Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
This study found that one of the constructive, necessary, beneficial, most effective, and cost-effective ways to meet the great challenge of rising energy prices is to develop and improve energy quality and efficiency. The process of improving the quality of energy and its means has been carried out in many buildings and around the world. It was found that the thermal insulation process in buildings and educational facilities has become the primary tool for improving energy efficiency, enabling us to improve and develop the internal thermal environment quality processes recommended for users (student - teacher). An excellent and essential empirical study has been conducted to calculate the fundamental values of the
... Show MoreThis study was conducted on Lake Hamrin situated in Diyala governorate, focal Iraq, between latitudes 44º 53ʹ 26.16 '- 45º 07 ʹ 28.03ʺ and 34º 04ʹ 24.75ʺ ــ 34º 19ʹ 12.74ʺ . As in this study, the surface area of Hamrin Lake was calculated from satellite images during the period from October 2019 to September 2020, with an average satellite image for each month, furthermore,by utilizing the Normalized Differences Water Index (NDWI), the largest surface area was 264,617 km2 for October and the lowest surface area 140.202 km2 for September. The surface temperature of the lake water was also calculated from satellite images of the Landsat 8 satellite, based on ban
... Show MoreAbstract
This study aims to identify the reality of using electronic applications in teaching language skills to people with mild intellectual disabilities from the mothers’ perspective. A descriptive approach was used. The electronic questionnaires were administered to the study sample, 122 responses were received from mothers of the students with mild intellectual disability in Hafer Al-Baten schools. The response average rate was 94%. The results showed that there are statistically significant differences that are related to the variant of monthly income as for the barriers to using electronic applications in such schools, whereas there were no differences regarding the variant of monthly income regarding t
... Show MoreThis research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type (5052-O).
The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot. &nbs
... Show MoreBackground: Because of its clinical and surgical importance and lack of precise information about this rare and important anatomical landmark, this study was designed to detect the presence, configurations and length of Mandibular Retromolar Canal (MRMC) with aid of CBCT visualization. Materials and methods: In this retrospective study the data was obtained from Specialist Health Center in AL-Sadder city in Baghdad for (100) patients with 200 inferior dental canal, all of them referred to CBCT scan (Kodak 9500, French origin). The scanning was done with tube voltage 90 kVp, tube current with 10mA and exposure time was 10 s., the field of view was measured with 5cm x 3.7cmwith 0.03mm voxel size Results: In the present study the prevalence of
... Show MoreBackground: The aims of the study were to evaluate the unclean/clean root canal surface areas with a histopathological cross section view of the root canal and the isthmus and to evaluate the efficiency of instrumentation to the isthmus using different rotary instrumentation techniques. Materials and Methods:The mesial roots of thirty human mandibular molars were divided into six groups, each group was composed of five roots (10 root canals)which prepared and irrigated as: Group one A: Protaper system to size F2 and hypodermic syringe, Group one B: Protaper system to size F2 and endoactivator system, Group two A:Wave One small then primary file and hypodermic syringe, Group two B:Wave One small then primary file and endoactivator system, Gr
... Show MoreFraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show Moreفعالية الوثب العالي تمتاز بالتكرار والممارسة لمراحل التسلسل الحركي بالتكرارات الصحيحة المصحوبة بالتغذية الراجعة من اجل الوصول إلى اداء افضل, ومن خلال عمل الباحثتان كونها تدريسية لمادة الساحة والميدان لاحظت ضعفا في مستوى الأداء الفني عند الطالبات في ضبط مراحل التسلسل الحركي الكامل لفعالية الوثب العالي ، لذا ارتأت الباحثتان اعداد تمرينات خاصة باستخدام أساليب التنافس حمل المتعلم على مضاعفة جهده لينافس ذاته
... Show More