Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
The research team seeks to study the phenomena of random housing in Iraqi society in general and Baghdad city in particular by standing on the causes behind this phenomena and its relation with security situation in Baghdad. The researchers adopted a theoretical and practical framework. The main objective is to diagnose the risks caused by the escalation of slums in Baghdad city.
The research seeks to identify the contemporary events that face the use of electronic payment methods to localize the salaries of state employees and its impact in enhancing the mental image of customers, and to achieve this purpose from the fact that a questionnaire was designed and distributed to an optional sample of (31) individual customers (employees) dealing With the researched private banks, it has been analyzed and reached a number of conclusions and recommendations, the most prominent of which is the lack of modernity of electronic payment methods by customers, which is reflected in the mental image of customers and the achievement of their satisfaction, in the Emiratization project for salaries needs an advanced leade
... Show MoreQuality control is an effective statistical tool in the field of controlling the productivity to monitor and confirm the manufactured products to the standard qualities and the certified criteria for some products and services and its main purpose is to cope with the production and industrial development in the business and competitive market. Quality control charts are used to monitor the qualitative properties of the production procedures in addition to detecting the abnormal deviations in the production procedure. The multivariate Kernel Density Estimator control charts method was used which is one of the nonparametric methods that doesn’t require any assumptions regarding the distribution o
... Show MoreMedian filter is adopted to match the noise statistics of the degradation seeking good quality smoothing images. Two methods are suggested in this paper(Pentagonal-Hexagonal mask and Scan Window Mask), the study involved modified median filter for improving noise suppression, the modification is considered toward more reliable results. Modification median filter (Pentagonal-Hexagonal mask) was found gave better results (qualitatively and quantitatively ) than classical median filters and another suggested method (Scan Window Mask), but this will be on the account of the time required. But sometimes when the noise is line type the cross 3x3 filter preferred to another one Pentagonal-Hexagonal with few variation. Scan Window Mask gave bett
... Show MoreThe survey showed sample opinions of officials in the general company for vegetable oils industry, and the statement of the order of the effect of these dimensions depending on the degree of importance, the questionnaire was used as a key tool in collecting data and information of the sample consisted of 30 officials, arithmetic mean, standard deviation, percentages, Spearman correlation coefficient and the global statistical analysis as a statistical methods that based on statistical program (SPSS), The researcher came to several conclusions, most important that there is high agreement by the respondents of the importance of the dimensions of building a mental picture of the company and to attract the consumer's attention, Also research
... Show MoreRepresent the current study and tagged (the credibility of digital image and its reflection on the process of cognitive picture releases) scientific effort is designed to detect realizing press releases and the extent affected the credibility of the digital image by selecting the relationship between digital photo and the extent of their credibility on the one hand and between the process of cognition and Press Photo of the hand Other than the consequent establishment researcher collects materials to serve the scientific research topic in three chaptersCombine the first one methodological framework for the search of the research problem and its significance and the desired objective be achieved together with the definition of the most im
... Show MoreCommunity detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a
... Show MoreThis research sheds light on the development that has occurred on the use of press pictures in the Iraqi press by analyzing the form and content of the images used in (Al-Sabaah) newspaper for the 2012 model. The researcher's interest in this topic for what represented by the press picture of a way to highlight and attract the reader's attention to the substance journalist who represents the goals behind the newspaper publishing.
This research is divided into three sections. The first one dealt with the methodological framework of the research, and the second part addressed the aspect of press pictures and its history and technological development, while the third section devoted to the study of the development of the form and co
... Show MoreIn cognitive radio system, the spectrum sensing has a major challenge in needing a sensing method, which has a high detection capability with reduced complexity. In this paper, a low-cost hybrid spectrum sensing method with an optimized detection performance based on energy and cyclostationary detectors is proposed. The method is designed such that at high signal-to-noise ratio SNR values, energy detector is used alone to perform the detection. At low SNR values, cyclostationary detector with reduced complexity may be employed to support the accurate detection. The complexity reduction is done in two ways: through reducing the number of sensing samples used in the autocorrelation process in the time domain and through using the Slid
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show More