Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreBackground: The aim of this study is to evaluate the color change ∆E of the dental enamel following treatment with 2 kinds of protector (icon infiltrant, clinpro varnish) before fixed orthodontic treatment to avoid the possible white spot lesions. Materials and Methods: Fifty four subjects treated with fixed appliances were divided into 3 groups: the 1st group was control, while the 2nd and 3rd groups were treated with icon infiltrant and clinpro varnish before bonding procedure, respectively. Color parameters (L,a,b) were recorded for the middle and gingival thirds before and after bonding procedure to get the ∆E of each group. Results: One-way ANOVA test showed a non-significant difference in ∆E between the 3 groups a
... Show MoreThe aim of this paper, is to study different iteration algorithms types two steps called, modified SP, Ishikawa, Picard-S iteration and M-iteration, which is faster than of others by using like contraction mappings. On the other hand, the M-iteration is better than of modified SP, Ishikawa and Picard-S iterations. Also, we support our analytic proof with a numerical example.
In this paper, we introduced some fact in 2-Banach space. Also, we define asymptotically non-expansive mappings in the setting of 2-normed spaces analogous to asymptotically non-expansive mappings in usual normed spaces. And then prove the existence of fixed points for this type of mappings in 2-Banach spaces.
This study aimed to determine the nickel (Ni), and chromium (Cr) ions amounts and investigate their potential effects on thyroid hormones in patients' saliva who were receiving treatment with fixed orthodontic appliances (FOA). In this study, 42 FOA volunteers participated, and all samples were obtained from a specialized center for manufacturing and orthodontics in Bab Al-Moadham, Baghdad, Iraq. According to the findings, individuals with fixed orthodontics have significantly higher levels of the thyroid hormones (P<0.05) FT3 and FT4 than those who did not have orthodontic treatment, whereas there were no significant changes in TSH (P=0.599). Additionally, the amounts of Ni+2 and Cr+3
... Show MoreOur aim was to investigate the changes in the myocardium stiffness index for patients suffering from systemic hypertension, and to assess their left ventricular performance. We studied 263 hypertensive patients and 166 healthy subjects as a control group. By using conventional Doppler echocardiography, the following parameters were measured—Left ventricular end diastolic diameter, left ventricular end systolic diameter, transmitral early velocity, isovolumic relaxation time, and isovolumic contraction time. Tissue Doppler imaging (TDI) was used in the measurements of the early mitral annular velocity (Ea) and the diastolic stiffness was obtained by calculating the ratio E\Ea\LVIDd. Index myocardial performance (IMP) was calculated
... Show MoreOrganic Permeable Base Transistors (OPBTs) reach a very high transit frequency and large on-state currents. However, for a later commercial application of this technology, a high operational stability is essential as well. Here, the stability of OPBTs during continuous cycling and during base bias stress is discussed. It is observed that the threshold voltage of these transistors shifts toward more positive base voltages if stressed by applying a constant potential to the base electrode for prolonged times. With the help of a 2D device simulation, it is proposed that the observed instabilities are due to charges that are trapped on top of an oxide layer formed around the base electrode. These charges are thermally released after rem
... Show MoreThis paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different
... Show MoreA robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show More