Vous êtes sur la page 1sur 18

FWCII2013 KUALA LUMPUR

FIRST WORLD CONGRESS ON ISLAMICISATION AND INTEGRATION OF HUMAN ACQUIRED KNOWLEDGE (FWCII 2013)

INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA 23-25 August 2013

PAPER TITLE

The development of Al-Mu`awwidhah (protective) and Al-Dhakirah (memory) computing for improvement of human potentials

A.Faizul Shamsudin , Wan Sabri Wan Yusof , Jamil Hashim , Tg. Mohd. Sembok , Jamaluddin Ibrahim , Fauzan Nordin
Kolej Universiti Islam Sultan Azlan Shah Bukit Chandan Bandar DiRaja Kuala Kangsar 33000 Perak afaizuls@kiperak.edu.my; wansabri@kiperak.edu.my; rector@kiperak.edu.my; www.kiperak.edu.my International Islamic University Malaysia Jalan Gombak, 53100 Kuala Lumpur tmst@iium.edu.my; jamaluddin@iium.edu.my;fauzan@iium.edu.my; www.iium.edu.my

Abstract Key Words: Block-ciphers, dementia, Al-Mu`awwidhah, Al-Dhakirah, pseudo-genes Human potentials may be degraded by private data and memory losses. The purpose of AlMu`awwidhah in protective computing involving unique non-parametric cryptographs is for shielding private data against abnormal attacks (e.g., psycho-analysis, super-natural) on blocks of information (e.g., personal data, medical records). It could be a person who is a possible

FWCII2013 KUALA LUMPUR

target in cyberspace and mobile communication. In another aspect of human potential, the aim of Al-Dhakirah computing is to predict novel genes that may unravel the puzzles of humans incurable memory dysfunctions (dementia). Memory loss may result in social isolation, failed critical missions and even loss of lives. The study of Al-Muawwidhah in protective computing uses a new ethno-mathematical algorithm which recognizes the unique objects of Al-Quran (e.g., Al-Muqatta`ah, Al-Muawwidhah), Al-Hadith (e.g., Hadith Fitan, Hadith Gharar) and expanding objects from ancient languages (e.g, Latin, Aramaic, Syriac, Hebrew, Hindu, Chinese). The study of Al-Dhakirah in memory computing is based on a new recreation mathematical algorithm that can generate life-like artificial or pseudo-genes responsible for memory dysfunctions. A special UCE (unique class encryption) software was built from the new algorithm that can produce a 256 bit block cipher with security strength at par with parametric block ciphers. The development of a special DBrain software based on the new algorithm can produce pseudo-genes that contain some naturalness of the human dementia-related gene motifs and can predict the herbal drugs and treatment required. Further validation would be needed for both the private data protection and memory loss treatment by computing methods of AlMuawwidhah and Al-Dhakirah before they can provide the support to individuals for enhancing their human potentials. The validation would also require human-computing interfaces for users and techno-preneurs or those who wish to capitalize on the user-friendly products.

1. INTRODUCTION When Scot McNealy, CEO of Sun Microsystems , stunned an audience, You have no privacy, now get over it, the truth has been unveiled that in the name of security, human potentials in terms of privacy have been compromised most of the time (Gralla, P., 2006). The art of spyware, hackers, snoopers and individuals who simply want to break into private computers, mobiles and networks has been increasingly perfected to invade a persons privacy. The abnormal method of psycho-analysis and paranormal attacks has been increasingly effective. Perhaps the most disturbing fact of the post-September 11 terrorists aerial attack on key US financial and defense buildings was the Patriots Act passed by the US Co ngress reflective of what was revealed 9 years later as Islam (though he meant extremist Islam) would seem to lie at the center of the American struggle against terrorism and the long commitment to

