Preferred Language
Articles
/
bsj-5060
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 19 2026
Journal Name
Journal Of Juridical And Political Science
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the

... Show More
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Innovation, Creativity And Change
The importance of using the World Wide Web (the Internet) for professors of Arabic Language Department at the University of Baghdad‏
...Show More Authors

Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Level of Entrepreneurial Orientation: Analytical Research in the National Security Advisory
...Show More Authors

The current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 17 2023
Journal Name
Revista De Gestão Social E Ambiental
Complete Street as a Key for Urban Environment Development
...Show More Authors

Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad.   Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements.   Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
5g Impact On Biomedical Engineering
Wireless Techniques and Applications of the Internet of Medical Things
...Show More Authors

View Publication
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The impact of brand identity in achieving marketing objectives Applied Study in the International Company for smart card "Key Card"
...Show More Authors

Each organization has values ​​and objectives, tangible and intangible properties of its products. The reflection of properties on the brand constitutes the identity of the brand that contributes to building the customer's convictions about the products or services provided by any organization and its brand in a positive or negative way. This is reflected in purchasing behavior, which may push forward the progress towards marketing goals or deviation from them. Therefore, the current research came to identify the brand identity, its types and the factors affecting them and how they affect to achieve each of the marketing goals. At a time when

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Current Research In Microbiology And Biotechnology
Detection of anti-Helicobacter pylori in patients with Multiple Sclerosis
...Show More Authors

To determine the relationship between Helicobacter pylori infection and Multiple Sclerosis (MS) disorder, 20 patients with MS aged (25-60) years have been investigated from the period of 2016/12/1 to 2017/3/1 and compared to 15 apparently healthy individuals. All study groups were carried out to measure anti H.pylori IgA and H.pylori IgG antibodies by enzyme linked immunosorbent assay (ELISA) technique. There was a significant elevation (p<0.05) in the concentration of anti H.pylori IgG and IgA antibodies (Abs) compared to control group, and there was no significant difference (p>0.05) in the concentration of IgA and IgG (Abs) of H.pylori according to gender, and there was no significant difference (p>0.05) in the concentration of IgA and I

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Iraqi Journal Of Hematology
Detection of active human cytomegalovirus in patients with multiple myeloma
...Show More Authors
Abstract:<sec><title>BACKGROUND:

Human cytomegalovirus (HCMV) infection is ubiquitous and successfully reactivated in patients with immune dysfunction as in patient with multiple myeloma (MM), causing a wide range of life-threatening diseases. Early detection of HCMV and significant advances in MM management has amended patient outcomes and prolonged survival rates.

OBJECTIVES:

The aim of the study was to estimate the frequency of active HCMV in MM patients.

MATERIALS AND METHODS:

This is a case–control study involved 50 MM patients attending Hematology Center, Bag

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Oct 23 2020
Journal Name
Medico-legal Update
Levels of Some Cytokines in Iraqi Patients with Multiple Myeloma
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref