Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.
From a medical perspective, autoimmunity reflects the abnormal behaviour of a human being. This state is shaped when the defense of an organism betrays its own tissues. Allegedly, the immune system should protect the body against attacking cells. When an autoimmune disease attacks, it results in perilous actions like self-destruction. However, from a psychological perspective, the French philosopher Jacques Derrida (1930-2004) explains that autoimmunity harms both the self and the other. As a result, the organ disarms the betraying cells, as the immune system cannot provide necessary protection. From a literary perspective, Derrida has termed autoimmunity as deconstruction for almost forty years. Autoimmunity starts with the stage of a norm
... Show MoreData <span>transmission in orthogonal frequency division multiplexing (OFDM) system needs source and channel coding, the transmitted data suffers from the bad effect of large peak to average power ratio (PAPR). Source code and channel codes can be joined using different joined codes. Variable length error correcting code (VLEC) is one of these joined codes. VLEC is used in mat lab simulation for image transmission in OFDM system, different VLEC code length is used and compared to find that the PAPR decreased with increasing the code length. Several techniques are used and compared for PAPR reduction. The PAPR of OFDM signal is measured for image coding with VLEC and compared with image coded by Huffman source coding and Bose-
... Show MoreThis study illustrates the impact of non-thermal plasma (Cold Atmospheric Plasma CAP) on the lipids blood, the study in vivo. The lipids are (cholesterol, HDL-Cholesterol, LDL-Cholesterol and triglyceride) are tested. (FE-DBD) scheme of probe diameter 4cm is used for this purpose, and the output voltage ranged from (0-20) kV with variable frequency (0-30) kHz. The effect of non-thermal atmospheric plasma on lipids were studied with different exposure durations (20,30) sec. As a result, the longer plasma exposure duration decreases more lipids in blood.
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
Photovoltaic (PV) devices are widely used renewable energy resources and have been increasingly manufactured by many firms and trademarks. This condition makes the selection of right product difficult and requires the development of a fast, accurate and easy setup that can be implemented to test available samples and select the cost effective, efficient, and reliable product for implementation. An automated test setup for PV panels using LabVIEW and several microcontroller-based embedded systems were designed, tested, and implemented. This PV testing system was fully automated, where the only human intervention required was the instalment of PV panel and set up of required testing conditions. The designed and implemented system was
... Show MoreThe present study aims to identify the most and the least common teaching practices among faculty members in Northern Border University according to brain-based learning theory, as well as to identify the effect of sex, qualifications, faculty type, and years of experiences in teaching practices. The study sample consisted of (199) participants divided into 100 males and 99 females. The study results revealed that the most teaching practice among the study sample was ‘I am trying to create an Environment of encouragement and support within the classroom which found to be (4.4623). As for the least teaching practice was ‘I use a natural musical sounds to create student's mood to learn’ found to be (2.2965). The study results also in
... Show MoreThe subject of this study is one of the most interactive media networks, which is the Instagram.The study uses a descriptive approach and focuses on how Instagram turns from a media tool to a marketing tool. The study problematic consists of this question: How Instagram turns to a marketing tool, and what are the advantages and the disadvantages for that?This study highlights the definition of Instagram, the creation of it and its improvement, the Instagram in Bahrain, the Instagram uses, the Instagram as a marketing tool, and the advantages and disadvantages of using Instagram for marketing.The study confirms that Instagram is a new media network, and focuses on how it develops on later stages and mentions the increase of the percentage
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8