FWCII2013 KUALA LUMPUR

several overseas wars launched with the Global War on Terror (Fuller, G. E., 2010; Pg.3). This raises the urgent need for Al-Muawwidhah (protective) computing against such pervasive views on individuals privacy anywhere in cyberspace. In the same breath, Neuro Pathology (Ellison et al., 2004) predicted the upsurge in decadence of another aspect of human potentials, dementia or the memory loss syndrome in the 21st century due to amongst others, stressful lifestyles and degraded environments. The affected individuals become socially withdrawn and suffer impairment of speech and sometimes movements, not knowing what to speak nor where to go. This also spells the need for a Al-Dhakirah (memory) computing that may be able to impede the degradation of human dignity. In both cases, the individuals who lost their either privacy or memory, or both may have lost their identity and would become socially isolated and economically alienated. The definition for Al-Muawwidhahtain is rooted from Auz which means to protect and fortify (Al-Quran: Al-Ikhlas, Al-Falak, Al-Nas). Prophet Muhammad (peace and blessings of Allah unto him) recited the Al-Muawwidhatain to form a protective barrier against Shaytan (devils) and their evil magics (Sahih Al-Bukhari: Kitab al-Tibb). The recitation of Ayatul Qursi is believed to be as safeguard from evil spirits (Abdallah, Y. A., 1994; Pg. 37). In general all the Quranic verses can be used as protector of the believers from all the temptations of the devil and as cure of all sicknesses (Abdallah, Y. A., 1994; Pg. 268 ). Thus the main objective of this paper is to discuss the development of algorithms translating the Al-Muawwidhah and AlDhakirah concepts to special mathematics for computing. The outcome may look like magic numbers forming protective shields for blocks of information and almost real-looking genes of life codes. The paper concludes that no-matter how real the computer generated codes may look like a validation process would be needed before they can be accepted by the user.

2. THE ALGORITHMS

The algorithms form the foundations of the software to be developed and are mathematically based. The algorithm for Al-Muawwidhah computing is deeply rooted on a new ethnomathematics of Al-Quran, Al-Hadith and other major spoken languages in the world. Whereas,

FWCII2013 KUALA LUMPUR

the algorithm for Al-Dhakirah computing is based on modified recreational mathematics of recursion. . 2.1 New ethno-mathematics for Al-Muawwidhah computing The broader concept of ethno-mathematics includes all culturally identifiable groups with their jargon, codes, symbols, myths, and even specific ways of reasoning and inferring (DAmbrosio, U., 1997). It emphasizes the importance of ethno-mathematics in increasing the understanding of cultural diversity in mathematical practices. The philosophical argument, however, is that ethno-mathematics may be against the dominant views that mathematical truth is immutable, monolithic, universal and timeless (Gerdes, P., 2001). On the other hand, the epistemological argument for the ethno-mathematics of the Al-Quran encompasses a universal and immutable divine truth for mankind. The special Quranic Al-Muqattaah or sometimes known as Fawatih or openers of chapters such as Yaasiin, Haamiim, Alif-Laam-Miim, Taa-SiiMiim, is that they are mysterious and their true meanings are not known to humans (Abdallah, Y. A., 1994). Yusuf Ali elaborated the eternity of ethno-mathematics in the Quran such as the unseen as in Hellenic thought: Each verse is but a symbol: what it represents is something immediately applicable, and so mething eternal and independent of time and space. (Sherif, 2006; P. 175). Ethno-mathematics is used in the design of the Al-Muawwidhah Substitution-Box (S-Box) or termed at M S-Box which is the most crucial and critical component of the All-Muawwidhah block cipher or as termed in this research the M-Block Cipher, especially their resistance against non-linear and abnormal cryptanalysis (Patarin, J., 2008). In constructing the M S-Box (previously known UCE Unique Class Encryption in a completed resear ch), the Sub-Byte elements in the M-Block cipher, a mapping of m-bit inputs to n-bit outputs. S-box with an m-bit input and an n-bit output is called a m*n-bit S-box. M S-boxes are generally the only non-linear step in an algorithm which gives the M-block cipher its security. The construction of S-Boxes using Bent function (Patarin, J., 2007) for perfect non-linear S-boxes use Maiorana-McFarland method, in order for S-boxes to be resistant against linear cryptanalysis.

FWCII2013 KUALA LUMPUR

Thus using these methods, the construction of Al-Muawwidhah S-Boxes begins with the algorithm of extracting Quranic objects for the M S-Boxes. The object extraction algorithm is based on XOR summation. In comparison, if it is based on modular addition, too many value collisions will be shown. So is modular multiplication which cannot be used because of the incapability of the computer to hold huge multiplication result which will give integer overflow. In XOR summation, let us denote Quranic object Qi as the object that will be extracted, consisting of k Arabic letters sequence from q1, q2, ..., qk1, qk. The extracted value XQi is obtained from Qi through the method below :

K XQi = N=1 qn

Where the value of q1, q2, ..., qk is the least-significant byte UTF-8 value of each single arabic character that varies from 0x81( )to 0x88 ( ), 0x8A (), and 0xA7 () to 0xBA ( ). As a brief example, we extract the value from ( ) by splitting each of the letter as a single form of arabic character, not as the detail form of each letter (i.e. the character is not counted as the initial form of that appeared in the beginning of a word). Therefore, ( ) = 0x85 0x84 0xA7 = 0xA6 (Shamsudin, A.F., et. al, 2009). However, some Quranic and Al-Hadith objects appear repetitively in different parts of the Holy Quran, an inherent property in Quranul Karim and Hadithu Shariff themselves. As such, their objects may be mapped with the same value resulting two different objects Qi and Qj giving the same value. The ethno-mathematics OC (Object Collision) and VC (Value Collision) are introduced. OC is the collision that occurs when two or more identical Quranic and AlHadith objects appear in two different components. VC is the collision that occurs when two or different objects Qi and Qj give the result of the same extraction value.

