Preferred Language
Articles
/
bsj-5060
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Intemperance Use of the Internet with the University's Students
...Show More Authors

The research aims:
1- To know the intemperance use of the internet by the University's students.
2- To know the differences with a statistical indication in the intemperance use of the internet after the gender's inconstant ( Males-females).
3- To know the differences with a statistical indication in the intemperance use of the internet after the Major's inconstant ( scientific- humanistic)
This current research restricts a sample of the university students for both sexes.
Theoretical frame:
The research viewed several theories that explains intemperance use of the internet & the results.
Research measures :
1- Research has been adapted the scale ( Internet use) which was prepared by the Moroccan researcher (

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Al–bahith Al–a'alami
Semiotics of Picture and News
...Show More Authors

It has become familiar to see alchemy as a methodological approach that combines conscious, diverse, psychological, social, structural, and discrete approaches in the communications technology that Marshall McLuhan found to be able to extend our bodies and senses, The media discourse has a deep and superficial structure produced by the first, with its social, cultural and historical backgrounds, in a context that connects the image with the word, as the "meanings are made" - everywhere, as described by Jonathan ) In fashion, in the arts as a whole, and from its "signs" Our analysis of «meaning», in the media, and communication through advertising, magazines, newspapers, television, and the Internet. Therefore, alchemy is preoccupied wi

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 02 2018
Journal Name
European Journal Of Oral Sciences
Identification of key determinants in<i>Porphyromonas gingivalis</i>host-cell invasion assays
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Strategic direction in Strategic Reputation and its impact on Competitive Compressions Survey study in mobile communications companies in Iraq
...Show More Authors

Obstruct:                                                                                                                           &nbsp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
Improved Alternating Direction Implicit Method
...Show More Authors
Abstract<p>The alternating direction implicit method (ADI) is a common classical numerical method that was first introduced to solve the heat equation in two or more spatial dimensions and can also be used to solve parabolic and elliptic partial differential equations as well. In this paper, We introduce an improvement to the alternating direction implicit (ADI) method to get an equivalent scheme to Crank-Nicolson differences scheme in two dimensions with the main feature of ADI method. The new scheme can be solved by similar ADI algorithm with some modifications. A numerical example was provided to support the theoretical results in the research.</p>
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 06 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Comparing the Quality of Life among Patients with Relapsing Remitting Multiple Sclerosis in Iraq Using Different Disease Modifying Therapies
...Show More Authors

Multiple sclerosis (MS) is a chronic, inflammatory, immune mediated disease of the central nervous system, mostly affecting young adults with mean age of 30 years, twice as high in women compared to men. The etiology of MS is not fully elucidated. MS symptoms are directly related to demyelination and axonal loss, along with other psychological symptoms, can result in functional limitations, disability and reduced quality of life (QoL).  The QoL assessments in patients with a chronic disease may contribute to improving treatment and could even be of prognostic value. The goals  of this study were  to  compare the QoL of  Iraqi patients with relapsing remitting multiple sclerosis (RRMS),using three different diseas

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Effect Of Using Quantitative Methods Of Demand Forecasting In Improving Of Supply Chain Performance:" Case Study In One Of An Industerial Organization"
...Show More Authors

Objecte The study aims to test the effect of using the appropriate quantitative method of demand forecasting in improving the performance of supply chain of the aviation fuel product ( The study sample), One of the products of the Doura refinery (The study site), By testing a set of quantitative methods of demand forecasting using forecasting error measurements, and choosing the least faulty, most accurate and reliable method and adept it in the building  chain.

Is the study of problem through a starting with the fol

... Show More
View Publication Preview PDF
Crossref (1)
Crossref