Preferred Language
Articles
/
bsj-6211
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 16 2020
Journal Name
Route Educational & Social Journal
Effect of applying the QR-Code system for acquisition chemistry and creative thinking in of first class female student at intermediate schools.
...Show More Authors

This research aims at identifying the system of applying the QRcode system for acquisition of chemistry by first class female students studying at intermediate schools knowledge and its effect on creative thinking. The research sample consisted of (63) female students in one of the intermediate schools in Baghdad/Iraq using two equivalents experimental and control groups. The scientific context used was based on the chemistry text book related to the periodic table, (Metals) for the first group of students and Alkaline metals,Nonmetals, Metalloides) for the second group. The research methodology employed consisted of the followings :Measuring students acquisition using (35) issues. The results were verified for their face validity and obtai

... Show More
Publication Date
Thu Aug 02 2018
Journal Name
European Journal Of Oral Sciences
Identification of key determinants in<i>Porphyromonas gingivalis</i>host-cell invasion assays
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 10 2017
Journal Name
Al-academy
The Dynamics of the artistic form in the Iraqi theater
...Show More Authors

The research is aimed at dynamics the dynamics of the artistic form within the theater and the dynamics of this movement in the development of the form and the multiplicity of meaning. This research came to address a problem of great importance in the creation of the image and the form of theatrical presentation. The evolution and transformation within the display system requires a dynamic structure that enables the form of growth and growth. The aim of the research was to identify the dynamics of form in the Iraqi theater. The researcher then identified two terms: form and motor.
In the theoretical framework, it was divided into two sections: the first (the dynamics of the artistic form) and the second (the dynamics of the act of dir

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 10 2017
Journal Name
Al-academy
Form and function in the design of intellectual toys
...Show More Authors

Playing is the only common language among children in every place and time, to the fact that what distinguishes the children is their quest to play and fun way innate, not acquired, which is expressed with the child really is one of the rights. And play a key entrance to the growth of the child mentally, intellectually and cognitively and not for the child emotionally and socially just. In the play the child begins to identify and classify objects and learn concepts and circulate among themselves on a linguistic basis. Activity here and play a major role in leading the linguistic development of the child in the composition has the communication skills.

The Games (especially intellectual ones) Whatever the cause of the development

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Materials Science In Semiconductor Processing
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

View Publication
Scopus (54)
Crossref (50)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Effect of Sn Addition on Phase Transformation Behavior of Equiatomic Ni-Ti Shape Memory Alloy
...Show More Authors

Sn effect on the phase transformation behavior, microstructure, and micro hardness of equiatomic Ni-Ti shape memory alloy was studied. NiTi and NiTiSn alloys were produced using vacuum induction melting process with alloys composition (50% at. Ni, 50% at.Ti) and (Ni 48% at., Ti 50% at., Sn 2% at.). The characteristics of both alloys were investigated by utilizing Differential Scanning Calorimetry, X- ray Diffraction Analysis, Scanning Electron Microscope, optical microscope and vicker's micro hardness test. The results showed that adding Sn element leads to decrease the phase transformation temperatures evidently. Both alloy samples contain NiTi matrix phase and Ti2Ni secondary phase, but the Ti2Ni phase content dec

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Aip Conference Proceedings
Macro controlling of copper oxide deposition processes and spray mode by using home-made fully computerized spray pyrolysis system
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
INTERACTION EFFECTS OF HYDRODYNAMICALLY FULLY DEVELOPED PRIMARY FLOW AND SECONDARY FLOW IN THE THERMAL ENTRANCE REGION OF ANNULAR DUCT
...Show More Authors

Experiments have been conducted to study the local and average heat transfer by mixed
convection for hydrodynamically fully developed, thermally developing and fully developed
laminar upward air flow in an inclined annulus with adiabatic inner cast iron tube and uniform
heated outer aluminum tube with an aspect ratio ( Ω = 0.72) and (L/Dh≈40) for both calming and
test sections). A wide range of Reynolds number from 859 to 2024 has been covered, and heat
flux has been varied from 159 W/m2 to 812 W/m2 (these values of heat flux and Reynolds
number gave Richardson number range from 0.03 to 0.٣٨), with angles of annulus inclination
φ =0o (horizontal position), φ =60o (inclined position), and φ =90o (vertical posi

... Show More
View Publication Preview PDF
Crossref