FWCII2013 KUALA LUMPUR

2.2. New recreational mathematics for Al-Dhakirah computing

The recreation mathematics of Sierpinski gasket (also known as the Sierpinski triangle) or Pascal's triangle is used. By induction, the Sierpinski gasket is Pascal's triangle modulo 2. Since Pascal's triangle consists of binomial coefficients this suggests a question answered by Lucas Theorem : what is the parity of C(n, m)? In other words, when C(n, m) is odd and when is it even? With all entries modulo 2, the result will be exactly that of the applet automation that leads to the Sierpinski gasket. While constructing the puzzle of Towers of Hanoi (TOH), with n (number of discs) growing, it can be shown that the sequence of point sets converges to the Sierpinski gasket. This produces the Hofstader genie (Hofstader, 1986) sequence; ac ab cb ac ba bc ac.

In order to solve the puzzle to produce sequences of a life-like gene to look like CGA CCC GGA AGA and so on, a new recreation mathematics of a double parity Lucas Theorem C1(m, n): C2(m,n) was proposed (Shamsudin et al., 2007). That is when C1(n, m) is odd and when it is even, C2(n, m) is odd when C1(n, m) is even. Or, ODD-EVEN-ODD. This is translated into a split 2-level recursive TOH model based on the bio-molecular phenomena of energy states of DNA nucleotide molecules (Shamsudin, A.F., et al., 2008). It assumes that the recursive split 2-level TOH model would follow the excited, inhibiting, shunting behavior of synaptic signals between N energy states (N discs in TOH) in nucleotides that somehow produce a pseudo-gene expression of natural genes.

The 2 split-level TOH model assumes the movement of N discs between the 3 towers in first level and the next 2 towersin the second level emulating the dynamics of energy states between nucleotide molecules [7]. As an illustration, one can begin with the first level of randomly arranged nucleotides on a C-G-A . A single energy transition (N=1) occurs from nucleotide state (C ) to nucleotide state (A) when the energy potential between the two states increases. Assuming that the nucleotide state (C) is at the higher energy level while the nucleotide state (A) is at the lower energy level. The jump frees the transition energy that moves the DNA motif CA, transferring the free energy from nucleotide state (C ) to state (A). The same free energy moves the DNA motif (AG) when the energy is transferred back from nucleotide state (A) to

FWCII2013 KUALA LUMPUR

nucleotide state (G). This transfer releases the free energy to the second level of nucleotide pairs (A-T)-(G-C), from nucleotide state (G) to the nucleotide pair state (A-T). This moves the DNA motif (GAT) before releasing the free energy to the nucleotide pair state (G-C). As the energy potential increases between state (G-C) and state (A), the free energy moves (GCA) before being released back to state (A). The free energy creates energy potentials between states and moves or produces DNA motifs. When the number of energy transitions increase (N>1), more free energies are available thus moving or recreating more pseudo -gene sequences such as : ATG ATC GCC ATG CAT CGC ATG.

3. METHOD The methodology for Al-Muawwidhah computing is the process of developing an AES (Advanced Encryption Standard) (NIST, 2001) a 256Bit Muawwidhah Block Cipher (or MBlock Cipher) from the new ethno-mathematics. The Al-Dhakirah computing uses the method of generating pseudo-genes from the new recreation mathematics.

3.1. Building a 256Bit M-Block Cipher The method involves the creation of the Muawwidhah S-Boxes (or M S-Boxes) from the ethno-mathematics of extracted objects to build the M-Block Cipher and a key- scheduling algorithm. Let us denote Kr as the key operated to each of the round of the block cipher as the output from key-scheduling algorithm. The Kr is divided into two equal sub-keys of Kr, denoted as KLr and KRr; Kr = KLr KRr

From each of the sub-keys, the SL and SR are produced as the seeds value for the Linear Feedback Shift Register (LFSR) operation using 8-bit XOR-summation on each of the sub-keys.

