Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.
The ability of microorganisms to attach to living and non-living surfaces and create a biofilm is the cause of numerous long-lasting illnesses, as well as their strong resistance to drugs. Bacterial biofilms consist of intricate assemblies of immobile bacteria. These are located in an extracellular matrix and adhere to various surfaces for a long period. The present study evaluated the antibacterial effectiveness of Plantago major extract against Staphylococcus aureus biofilm. The specimens analyzed in this investigation were skin infections of clinical origin. The current study was not previously studied, particularly in terms of S. aureus biofilm breakdown and inhibition. The disc diffusion method was used to test the antimicrobial activi
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
In this research, the effect of changing the flood level of Al-Shuwaija marsh was studied using the geographic information systems, specifically the QGIS program, and the STRM digital elevation model with a spatial analysis accuracy of 28 meters, was used to study the marsh. The hydraulic factors that characterize the marsh and affecting on the flooding such as the ranks of the water channels feeding the marsh and the degree of slope and flat areas in it are studied. The area of immersion water, the mean depth, and the accumulated water volume are calculated for each immersion level, thereby, this study finds the safe immersion level for this marsh was determined.
Hydrocarbon displacement at the pore scale is mainly controlled by the wetness properties of the porous media. Consequently, several techniques including nanofluid flooding were implemented to manipulate the wetting behavior of the pore space in oil reservoirs. This study thus focuses on monitoring the displacement of oil from artificial glass porous media, as a representative for sandstone reservoirs, before and after nanofluid flooding. Experiments were conducted at various temperatures (25 – 50° C), nanoparticles concentrations (0.001 – 0.05 wt% SiO2 NPs), salinity (0.1 – 2 wt% NaCl), and flooding time. Images were taken via a high-resolution microscopic camera and analyzed to investigate the displacement of the oil at dif
... Show MoreEmpirical research in the disciplines of art and design has started to escalate and gather consideration within the academic community over the past few decades. However, still, graphic design tends to be a topic extremely under-researched by scholarly persons. Profound research in the field of graphic design extends far beyond the works produced by the designer himself (Khoury, 2009, p.844). In order to develop a clear insight, one needs to delve deep into the subcategories that the diverse field of graphic design is comprised of, including illustration, typography, interaction design, branding and even the impact of notable, eminent institutes from around the world that have taken the budding artists for quite a long time (Walke
... Show MoreIn this work, HgBa2CaCu2-xSbxO8+δ compounds with (x = 0.2, 0.4, 0.6 and 0.8) have been prepared by the solid-state reaction method. Structural, morphological, and electrical properties were investigated using X-ray diffraction (XRD) and scanning electron microscope (SEM) techniques. Using the 4-probe technique to study the effect of antimony-substitution for Copper on the electrical properties of HgBa2CaCu2-xSbxO8+δ (Hg-1212) phase was investigated by measuring the resistivity as a function of temperature. Results indicate that the addition of antimony (Sb) increases the volume fraction of the phase and changes the superconducting transition temperature Tc of the superconductor to a normal state. The dielectric loss factor and ac
... Show MoreEstimations of average crash density as a function of traffic elements and characteristics can be used for making good decisions relating to planning, designing, operating, and maintaining roadway networks. This study describes the relationships between total, collision, turnover, and runover accident densities with factors such as hourly traffic flow and average spot speed on multilane rural highways in Iraq. The study is based on data collected from two sources: police stations and traffic surveys. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. The se
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreCadastral maps are the main documents of ownership and plots of land, as it contribute to preserving the property rights of individuals and institutions. It indicates the size and shape of each parcel and reveals geographic relationships that affect property value. The Iraqi cadastral maps are in old coordinate system AL-nahrwan 1934 and lambert conformal conic projection. Therefore these maps are old and unfit for use. The main objective of this paper is to investigate the effect of cartographic properties on updating cadastral maps. This depends on studying the effect of conversion the projection and the datum of the cadastral maps of the study area from (datum: nahrwan34, projection: lambert confo