Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
The research aims to propose a plan to reduce the waiting times in the Multiple Server queuing model (M, M, C) (FCFS, ∞, ∞), and adopt this plan, mainly on the arrival rate (λ), some process have been achieved in order to reduce the arrival rate per service channel that should reduces the overall waiting time in the system. This research is on two sections where the first deals with theory and how it has been approved the proposed method in theory and in mathematical equations as well as the second section, which dealt with the practical goal of applying the proposed method and comparing it with the traditional way, which was followed in calculating the performance measures in this model.
&
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More"The aim of the research is to identify the availability of the dimensions of the research variables represented by organizational symmetry and the quality of work-life at the University of Information and Communications Technology, which is one of the formations of the Ministry of Higher Education and Scientific Research in Baghdad, in addition to knowing the relationship and influence between them. The research relied on the descriptive analytical approach based on peer description. The research was analyzed and the research sample consisted of (148) individuals, the sample was chosen using the comprehensive inventory method, data was obtained by relying on the questionnaire which was prepared from ready-made m
... Show MoreThe therapeutic value of the phenolic component and pure thymol was well known; this study comprised the extraction of crude phenol from two plants (Thymus vulgaris and Artemisia annua) which contain thymol with pure thymol and evaluate their effect on hematological and histological by using three different concentrations of each plant extract and pure thymol to tested them on lab mice. All the mice were allowed free access to water and feed for 21 days in laboratory conditions; orally, pure water was administered to the control mice (group I), while groups II, III, and IV were given orally with T. vulgaris, A. annua, combination of last two crude phenol plant extract 50:50 and pure thymol respectively. The levels of CHO, TRI, and HDL were
... Show MoreThe study aims to demonstrate the importance of instructional methods in teaching Arabic language as a second language or teaching the Arabic language to non-native speakers. The study is in line with the tremendous development in the field of knowledge, especially in the field of technology and communication, and the emergence of many electronic media in education in general and language teaching in particular. It employs an image in teaching vocabulary and presenting the experience of the Arabic Language Institute for Non-Speakers-King Abdul-Aziz University. The study follows the descriptive approach to solve the problem represented by the lack of interest in the educational methods when teaching Arabic as a second language. Accordingl
... Show More