FWCII2013 KUALA LUMPUR

8 SL = n=1 8 SR = n=1 KRr(n) = KRr(1) KRr(2) ... KRr(8) KLr(n) = KLr(1) KLr(2) ... KLr(8)

SR will be used to generate 22-bit LFSR output, that will split into A = 4 bits, B = 5 bits, C = 5 bits, and D = 8 bits. Later, the value of A, B, C, D will be used to generate random sequence number using another LFSR on each of the component (A Al-Muqattaat, B AlMuawwidzatain, C Ayatul Kursi, and D non-object value) to determine which of the extracted objects that will be put inside as the S-Boxes. Whereas SL will be used to generate 256 sequences, E = i1, i2, ..., i256, of number that will determine the distribution of value from AlMuqattaat, Al-Muawwidzatain, Ayatul Kursi, and the Unappeared Value in order to distribute the extracted value from each components randomly on the S-box. = ABCD i1, i2, i3, ..., i256

LFSR8(SR) LFSR8(SL)

Finally, the M S-Box, denotes as S, is constructed using the random sequence E = i1, i2, i3, ..., i256 as the index of the M S-Box, S, and each of Si will be assigned by the value taken from Al-Muqattaat, Al-Muawwidzatain, Ayatul Kursi, and Unappeared Value orderly by component but randomly by the value of each component . The M S-Box must possess the low differential uniformity that will make the block cipher to resist against the differential cryptanalysis. Likewise, this M S-Box with a non-linear step in the round faction will determine the block-ciphers resistance against linear cryptanalysis.

FWCII2013 KUALA LUMPUR

3.2.

Computer generation of pseudo-genes

The use of the split 2-level TOH recursive energy transition

between nucleotides as

mentioned above, produces a natural looking sequence of pseudo-genes. However, the ability of pseudo-genes, or artificial derivatives of natural genes in predicting new genes, say a mutant gene of a specie, depends on the energy dynamics, structure and biochemistry of the new mutants, similar to the earlier work on synthetic proteins (Karplus, M., 1987). As a start the pathological trace of pseudo-genes can be sequences using both the dry and wet approaches with natural gene motifs to find certain naturalness in the pseudo-gene sequence. A dry approach will be to sequence the wildcat DNA motifs with the pseudo-genes (Satya et al., 2003). The pattern match of pseudo-gene sequence to natural wildcat DNA motifs K45 (ACC) and S67 (CCT).

A wet approach will be to extract natural genes from the brain of animals that are induced with dementia. This would need a DNA extraction and analytical laboratory. The animal (commonly rodents) experiment may use MDMA (3,4 methylene di-oxymetha-mphetamine) which is neural-toxic to the rat brain. It induced changes in expression of 28 genes associated with diverse memory-related activities of the drug-induced rat. It can also be of interest to investigate whether MDMA alters the expression of certain genes in the rat brain. An option can be Poly-L-lysine hydro-bromide another neuro-toxic agent. The target samples were subjected for DNA and GABA extraction and analyses. The corresponding target receptors are subjected for amino acid analysis. The MDMA-treated rats may lead to changes in Q-amino butyric acid (GABA) transporters.

In both the dry and wet approaches described above, the prediction of the structure of the related receptor genes begins with the specific question: given two gene sequences (one pseudoartificial and other the natural gene) that differ by several DNA motifs can one predict the structure of the artificial mutant from the known structure of the natural gene sequence?

FWCII2013 KUALA LUMPUR

4. RESULTS Using the methods of building the M-Block Cipher for Al-Muawwidhah computing and the computer generation of pseudo-gene sequences for Al-Dhakirah computing, the results are shown below. These include the algebraic test values for the non-parametric M-Block Cipher which would indicate its algebraic security strength. The results for the DBrain pseudogenes would also include their desirability factors which may reflect their naturalness and their use for predicting new mutants.

