Preferred Language
Articles
/
bsj-5060
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Evaluation of Low Level Laser Therapy using 785 nm Diode Laser on the Enhancement of Chronic Wound Healing
...Show More Authors

Low-intensity laser irradiation has been explored as an alternative, non-invasive method to encourage chronic wounds to heal. This study aimed to evaluate the effects of low level laser therapy (biostimulation) using semiconductor diode laser with wavelength (785 nm) on the enhancement of chronic wound healing. Fifty patients with chronic wounds were selected to be treated with Low Level Laser Therapy. Their ages ranged between 1 to 76 years. The wound sites were distributed in the lower limb, upper limb, trunk , perineum and head (70%,14%,12%,2%,2%, respectively). Application of laser therapy by noncontact method few millimeters from the skin for 15 minutes per one session twice weekly for two months ; ie,16 sessions for each patient. R

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 09 2025
Journal Name
Modern Sport
The effect of Developing special endurance using multiple round periods on some physical and functional indicators for elite boxers
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Apr 01 2021
Journal Name
Computer Methods And Programs In Biomedicine
A hybrid approach based on multiple Eigenvalues selection (MES) for the automated grading of a brain tumor using MRI
...Show More Authors

View Publication
Scopus (39)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation Among Choices Of Water Quality Improvement By Using Some Of Total Quality Management Tools Applied Research In Baghdad Governorate Water Directorate
...Show More Authors

  Many managers in geometrical and technical organizations prefer to deal with quantitative values ​​to choose between the available options and choose the best alternative to avoid randomization and bias in decision making. One of them Baghdad Water Department, which seeks to develop the quality of its product (drinking water) and achieve its objectives under increasing growing population and the demand for water, Some of TQM tools, especially the statistical, have this ability because there is chance to use historical data and experiment of employees in Application . Two statistical tools were applied: the nominal group technique, matrix data analysis technique as well as the brainstorming tool to search for the best o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
הצורה השירית בשירת דן פגיס קובץ " גלגולים " לדוגמה
...Show More Authors

הקדמה
עיון זה מטפל ביסוד עיקרי במבנה השירי, כלומר הצורה השירית, המהווה את היסוד הבולט והחשוב ביותר
בשירה, אין שיר בעל ערך אמנותי שלא מכיל צורה שירית יפה.
העיון הזה כולל מבוא על הצורה השירית , בו הצגנו דעות של מבקרים ערביים ומערביים בולטים ביחס הנושא ,
למען הגשת צורה מפורשת להבנת מבנה הצורה השירית . סקרנו את היסודות העיקריים שנשענה עליהם
הצורה השירית ומהן: הדמיון, הדמוי, מטאפורה, סמל, סיפקנו הסבר מפורט על

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 24 2021
Journal Name
Ieee Access
Smart IoT Network Based Convolutional Recurrent Neural Network With Element-Wise Prediction System
...Show More Authors

An Intelligent Internet of Things network based on an Artificial Intelligent System, can substantially control and reduce the congestion effects in the network. In this paper, an artificial intelligent system is proposed for eliminating the congestion effects in traffic load in an Intelligent Internet of Things network based on a deep learning Convolutional Recurrent Neural Network with a modified Element-wise Attention Gate. The invisible layer of the modified Element-wise Attention Gate structure has self-feedback to increase its long short-term memory. The artificial intelligent system is implemented for next step ahead traffic estimation and clustering the network. In the proposed architecture, each sensing node is adaptive and able to

... Show More
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2013
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة العدد الخاص بمؤتمر الكلية
A propose method for hiding image into image
...Show More Authors

Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Degradation of Indigo Dye Using Quantum Mechanical Calculations
...Show More Authors

The semiempirical (PM3) and DFT quantum mechanical methods were used to investigate the theoretical degradation of Indigo dye. The chemical reactivity of the Indigo dye was evaluated by comparing the potential energy stability of the mean bonds. Seven transition states were suggested and studied to estimate the actually starting step of the degradation reaction. The bond length and bond angle calculations indicate that the best active site in the Indigo dye molecule is at C10=C11.  The most possible transition states are examined for all suggested paths of Indigo dye degradation predicated on zero-point energy and imaginary frequency. The first starting step of the reaction mechanism is proposed. The change in enthalpy, Gibbs free energ

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Computerized Knowledge Operations in Improving Business Performance
...Show More Authors

This research aimed at studying the role of calculated knowledge an its efficiency in improving the performance especially most of the organizations are living within knowledge era which concentrate on new technology investment in different fields of modern live . Under the scientific trends towards the economy of calculated knowledge which depend basically on new computer program in order to utilize the knowledge to raise the level of work performance exploiting different resources in the best way that helps the organizations to achieve their objectives because the information technology and computer programs became a means of survival and indispensible instrument within the developed world which depend on prosperity . progress

... Show More
View Publication Preview PDF
Crossref