Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.
This study is pointed out to estimate the effectiveness of two solvents in the extraction and evaluating the active ingredients and their antioxidant activity as well as anti-cancer efficiency. Therefore, residues from four different Brassica vegetables viz. broccoli, Brussels sprout, cauliflower, and red cherry radish were extracted using two procedures methods: methanolic and water crude extracts. Methanol extracts showed the highest content of total phenolic (TP), total flavonoids (TF), and total tannins (TT) for broccoli and Brussels sprouts residues. Methanolic extract of broccoli and Brussels sprouts residues showed the highest DPPH· scavenging activity (IC50 = 15.39 and 18.64 µg/ml). The methanol and water ex
... Show MoreThe research problem consisted in answering the question that revolves around what is the impact of localizing employees’ salaries on bank deposits, and did it lead to an increase in their size? The research also aimed to nominate some initial solutions to improve the role of salary localization, in terms of reviewing the concept of electronic payment systems, its tools and channels, and then identifying the concept of salary localization, its importance, objectives and obstacles to its application, and then analyzing the reality of the state of localization of salaries and bank deposits to banks, the research sample for the period (2017- 2021), and the use of the statistical program (SPSS V25) to test the research hypotheses. The stud
... Show MoreGA Al Omran, AA Noaimi, Z Al Madfai, H Al Hamamy, Journal of the Faculty of Medicine Baghdad, 2012
Several types of laser are used in experimental works in order to study the effects of laser on blood vessel. They differ from each other by a lot of properties mainly in wavelength, energy of the laser and pulse duration. In this study argon laser (488 nm- 514 nm) and continuous Nd: YAG laSer (1064 nm), have been applied to 50 samples of sheep blgod tesselS. Histologically, tha results of the study were different According to the txpe of L`sar used; apgon larer had distrabtave effects on $he blood vessal while continuous Nd: YAG laser Appeaped to be the safesd one on the blmod vessel architecture. This study concluded that argoj laser has da-aging ef&ect on
... Show MoreIn this numerical study a detailed evaluation of the heat transfer characteristics and flow structure in a laminar and turbulent flow through a rectangular channel containing built-in of different type vortex generator has been a accomplished in a range of Reynolds number between 500 and 100,000.A modified version of ESCEAT code has been used to solve Navier-Stokes and energy equations. The purpose of this paper is to present numerical comparisons in terms of temperature, Nusselt number and flow patterns on several configurations of longitudinal vortex generator including new five cases. The structures of heat and flow were studied, using iso-contours of velocity components, vortices, temperature and Nusselt n
... Show MoreA prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc
... Show MoreThis research aims to test the relationship between "relational leadership as an independent variable and organizational energy as a dependent variable. The current research variables are among the recent and important variables for the development of organizations, and for the purpose of explaining the relationship and influence between the variables, a set of goals has been formulated, including providing the interested and scientific and theoretical information explaining the nature of the variables The research, and the extent to which its causes are reflected in the research sample to increase the interest of the research organization’s organization and make it more appropriate to the required performance in light of a cha
... Show More