Preferred Language
Articles
/
bsj-6211
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Rotation and Magnetic Force Effects on Peristaltic Transport of Non -Newtonian Fluid in a Symmetric Channel
...Show More Authors

In this paper, the impact of magnetic force, rotation, and nonlinear heat radiation on the peristaltic flow of a hybrid bio -nanofluids through a symmetric channel are investigated. Under the assumption of a low Reynolds number and a long wavelength, the exact solution of the expression for stream function, velocity, heat transfer coefficient, induced magnetic field, magnetic force, and temperature are obtained by using the Adomian decomposition method. The findings show that the magnetic force contours improve when the magnitude of the Hartmann number M is high and decreases when rotation increases. Lastly, the effects of essential parameters that appear in the problem are analyzed through a graph. Plotting all figures is done using the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Algebra
Fully extending modules
...Show More Authors

Throughout this paper we introduce the concept of quasi closed submodules which is weaker than the concept of closed submodules. By using this concept we define the class of fully extending modules, where an R-module M is called fully extending if every quasi closed submodule of M is a direct summand.This class of modules is stronger than the class of extending modules. Many results about this concept are given, also many relationships with other related concepts are introduced.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
A Modified Strength Pareto Evolutionary Algorithm 2 based Environmental /Economic Power Dispatch
...Show More Authors

A Strength Pareto Evolutionary Algorithm 2 (SPEA 2) approach for solving the multi-objective Environmental / Economic Power Dispatch (EEPD) problem is presented in this paper. In the past fuel cost consumption minimization was the aim (a single objective function) of economic power dispatch problem. Since the clean air act amendments have been applied to reduce SO2 and NOX emissions from power plants, the utilities change their strategies in order to reduce pollution and atmospheric emission as well, adding emission minimization as other objective function made economic power dispatch (EPD) a multi-objective problem having conflicting objectives. SPEA2 is the improved version of SPEA with better fitness assignment, density estimation, an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Laser
Generation of True Random TTL Signals for Quantum Key-Distribution Systems Based on True Random Binary Sequences
...Show More Authors

A true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems

View Publication Preview PDF
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
A Nonlinear MIMO-PID Neural Controller Design for Vehicle Lateral Dynamics model based on Modified Elman Neural Network
...Show More Authors

This paper presents a new design of a nonlinear multi-input multi-output PID neural controller of the active brake steering force and the active front steering angle for a 2-DOF vehicle model based on modified Elman recurrent neural. The goal of this work is to achieve the stability and to improve the vehicle dynamic’s performance through achieving the desired yaw rate and reducing the lateral velocity of the vehicle in a minimum time period for preventing the vehicle from slipping out the road curvature by using two active control actions: the front steering angle and the brake steering force. Bacterial forging optimization algorithm is used to adjust the parameters weights of the proposed controller. Simulation resul

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 08 2017
Journal Name
Neural Computing And Applications
A new algorithm of modified binary particle swarm optimization based on the Gustafson-Kessel for credit risk assessment
...Show More Authors

View Publication
Scopus (31)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Direct Solution Scheme for Wide-Angle Electromagnetic Scattering Problems Using Compressive Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Quasi-Fully Cancellation Fuzzy Modules
...Show More Authors

  In this paper it was presented the idea quasi-fully cancellation fuzzy modules and we will denote it by  Q-FCF(M), condition universalistic idea quasi-fully cancellation modules It .has been circulated to this idea quasi-max fully cancellation fuzzy modules and we will denote it by Q-MFCF(M). Lot of results and properties have been studied in this research.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 12 2024
Journal Name
Semiconductor Physics, Quantum Electronics And Optoelectronics
Numerical study of single-layer and interlayer grating polarizers based on metasurface structures for quantum key distribution systems
...Show More Authors

Polarization is an important property of light, which refers to the direction of electric field oscillations. Polarization modulation plays an essential role for polarization encoding quantum key distribution (QKD). Polarization is used to encode photons in the QKD systems. In this work, visible-range polarizers with optimal dimensions based on resonance grating waveguides have been numerically designed and investigated using the COMSOL Multiphysics Software. Two structures have been designed, namely a singlelayer metasurface grating (SLMG) polarizer and an interlayer metasurface grating (ILMG) polarizer. Both structures have demonstrated high extinction ratios, ~1.8·103 and 8.68·104 , and the bandwidths equal to 45 and 55 nm for th

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
A Fully Computerized Method to Backup the Router Configuration File
...Show More Authors

This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.

    The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).

View Publication Preview PDF