Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
Multiple myeloma is hematological disease produces many complications in the bone, kidney, neural and other complications. The study aims to measure serum biomolecules like fetuin-A and resistin and determined the possibility to use these biomarkers as disease predictor. blood samples were isolated from 58 patients and 24 sex and age-matched control, serum then isolated, and proper ELISA kit then used to a determined level of B2 microglobulin, resistin, and fetuin-A. The result demonstrated significant increase in B2 microglobulin, fetuin-A and resistin in patients compare to control (1.3470.714 vs. 0.9130.253), p = 0.000, (14.00310.352 vs. 9.2594.264), p= 0.005, (1.9673.595 vs. 0.6040.622), p = 0.009, respectively. These di
... Show MoreMultiple myeloma is hematological disease produces many complications in the bone, kidney, neural and other complications. The study aims to measure serum biomolecules like fetuin-A and resistin and determined the possibility to use these biomarkers as disease predictor. blood samples were isolated from 58 patients and 24 sex and age-matched control, serum then isolated, and proper ELISA kit then used to a determined level of B2 microglobulin, resistin, and fetuin-A. The result demonstrated significant increase in B2 microglobulin, fetuin-A and resistin in patients compare to control (1.3470.714 vs. 0.9130.253), p = 0.000, (14.00310.352 vs. 9.2594.264), p= 0.005, (1.9673.595 vs. 0.6040.622), p = 0.009, respectively. &
... Show MoreThe proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP
... Show MoreThis study aimed to developing the skills of critical reading for the tenth basic school female students through a training program using the reflective thinking method. The study sample consisted of (64) students. To achieve the objective of the study, the researcher uses the quasi-experiment approach consisting of a control group (32 students) and an experimental group (32 students). The researcher used three research inventories as follows: 1) A list of critical reading skills included (30) skills within three aspects (Recognition – Deduction – Evaluation and Judgment). 2) An executive program using reflective thinking for developing critical reading skills. 3) Achievement test to measure
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreSMNs like Facebook, YouTube, Twitter, WhatsApp,..etc. are among the most popular sites on the Internet. These sites can provide a powerful means of sharing, organizing, finding information and knowledge. The popularity of these sites provides an opportunity to measure the use them in knowledge sharing, which needs a special scale, but unfortunately, there is no special scale for that. Thus, this study supposes to use SCT as a scale to measure the use of SMNs in electronic knowledge sharing due to it has been used to measure knowledge sharing with its traditional form. This study can help the decision-makers to use these SMNs to share the academics’ knowledge in educational institutes to the communi
... Show MoreSurveys has done for collecting Sunn Pest which been parasitized by oophagous parasitoids
in infested wheat fields of villages around Erbil, Sulimanya and Dohuk governorates from
April to the end of May 2010, the result showed that a high rat of eggs hatching was 96.3%
within Erbil governorate and its cleared from results that not all laid eggs had been hatched
normally . The percentage ratio of egg parasitism in general was low in most studied villages.
In this study: Trissolcus grandis Thompson, Trissolcus semistriotus Nees., and Telenomus sp.
on sunn pest eggs has been observed. Identification keys supported with figures were
formulated to identify of these species.
The tax system, like any other system, as a set of elements and parts that complement each other and are interrelated and interact to achieve specific goals, and is a natural reflection of the economic, social and political conditions prevailing in society, and therefore the objectives of tax policy formulated in line with the objectives of economic policy in general, which means that any change in economic policy clearly affects fiscal policy measures and fiscal policy in particular.
The problem of searching for the impact of foreign direct investment in the Iraqi tax system was focused on the study the of foreign direct investment and therole played in developing and improving the economic reality and its implicatio
... Show More