Preferred Language
Articles
/
bsj-5060
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Innovation, Creativity And Change.
Multiple Intelligences and Their Relation to Blood Group Among University Students
...Show More Authors

Publication Date
Fri Jan 01 2016
Journal Name
Applied Numerical Mathematics
Multiple time-dependent coefficient identification thermal problems with a free boundary
...Show More Authors

View Publication
Scopus (28)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Performance Enhancement of the South Baghdad Thermal Station
...Show More Authors

Aim of the research is the study of improving the performance of the thermal station south Baghdad and the main reasons for reduced its efficiency. South Baghdad power planet comprises (6) steam turbine units and (18) gas turbine units .The gas turbine units are composed of two groups: the first group is made up of gas units (1,2), each of capacity (123) MW. The design efficiency of gas turbine units is 32%. The actual efficiency data of steam units is 18.3% instead of 45% which is the design efficiency. The main reason for efficiency reduction of gas units is the rejected thermal energy with the exhaust gases to atmosphere, that are (450-510) ℃.The bad type of fuel used (heavy) fuel. Another reason for the low efficiency and has a neg

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 31 2019
Journal Name
Journal Of Pure And Applied Microbiology
Determination of Level of 25-Hydroxy Vitamin D3 in Patients with Multiple Sclerosis and Its Effect on Disease Activity
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Digital-Based Optimal AVR Design of Synchronous Generator Exciter Using LQR Technique
...Show More Authors

In this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q,  this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Inverse Kinematics Solution for Redundant Robot Manipulator using Combination of GA and NN
...Show More Authors

A demonstration of the inverse kinematics is a very complex problem for redundant robot manipulator. This paper presents the solution of inverse kinematics for one of redundant robots manipulator (three link robot) by combing of two intelligent algorithms GA (Genetic Algorithm) and NN (Neural Network). The inputs are position and orientation of three link robot. These inputs are entering to Back Propagation Neural Network (BPNN). The weights of BPNN are optimized using continuous GA. The (Mean Square Error) MSE is also computed between the estimated and desired outputs of joint angles. In this paper, the fitness function in GA is proposed. The sinwave and circular for three link robot end effecter and desired trajectories are simulated b

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sat Dec 11 2021
Journal Name
Engineering, Technology & Applied Science Research
Post-Fire Behavior of Non-Prismatic Beams with Multiple Rectangular Openings Monotonically Loaded
...Show More Authors

The main objective of this paper is to study the behavior of Non-Prismatic Reinforced Concrete (NPRC) beams with and without rectangular openings either when exposed to fire or not. The experimental program involves casting and testing 9 NPRC beams divided into 3 main groups. These groups were categorized according to heating temperature (ambient temperature, 400°C, and 700°C), with each group containing 3 NPRC beams (solid beams and beams with 6 and 8 trapezoidal openings). For beams with similar geometry, increasing the burning temperature results in their deterioration as reflected in their increasing mid-span deflection throughout the fire exposure period and their residual deflection after cooling. Meanwhile, the existing ope

... Show More
Crossref (20)
Crossref
Publication Date
Sat Dec 11 2021
Journal Name
Engineering, Technology & Applied Science Research
Post-Fire Behavior of Non-Prismatic Beams with Multiple Rectangular Openings Monotonically Loaded
...Show More Authors

The main objective of this paper is to study the behavior of Non-Prismatic Reinforced Concrete (NPRC) beams with and without rectangular openings either when exposed to fire or not. The experimental program involves casting and testing 9 NPRC beams divided into 3 main groups. These groups were categorized according to heating temperature (ambient temperature, 400°C, and 700°C), with each group containing 3 NPRC beams (solid beams and beams with 6 and 8 trapezoidal openings). For beams with similar geometry, increasing the burning temperature results in their deterioration as reflected in their increasing mid-span deflection throughout the fire exposure period and their residual deflection after cooling. Meanwhile, the existing ope

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (20)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref