Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreA simple and novel method was developed by combination of dispersive liquid-liquid microextraction with UV spectrophotometry for the preconcentartion and determination of trace amount of malathion. The presented method is based on using a small volume of ethylenechloride as the extraction solvent was dissolved in ethanol as the dispersive solvent, then the binary solution was rapidly injected by a syringe into the water sample containing malathion. The important parameters, such the type and volume of extraction solvent and disperser solvent, the effect of extraction time and rate, the effect of salt addition and reaction conditions were studied. At the optimum conditions, the calibration graph was linear in the range of 2-100 ng mL-1 of ma
... Show MoreThe current research aims to determine the impact of the cognitive reconstruction program on the development of psychological hardness among middle school students through the experimental verification of three hypotheses. The research sample consisted of (16) out of (450) students selected from Ibn Rushud preparatory school- Al-Rusafa 2. These participants have been randomly distributed into two equal groups. The researcher has used the method of cognitive reconstruction with the experimental group, whereas with the controlling group, he used nothing. The researcher has further used the scale of psychological hardness of Kobassa with the participants; the scale has been built in a way that suits the sample of the study, which consisted
... Show More
The research aims to identify the factors that affect the quality of the product by using the Failure Mode and Effect Analysis (FMEA) tool and to suggest measures to reduce the deviations or defects in the production process. I used the case study approach to reach its goals, and the air filter product line was chosen in the air filters factory of Al-Zawraa General Company. The research sample was due to the emergence of many defects of different impact and the continuing demand for the product. I collected data and information from the factory records for two years (2018-2019) and used a scheme Pareto Fishbone Diagram as well as an FMEA tool to analyze data and generate results.
Par
... Show MoreAn analytical and clinical study has been applied for measure the bioavailability of Zinc in serum of twenty adults healthy volunteers, using flame atomic absorption spectrophotometer (FAAS) at 213.9 nm. The calibration graph is linear in the ranges of 0.25-1.5 μg.mL-1 with correlation coefficient (R) 0.09996)μg.mL1-and molar absorpitivites 22957.76(L.mol1-cm-1.The concentration of Zinc determined in serum of all volunteers before and after administered orally a tablet of 50 mg zinc sulphate, produced by Samara drugs company (SDI). All data were subjected to statistical analysis by calculating accuracy, precision in addition to other parameters. The results indicate that the average maximum concentration (C-max ± SD) of blood zinc was 0.
... Show MoreThe aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreA numerical method (F.E.)was derived for incompressible viscoelastic materials, the aging and
environmental phenomena especially the temperature effect was considered in this method. A
treatment of incompressibility was made for all permissible values of poisons ratio. A
mechanical model represents the incompressible viscoelastic materials and so the properties can
be derived using the Laplace transformations technique .A comparison was made with the other
methods interested with viscoelastic materials by applying the method on a cylinder of viscoelastic material surrounding by a steel casing and subjected to a constant internal pressure, as well as a comparison with another viscoelastic method and for Asphalt Concrete pro