Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
The unstable and uncertain nature of natural rubber prices makes them highly volatile and prone to outliers, which can have a significant impact on both modeling and forecasting. To tackle this issue, the author recommends a hybrid model that combines the autoregressive (AR) and Generalized Autoregressive Conditional Heteroscedasticity (GARCH) models. The model utilizes the Huber weighting function to ensure the forecast value of rubber prices remains sustainable even in the presence of outliers. The study aims to develop a sustainable model and forecast daily prices for a 12-day period by analyzing 2683 daily price data from Standard Malaysian Rubber Grade 20 (SMR 20) in Malaysia. The analysis incorporates two dispersion measurements (I
... Show Moreيسلط كتابنا الضوء على الآليات التي تم توظيفها في النص الخيالي المتناص بوعي، وكيف قُدِّمَ وشُحنَ بالنص ليجعله فريدًا يتألق بفكرته ويظل مستقلاً بخياله حتى عن الخيال المستدعى في تكوينه، لنستخرج بعض الآليات والوظائف التي قد تشترك بعضها أو جزء منها في تكوين نصوص سردية خيالية أخرى
In this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes
The poster is one of the means which can be communicate with others through it, to transfer ideas that the designer want to focus on, for its importance to accomplish the poster. It’s a visual mean contact aim to submit an idea to the audience to get a clear idea, and that would be through the shapes and subject to submit the idea. Depend on that our goal in this study is to find out, what follows:1-Finding the relationship between the shape and the idea.And the study comes up with several results, like:1-The drawings that contain themes connected with what the designer want to achieve, through the clearness of idea and to make those elements clear by putting more elements to surround the main shape.2-To assure that the strong connecti
... Show Moreالمنطق منهجا نقديا - دراسة في قراءة الشكل الجمالي كتاب (المنطق منهجا نقدياً – دراسة في قراءة الشكل الفني) يهتم الكتاب بدراسة التصورات المنطقية في الفنون التشكيلية وهو يقع في اربعة فصول خصص الاول منها لبيان المنهجية والفكرة العامة عن علاقة المعرفة بالقواعد الفكرية والقواعد المنطقية موضحا ذلك في (مدخل عام) وتعلق الفصل الثاني بالمفاهيم المنطقية وما كتبه علماء المنطق في عرض شامل ومكثف تناول فيه المؤلف مفهوم ال
... Show MoreSome have considered the dialectic in form and meaning from different points of view, and dismantled them from each other, and this view is correct if we adopt according to the logic of Aristotle when it comes to dialectic, the dialectic of form and meaning has different aspects and does not share a single line in terms of conceptual meaning, the form is the appearance What the recipient sees with the help of cognitive tools, the content or content is the mental meaning, which in turn depends on his own tools, and to this extent this view is correct, and the intellectual content or meaning of the artwork or the human message that the artist wants to convey to the viewer.
The research included four chapters. The first chapter included