Preferred Language
Articles
/
bsj-6211
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Thu May 14 2020
Journal Name
Journal Of Planner And Development
Cities of Lebanon from "Planning to Congestion Towards a "flexible mobility culture
...Show More Authors

This paper examines the change in planning pattern In Lebanon, which relies on vehicles as a semi-single mode of transport, and directing it towards re-shaping the city and introducing concepts of "smooth or flexible" mobility in its schemes; the concept of a "compact city" with an infrastructure based on a flexible mobility culture. Taking into consideration environmental, economical and health risks of the existing model, the paper focuses on the four foundations of the concepts of "city based on culture flexible mobility, "and provides a SWOT analysis to encourage for a shift in the planning methodology.

View Publication Preview PDF
Publication Date
Tue Sep 16 2025
Journal Name
Construction Materials
Molasses-Modified Mortars: A Sustainable Approach to Improve Cement Mortar Performance
...Show More Authors

The utilization of sugarcane molasses (SCM), a byproduct of sugar refining, offers a promising bio-based alternative to conventional chemical admixtures in cementitious systems. This study investigates the effects of SCM at five dosage levels, 0.25%, 0.50%, 0.75%, 1.00%, and 1.25% by weight of cement, on cement mortar performance across fresh, mechanical, thermal, durability, and density criteria. A comprehensive experimental methodology was employed, including flow table testing, compressive strength (7, 14, and 28 days) and flexural strength measurements, embedded thermal sensors for real-time hydration monitoring, water absorption and chloride ion penetration tests, as well as 28-day density determination. Results revealed clear

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed May 01 2024
Journal Name
Journal Of Physics: Conference Series
A modified ARIMA model for forecasting chemical sales in the USA
...Show More Authors
Abstract<p>model is derived, and the methodology is given in detail. The model is constructed depending on some measurement criteria, Akaike and Bayesian information criterion. For the new time series model, a new algorithm has been generated. The forecasting process, one and two steps ahead, is discussed in detail. Some exploratory data analysis is given in the beginning. The best model is selected based on some criteria; it is compared with some naïve models. The modified model is applied to a monthly chemical sales dataset (January 1992 to Dec 2019), where the dataset in this work has been downloaded from the United States of America census (www.census.gov). Ultimately, the forecasted sales </p> ... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESIS NEW LIQUID ELECTRODES FOR DETERMINATION DOMPERIDONE MALEATE BASED ON A MOLECULARLY IMPRINTED POLYMER: SYNTHESIS NEW LIQUID ELECTRODES FOR DETERMINATION DOMPERIDONE MALEATE BASED ON A MOLECULARLY IMPRINTED POLYMER
...Show More Authors

Liquid electrodes of domperidone maleate (DOMP) imprinted polymer were synthesis based on precipitation polymerization mechanism. The molecularly imprinted (MIP) and non-imprinted (NIP) polymers were synthesized using DOMP as a template. By methyl methacrylate (MMA) as monomer, N,Nmethylenebisacrylamide (NMAA) and ethylene glycol dimethacrylate (EGDMA) as cross-linkers and benzoyl peroxide (BP) as an initiator. The molecularly imprinted membranes were synthesis using acetophenone (APH), di-butyl sabacate (DBS), Di octylphthalate (DOPH) and triolyl phosphate (TP)as plasticizers in PVC matrix. The slopes and limit of detection of l

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
Form and content in book covers designs
...Show More Authors

   Despite the development in the fields of communication and informatics, the book remains its distinguished presence and popular popularity as it is the oldest means to obtain knowledge, addressing the vast majority of society in different levels and levels of knowledge and culture. The design of the cover book portal and the structure of semolina semantic including the elements of construction and typography contribute to the activation of the relationship between form and content, and here lies the importance of this relativity and its role in enhancing the communicative dimension of the design of the book cover, and cast a shadow on the promotional and marketing effectiveness. Hence the importance of research, but the prob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
Attributes of the figure in the work of Afifa Aleiby
...Show More Authors

The experiments and artistic performances in contemporary Iraqi painting varied between objective simulation and experimentation in other invisible worlds through metaphor and employment to express the latent implications between the human relationship with the tangible and the intangible. The research problem contained the answer to the following questions to understand the formal features in Afifa Laibi's drawings: What are the formal features of Afifa Laibi's drawings and what are the intellectual transformations that she embodied in presenting her subjective subjects? Did the Iraqi and global environmental changes and influences contribute to the forms of Afifa Laibi? The importance of the research also lies in the study of one of th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 05 2024
Journal Name
Al-academy
THE SYSTEM OF SHAPE IN SOME OF PICASSOS CERAMICS
...Show More Authors

Picasso ceramics represented illuminated sign in ceramic art and excelled in accord ceramic art dimension aesthetically, and put it in a new prospects, despite the simplicity of the forms turn into a magical images and multiple interpretations.
So the search deliberately to choose purposive (37) samples divided into four groups, as follows: -
A flat shapes / palets or saucers / the vases /modified vases .
benefiting from indicators were spawned from literature ,to analyzing samples within the totals for the identification systems act forming art work`s:-
(1)Picasso's ceramic work product of a deliberate process represented a capacity of technical experience, and formal
(2)The system configuration in the ceramic art works c

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 21 2022
Journal Name
Al-academy
خصائص الشكل في منحوتات مرتضى حداد
...Show More Authors
يهتم البحث بدراسة الشكل في منحوتات الفنان مرتضى حداد ، والبحث عن خصائصه الفنية، وعلى وفق ذلك تمت صياغة عنوان البحث بالصيغة آلاتية: خصائص الشكل في منحوتات الفنان مرتضى حداد. شيد البحث على أربعِ مباحث؛ وتتقدمها مقدمة ثُبتت فيها مشكلة البحث التي قام على أساسها هذا البحث ، وكذلك أهمية البحث وبيان مدى الحاجة إليه ، وكذلك تحديد هدف البحث وهو الكشف عن خصائص الشكل في منحوتات الفنان مرتضى حداد ، فضلاً عن ح
... Show More
View Publication Preview PDF