Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
Huwaiza marsh is considered the largest marsh in the southern part of Iraq. It is located between 31° and 31.75° latitude and extends over the Iraqi-Iranian border; but the largest part lies in Iraq. It is located to the east of Tigris River in Messan and Basra governorates.
In this research, the variation of some water quality parameters at different locations of Huwaiza marsh were studied to find out its efficacy in the treatment of the contamination coming from the wastewater outfall of Kahlaa brokendown sewage treatment plant which lies on the Kahlaa River. This rive is the main feeder of Huwaiza marsh. Ten water quality sampling locations were chosen in this marsh. The water samples were taken during 2009 for three months; Janu
Objective(s): The aim of this study is to assess the impact of social phobia upon self-esteem of nursing
collegians.
Methodology: A Cross-sectional study is carried out at University of Baghdad, Karkuk, Thi-Qar, and Kufa,
colleges of nursing from Feb 8
th
, 2011 to Sep. 25th, 2011. A sample of all first class nursing collegians (N=330)
were selected from a probability sample of nursing colleges by dividing Iraq to three geographical areas (South,
North, and Middle Euphrates) in addition to Baghdad. The data were collected through the use of selfadministered
technique as a mean for data collection, by using a questionnaire that consists of three parts:
First part was the socio-demographic data form; the second o
Ecosystems provide humans with services that include benefits from food, fresh water, climate regulation, and socio-economic assets. The Mesopotamian marshlands are among the largest wetlands in the Middle East and they provide various benefits. However, ecosystem services of the Marshlands are consistently undervalued in national economic analysis and decision making. This study focusses on the Central Marshes, the first National Park in Iraq, and is the first attempt at valuing a series of ecosystem services from a valuable natural ecosystem in Iraq. We adopted the Toolkit for Ecosystem Services Site-Based Assessment (TESSA) for the determination of biophysical and economic values of services at the site level. Data on key ecosystem se
... Show MoreThis study aims to model the flank wear prediction equation in metal cutting, depending on the workpiece material properties and almost cutting conditions. A new method of energy transferred solution between the cutting tool and workpiece was introduced through the flow stress of chip formation by using the Johnson-Cook model. To investigate this model, an orthogonal cutting test coupled with finite element analysis was carried out to solve this model and finding a wear coefficient of cutting 6061-T6 aluminum and the given carbide tool.
In a world where tourism has become the leading industry on the market, sustainable tourism has found its place and is becoming a major player in the network of traveling Internet users. Hospitality, solidarity and conviviality are essential are giving meaning to sharing. This “extra soul” has the capacity to enrich moments, places, attractions and heritage. Archaeological heritage sites constitute an important factor for the economic and social life of a large number of countries, the development policy came to emphasize the safeguard and the preservation of landscapes and natural or man-made sites, against the attacks which have impoverished the cultural heritage, this heritage
Background: Plants used in folk medicine for
the treatment of peptic ulcer diseases is a very
promising approach to overcome the limitations of
classical medicines.
Aim: To explore the efficacy of medicinal
plants, namely turmeric, garlic and marshmallow,
in eradication of H. pylori.
Methods: This prospective study was carried out
on 225 of well-known dyspeptic patients who were
divided into four groups; a control group (received
classical medical therapy) and three other groups
that received one of the three medicinal plants,
plus the same therapy used in the control group.
The follow up was done by using a questionnaire
form, endoscopic examination, and determination
of serum levels of anti
Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection
... Show More