Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.
The general crisis of research methods in the social sciences
Research methodology: philosophy and techniques, founded by philosophers and applied by scientists, and no accurate application of techniques except with a deep understanding of philosophy, as a prerequisite. This fact is almost completely absent from the Iraqi and Arab academic mentality. This constituted one of the dimensions of the double crisis - theoretical and applied - of research methods in the social sciences. As first, there is no philosophy of science, neither as an independent material nor as an introductory subject, but not even an oral confirmation. Secondly, the advancement of quantitative research methods are presented without a background philosophy, as sol
The atomic properties have been studied for He-like ions (He atom, Li+, Be2+ and B3+ions). These properties included, the atomic form factor f(S), electron density at the nucleus , nuclear magnetic shielding constant and diamagnetic susceptibility ,which are very important in the study of physical properties of the atoms and ions. For these purpose two types of the wave functions applied are used, the Hartree-Fock (HF) waves function (uncorrelated) and the Configuration interaction (CI) wave function (correlated). All the results and the behaviors obtained in this work have been discussed, interpreted and compared with those previously obtained.
Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThe paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main
... Show MoreThe Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr
A field experiment was conducted on the form of the Dept. of Field Crop Sci. / College of Agriculture / University of Baghdad in spring and fall seasons of 2009 and 2010 . Ten inbreds of maize were planted and crossed to each other to produce single crosses . In the second season, single crosses were planted along with thin parent to produce three – way and double crosses . In the third seasons panet and crosses were planted . Crosses were selfed to produce F2 seeds and increase seeds of inbreds . In the fourth season, all grin types were planted , and their agronomic traits were evaluated . Values of P of inbreds , F1 and F2 were calculated for agronomic traits . The new formula to predict inbreeding depression ( ID ) F2 plant without gr
... Show MoreAASAH Enass J Waheed, Shatha MH Obaid, Research Journal of Pharmaceutical, Biological and Chemical Sciences, 2019 - Cited by 5
KE Sharquie, GA Ibrahim, AA Noaimi, HK Hamudy, J Saudi Soc Dermatol Dermatol Surg, 2010 - Cited by 2
Objective: To conduct a standardized method for cavity preparation on the palatal surface of rat maxillary molars and to introduce a standardized method for tooth correct alignment within the specimen during the wax embedding procedure to better detect cavity position within the examined slides. Materials and methods: Six male Wistar rats, aged 4-6 weeks, were used. The maxillary molars of three animals were sectioned in the frontal plane to identify the thickness of hard tissue on the palatal surface of the first molar which was (250-300µm). The end-cutting bur (with a cutting head diameter of 0.2mm) was suitable for preparing a dentinal cavity (70-80µm) depth. Cavity preparation was then performed using the same bur on the tooth
... Show More