Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
The investment portfolio of financial instruments & banking relatively new in the banking sector & the world of investment &capital markets in spite of its importance & its advantages in terms of the nature of the diversity of investment instruments as well as reduce the risk of investment & its contribution to the revitalization of the banks & the financial market , economic, &characterized by developments accelerated under information & communications technology , as is the portfolio tool vehicle of investment tools that provide for people who want to invest & they can not manag
... Show MoreThe tourism activity is one of the pillars on which the economy of any country is based , the importance of the tourism sector is reflected in its potential to become an effective development alternative in many countries, especially Iraq ,this has a direct impact on the national economy as an important source in attracting hard currency and eliminating unemployment. Adding the Iraqi Marshlands to the list of effects makes it contribute to diversification of sources of income and stimulating rest of the economic sectors, the potentials and qualifications possessed by Iraq in the field of tourism and monuments have a significant impact on the state budget if they were exploited optimally. The research aims at identifying the contr
... Show MoreHypoxic training, which in turn is one of the methods adopted in sports training methods, especially in activities that depend on the aerobic system in its performance, which includes training with a lack of oxygen by reducing its molecular pressure, since this method targets functional organs and works temporary responses during training and permanent responses After training as an adaptation to these devices as a result of training in this way, the study aimed to identify the effect of hypoxic exercises using the training mask and the extent of the change in some biochemical indicators, in addition to that to identify the effect of these exercises on the indicator of energy expenditure and )VMA) and the achievement of the effectiveness of
... Show MoreA chemical study was carried out to evaluate the efficiency of the liver enzyme concertation and uric acid level and its antagonists in the serum of the professors exposed to chemicals in the laboratories of the University of Samarra and their comparison with the healthy people. The research included 25 samples of the exposed professors and 20 samples as a group of officers.
The results of the current study showed a significant increase in the level of AST, ALT in the serum of professors exposed to chemicals compared to healthy people. The results showed no significant increase in
... Show MoreExcessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M
... Show MoreThe commercial job is one of the most important businesses in the cities as there is no city can exist without commercial markets to offer service to its inhabitants. This study aims to distribute the commercial function in Abu Tayara Street located in the municipality of Al-Dora by highlighting the size of such businesses in this street. It focuses on analyzing the change that has occurred due to the usages of the commercial land not only in the residential areas, but also in various aspects associated with the growth of the population in the city. Both expansion and development of the economic and social aspects in the area have increased the demand for commercial services. So, the research focuses on the aspects of functional speciali
... Show Moreبعد ثورة تموز عام 1958في العراق, لم يكن يسمح للقطاع الخاص بأن تكون له استثمارات كبيرة في القطاعات الاقتصادية. وذلك بسبب الإيديولوجيات التي كانت تؤطر الفكر السياسي. حيث كان النهج الاشتراكي هو الغالب في إدارة الأنشطة الاقتصادية. إذ قامت الدولة بتأميم معظم الاستثمارات الخاصة الكبيرة ،لاس
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show More