Preferred Language
Articles
/
bsj-6211
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Current and Modified Flood Discharge Capacity of a Reach of Tigris River between Kut and Amarah Barrages
...Show More Authors

This study was conducted to examine the discharge capacity of the reach of the Tigris River between Kut and Amarah Barrages of 250km in length. The examination includes simulation the current capacity of the reach by using HEC-RAS model. 247cross sections surveyed in 2012 were used in the simulation. The model was calibrated using observed discharges of 533, 800, 1025 and 3000m3/s discharged at Kut Barrage during 2013, 1995, 1995 and 1988, respectively, and its related water level at three gauge stations located along the reach. The result of calibration process indicated that the lowest Root Mean Square Error of 0.095 can be obtained when using Manning’s n coefficient of 0.026, 0.03 for th

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
A Modified Support Vector Machine Classifiers Using Stochastic Gradient Descent with Application to Leukemia Cancer Type Dataset
...Show More Authors

Support vector machines (SVMs) are supervised learning models that analyze data for classification or regression. For classification, SVM is widely used by selecting an optimal hyperplane that separates two classes. SVM has very good accuracy and extremally robust comparing with some other classification methods such as logistics linear regression, random forest, k-nearest neighbor and naïve model. However, working with large datasets can cause many problems such as time-consuming and inefficient results. In this paper, the SVM has been modified by using a stochastic Gradient descent process. The modified method, stochastic gradient descent SVM (SGD-SVM), checked by using two simulation datasets. Since the classification of different ca

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Modified Grid Clustering Technique to Predict Heat Transfer Coefficient in a Duct of Arbitrary Cross Section Area
...Show More Authors

A simple straightforward mathematical method has been developed to cluster grid nodes on a boundary segment of an arbitrary geometry that can be fitted by a relevant polynomial. The method of solution is accomplished in two steps. At the first step, the length of the boundary segment is evaluated by using the mean value theorem, then grids are clustered as desired, using relevant linear clustering functions. At the second step, as the coordinates cell nodes have been computed and the incremental distance between each two nodes has been evaluated, the original coordinate of each node is then computed utilizing the same fitted polynomial with the mean value theorem but reversibly.

The method is utilized to predict

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Endodontics
Synthesis and Preliminary Evaluation of a Polyolefin-based Core for Carrier-based Root Canal Obturation
...Show More Authors

Introduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Iraqi Journal Of Information And Communication Technology
EEG Signal Classification Based on Orthogonal Polynomials, Sparse Filter and SVM Classifier
...Show More Authors

This work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Oct 17 2024
Journal Name
مجلة ميسان لعلوم التربية البدنية
A historical study of the origins of the sport of polo and its development from the royal court to the stadiums of modern times
...Show More Authors

The sport of polo, the game of kings and sultans, is one of the traditional sports that has defied time throughout its long history. It has preserved its historical roots and been able to adapt to contemporary requirements, societal transformations, and temporal and spatial variables. It has moved from an aristocratic sport practiced as a form of entertainment to a professional competitive sport. It attracts many players and millions of viewers, so it is a living model of how sports develop and transform from a local tradition into global sports with organized rules managed by international institutions and with many championships worldwide. Through this, the research objectives were formulated, including exploring sports' origins. Polo in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref