Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
BMMAM Saleh, EUROPEAN ACADEMIC RESEARCH, 2016
Four photosensitizers were used to test inhibitory effect of Helicobacter pylori bacteria using
low power helium: neon red laser radiation. Biopsies were collected from 176 patients and H. pylori were
isolated, identified and bacterial suspension was prepared. Samples of this suspension were mixed with
various low concentrations of the test sensitizer. The mixture samples were exposed to different laser
radiation doses. The samples were then inoculated and the inhibition zones were studied and compared
with their analogues of control samples. The most effective sensitizer with optimum concentration and
irradiation dose was determined. Statistical analysis of results was performed. The sensitizers' toluidine
blue and
Aim This study is an overview of NPEV investigated during AFP surveillance programs for the period 2010–2017 in Iraq. Methods Stool samples from 4296 AFP cases and 2933 healthy contacts among children less than 15 years of age were processed for virus isolation as a part of AFP surveillance for the Global Polio Eradication Program in Iraq at National Polio Laboratory. NPEV detection was performed by virus isolation on cell culture according to WHO recommendations. Results The NPEV isolation rate was 14% of total AFP cases and 14.5% of healthy contacts. The infection rate was higher in males than females with a male/female ratio of 1.5: 1. The highest NPEV infection rate was observed among the children aged 1-2 years and decrease significa
... Show MoreLas diferencias entre el pretérito perfecto simple y el imperfecto son uno de los temas más complejos de la lengua española, no sólo para el estudiante, sino para el profesor, puesto que sistematizar los casos y hacerlos fácilmente comprensibles al alumno es tarea difícil. Los profesores de lengua, cuyas investigaciones han dado lugar a una serie de teorías y de corrientes metodológicas y didácticas que permiten enfocar la enseñanza de una lengua extranjera de manera muy distinta a como se hacía tradicionalmente. Vamos a repasar muy brevemente cuáles son estas teorías.
En primer lugar es necesario señalar en qué consiste el aprendizaje de una segunda lengua:
"El aprendizaje de una segunda lengua (L2) es el
... Show MoreIn this paper, the Magnetohydrodynamic (MHD) for Williamson fluid with varying temperature and concentration in an inclined channel with variable viscosity has been examined. The perturbation technique in terms of the Weissenberg number to obtain explicit forms for the velocity field has been used. All the solutions of physical parameters of the Darcy parameter , Reynolds number , Peclet number and Magnetic parameter are discussed under the different values as shown in plots.
The theory of the epic theater has received wide attention by filmmakers around the world because of its great impact on the artistic work of the theater and its relationship with societies, and among these directors the Iraqi directors have been influenced by the epic theater and its applications in the show.
In order to find out the effectiveness of these influences on the Iraqi director, I found the need to do this study, which was divided into an introduction and a theoretical framework that included two topics. The first topic (Philosophical References and the Intellectual Foundations of the Epic Theater Theory) deals with the philosophical foundations that crystallized the epic theory of Burch and the mechanism of working
The current research studies the digital techniques in order to identify the treatments with graphic techniques for the theatrical scene, which includes a number of programs and treatment tools with digital technique to identify the visual and aesthetic dimensions and outputs achieved in the design of the theatrical scene in addition to the options, that they provide in the design of a system of hypotheses for the theatrical world, In order to be an experimental mediator in achieving the creative hypothesis, which limited the research with a pivotal objective which is: identifying the digital techniques employed in the graphic digital design for the scene in the theatrical show. The research lies in its objective limits stated in the met
... Show MoreIn this paper, we have investigated some of the most recent energy efficient routing protocols for wireless body area networks. This technology has seen advancements in recent times where wireless sensors are injected in the human body to sense and measure body parameters like temperature, heartbeat and glucose level. These tiny wireless sensors gather body data information and send it over a wireless network to the base station. The data measurements are examined by the doctor or physician and the suitable cure is suggested. The whole communication is done through routing protocols in a network environment. Routing protocol consumes energy while helping non-stop communic
... Show More