Preferred Language
Articles
/
bsj-5060
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The eloquence of the poetic image in the poetry of the Andalusian son of Labanism is a stylistic approach
...Show More Authors

The resort to the eloquence of the poetic image as a style reveals the poet's creativity and creativity in dealing with external influences, and reflect them with emotional images express a sense of intense emotional imagination, and this imagination stems from the experience of a poetic sense of truth, tasted by the recipient before the creator of the poetic text.

View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Hybrid Solar Air Conditioning System using a New Control Strategy
...Show More Authors

Enhancement of the performance for hybrid solar air conditioning system was presented in this paper. The refrigerant temperature leaving the condenser was controlled using three-way valve, this valve was installed after the compressor to regulate refrigerant flow rate towards the solar system. A control system using data logger, sensors and computer was proposed to set the opening valve ratio. The function of control program using LabVIEW software is to obtain a minimum refrigerant temperature from the condenser outlet to enhance the overall COP of the unit by increasing the degree of subcooled refrigerant. A variable load electrical heater with coiled pipe was used instead of the solar collector and the storage tank to simulate the sola

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key
...Show More Authors

Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning
...Show More Authors

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 10 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Importance of Using the Internet of Things in Education
...Show More Authors

The subject of the Internet of Things is very important, especially at present, which is why it has attracted the attention of researchers and scientists due to its importance in human life. Through it, a person can do several things easily, accurately, and in an organized manner. The research addressed important topics, the most important of which are the concept of the Internet of Things, the history of its emergence and development, the reasons for its interest and importance, and its most prominent advantages and characteristics. The research sheds light on the structure of the Internet of Things, its structural components, and its most important components. The research dealt with the most important search engines in the Intern

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (13)
Scopus Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Detection of Road Traffic Congestion Using V2V Communication Based on IoT
...Show More Authors

Intelligent Transportation Systems (ITS) have been developed to improve the efficiency and safety of road transport by using new technologies for communication. Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) are a subset of ITS widely used to solve different issues associated with transportation in cities. Road traffic congestion is still the most significant problem that causes important economic and productivity damages, as well as increasing environmental effects. This paper introduces an early traffic congestion alert system in a vehicular network, using the internet of things (IoT) and fuzzy logic, for optimizing the traffic and increasing the flow. The proposed system detects critical driving conditions, or any emerge

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Constant and the Variable in the Aesthetic Image of the Theatrical Direction: حازم عبد المجيد إسماعيل
...Show More Authors

The theatre is one of the main pillars of the human aesthetic thinking as it contains logical explanations for the public human life aspects outside time and environment. When we find that the directive philosophical thinking moving away from the stylistic constants and the virtual laws in taboos that control the accomplishment in terms of the traditional shapes, the employment and the theatrical reception. Some directors moved in post-modernism concepts in a perceptive that liberates thought from its natural context in thinking into an innovative perceptive. The aesthetic images are the basic premise in the prohibition of the philosophical thinking interpretation in order to move the directive thinking and this movement depends on the v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Mar 12 2020
Journal Name
Al-khwarizmi Engineering Journal
Improving Reverse Engineering Processes by using Articulated Arm Coordinate Measuring Machine
...Show More Authors

The invention relates to a coordinate measuring machine (CMM) for determining a measuring position of a probe. The AACMM isdepends on the robotkinematics (forward and reverse) in their measurementprinciple, i.e., using the AACMM links and joint angles todetermine the exact workspace or part coordinates. Hence, themeasurements are obtained using an AACMM will be extremely accurate and precise since that ismerely dependent on rigid structural parameters and the only source of measurement error is due to human operators. In this paper, a new AACMM design was proposed. The new AACMM design addresses common issues such as solving the complex kinematics, overcoming the workspace limitation, avoiding singularity, and eliminating the effects of

... Show More
View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
ФОРМИРОВАНИЕ КОММУНИКАТИВНО-РЕЧЕВОЙ КОМПЕТЕНЦИИ СТУДЕНТОВ КАФЕДРЫ Р The formation of verbal communication for students of Russian Language Department at College of Languages at University of Baghdad by using multiple technological means
...Show More Authors

В статье рассматривается вопрос об использовании мультимедийных средств для оптимизации процесса формирования коммуникативной компетенции  в иракской аудитории с привлечением компьютерных технологий. Статья посвящена  использованию мультимедийных технологий  и  различных  приемов формирования интереса к русскому языку. Включение в процесс обучения коммуникативно-значимого, аутентичн

... Show More
View Publication Preview PDF