Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
This paper is concerned with finding solutions to free-boundary inverse coefficient problems. Mathematically, we handle a one-dimensional non-homogeneous heat equation subject to initial and boundary conditions as well as non-localized integral observations of zeroth and first-order heat momentum. The direct problem is solved for the temperature distribution and the non-localized integral measurements using the Crank–Nicolson finite difference method. The inverse problem is solved by simultaneously finding the temperature distribution, the time-dependent free-boundary function indicating the location of the moving interface, and the time-wise thermal diffusivity or advection velocities. We reformulate the inverse problem as a non-
... Show MoreUsing a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were spe
... Show MoreThe Weibull distribution is considered one of the Type-I Generalized Extreme Value (GEV) distribution, and it plays a crucial role in modeling extreme events in various fields, such as hydrology, finance, and environmental sciences. Bayesian methods play a strong, decisive role in estimating the parameters of the GEV distribution due to their ability to incorporate prior knowledge and handle small sample sizes effectively. In this research, we compare several shrinkage Bayesian estimation methods based on the squared error and the linear exponential loss functions. They were adopted and compared by the Monte Carlo simulation method. The performance of these methods is assessed based on their accuracy and computational efficiency in estimati
... Show MoreIn order to promote sustainable steel-concrete composite structures, special shear connectors that can facilitate deconstruction are needed. A lockbolt demountable shear connector (LB-DSC), including a grout-filled steel tube embedded in the concrete slab and fastened to a geometrically compatible partial-thread bolt, which is bolted on the steel section's top flange of a composite beam, was proposed. The main drawback of previous similar demountable bolts is the sudden slip of the bolt inside its hole. This bolt has a locked conical seat lug that is secured inside a predrilled compatible counter-sunk hole in the steel section's flange to provide a non-slip bolt-flange connection. Deconstruction is achieved by demounting the tube from the t
... Show MoreA new Azo‐Schiff base ligand L was prepared by reaction of m‐hydroxy benzoic acid with (Schiff base B) of 3‐[2‐(1H–indol‐3‐yl)‐ethylimino]‐1.5‐dimethyl‐2‐phenyl‐2,3‐dihydro‐1H‐pyrazol‐4‐ylamine. This synthesized ligand was used for complexation with different metal ions like Ni(II), Co(II), Pd(II) and Pt(IV) by using a molar ratio of ligand: metal as 1:1. Resulted compounds were characterized by NMR (1H and 13C), UV–vis spectroscopy, TGA, FT‐IR, MS, elemental analysis, magnetic moment and molar conductivity studies. The activation thermodynamic parameters, such as ΔE*, ΔH*, ΔS*, ΔG*and
... Show MoreAim of the study: Using surface roughness and tensile bond strength tests, the objective of this investigation was to ascertain the impact of laser surface modification on the binding strength of injectable thermoplastic acrylic denture base material to acrylic-based soft-liner material. Materials and methods: Acrylic base soft liner material was bonded to injectable thermoplastic acrylic resin (Deflex). Forty specimens were created (20 disc, 20 dumbbells) 10 of each specimen type as control specimens, and 10 were treated with nano pulse Nd: YAG laser. The data were analyzed using the Kruskal-Wallis test and unpaired t-test (a=.05) and the roughness test was performed utilizing a double column universal test machine. Results: Compar
... Show MoreThis study investigated athletic Affiliation among male and female racket sports players (tennis, table tennis, and badminton). Athletic Affiliation Scale designed by (El-Shahat, 2021). The problem of the study comes from the extent to which players are affiliated with these sports. The researchers identified the scientific foundations of the scale. After verifying its validity, a random sample was selected from the Baghdad Governorate, including (49) players for the main experiment and (10) players for the pilot sample, distributed among the three sports from the original community 140 players (male and female) registered in the official federations of the games. The researchers adopted a descriptive approach using the survey metho
... Show MoreTetradentate complexes type [M (HL) 2] were prepared from the reaction of 2-hydroxy -1, 2-diphynel-ethanone oxime [H2L] and KOH with ( Mn II, Fe II, Co II, Ni II , Cu II and Hg II ), in methanol with (2:1) metal: ligand ratio. The general formula for Cu II and Mn II complexes are [M (HL) 2 Cl.H2O] K, for Co II [Co (HL) 2. H2O] and [M (HL) 2] for the rest of complexes. All compounds were characterised by spectroscopic methods, I.R, U.V-Vis, H.P.L.C, atomic absorption and conductivity measurements chloride content. From the data of these measurements, the proposed molecular structures for Fe II and Hg II complexes are tetrahedrals, while Mn II and Cu II complexes are octahedrals, Ni II complex adopting square planar structure and the complex
... Show MoreWhen writing a text, such as a newspaper article, various types of discourse markers are frequently used to group sentences into paragraphs and parts in order to establish a discourse with certain functions, such as coordination, orientation, emphasizing the concepts presented, etc. It should also be noted that this type of mark exists in both written and spoken language. Therefore, it is convenient to dedicate a chapter to these linguistic elements to clarify their use and their classification, which is mainly based on Jose Portolés (2001), as well as the main features, specifically their features (prosodic, morphological, semantic and pragmatic).
Resumen
... Show More