Preferred Language
Articles
/
bsj-6211
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Rhetorical connections to the head-covers of Mesopotamian gods: جهينة حامد حساني
...Show More Authors

The Rafidian artist discussed the headdresses of his idols with a varied scholarly momentum, so each idol had its own cover as this door of diversity contributed to the enrichment of Rafidian thought and full knowledge of their ideas and beliefs consistent with their multiple symbolic connections such as architecture, for example. The previous one, if not its entirety.
A research such as this (the discursive connections to the head-covers of the deities of the Mesopotamian civilization) aims to clarify the confusion that occurs through four chapters: The first chapter included: the research problem, the importance of research and the need for it, the objectives of the research, the temporal, spatial and objective limits of research, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Physics: Conference Series
Manufacturing and studying the effect of partial substitution on the properties of the compound Bi<sub>2-x</sub> Ag<sub>x</sub>Sr<sub>1.9</sub>Ba<sub>0.1</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> superconductors.
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Results In Physics
Alpha clustering preformation probability in even-even and odd-A<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e3355" altimg="si39.svg"><mml:msup><mml:mrow /><mml:mrow><mml:mn>270</mml:mn><mml:mo>−</mml:mo><mml:mn>317</mml:mn></mml:mrow></mml:msup></mml:math>(116 and 117) using cluster formation model and the mass formulae : KTUY05 and WS4
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
The emission spectra and hydrodynamic properties of Al plasma using Nd-YAG laser
...Show More Authors

In this work, the emission spectra and atomic structure of the aluminum target had been studied theoretically using Cowan code. Cowan code was used to calculate the transitions of electrons between atomic configuration interactions using the mathematical method called (Hartree-Fock). The aluminum target can give a good emission spectrum in the XUV region at 10 nm with oscillator strength of 1.82.
The hydrodynamic properties of laser produced plasma (LPP) were investigated for the purpose of creating a light source working in the EUV region. Such a light source is very important for lithography (semiconductor manufacturing). The improved MEDUSA (Med103) code can calculate the plasma hydrodynamic properties (velocity, electron density,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Engineering
Studying the Utility of Using Reed and Sawdust as Waste Materials to Produce Cementitious Building Units
...Show More Authors

In this research, the possibility of using waste wooden materials (reed and sawdust) was studied to produce sustainable and thermal insulation lightweight building units , which has economic and environmental advantages. This study is intended to produce light weight building units with low thermal conductivity, so it can be used as partitions to improve the thermal insulation in buildings. Waste wooden materials were used as a partial replacement of natural sand, in different percentages (10, 20, 30, and 40) % . The mix proportions were (1:2.5) (cement: fine aggregate) with w/c of 0.4. The values of 28 days oven dry density ranged between (2060-1693) kg/m3.The thermal conductivity decreased from (0.745 to 0.2

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Materials Science Forum
The Effect of Gamma Radiation on the Manufactured HgBa&lt;sub&gt;2&lt;/sub&gt;Ca&lt;sub&gt;2&lt;/sub&gt;Cu&lt;sub&gt;2.4&lt;/sub&gt;Ag&lt;sub&gt;0.6&lt;/sub&gt;O&lt;sub&gt;8+δ&lt;/sub&gt; Compound
...Show More Authors

In this article four samples of HgBa2Ca2Cu2.4Ag0.6O8+δ were prepared and irradiated with different doses of gamma radiation 6, 8 and 10 Mrad. The effects of gamma irradiation on structure of HgBa2Ca2Cu2.4Ag0.6O8+δ samples were characterized using X-ray diffraction. It was concluded that there effect on structure by gamma irradiation. Scherrer, crystallization, and Williamson equations were applied based on the X-ray diffraction diagram and for all gamma doses, to calculate crystal size, strain, and degree of crystallinity. I

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Fri Oct 01 2021
Journal Name
Nonlienear Optics Quantum Optics
Narrow Emission Linewidth of Highly-Pure Silicon Nitride Nanoparticles in Different Dye Solutions as Random Gain Media
...Show More Authors

In this work, two different laser dye solutions were used to host highly-pure silicon nitride nanoparticles as scattering centers to fabricate random gain media. The laser dye was dissolved in three different solvents (ethanol, methanol and acetone) and the final results were obtained for methanol only. The silicon nitride nanoparticles were synthesized by dc reactive magnetron sputtering technique with average particle size of 35 nm. The random gain medium was made as a solid rod with high spectral efficiency and low production cost. Optical emission with narrow linewidth was detected at 532-534 nm as 9 mg of silicon nitride nanoparticles were added to the 10 -5 M dye solution. The FWHM of 0.3 and 3.52 nm was determined for Rhodamine B and

... Show More
View Publication
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Study and Analysis the Mathematical Operations of Fuzzy Logic
...Show More Authors

The last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.

View Publication Preview PDF
Crossref