Preferred Language
Articles
/
bsj-6211
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
The combined effectiveness of magnetic force and heat\mass transfer on peristaltic transportation “Hyperbolic Tangent” Nanofluid in a Slopping Non-Regular Non-symmetric Channel.
...Show More Authors
Abstract<p>in the present article, we present the peristaltic motion of “Hyperbolic Tangent nanofluid” by a porous area in a two dimensional non-regular a symmetric channel with an inclination under the impact of inclination angle under the impact of inclined magnetic force, the convection conditions of “heat and mass transfer” will be showed. The matter of the paper will be further simplified with the assumptions of long wave length and less “Reynolds number”. we are solved the coupled non-linear equations by using technical analysis of “Regular perturbation method” of series solutions. We are worked out the basic equations of continuity, motion, temperature, and volume fraction</p> ... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
عدد خاص بابحاث المؤتمر العلمي الدولي الخامس المشترك الثالج / الجامعة العراقية / مجلة العلوم الاسلامية
التسامح الديني مفتاح لبوابة التعايش السلمي بين الشعوب
...Show More Authors

يهدف هذا البحث إلى بيان أن الأديان في مقاصدها وأصولها وفروعها تلتقي على التسامح المؤدي إلى التعايش السلمي بين مجموعة مختلفة في الدين أو اللون أو القومية أو الفكر من خلال إعطاء حرية التعبير والفكر والتمذهب والعقيدة لكل إنسان وإن كان مخالفا معنا؛ حيث تفيذ نصوصها الأحقاد والكراهية، وتدعو إلى التأخي بين البشر محققة بذلك التعايش السلمي المنشود، بل وتحض الإنسان على حماية أخيه الإنسان وصيانة حياته وممتلكاته أيا ك

... Show More
View Publication
Publication Date
Thu Mar 05 2020
Journal Name
Irrigation And Drainage
ECONOMIC ASSESSMENT OF DUYRIDGE DAM AS A WATER‐HARVESTING SCHEME IN IRAQ
...Show More Authors
Abstract<p>Iraq, home of the Tigris and Euphrates rivers, has survived an extreme deficiency of surface water assets over the years. The gap is due to the decline of the Iraqi water share every year, as well as a high demand for water use from different sectors, particularly agriculture.</p><p>Dam development has long given significant economic benefits to Iraq in circulating low‐priced electricity and supporting low‐income farmers by supplying them with a free irrigation system (Zakaria et al, 2012). This encouraged domestic consumption and investment.</p><p>Despite the fact that numerous advantages are expected from dam construction, it should be painstakingly assessed, utilizing cost</p> ... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Cache Coherence Protocol Design and Simulation Using IES (Invalid Exclusive read/write Shared) State
...Show More Authors

To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Study of Laser Propagation Parameters in the Underdense Plasma Region Using a Two Dimensional Simulation Code
...Show More Authors

The propagation of laser beam in the underdense deuterium plasma has been studied via computer simulation using the fluid model. An appropriate computer code “HEATER” has been modified and is used for this purpose. The propagation is taken to be in a cylindrical symmetric medium. Different laser wavelengths (1 = 10.6 m, 2 = 1.06 m, and 3 = 0.53 m) with a Gaussian pulse type and 15 ns pulse widths have been considered. Absorption energy and laser flux have been calculated for different plasma and laser parameters. The absorbed laser energy showed maximum for  = 0.53 m. This high absorbitivity was inferred to the effect of the pondermotive force.

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Association of Endothelin-I and A symmetric Dimethylarginine Levels with Insulin Resistance in Type-2 Diabetes Mellitus Patients
...Show More Authors

Endothelin-I (ET-I) is one of the potent vasoconstrictors secreted from endothelial cells when needed. Many studies revealed the elevation of serum ET-I with human diabetes and microangiopathies. Since insulin resistance is a case of mixed diabetic and pre-diabetic cases, many risk factors beyond obesity and inflammation are proposed. The current study aims to demonstrate the association between serum ET-I and asymmetric dimethylarginine (ADMA) and insulin resistance in type 2 diabetes mellitus (T2DM). Sera of 73 subjects were enrolled currently (control= 35 subjects, and 38 with T2DM for more than 7 years), aged (40-60) years old, with distinct body mass index (BMI) ≤ 25 for control volunteers and (BMI) ≥ 25 for obesity and diabetes

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Teaching techniques due to the Brain-based learning theory among math teachers
...Show More Authors

The purpose of the study is to identify the teaching techniques that mathematics' teachers use due to the Brain-based learning theory. The sample is composed of (90) teacher: (50) male, (40) female. The results have shown no significant differences between male and female responses' mean. Additionally, through the observation of author, he found a lack of using Brain-based learning techniques. Thus, the researcher recommend that it is necessary to involve teachers in remedial courses to enhance their ability to create a classroom that raise up brain-based learning skills.  

View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Ieee Transactions On Circuits And Systems Ii: Express Briefs
Adaptive Multibit Crosstalk-Aware Error Control Coding Scheme for On-Chip Communication
...Show More Authors

The presence of different noise sources and continuous increase in crosstalk in the deep submicrometer technology raised concerns for on-chip communication reliability, leading to the incorporation of crosstalk avoidance techniques in error control coding schemes. This brief proposes joint crosstalk avoidance with adaptive error control scheme to reduce the power consumption by providing appropriate communication resiliency based on runtime noise level. By switching between shielding and duplication as the crosstalk avoidance technique and between hybrid automatic repeat request and forward error correction as the error control policies, three modes of error resiliencies are provided. The results show that, in reduced mode, the scheme achie

... Show More
View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the

... Show More
View Publication Preview PDF
Scopus (61)
Crossref (52)
Scopus Clarivate Crossref