4.1. M-Block Cipher Al-Muawwidhah software (or M-code) uses new ethno-mathematical algorithms to extract non-parametric objects to construct S-Boxes for a 256 M-Product cipher as shown below in Figure 1.
equal value 0 found in 136 and 255 equal value a8 found in 138 and 228 equal value b2 found in 139 and 176 equal value 3 found in 141 and 163 equal value be found in 143 and 198 equal value 16 found in 144 and 249 equal value 0 found in 146 and 147 equal value 0 found in 146 and 149 88 00 00 12 00 00 0e 24 9c 3f 00 18 2a 1c 8a 86 87 21 00 23 00 8c a9 bc 31 00 94 3a 36 2d 00 98 00 26 00 8c 80 89 a2 00 03 19 00 00 b1 00 00 00 8b a1 1f 00 00 00 2d b8 ff ad 04 94 00 1a 00 00 00 17 0a 95 a4 a3 0f 8a 00 a3 00 8b 00 88 00 06 00 a2 13 0b 00 00 92 39 91 05 b2 3d a7 00 3b 00 00 a9 00 00 37 3c 00 00 1f 14 00 83 00 97 20 00 00 00 20 00 00 81 b5 22 37 00 1d 00 34 00 b7 00 aa 93 07 2f 9f 15 00 00 00 2c 83 00 bb 1e 09 00 06 00 25 85 22 00 00 32 00 00 16 be 17 00 b9 00 0b 2c 32 a8 16 26 92 90 a6 8d 29 00 00 00 00 b6 00 00 a6 84 00 00 10 bf 8f 00 82 11 00 ba 84 35 04 30 96 00 14 00 0d 99 b4 23 b1 9f bd 0a 00 a4 00 b0 13 28 27 00 9d 00 28 81 08 00 30 4e 00 00 00 ac 00 2e 00 0f b2 00 09 00 00 39 00 86 b3 00 82 00 3e 05 9a 00 38 b0 be 03 a8 00 00 a0 00 33 value 88 found in 0 and 77 equal value 0 found in 1 and 2

Figure 1. Segment of computer generated Al-Muawwidhah objects extractions

Figure 1 shows M-code runs produce patterns with non-parametric and parametric random M S-Boxes. The sources of non-parametric objects derived from the ethno-mathematics

10

FWCII2013 KUALA LUMPUR

are from the Quranic Auz (Muawwidhatain, Al-Muqattaah, Ayatul Qursi, Suratul Kahfi), AlHadith ( Fitan, Gharar) and spoken languages (Latin Alphabet, Chinese Kanji, Indian Sanskrit).The M-code randomly constructs the M-Block Cipher with omissions of objects that have OC and VC values. Using the special ethno-mathematics, 13 Al-Muqattaat objects, 19 AlMuawwidhah objects and 17 Ayatul Qursi objects are derived. Other objects are collected from various parts of the Quran based on unique phenomena reported in the Al-Hadith. This include object extraction from several Quranic themes such as Isra wal Miraj, Asmaul Husna, Lailatul Qadr, Ummul Quran (Al-Fatihah) and Juz Amma and the Al-Hadith themes of Fitan and Gharar. Another example is the ethno-mathematical extractions made from the Indian, Hebrew and Turkish linguistic objects. The Indian objects were successfully extracted that could reach the hexadecimal values 0xC0 until 0xCF. Hebrew objects extracted reached hexadecimal values 0xE0 until 0xEF while that of Turkish reached hexadecimal values from 0xF0 until 0Xff.

Unicode gives hexadecimal value from 0xF0 until 0Xff. At this point there were already about 176 bits of objects. In order to fulfill the rest of objects, more extract values are derived from other Surah and selected Al-Hadith. The generated values are scattered from 0x40 until 0x7F which eventually reached 216 Bits and the rest are non-extracted objects with 40bit of random Sub-Bytes. In one run of the M-code for a few seconds had generated about 13.8 million of 8-Bit M S-Boxes. The non-linearity (NL) and differential uniformity (DU) values indicated the current strength of M Block Cipher to be at par with Khazad and Annubis Block Ciphers (Shamsudin, A.F., et al., 2008).

4.2. DBrain pseudo-genes

Al-Dhakirah computing software using new recreation mathematical algorithm to produce pseudo-genes extracts gene motifs from natural gene related to dementia (e.g., GABA) data based on Codon table. Frequencies of gene motif scores are determined and the desirability factor are computed to select which pseudo-gene template can be used to predict the mutants. The subsequent data mining for biomarker proteins with their associated grid-based auto-

11

FWCII2013 KUALA LUMPUR

docking for target drug chemical structure may predict the target herbal nutrients for predementia. This may lead to the range of herbal plants that would match with the target drug chemical structure identified. The difference between the maximum and minimum fitness factors or the desirability factor between the natural gene and the pseudo-gene sequences reflects how desirable the computer generated pseudo-gene sequence will be identified for herbal drug and disease predictions from a particular animal or plant species. Tables 1a, 1b and 1c below show the results of desirability factors of the family of 10 pseudo-gene sequences calculated using grid computing. The grid-computing based desirability factor of 0.731 for the pseudo-gene sequences in the family of pseudo-genes may seem feasible for further analysis.
Tables.1a, 1b and 1c : Grid computing result of desirability factor for a family of 10 artificial pseudo-gene sequences to natural human dementia DNA motifs (ACA, AGG, GAA, GAT, TTT, CCC, TGA, GTG, CCT, TAG, TGG, ATT) from GABBR1 gene sequence
Table 1a. 12:05:54 - 110/10/26. The desirability factor is: 0.640000 Gene Motifs
2012 ACA AGG GAA GAT TTT CCC TGA GTG CCT TAG TGG ATT

