase variant and its termination. It is known that the standard chase variant is more powerful in termination analysis provided a database is given. But all-instance termination analysis presents a challenge, since the critical database and similar techniques do not work. The interest of this paper is on the following question: How to devise a framework in which various known decidable classes of finite skolem chase can all be properly extended by the technique of standard chase? To address this question, we develop a novel technique to characterize the activeness of all possible cycles of a certain length in the standard chase procedure, which leads to the formulation of a parameterized class called k-SAFE(cycle), which guarantees all-instance, allpath termination, where the parameter takes a ...
The chase procedure for existential rules is an indispensable tool for several database applicati... more The chase procedure for existential rules is an indispensable tool for several database applications, where its termination guarantees decidability of these tasks. Most previous studies have focused on the Skolem chase variant and its termination analysis. It is known that the restricted chase variant is more powerful in termination analysis provided a database is given. But all-instance termination presents a challenge since the critical database and similar techniques do not work. We develop a novel technique to characterize the activeness of all possible cycles of a certain length for restricted chase, which leads to the formulation of a parameterized class of finite restricted chase, called k-\(\mathsf {safe}(\varPhi )\). This approach is applicable to any class of finite Skolem chase identified with a condition of acyclicity. More generally, we show that the approach can be applied to the entire hierarchy of bounded rule sets previously only defined for Skolem chase. Experiment...
of the most significant drawbacks that the previously proposed watermarking schemes are suffered ... more of the most significant drawbacks that the previously proposed watermarking schemes are suffered from, is size of the watermark picture which should be of limited length. One possible way out of this bottleneck is going into molecular layers. In this regard, We present the first watermarking model in DNA computing. This scheme can be implemented on an in-vivo computer. The proposed scheme uses the bacteriophage lambda genome for coding watermark image (owner-related information) and the Escherichia coli (E. coli) bacteria genome for coding the host image. The presented coding scheme is based on the silent mutation of codons which produces harmless bacteria and phages. The significant advantage of this scheme over other methods is that the process of embedding the watermark image in the host image takes place naturally in the process of infecting E. coli cells using bacteriophage lambda in lysogenic cycle. The owner of the watermark image can easily extract his information using the ...
Interaction of drugs with proteins, especially Serum albumin (SA), has a great significance in ph... more Interaction of drugs with proteins, especially Serum albumin (SA), has a great significance in pharmacology. SA can affect the biological activity and toxicity of drug. The binding parameters are helpful in the study of pharmacokinetics and the design of therapeutic dosages. Determination of the impact of various factors such as chemical modifications which may occur in vivo is also important when drug binds with albumin to a significant degree. In this study, the effect of some modifications on protein stability, ...
The chase procedure for existential rules is an indispensable tool for several database applicati... more The chase procedure for existential rules is an indispensable tool for several database applications, where its termination guarantees the decidability of these tasks. Most previous studies have focused on the skolem chase variant and its termination analysis. It is known that the restricted chase variant is a more powerful tool in termination analysis provided a database is given. But all-instance termination presents a challenge since the critical database and similar techniques do not work. In this paper, we develop a novel technique to characterize the activeness of all possible cycles of a certain length for the restricted chase, which leads to the formulation of a framework of parameterized classes of the finite restricted chase, called $k$-$\mathsf{safe}(\Phi)$ rule sets. This approach applies to any class of finite skolem chase identified with a condition of acyclicity. More generally, we show that the approach can be applied to the hierarchy of bounded rule sets previously ...
International Journal of Advanced Computer …, 2012
Genetically engineered machines take advantage of the computational power of DNA and seem to be p... more Genetically engineered machines take advantage of the computational power of DNA and seem to be promising in the future of computers. In this paper a solution has been proposed and simulated for securing images in the context of DNA computing. A total of ...
Summary DNA computing is promising in providing primitives of classical cryptography since it pro... more Summary DNA computing is promising in providing primitives of classical cryptography since it provides a variety of advantages over conventional silicon-based computing paradigms. These advantages include massive parallelism and data hiding capability ...
ABSTRACT The ever-growing penetration of communication networks, digital and Internet technologie... more ABSTRACT The ever-growing penetration of communication networks, digital and Internet technologies in our everyday lives has the transmission of text data, as well as multimedia data such as images and videos, possible. Digital images have a vast usage in a number of applications, including medicine and providing security authentication, for example. This applicability becomes evident when images, such as walking or people's facial features, are utilized in their identification. Considering the required security level and the properties of images, different algorithms may be used. After key generation using logistic chaos signals, a scrambling function is utilized for image agitation in both horizontal and vertical axes, and then a block-chaining mode of operation may be applied to encrypt the resultant image. The results demonstrate that using the proposed method drastically degrades the correlation between the image components and also the entropy is increased to an acceptable level. Therefore, the image will become greatly resistant to differential attacks. However, the increasing scrambling rounds and the decreasing number of bits of the blocks result in increasing the entropy and decreasing the correlation.
Uploads
Papers