Preferred Language
Articles
/
bsj-5060
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Conference Of Numerical Analysis And Applied Mathematics Icnaam 2019
Isolation and characterization study towards microbial improved oil recovery applications
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Handling a problem of transport solid waste in Baghdad City to Healthy landfill sites using transportation Model
...Show More Authors

 A problem of solid waste became in the present day common global problem among all countries, whether developing or developed countries, and can say that no country in the world today is immuning from this dilemma which must find appropriate solutions. The problem has reached a stage that can not ignore or delay, but has became a daily problem occupies the minds of ecologists, economists and politicians took occupies center front in the lists of  priorities for the countries in terms of finding solutions to the rapid scientific and radical them. and that transport costs constitute an important component of total costs borne by the municipal districts in the process of disposal of solid waste, so any improvement in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Neurology Asia
Integrin alpha-4 gene polymorphism in relation to natalizumab response in multiple sclerosis patients
...Show More Authors

Objectives: The aim of this study was to assess the possible the association between +3061 (G>A, rs1143676) missense mutation in exon 24 of the integrin α-4 subunit (ITGA-4) gene and the response to natalizumab in a sample of Iraqi multiple sclerosis patients. Methods: A sample of 59 patients with multiple sclerosis (16 males and 43 females; mean age of 32 years; age range of 15 to 52 years) receiving natalizumab for at least 12 consecutive months were involved in the study between March and August/ 2022. The sample was categorized into two groups according to their response to natalizumab treatment (responders and non-responders). Polymerase chain reaction and Sanger’s sequencing for the extracted deoxyribonucleic acid was pe

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Thu Oct 25 2018
Journal Name
Al–bahith Al–a'alami
Image of relief organizations for displaced Iraqis
...Show More Authors

This research aims to know the intellectual picture the displaced people formed about aid organizations and determine whether they were positive or negative, the researchers used survey tool as standard to study the society represented by displaced people living in Baghdad camps from Shiites, Sunnis, Shabak, Turkmen, Christians, and Ezidis.
The researcher reached to important results and the most important thing he found is that displaced people living in camps included in this survey hold a positive opinion about organizations working to meet their demands but they complain about the shortfall in the health care side.
The research also found that displaced people from (Shabak, Turkmen, and Ezidi) minorities see that internati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Islamic Sciences
الصورة الفنية للأزهار في شعر ابي وكيع التنيسي
...Show More Authors

ارتبط الانسان بالطبيعة بأشكالها المختلفة ارتباطا وثيقا ، فهي تمثل الحاضنة له بمجالات حياته كلها، فما كان من الأدباء الا أن يجعلوها في كثير من الأحيان مادة لأدبهم وأرضية خصبة لنتاجهم، فتمظهرت بصورها المختلفة وحاجة الانسان لها وخيرها وشرها في الأدب على مدى التاريخ، والعرب شأنهم شأن غيرهم من الأمم فمنذ عصر ما قبل الاسلام كانت الطبيعة منفذا مهما وملجأ للشعراء في انتاج الأدب وابداعه وإلى يومنا هذا، ونحن إذ نتحد

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Study of Laser Propagation Parameters in the Underdense Plasma Region Using a Two Dimensional Simulation Code
...Show More Authors

The propagation of laser beam in the underdense deuterium plasma has been studied via computer simulation using the fluid model. An appropriate computer code “HEATER” has been modified and is used for this purpose. The propagation is taken to be in a cylindrical symmetric medium. Different laser wavelengths (1 = 10.6 m, 2 = 1.06 m, and 3 = 0.53 m) with a Gaussian pulse type and 15 ns pulse widths have been considered. Absorption energy and laser flux have been calculated for different plasma and laser parameters. The absorbed laser energy showed maximum for  = 0.53 m. This high absorbitivity was inferred to the effect of the pondermotive force.

View Publication Preview PDF
Publication Date
Fri Sep 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Analysis of Temperature and Residual Stress Distribution in CO2 Laser Welded Aluminum 6061 Plates Using FEM
...Show More Authors

This paper develops a nonlinear transient three-dimensional heat transfer finite element model and a rate independent three-dimensional deformation model, developed for the CO2 laser welding simulations in Al-6061-T6 alloy. Simulations are performed using an indirect coupled thermal-structural method for the process of welding. Temperature-dependent thermal properties of Al-6061-T6, effect of latent heat of fusion, and the convective and radiative boundary conditions are included in the model. The heat input to the model is assumed to be a Gaussian heat source. The finite element code ANSYS12, along with a few FORTRAN subroutines, are employed to obtain the numerical results. The benefit of the proposed methodology is that it

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Iraqi Journal Of Hematology
Evaluation of angiopoietin-2 level in patients with multiple myeloma at presentation and in remission state
...Show More Authors

The study aimed to assess the level of ANG‑2 in MM patients at diagnosis and in remission state and elaborate on its correlation with interleukin‑6 (IL‑6) and beta‑2 microglobulin (B2M) levels. Sixty MM patients; 20 newly diagnosed (ND), and 40 patients in remission were included. Twenty healthy individuals were included as a control group. Plasma levels of ANG‑2, B2M, and IL‑6 were tested by enzyme‑lin ked immunosorbent assay. There are significant statistical differences between ND patients and those in remission in hemoglobin, neutrophil count, blood urea, serum creatinine, glomerular filtration rate, B2M, IL6, and ANG‑2 (P = 0.001, 0.033, 0.005, 0.001, 0.001, 0.001, 0.004, and 0.001, respectively). ANG‑2 showed signifi

... Show More
View Publication
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
A Competitive Study Using UV and Ozone with H2O2 in Treatment of Oily Wastewater
...Show More Authors

          In this study, ultraviolet (UV), ozone techniques with hydrogen peroxide oxidant were used to treat the wastewater which is produced from South Baghdad Power Station using lab-scale system. From UV-H2O2 experiments, it was shown that the optimum exposure time was 80 min. At this time, the highest removal percentages of oil, COD, and TOC were 84.69 %, 56.33 % and 50 % respectively. Effect of pH on the contaminants removing was studied in the range of (2-12). The best oil, COD, and TOC removal percentages (69.38 %, 70 % and 52 %) using H2O2/UV were at pH=12. H2O2/ozone experiments exhibited better performance compared to

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref