Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.
This paper includes a comparison between denoising techniques by using statistical approach, principal component analysis with local pixel grouping (PCA-LPG), this procedure is iterated second time to further improve the denoising performance, and other enhancement filters were used. Like adaptive Wiener low pass-filter to a grayscale image that has been degraded by constant power additive noise, based on statistics estimated from a local neighborhood of each pixel. Performs Median filter of the input noisy image, each output pixel contains the Median value in the M-by-N neighborhood around the corresponding pixel in the input image, Gaussian low pass-filter and Order-statistic filter also be used. Experimental results shows LPG-PCA method
... Show MoreNarcissism is a complicated phenomenon that can be reflected in the narcissist’s language. Investigating narcissism in terms of linguistics, and pragmatics in particular, does not seem to have been given its due attention, as this study reveals. Thus, this study is an endeavor to discover how narcissism is reflected in the American movie Big Eyes (2014). It is known for introducing narcissistic behaviors. This paper aims to identify the types, motivations, and pragmatic manifestations of narcissism in the selected movie. Three pragmatic theories are chosen to scrutinize narcissism in the data: Searle’s speech acts (1969), Grice’s maxims breaching (1975), and Culppeper’s impoliteness (1996). To cope with the nature of the
... Show MoreGeographic information system (GIS) is utilized in a variety of tasks such as, resource management, urban planning, emergency planning in case of accident, and rapid response etc. The aim of this study is to produce a digital map with the aid of GIS and a survey data. A survey data is conducted with Total Station technique on sanitary planning positions. The campus of Baghdad University is chosen to test the execution and accuracy of the results for sewer manholes locations. During the field survey, Total Station (Nikon Nivo) is used to identify the 3-D coordinates for each location. Finally, Geographical Information System (GIS) are utilized to present the digital map of the network sewer pipe line to the end users. Although Geographic Inf
... Show MoreThe present study aimed at examining the factors that affect the choice of A major among a sample of BA fe(male) students at the levels 3-8 in King Abdulaziz University (KAU), in Jeddah, Saudi Arabia. To meet this objective, a descriptive survey method was used together with a questionnaire that consisted of 4 axes to answer the central question: What are the factors affecting the choice of a major at the university? Results have shown that the item that measured the students’ ability to choose the major ranked (First); it was concerned with the effect on the students' choice of his/her major in the university. On the last position and with respect to this effect came the professional tendencies and desires. Results have also shown tha
... Show MoreResearchers are interested in the issue of children abuse and they look for its cause in the past and present. Their interest is limited to identifying penal liability which is caused by children abuse away from focusing on civil liability. So, the study is going to clarify the parents' responsibility for children abuse rather than civil liability of the medic in case he wouldn’t notify the authorities about the case according to the American law rules and the attitude of Iraqi law rather than some judicial application of civil cases that were exposed to American judiciary concerning children abuse.
Racism changes its meaning, shape, purpose or function according to various factors such as time, place, motives, and backgrounds; among others. It seems, however, to have deep roots back in the history of mankind. Such a concept stems from a perceived difference with the other. It is fed by the feeling of being hierarchically superior in opposition to another party that is depicted as inferior. Since ancient times, racism is disguised in different forms and manifests itself on various levels. It is a truism that this ideology can be best presented via language.
Due to its negative implication, racism lends itself to a critical kind of research. As such, this paper is a critical pragmatic investigation for this phenomenon a
... Show MoreThe determination of aerodynamic coefficients by shell designers is a critical step in the development of any projectile design. Of particular interest is the determination of the aerodynamic coefficients at transonic speeds. It is in this speed regime that the critical aerodynamic behavior occurs and a rapid change in the aerodynamic coefficients is observed. Two-dimensional, transonic, flow field computations over projectiles have been made using Euler equations which were used for solution with no special treatment required. In this work a solution algorithm is based on finite difference MacCormack’s technique for solving mixed subsonic-supersonic flow problem. Details of the asymmetrically located shock waves on the projectiles hav
... Show MoreThe article considers a creolized text as a means of modern communication, describing its key verbal and visual components; the relationship of concepts polycode and creolized text has been shown; the universal basic image features have been called; the following kinds of creolized texts have been distinguished; it has been proved that the effective means of attracting the attention of the addressee is the use of expressive font features, which are divided into two groups: topographics (mechanisms of varying of areal syntagmatic of a text) and supragraphcs (change of typeface of font).
In the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic
... Show More