Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
Cutaneous leishmaniasis is one of endemic diseases in Iraq. It is considered as widely health problem and is an uncontrolled disease. The aim of the study is to identify of Leishmania species that cause skin lesions among patients in Thi-Qar Province, South of Iraq, also to detect some virulence factors of L. tropica. This study includes three local locations, Al-Hussein Teaching, Suq Al-Shyokh General and Al-Shatrah General Hospitals in Province for the period from the beginning of December 2018 to the end of September 2019. The samples were collected from 80 patients suffering from cutaneous leishmaniasis, both genders, different ages, various residence places and single and multiple lesions. Nested-PCR technique was
... Show MoreThe research aims to improve the effectiveness of internal control system according to a model COSO, by identifying the availability of system components according to the model and then improve the effectiveness of each component by focusing on areas for improvement in each component, as it was addressed to a model COSO and then Maamth with the environment, the current Iraqi by introducing some improvements on the form of some mechanisms of corporate governance of the Council of Directors, and senior management, the Audit Committee, Committee appointments, especially that supplies application available in the laws and legislation, the current Iraqi, taking into consideration to make some
... Show MoreIn this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.
This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MoreTo overcome the problems which associated with the standard multiple daily doses (MDD)
of aminoglycosides (AGs) like high incidence of toxicity(nephrotoxicity, ototoxicity)(5-25%) and high cost, an alternative approach was developed which was single daily dose (SDD).This new regimen was designed to maximize bacterial killing by optimizing the peak concentration/minimum inhibitory concentration(MIC)ratio and to reduce the potential for toxicity. The study includes 75 patients selected randomly, 50 of them received SDD regimen of age range of 17-79 years and the remaining received MDD regimen of age range of 13-71 years. The study was designed to evaluate the safety of SDD regim
... Show MoreCaryl Churchill's Top Girls (1982) reveals how women have achieved a point of strength and independence in their battle to face men's oppression throughout history. Churchill has replicated recent transitions in the 1980s and 1990s in works that depict these movements' central concerns and contradictions as they change. Similarly, her theater is a result of many problems and shifts in hegemonic modes of production during this time. This paper traces the achievements of the major character of Top Girls, Marlene, in her way of life and her handling of the struggles of other women around her. Because of this strength, Marlene is compared to the British Prime Minister, Thatcher. Therefore, this paper will shed light on the term of T
... Show MoreTwo quantitative, environment-friendly and easily monitored assays for Ni (II) and Co (III) ions analysis in different lipstick samples collected from 500-Iraqi dinars stores located in Baghdad were introduced. The study was based on the reaction of nickel (II) ions with dimethylglyoxime (DMG) reagent and the reaction of cobalt (III) ions with 1-nitroso-2-naphthol (NN) reagent to produce colored products. The color change was measured by spectrophotometric method at 565 nm and 430 nm for Ni and Co, respectively, with linear calibration graphs in the concentration range 0.25-100 mg L-1 (Ni) and 0.5-100 mg L-1 (Co) and LOD and LOQ of 0.11 mg L-1 and 0.36 mg L-1 (Ni), and 0.15 mg L-1 an
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
The research has been based on two main variables (information and communication technology) and the quality of blended education (physical and electronic), aiming to reveal the relationship between four dimensions (physical devices, software, databases, communication networks) and the elements of education represented by (the teacher, the student, the teaching process, curriculum). The methodology and post-analysis-based research were conducted at the Technical College of Management / Baghdad through polling the opinions of a random sample that included (80) teachers out of (86) and the number of students (276) representing a random sample from all departments of the college (for the morning study) out of (3500) stud
... Show MoreIn this paper, the reliability and scheduling of maintenance of some medical devices were estimated by one variable, the time variable (failure times) on the assumption that the time variable for all devices has the same distribution as (Weibull distribution.
The method of estimating the distribution parameters for each device was the OLS method.
The main objective of this research is to determine the optimal time for preventive maintenance of medical devices. Two methods were adopted to estimate the optimal time of preventive maintenance. The first method depends on the maintenance schedule by relying on information on the cost of maintenance and the cost of stopping work and acc
... Show More