Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.
Orthogonal Frequency Division Multiplexing (OFDM) is an efficient multi-carrier technique.The core operation in the OFDM systems is the FFT/IFFT unit that requires a large amount of hardware resources and processing delay. The developments in implementation techniques likes Field Programmable Gate Array (FPGA) technologies have made OFDM a feasible option. The goal of this paper is to design and implement an OFDM transmitter based on Altera FPGA using Quartus software. The proposed transmitter is carried out to simplify the Fourier transform calculation by using decoder instead of multipliers. After programming ALTERA DE2 FPGA kit with implemented project, several practical tests have been done starting from monitoring all the results of
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreIn this paper the modified trapezoidal rule is presented for solving Volterra linear Integral Equations (V.I.E) of the second kind and we noticed that this procedure is effective in solving the equations. Two examples are given with their comparison tables to answer the validity of the procedure.
There many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma
... Show MoreThis research studies the effect of adding five different percentages of polymer (2, 4, 6, 8, and 10% of cement weight) on cement mortar's fresh and hardened properties, which was cured at laboratory temperature for 7, 14, and 28 days. Workability increases with increasing polymer. The workability value was lowest (25.6 and 29.4) % in mixtures containing 2% and 4% of (SBR). Increasing polymer ratios significantly decreased mechanical properties (compressive and flexural strength). Therefore, the best results were at 2% SBR and 4% SBR at 28 days of age. An inverse relationship was recorded between the increase in SBR ratios and polymer-modified cement mortar's compressive and flexural strength values. In general, the high
... Show MoreBackground: The aim of this study was to measure the radiopacity (RO) of modified microhybrid composite resins by adding 2 types of nanofillers (Zinc Oxide and Calcium Carbonate) in two concentrations 3% and 5% and comparing them to unmodified microhybrid composite resins and to nanofilled composite resin. Materials and Methods: Two types of composite resin were used (Microhybrid composite MH Quadrent anterior shine and Nanofilled composite resin Filtek Z350 XT), for each tested group five disk-shaped specimens (1-mm-thick and 15 mm diameter) were fabricated. The material samples were radiographed together with the aluminum step wedge. The density of the specimens was determined with a transmission densitometer and was expressed in term of
... Show More
In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di
... Show MoreDurability of hot mix asphalt (HMA) against moisture damage is mostly related to asphalt-aggregate adhesion. The objective of this work is to find the effect of nanoclay with montmorillonite (MMT) on Marshall properties and moisture susceptibility of asphalt mixture. Two types of asphalt cement, AC(40-50) and AC(60-70) were modified with 2%, 4% and 6% of Iraqi nanoclay with montmorillonite. The Marshall properties, Tensile strength ratio(TSR) and Index of retained strength(ISR) were determined in this work. The total number of specimens was 216 and the optimum asphalt content was 4.91% and 5% for asphalt cement (40-50) and (60-70) respectively. The results showed that the modification of asphalt cement with MMT led to increase Marsh
... Show More