Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.
A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThis paper examines the mechanical properties of a composite material made of modified Iraqi gypsum (juss) reinforced with polypropylene fibers. The modified juss was prepared by adding two percentages of cement (5, 10) %. Two percentages of polypropylene fibers were used, to reinforce the modified juss (1, 2) %. The water/dry compound ratio used was equal to 0.53%. The composite was evaluated based on compressive strength, flexural strengths, absorption percentage, density, acoustic impedance, ultra - pulse velocity, longitudinal shrinkage and setting time tests. The results indicated that the inclusion of cement on to juss increases the compressive strength, absorption percentage, density, acoustic impedance, ultra - pulse velocit
... Show MoreThe present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy
... Show MoreThe research is aimed at dynamics the dynamics of the artistic form within the theater and the dynamics of this movement in the development of the form and the multiplicity of meaning. This research came to address a problem of great importance in the creation of the image and the form of theatrical presentation. The evolution and transformation within the display system requires a dynamic structure that enables the form of growth and growth. The aim of the research was to identify the dynamics of form in the Iraqi theater. The researcher then identified two terms: form and motor.
In the theoretical framework, it was divided into two sections: the first (the dynamics of the artistic form) and the second (the dynamics of the act of dir
Playing is the only common language among children in every place and time, to the fact that what distinguishes the children is their quest to play and fun way innate, not acquired, which is expressed with the child really is one of the rights. And play a key entrance to the growth of the child mentally, intellectually and cognitively and not for the child emotionally and socially just. In the play the child begins to identify and classify objects and learn concepts and circulate among themselves on a linguistic basis. Activity here and play a major role in leading the linguistic development of the child in the composition has the communication skills.
The Games (especially intellectual ones) Whatever the cause of the development
... Show MoreThe key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.
The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty
The upbringing of Yehuda Amichai and the conditions he lived in had a great influence on his deep sense of pain, which made him think of death and suicide. Especially after the Nazis came to power in Germany, and his emigration with his family. Amichai searched for love throughout his life, and his failure was one of the most important factors affecting his psyche, which is A deep influence that made him live in harsh and painful pains that broke him, and prevented her from achieving his ambitions in life.Dramatic texts are characterized by repetition in writing and presentation. It is a textual discourse that has two advantages, first, that it can be read as a literary text like all other literary texts, and second, that it can be consider
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
This study concerns the removal of a trihydrate antibiotic (Amoxicillin) from synthetically contaminated water by adsorption on modified bentonite. The bentonite was modified using hexadecyl trimethyl ammonium bromide (HTAB), which turned it from a hydrophilic to a hydrophobic material. The effects of different parameters were studied in batch experiments. These parameters were contact time, solution pH, agitation speed, initial concentration (C0) of the contaminant, and adsorbent dosage. Maximum removal of amoxicillin (93 %) was achieved at contact time = 240 min, pH = 10, agitation speed = 200 rpm, initial concentration = 30 ppm, and adsorbent dosage = 3 g bentonite per 1L of pollutant solution. The characterization of the adsorbent, modi
... Show More