Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Due to the significant role in understanding cellular processes, the decomposition of Protein-Protein Interaction (PPI) networks into essential building blocks, or complexes, has received much attention for functional bioinformatics research in recent years. One of the well-known bi-clustering descriptors for identifying communities and complexes in complex networks, such as PPI networks, is modularity function. The contribution of this paper is to introduce heuristic optimization models that can collaborate with the modularity function to improve its detection ability. The definitions of the formulated heuristics are based on nodes and different levels of their neighbor properties. The modulari
... Show MoreBackground: TIDM is known to be polygenic disease that appears from the interaction of mutation in multiple genes including HLA. The autoimmune mediated destruction of
pancreatic β-cells is reflected by the presence of autoantibodies against prominent antigens in the pancreatic β-cells.
Objective: This study was designed to investigate the role of HLA-class I and class II antigens in the etiology of type 1 diabetes mellitus (T1DM) and also assessment of
glutamic acid decarboxylase (GAD65) autoantibodies in the patients at the onset of the disease.
Patients & Methods: Sixty T1DM patients who were newly onset of the disease (diagnosed less than five months) were selected. Eighty apparently healthy
Background: There are various secreted proteins affecting the prognosis of oral squamous cell carcinoma (OSCC) and one of them is Angiopoietin-2(Ang-2) which is thought to have an essential role in the development and progression of the tumor. Aim of the study: This study was conducted to determine the expression of (Ang-2) in (OSCC) to assess its correlations with clinicopathological parameters of the tumor. Material and Methods: 36 formalin- fixed, paraffin- embedded tissue blocks histologically diagnosed as OSCC were examined for Ang-2 immunohistochemical expression semi quantitively. Results: The expression of Ang-2 was significantly associated with histopathological grade (P value=0.023), while there is no significant association wi
... Show MoreGestational diabetes mellitus (GDM) is a complication of gestation that is characterized by impaired glucose tolerance with first recognition during gestation. It develops when ?- cell of pancreas fail to compensate the diminished insulin sensitivity during gestation. This study aims to investigate the relationship between mother adiponectin level and ?- cell dysfunction with development gestational diabetes mellitus (GDM) and other parameters in the last trimester of pregnancy. This study includes (80) subjects ( pregnant women) in the third trimester of pregnancy, (40) healthy pregnant individuals as control group aged between (17 - 42) years and (40) gestational diabetes mellitus patients with aged between (20 - 42) years. The f
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreThis review will focus on protein and peptide separation studies of the period 1995 to 2010. Peptide and protein analysis have developed dramatically after applying mass spectrometry (MS) technology and other related techniques, such as two-dimensional liquid chromatography and two-dimensional gel electrophoresis. Mass spectrometry involves measurements of mass-to-charge ratios of the ionized sample. High-performance liquid chromatography (HPLC) is an important technique that is usually applied before MS is conducted due to its efficient separation. Characterization of proteins provides a foundation for the fundamental understanding of biology aspects. In this review, instrumentation, principle, applications, developments, and accuracy o
... Show More