Preferred Language
Articles
/
bsj-6211
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
A modified Mobilenetv2 architecture for fire detection systems in open areas by deep learning
...Show More Authors

This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.

Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Building a Sustainable GARCH Model to Forecast Rubber Price: Modified Huber Weighting Function Approach
...Show More Authors

The unstable and uncertain nature of natural rubber prices makes them highly volatile and prone to outliers, which can have a significant impact on both modeling and forecasting. To tackle this issue, the author recommends a hybrid model that combines the autoregressive (AR) and Generalized Autoregressive Conditional Heteroscedasticity (GARCH) models. The model utilizes the Huber weighting function to ensure the forecast value of rubber prices remains sustainable even in the presence of outliers. The study aims to develop a sustainable model and forecast daily prices for a 12-day period by analyzing 2683 daily price data from Standard Malaysian Rubber Grade 20 (SMR 20) in Malaysia. The analysis incorporates two dispersion measurements (I

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Materials Science In Semiconductor Processing
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

View Publication
Scopus (55)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Mon Feb 20 2023
Journal Name
د.زينب ميثم علي
توظيف الشكل المتخيل في رواية فرانكشتاين في بغداد
...Show More Authors

يسلط كتابنا الضوء على الآليات التي تم توظيفها في النص الخيالي المتناص بوعي، وكيف قُدِّمَ وشُحنَ بالنص ليجعله فريدًا يتألق بفكرته ويظل مستقلاً بخياله حتى عن الخيال المستدعى في تكوينه، لنستخرج بعض الآليات والوظائف التي قد تشترك بعضها أو جزء منها في تكوين نصوص سردية خيالية أخرى

Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Different Estimators for the shape Parameter and the Reliability function of Kumaraswamy Distribution
...Show More Authors

In this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
Figure role in highlighting and content in the technical poster
...Show More Authors

The poster is one of the means which can be communicate with others through it, to transfer ideas that the designer want to focus on, for its importance to accomplish the poster. It’s a visual mean contact aim to submit an idea to the audience to get a clear idea, and that would be through the shapes and subject to submit the idea. Depend on that our goal in this study is to find out, what follows:1-Finding the relationship between the shape and the idea.And the study comes up with several results, like:1-The drawings that contain themes connected with what the designer want to achieve, through the clearness of idea and to make those elements clear by putting more elements to surround the main shape.2-To assure that the strong connecti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2006
Journal Name
بيت الحكمة
المنطق منهجا نقديا - دراسة في قراءة الشكل الجمالي
...Show More Authors

المنطق منهجا نقديا - دراسة في قراءة الشكل الجمالي كتاب (المنطق منهجا نقدياً – دراسة في قراءة الشكل الفني) يهتم الكتاب بدراسة التصورات المنطقية في الفنون التشكيلية وهو يقع في اربعة فصول خصص الاول منها لبيان المنهجية والفكرة العامة عن علاقة المعرفة بالقواعد الفكرية والقواعد المنطقية موضحا ذلك في (مدخل عام) وتعلق الفصل الثاني بالمفاهيم المنطقية وما كتبه علماء المنطق في عرض شامل ومكثف تناول فيه المؤلف مفهوم ال

... Show More
View Publication
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
The dialectic of form and meaning in postmodern art
...Show More Authors

Some have considered the dialectic in form and meaning from different points of view, and dismantled them from each other, and this view is correct if we adopt according to the logic of Aristotle when it comes to dialectic, the dialectic of form and meaning has different aspects and does not share a single line in terms of conceptual meaning, the form is the appearance What the recipient sees with the help of cognitive tools, the content or content is the mental meaning, which in turn depends on his own tools, and to this extent this view is correct, and the intellectual content or meaning of the artwork or the human message that the artist wants to convey to the viewer.
The research included four chapters. The first chapter included

... Show More
View Publication Preview PDF
Crossref