Preferred Language
Articles
/
bsj-5060
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Use Principal Component Analysis Technique to Dimensionality Reduction to Multi Source
...Show More Authors

This paper tackles with principal component analysis method (PCA ) to dimensionality reduction in the case of linear combinations to digital image processing and analysis. The PCA is statistical technique that shrinkages a multivariate data set consisting of inter-correlated variables into a data set consisting of variables that are uncorrelated linear combination, while ensuring the least possible loss of useful information. This method was applied to a group of satellite images of a certain area in the province of Basra, which represents the mouth of the Tigris and Euphrates rivers in the Shatt al-Arab in the province of Basra.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Strong Subordination for E -valent Functions Involving the Operator Generalized Srivastava-Attiya
...Show More Authors

Some relations of inclusion and their properties are investigated for functions of type " -valent that involves the generalized operator of Srivastava-Attiya by using the principle of strong differential subordination.

View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The role of compensation system in improving the quality of educational services (Halabja University as a model)
...Show More Authors

          This study deals with the role of compensation system in improving the quality of educational services (University of Halabja as a Model) also our problem was the following question ; What is the role of compensation system in its different dimensions in improving the quality of educational services? And what is the relationship and impact of using the dimensions of the compensation system to improve the quality of educational services? The hypothesis of the research included the correlation and the impacts between the compensation system and its combined variables in the quality of educational services. This was proved through a field study and the distribution of questionn

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 02 2018
Journal Name
Iraqi Journal Of Physics
Frustrated total internal reflection of newton rings multiple beam interference
...Show More Authors

Frustrated Total Internal Reflection FTIR phenomenon is manifested employing Newton‟s rings setup generated via a coherent light beam of a laser diode ( . All concentric bright and dark rings, except the central bright spot, were noticed to recede (disappear) when the incident angle exceeded the critical angle of 41o.
It was also shown that the current setup has proven its applicability for other tests and can give convenient results that conform with theory. Neither the concept nor the design is beyond what can be realized in an undergraduate laboratory. However, technical improvements in mounting the prism - lens may be advisable. As an extension of the experiments, the effect can be studied using hollow prism filled with liquids

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
The content of intermediate stage biology books for multiple intelligences
...Show More Authors

The aim of current study is to analyze the content of intermediate stage biology books based on multiple intelligences. To do this, the researcher used the descriptive analytical approach. To analyze the three books of the intermediate stage, the author adopted content analysis tool and area unit. They were exposed to group of experts in methods of teaching biology, and measurement and evaluation. The findings of the study have shown a significant difference between what was expected and the observation of the multiple intelligences for the three biology books excluded the (social, musical, and kinetic intelligence), and there is no significant difference between the analysis' result of the biology books and the expectations of b

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
The role and effectiveness of the United Nations Security Council in light of the competition of international powers: an analytical study
...Show More Authors

Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 04 2023
Journal Name
College Of Islamic Sciences
Predicting the financial distress of companies using logistic regression and its impact on earnings per share in companies listed on the Iraqi Stock Exchange: Predicting the financial distress of companies using logistic regression and its impact on earnings per share in companies listed on the Iraqi Stock Exchange
...Show More Authors

Abstract

The prevention of bankruptcy not only prolongs the economic life of the company and increases its financial performance, but also helps to improve the general economic well-being of the country. Therefore, forecasting the financial shortfall can affect various factors and affect different aspects of the company, including dividends. In this regard, this study examines the prediction of the financial deficit of companies that use the logistic regression method and its impact on the earnings per share of companies listed on the Iraqi Stock Exchange. The time period of the research is from 2015 to 2020, where 33 companies that were accepted in the Iraqi Stock Exchange were selected as a sample, and the res

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
An Overview of Audio-Visual Source Separation Using Deep Learning
...Show More Authors

    In this article, the research presents a general overview of deep learning-based AVSS (audio-visual source separation) systems. AVSS has achieved exceptional results in a number of areas, including decreasing noise levels, boosting speech recognition, and improving audio quality. The advantages and disadvantages of each deep learning model are discussed throughout the research as it reviews various current experiments on AVSS. The TCD TIMIT dataset (which contains top-notch audio and video recordings created especially for speech recognition tasks) and the Voxceleb dataset (a sizable collection of brief audio-visual clips with human speech) are just a couple of the useful datasets summarized in the paper that can be used to test A

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref