Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
<span lang="EN-US">The fundamental of a downlink massive multiple-input multiple-output (MIMO) energy- issue efficiency strategy is known as minimum mean squared error (MMSE) implementation degrades the performance of a downlink massive MIMO energy-efficiency scheme, so some improvements are adding for this precoding scheme to improve its workthat is called our proposal solution as a proposed improved MMSE precoder (PIMP). The energy efficiency (EE) study has also taken into mind drastically lowering radiated power while maintaining high throughput and minimizing interference issues. We further find the tradeoff between spectral efficiency (SE) and EE although they coincide at the beginning but later their interests become con
... Show More<span lang="EN-US">The fundamental of a downlink massive multiple-input multiple-output (MIMO) energy- issue efficiency strategy is known as minimum mean squared error (MMSE) implementation degrades the performance of a downlink massive MIMO energy-efficiency scheme, so some improvements are adding for this precoding scheme to improve its workthat is called our proposal solution as a proposed improved MMSE precoder (PIMP). The energy efficiency (EE) study has also taken into mind drastically lowering radiated power while maintaining high throughput and minimizing interference issues. We further find the tradeoff between spectral efficiency (SE) and EE although they coincide at the beginning but later their interests become con
... Show MoreSummarized the idea of research is marked by "changes in the process of mass communication by using the international network of information" by specifying what data networking and mass communication is the transformation processes in the mass communication network where research aims to:1. Diagnostic data and transformations in the process of mass communication network.2. Provide a contact form commensurate with the characteristic mass of the International Network of electronic information, and research found to provide a communicative model called the (human contact network). In short (HCN) Humanity Communication Net also reached conclusions concerning the search process and communicative transformations and changes that have taken pla
... Show MoreIn this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.
The theatrical image represents one of the tools of communication with the other to create a communicative language that is produced and transmitted by the actor and his body through the theatrical space to convey the meaning in all its forms and types. The actor is concerned with the composition and construction of these images. My girl, the image is fragmented and multiple and different. Therefore, based on the foregoing, the researcher has divided his research into four chapters, representing the (methodological framework). First, the research problem, which is manifested in the following question (what is the structure of the fragmented image of the actor's performance? The Iraqi playwright), and secondly: the importance of the resea
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreThe enhancement of heat exchanger performance was investigated using dimpled tubes tested at different Reynolds numbers, in the present work four types of dimpled tubes with a specified configuration manufactured, tested and then compared performance with the smooth tube and other passive techniques performance. Two dimpled arrangements along the tube were investigated, these are inline and staggered at constant pitch ratio X/d=4, the test results showed that Nusselts number (heat transfer) of the staggered array is higher than the inline array by 13%. The effect of different depths of the dimple (14.5 mm and 18.5 mm) has been also investigated; a tube with large dimple diameter enhanced the Nusselts number by about 25% for the ran
... Show MoreThe study of images in the cognitive field receives considerable attention by researchers, whether in the field of media and public relations or in other humanities. Due to the great importance in shaping trends of public opinion, especially trends that individuals and the behaviors of people, institutions or ideas are determined by forming images that they hold in their minds towards these persons or institutions. Modern enterprises have realized, whether they are governmental ministries and official departments or non-governmental organizations as civil society organizations, the importance of studying the dominant image in the minds of the masses and make decisions and draw plans to configure this image as these institutions wishes.&n
... Show MoreIn recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS. This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP
... Show MoreThis paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys) of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been ev
... Show More