10SEQ Fri Nov 26 12-12-28 2010(1).txt 13 10SEQ Fri Nov 26 12-12-28 2010(2).txt 7 10SEQ Fri Nov 26 12-12-28 2010(3).txt 10 10SEQ Fri Nov 26 12-12-28 2010(4).txt 19 10SEQ Fri Nov 26 12-12-28 2010(5).txt 10 10SEQ Fri Nov 26 12-12-28 2010(6).txt 9

26 26 22 19 24 25 18 30 18

8 7 6 15 13 14 13 15 14

5 7 9 5 12 13 6 14 10

2 3 2 4 1 5 5 4 9

23 30 28 33 36 28 26 36 29

15 11 26 12 8 12 8 12 9

16 27 15 22 16 31 26 21 22

11 19 17 14 15 14 15 13 18

7 5 11 10 17 18 10 6 15

20 20 11 22 25 27 18 13 24

8 3 5 4 8 6 12 4 8

10SEQ Fri Nov 26 12-12-28 2010(7).txt 11 10SEQ Fri Nov 26 12-12-28 2010(8).txt 13 10SEQ Fri Nov 26 12-12-28 2010(9).txt 8

Table 1b. 12:12:28 - 110/10/26. The desirability factor is: 0.562500 Gene Motifs
2012 ACA AGG GAA GAT TTT CCC TGA GTG CCT TAG TGG ATT

10SEQ Fri Nov 26 12-44-21 2010(1).txt

29 18 25 15 24 23 21 22 21

5 12 11 14 10 14 15 8 6

8 15 12 10 6 13 10 1 7

5 4 2 5 8 4 3 3 6

31 30 21 43 37 24 27 34 32

8 10 10 18 16 9 15 15 10

22 21 15 10 21 26 20 18 20

9 19

10 15 18 18 6

22 10 12 9 7 25 19 16 20 17 22 18 20

3 6 6 3 4 3 9 6 5

10SEQ Fri Nov 26 12-44-21 2010(2).txt 15 10SEQ Fri Nov 26 12-44-21 2010(3).txt 13 10SEQ Fri Nov 26 12-44-21 2010(4).txt 16 10SEQ Fri Nov 26 12-44-21 2010(5).txt 14 10SEQ Fri Nov 26 12-44-21 2010(6).txt 13 10SEQ Fri Nov 26 12-44-21 2010(7).txt 9

11 10 13 18

16 16 15

10SEQ Fri Nov 26 12-44-21 2010(8).txt 15 10SEQ Fri Nov 26 12-44-21 2010(9).txt 10

12

FWCII2013 KUALA LUMPUR

Table 1c. 12:44:21 - 110/10/26. The desirability factor is: 0.713693 Gene Motifs
2012 ACA AGG GAA GAT TTT CCC TGA GTG CCT TAG TGG ATT

10SEQ Fri Nov 26 12-45-38 2010(1).txt

25 19 24 29 30 16 29 22 24

15 15 12 13 17 17 12 14 8

12 9 14 9 10 13 8 12 6

8 3 4 6 4 5 3 2 4

26 30 23 29 23 31 28 32 23

13 13 13 9 6 15 7 12 10

19 26 29 21 35 19 13 20 18

14 16 24 13 20 19 24 12 16

11 9 7 14 14 6 18 13 11

18 20 21 21 14 14 18 18 16

9 1 6 4 6 10 2 4 6

10SEQ Fri Nov 26 12-45-38 2010(2).txt 13 10SEQ Fri Nov 26 12-45-38 2010(3).txt 10 10SEQ Fri Nov 26 12-45-38 2010(4).txt 17 10SEQ Fri Nov 26 12-45-38 2010(5).txt 15 10SEQ Fri Nov 26 12-45-38 2010(6).txt 10SEQ Fri Nov 26 12-45-38 2010(7).txt 9 8

10SEQ Fri Nov 26 12-45-38 2010(8).txt 22 10SEQ Fri Nov 26 12-45-38 2010(9).txt 11

The high-end parallel computing such as grid, cloud or multi-core computers are used to produce pseudo-genes from millions to billions of sequences within a short time. The input for the high-speed computing is the gene motif sequence of a DNA sequence of interest to the person with pre-senile memory loss problem. For example, the indication of the pre-senile artificial gene sequence was found from the result of superimposing the DNA motifs of a human receptor gene called delta GABARD chromosome 1 of a dementia human, on the pseudo-gene sequence.

