Preferred Language
Articles
/
bsj-6211
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 04 2022
Journal Name
Theory And Practice In Language Studies
Investigating EFL Learners’ Ability to Analyse Poetic Language: A Pedagogical Corpus Stylistic Approach
...Show More Authors

Pedagogical stylistics refers to the application of the tools of stylistics in the teaching of the English language as a foreign or a second language.  Teaching and learning poetry is challenging. Thus, pedagogical corpus stylistics (Henceforth, PCS) approach has been introduced to Iraqi undergraduate foreign language learners (EFL) to guide them to analyze poetic language.  The study aims to make students interact with authentic examples of poetic language and answer questions about it. The main objective of the study is to examine whether PCS tools enable the learners to provide linguistic evidence from the poetic texts they are exposed to. This in turn ensures objective poetic analyses. Moreover, it aims to enable EFL Iraqi stu

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Wed May 20 2026
Journal Name
Al–bahith Al–a'alami
The agenda of the French news agency AFP in dealing with the press image of the peaceful resistance The Great Return Marches as a model "an analytical study" “A analytical study”
...Show More Authors

The study aimed to identify the treatment of the press image of the Great Return Marches in the French international news agency AFP by knowing the most important issues, their direction and the degree of interest in them. The study belongs to the descriptive research, and used the survey method, within the context of the content analysis method, and the researcher relied on the content analysis form tool and the interview tool to collect data. The study population is represented in the photos published by the French News Agency about the Great Return Marches during the period (end of March / 2018 until the end of November / 2019. The researcher chose an intentional sample using the Complete Census method. The study material represented

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Prepare a plan for the Total Productive Maintenance in the light of the concurrent engineering A Field Study in AL-Askandria General Company Machanical Industries and AL-Musaib Electric Power Station
...Show More Authors

           Strives Total Productive Maintenance  to increase the overall effectiveness of the equipment through the early involvement in the design and manufacture of equipment productivity. It also operates in an environment of simultaneous engineering work on the synchronization of activities to take advantage of early information by maintenance engineers, design, operation, and that helps to reduce the faults and facilitate future maintenance tasks.

    Has adopted a search in the theoretical concept of the total maintenance productivity and concurrent engineering activities carried out during which the conjunction a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
A New Approach for Developing Spectrophotometric Determination of Phenylephrine Drug in Pure, Pharmaceutics and Serum Samples Using Sodium Periodate as Oxidizing Agent via a Green Method of CFIA/Merging Zone Technique
...Show More Authors

     The research involved a rapid, automated and highly accurate developed CFIA/MZ technique for estimation of phenylephrine hydrochloride (PHE) in pure, dosage forms and biological sample. This method is based on oxidative coupling reaction of 2,4-dinitrophenylhydrazine (DNPH) with PHE in existence of sodium periodate as oxidizing agent in alkaline medium to form a red colored product at ʎmax )520 nm (. A flow rate of 4.3 mL.min-1 using distilled water as a carrier, the method of FIA proved to be as a sensitive and economic analytical tool for estimation of PHE.

Within the concentration range of 5-300 μg.mL-1, a calibration curve was rectilinear, where the detection limit was 3.252 μg.mL

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Effect of thickness on optical properties of pure Epoxy Resin plates
...Show More Authors

In this study, Epoxy Resin plates was prepared by mixing epoxy(A) and hardner(B)with ratio(A:B) (3:1) with different thickness (0.3-0.96)cm. The effect of thickness on optical properties have been studied (absorption ,transmission ,reflectance) also the optical constant were found like (absorption coefficient, extenuation coefficient and refraction index) for all of the prepared plates. The results have shown that by increasing the thickness of plates., the absorption intensity increase in which at plates thickness (0.3-0.96)cm the absorption intensity were(1.54-1.43) respectively, and since absorption peak for epoxy occur in ultraviolet region and exactly at wavelength(368)nm and energy gap(Eg=3.05 eV) thus their good transmittance in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences & Humanities
The Effect of Strategic Foresight on Achieving Strategic Entrepreneurship: Applied Research1
...Show More Authors

he current research aims to determine the extent of interest of the Oil Products Distribution Company (OPDC) and its various departments in the process of strategic foresight (SF), and the extent of interest that is reflected in the achievement of strategic leadership (SE). As well as knowing the nature of the relationship and the impact on the company. To achieve the objectives of the research, one main hypothesis was formulated, and three sub-hypotheses emerged from it. As the research relied on an analytical survey approach, the research targeted the workers within this company, And he reached a set of results, based on which a number of conclusions were formulated. The research community consisted of (185) individuals, and (160)

... Show More
View Publication
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Annals Of Fuzzy Mathematics And Informatics
Topology of cubic bipolar structures and its application on Q-algebra
...Show More Authors

In this paper, we define a cubic bipolar subalgebra, $BCK$-ideal and $Q$-ideal of a $Q$-algebra, and obtain some of their properties and give some examples. Also we define a cubic bipolar fuzzy point, cubic bipolar fuzzy topology, cubic bipolar fuzzy base and for each concept obtained some of its properties.

Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
On Solving Singular Multi Point Boundary Value Problems with Nonlocal Condition
...Show More Authors

In this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.

View Publication Preview PDF
Publication Date
Thu Jul 28 2022
Journal Name
Mechanics Based Design Of Structures And Machines
Experimental investigation on the damping characteristics in dry and saturated sands
...Show More Authors

Scopus (6)
Crossref (6)
Scopus Clarivate Crossref