Preferred Language
Articles
/
bsj-5060
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The eloquence of the poetic image in the poetry of the Andalusian son of Labanism is a stylistic approach
...Show More Authors

The resort to the eloquence of the poetic image as a style reveals the poet's creativity and creativity in dealing with external influences, and reflect them with emotional images express a sense of intense emotional imagination, and this imagination stems from the experience of a poetic sense of truth, tasted by the recipient before the creator of the poetic text.

View Publication Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Improving Shear Strength of Soft Clay by Using Torn Belts Chips
...Show More Authors

Random throwing of industrial waste has a significant impact on the environment unless it takes into account the conditions of engineered destroying and/or re-used. Taking the advantage of re-using waste materials in engineering projects represents a well-planned project in order to resolve a lot of engineering problems for some difficult soils. The objective of this study was to evaluate the capability and effects of Rubber Shreds (RS) from scrap torn belts towards improving the shear strength of soft clay. A direct shear tests were conducted on soft clay-RS mixture. The following parameters were investigated to study the influence of RS content, water content, normal stress, and dilation ratio. From experimental test results it was fou

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 10 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Importance of Using the Internet of Things in Education
...Show More Authors

The subject of the Internet of Things is very important, especially at present, which is why it has attracted the attention of researchers and scientists due to its importance in human life. Through it, a person can do several things easily, accurately, and in an organized manner. The research addressed important topics, the most important of which are the concept of the Internet of Things, the history of its emergence and development, the reasons for its interest and importance, and its most prominent advantages and characteristics. The research sheds light on the structure of the Internet of Things, its structural components, and its most important components. The research dealt with the most important search engines in the Intern

... Show More
View Publication Preview PDF
Scopus (33)
Crossref (14)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Hybrid Solar Air Conditioning System using a New Control Strategy
...Show More Authors

Enhancement of the performance for hybrid solar air conditioning system was presented in this paper. The refrigerant temperature leaving the condenser was controlled using three-way valve, this valve was installed after the compressor to regulate refrigerant flow rate towards the solar system. A control system using data logger, sensors and computer was proposed to set the opening valve ratio. The function of control program using LabVIEW software is to obtain a minimum refrigerant temperature from the condenser outlet to enhance the overall COP of the unit by increasing the degree of subcooled refrigerant. A variable load electrical heater with coiled pipe was used instead of the solar collector and the storage tank to simulate the sola

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Constant and the Variable in the Aesthetic Image of the Theatrical Direction: حازم عبد المجيد إسماعيل
...Show More Authors

The theatre is one of the main pillars of the human aesthetic thinking as it contains logical explanations for the public human life aspects outside time and environment. When we find that the directive philosophical thinking moving away from the stylistic constants and the virtual laws in taboos that control the accomplishment in terms of the traditional shapes, the employment and the theatrical reception. Some directors moved in post-modernism concepts in a perceptive that liberates thought from its natural context in thinking into an innovative perceptive. The aesthetic images are the basic premise in the prohibition of the philosophical thinking interpretation in order to move the directive thinking and this movement depends on the v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
COMPARATIVE STUDY FOR EDGE DETECTION OF NOISY IMAGE USING SOBEL AND LAPLACE OPERATORS
...Show More Authors

Many approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good

... Show More
View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
ФОРМИРОВАНИЕ КОММУНИКАТИВНО-РЕЧЕВОЙ КОМПЕТЕНЦИИ СТУДЕНТОВ КАФЕДРЫ Р The formation of verbal communication for students of Russian Language Department at College of Languages at University of Baghdad by using multiple technological means
...Show More Authors

В статье рассматривается вопрос об использовании мультимедийных средств для оптимизации процесса формирования коммуникативной компетенции  в иракской аудитории с привлечением компьютерных технологий. Статья посвящена  использованию мультимедийных технологий  и  различных  приемов формирования интереса к русскому языку. Включение в процесс обучения коммуникативно-значимого, аутентичн

... Show More
View Publication Preview PDF