5. DISCUSSIONS

The random voids in Figure 1 indicate the need to explore new objects values in AlMuawwidhah computing which could be from Aramaic letters. They are used in early days of civilization and may be able to fill up the unknown 40-bit S-Boxes. Aramaic is spoken in many countries such as Israel, Armenia, Georgia, Turkey, Iran, Iraq but nowadays it's not called Aramaic, it is been called Surit, Kurdit, Turoyo, Assyrian, etc. Scholars frequently call all these "Neo-Aramaic. The Syriac belongs to Aramaic family language. Unfortunately, the hex values of those objects still fall in Value Collision (VC) values. Thus these objects can be expanded and used in the future in order to enhance the M S-Boxes. The other possibility is the extraction of objects from the mysterious Jawi Scripts in the Malay world. The true coded meanings behind the Jawi Scripts, may remain a mystery up to today. It may hold the Da Vinci code of the Malay world for the unbreakable information security and the secret link that kept the Malay

13

FWCII2013 KUALA LUMPUR

world well communicated. Possibly, other special characters of Jawi Scripts in other parts of the Malay world may fit in the jig-saw puzzle to solve the 40 Bit void.

The special Jawi Scripts may be extracted from sources in Risalah of Sheikh Yusuf: AlTuhfat al-Sailliyya, Hubbul-Ward, Tuhfat Al-Labib studied from 7 wali of Gunung Bawakaraeng. The other is the Rajang system similar to Hindu Nakshatras and Arabic Anwa: Haribulan 21 arang, arang, harang, harang . The Chinese images in Syair Rajang, Syair Rakis, Silsilah Raja-Raja Berunai, Shaer Yang Di-Pertuan too can be the sources. In essence, the knowledge of Firasat in Hikayat Hang Tuah, Taj-al-Salatin, Bustan al-Salatin, Naqlin Bustanul al-Arifin, Tajul Muluk: Firasat Qiafat: dahi sempit-kurang budi dan bicara; tubuh warna merah lagi halus-pemalu may hold these potential Jawi Scripts [Shamsudin, A. F., et. al., 2012).

The results in Tables 1a, 1b and 1c from Al-Dhakirah computing are approximate in that the energy functions are empirical and that the energy recursions, searches, and dynamics are limited by the large computing times and memory use for the generation of pseudo-gene sequences. The energy states can reach even higher then N=49 because of the new 2-level split TOH algorithm. These may assume to be providing free energy for reproduction of billions of pseudo-genes sequences. The question is whether such large multi-billion pseudo-gene sequences are necessary for determining the desired pseudo-gene family? For example, the number of energy states, N=14, releasing more free energies thus moving or producing more pseudo-gene sequence up to about 80,000 nucleotides in length. A possible natural receptor gene responsible for memory-loss with its related DNA motifs may be identified. In Tables 1a, 1b and 1c above, artificial pseudo gene-to-natural DNA motif of dementia gene GABBAR sequencing show indicative desirability factors from 0.54 to 0.731 (Shamsudin, A.F., et. al., 2012). This is comparable to natural-to-natural DNA motif sequencing of wildcat gene with a desirability factor of 0.671 (Satya et al., 2003).

14

FWCII2013 KUALA LUMPUR

6. CONCLUSION AES equivalent 256bit Al-Muawwidhah S-Box construction is now possible with the nonparametric Al-Quran and Al-Hadith objects. However, the algebraic attack test is still a debatable cryptanalysis technique, especially its complexity. In practice though, the algebraic attack is still difficult to be implemented in the real world. The gap that exists between the current situation in modern cryptography and the idea of this research has been connected. The argument however, is to test the real-world security strength of the M-Block Cipher to be resistance against abnormal and para-normal attacks. The validation of such attacks may need to follow strict compliance to shariah principles such as avoiding Shirik and Khurafat. However, the possibility of a successful development of the non-parametric Al-Muawwidhah M-Block Ciphers have been shown. The challenge now will be the implementation of the validated Mcode in hardware and firmware for computer security devices.

In Al-Dhakirah computing, the recreation of the most pivotal unit of life or pseudo-gene sequence is now possible with the high speed computer. The question is, will it create controversies of heresy and man playing God? On the contrary, the use of meta-magical themes in recreation mathematics enhances Gods handiworks. Al-Muawwidhah and Al-Dhakirah computing with the respective M-codes and DBrain codes derived in this research may be embedded in systems that can enhance or at least sustain human potentials of privacy (Aurad) and dignity ( Maruah).

REFERENCES

Abdallah Yusuf Ali (1994). The Holy Quran-Text

and Translation, Kuala Lumpur: Islamic

Book Trust ; Al-Ikhlas, Al-Falaq, Al-Nas, Pg. 634-635.

