Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.
Cerium (III), Neodymium (III) and Samarium (III) Complexes existent a wide range of implementation that stretch from their play in the medicinal and pharmaceutical area because of their major significant pharmacological characteristic such as antifungal, anti-cancer, anti-bacterial ,anti-human immunodeficiency virus ,antineoplastic, anti-inflammation,inhibition corrosion,in some industrial (polymers, Azo dye).It is likely to open avenuesto research among various disciplines such as physics, electronics, chemistry and materials science by these complexes that contain exquisitely designed organic molecules.This paper reviews the definition, importance and various applications of Cerium (III), Neodymium (III) and Samarium (III) Complexe
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking. The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform
... Show MoreTrickle irrigation is one of the most conservative irrigation techniques since it implies supplying water directly on the soil through emitters. Emitters dissipate energy of water at the end of the trickle irrigation system and provide water at emission points. The area wetted by an emitter depends upon the discharge of emitter, soil texture, initial soil water content, and soil permeability. The objectives of this research were to predict water distribution profiles through different soils for different conditions and quantify the distribution profiles in terms of main characteristics of soil and emitter. The wetting patterns were simulated at the end of each hour for a total time of application of 12 hrs, emitter disch
... Show MoreHepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative
... Show MoreObjectives: The demand for orthodontic treatment is nowadays increasing significantly for aesthetic improvement and to correct various kinds of malocclusion, yet the prolonged treatment time remains the main obstacle. This review aimed to demonstrate various orthodontic techniques and highlight the evidence-based successful approaches used for acceleration of orthodontic tooth movement. Materials and Methods: Data and sources of information pertaining to accelerated orthodontic tooth movement premised on English-written articles were searched using electronic databases including Google Scholar, Scopus, PubMed and MEDLINE. Results: This review demonstrated the availability of different surgical and non-surgical methods to enhance tooth movem
... Show MoreThe using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible models of parametric models and these models were nonparametric models.
In this manuscript were compared to the so-called Nadaraya-Watson estimator in two cases (use of fixed bandwidth and variable) through simulation with different models and samples sizes. Through simulation experiments and the results showed that for the first and second models preferred NW with fixed bandwidth fo
... Show MoreSynthetic anti-TB drugs are being used to treat tuberculosis (TB) as they are effective, however, they are accompanied by many side effects. The disease has remained largely uncured till date. The use of plant extracts or phytochemicals along with the anti-TB drugs is a very attractive strategy to make the treatment more effective as phytochemicals have no side-effects, are much less toxic than synthetic anti-TB drugs, are safe to use and most importantly, do not produce resistant strains as opposed to synthetic anti-TB drugs. Approximately 420,000 plant species have been identified globally and among them only a few have been explored for their therapeutic potential. Traditional medicine in different parts of the world has employed crud
... Show More