15

FWCII2013 KUALA LUMPUR

Abdallah Yusuf Ali (1994). The Holy Quran-Text Book Trust; Al-Baqarah; v.255, Pg. 37.

and Translation, Kuala Lumpur: Islamic

Abdallah Yusuf Ali (1994). The Holy Quran-Text Book Trust ; Al-Isra; v. 82, Pg. 268.

and Translation, Kuala Lumpur: Islamic

Jacques Patarin (2008). Generic Attacks on Feistel Schemes, International Association for Cryptologic Research ePrint Archive.

Jacques Patarin,Valerie Nachef and Come Berbain (2007). Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions, International Association for Cryptologic Research ePrint Archive. DAmbrosio,U. (1997). Ethnomathematics and its address in the history and pedagogy of mathematics, In Powell,A.B. and Frankenstein,M., editors, Ethnomathematics. Challenging Eurocentrism in Mathematics Eucation, pages 13-24, State University of New York Press, Albany NY.

Ellison, D., Love., S., Chimelli, L., Harding, B. N., Lowe J. and Vinters, H. V. (2004). NeuroPathology, Mosby Publications, London.

Fuller, G. E. (2010). A world without Islam. Little, Brown and Company, New York. Gralla, P. (2009). How personal & internet security work (4 th Ed.), Que Publishing, USA.

Hofstadter, D.R. (1986). Metamagical themas: questing for the essence of mind and pattern. Penguin Books, p.430, a. 483 to 525.

Karplus, M. (1987). The prediction and analysis of mutant structures. Protein Engineering, pg. 35- 44, Alan R. Liss, Inc., 1987.

16

FWCII2013 KUALA LUMPUR

National Institute of Standards and Technology (2001),

Federal Information Processing

StandardsPublication197,AdvancedEncryptionStandards,http://csrc.nist.gov/publications/fips/fip s197/fpf- 2001). Sahih Al-Bukhari: Kitab al-Tibb, Bab Ruqyah al-Nabiyy.Narration by Aisha on the superiority of the Al-Muawwidhah.

Satya, R.V., Mukherjee, A. & Ranga, U. (2003). A pattern matching algorithm for codon optimization and CpG motif engineering DNA expression vector. Proceedings of the Computational System Bioinformatics, CSB03, IEEE.

Shamsudin, A. F., Md. T. Azhar, F. Salih, H., Md Noon, A. R. Ahlan and M. A. Suhaimi (2007). The use of LISP genies as meta-magical themas in solving the neuro-degeneration puzzle. Proceedings for International Conference in Bio-informatics and Biotechnology, ICBio07, Kuala Lumpur.

Shamsudin, A.F, Azhar Md. T., Salih, F., MdNoon, H., Ahlan, M.. A., Suhaimi, M. A.BalFagih, Z., Ibrahim, N., Mohd. Badri, F. (2008). Pattern matching algorithms for artificial to natural DNA codes of a dementia brain. IEEE Proceedings for International Conference on Communication and Computer Engineering, ICCCE08, May 2008. IEEE Catalog Number CFP0839D ISBN: 978-1-4244-1692. Library of Congress: 2007936374.

Shamsudin, A.F., Jamil Hashim, Wan Sabri Wan Yusof, Abd Rahman Najib (2012). The potential of Jawi ethno-mathematics in Al- Muawiddhah (Protective) computing against paranormal attacks, Proceedings Seminar Tulisan Jawi dan Teknologi, Universiti Malaysia Pahang, Gambang Pahang.

Shamsudin, A.F., Hussin, U.S., Zainuddin, A. M., Jamaludin Ibrahim, and Suhaimi, M.A. (2012). Computer generated artificial genes: from delusions to reality. Al-Tahqafah Global Journal Scorpus cited abstract and proceedings of World Conference on Islamic Thought contemporary challenges and realities, WCIT2012, Sept. 11-12, Ipoh.

17

FWCII2013 KUALA LUMPUR

Shamsudin, A.F., Ibrahim, Jamaludin Ibrahim, Tg. Mohd. Tg.Sembok, Fauzan Nordin, Jamil Hashim,Wan Sabri Wan Yusof (2013), Development of Al-Muawwidhah computing for personal data protection against abnormal attacks, paper abstract accepted for ICT4M International Conference, Rabat Morocco.

Sherif, M.A. (2006). Searching for solace: a biography of Abdullah Yusuf Ali, an interpreter of the Quran. 4th Edition, Islamic Book Trust, Kuala Lumpur.

18

Vous aimerez peut-être aussi