Preferred Language
Articles
/
bsj-4033
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by proposing a more efficient design for the hardware implementation of ECDSA. The design raised the throughput to 0.08207 Mbit/s, leading to an increase of 6.95% from the existing design. It also includes the design and implementation of the Universal Asynchronous Receiver Transmitter (UART) module. The present work is based on a 163-bit key-size over Koblitz curve k-163 and secure hash function SHA-1. A serial module for the underlying modular layer, high-speed architecture of Koblitz point addition and Koblitz point multiplication have been considered in this work, in addition to utilising the carry-save-multiplier, modular adder-subtractor and Extended Euclidean module for ECDSA protocols. All modules are designed using VHDL and implemented on the platform Virtex5 xc5vlx155t-3ff1738. Signature generation requires 0.55360ms, while its validation consumes 1.10947288ms. Thus, the total time required to complete both processes is equal to 1.66ms and the maximum frequency is approximately 83.477MHZ, consuming a power of 99mW with the efficiency approaching 3.39 * 10-6.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 10 2018
Journal Name
Al–bahith Al–a'alami
Work Stress Sources of the Communicator in Public Relations “A field study on Governmental Institutions in UAE”.
...Show More Authors

This study addressed the work stress sources and level of the communicator in public relations in governmental institutions in the United Arab Emirates. The importance of this study is the lack of studies on work stress of the communicator in public relations. The study aimed to investigate the work stress source Physical, individual, groups, organizational and Professional source which effect on the performance of communicator in public relations. The researcher used the descriptive approach and questionnaire as an essential tool for collecting information. Some of the important results of the study are The communicator in public relations facing stress in work by 42% which affect on his performance by average level. The organizational

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (4)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Extent to Which the Internal audit function contributes to improving administrative performance: A field study in the Baghdad Health Department / Rusafa
...Show More Authors

Abstract:

                The internal audit is considered the safety valve for senior management in all institutions. It aims to protect property, and raise the efficiency and effectiveness of the administrative performance, by following up on compliance with laws and instructions and the application of regulations in a way that increases the administrative performance of the department. The internal audit is possible to determine Weaknesses or imbalances in the administrative performance. To achieve this goal, an analytical descriptive methodology was adopted. The Baghdad Health Department / Al-Rosana was considered as society for this s

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
Student Attitudes towards Rooting the Educational Administration Field: A Field Study for Phd Students in the Department of Educational Administration at Umm al-Qura University
...Show More Authors

The study sought to identify the attitudes of PhD students towards establishing the field of educational administration. The study followed the descriptive survey method. The questionnaire was used to collect information from the study community consisting of (95) male and female students in the department of educational administration and Planning. Among the most important results about students ’attitudes towards establishing the educational administration field are the following: 1) identifying the necessity of establishing the educational administration field. 2) Encouraging students to attend seminars and scientific conferences in Islamic rooting. 3) there are no statistically significant differences in the attitudes of doctoral s

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an Autonomous Mobile Robot using Enhanced Bacterial Foraging Optimization Algorithm
...Show More Authors

This paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori

... Show More
View Publication Preview PDF
Crossref (15)
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Forced displacement in Iraq its causes and its effects on displaced families (A field study of displaced families to the city of Baghdad)
...Show More Authors

After a temporary halt to forced thghebr in different cities of Iraq this methodlogy
opeations returned directiy in the areas of political conflict on the ground which are translated
operations and forced displacement violence es they operations aimed at completing the
forced displacement that occurred after the occupation in(2003)which took an upward curve
publicly after these events and some of which are aimed at the liquidation of some provinces
than any demographic diversity of religious or sectarian or alhens and others aimed at
redemographic distribution within the province itself to produce a net sectarian zones as is the
case in Diyala Nineveh and Babylon Baghdad has the epicenter of sectarian violence and th

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 30 2025
Journal Name
Samarra Journal Of Engineering Science And Research
Proposed low Xilinx FPGA power consumption for recursive NOMA applied in optical visible light communication
...Show More Authors

Today the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The po

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Euphrates Journal Of Agricultural Science
MEASURES OF SPECIFIC PRODUCTIVITY, ACTUAL TIME, APPEARANCE AND TILLAGE DEVIATION FOR TWO PLOWS MOSTLY USED IN IRAQ
...Show More Authors

Experiment was conducted in Baghdad, three factor were used in this research included Two types of Plows included moldboard and disk plows which represented the main plot, Three forward speeds of the tillage was the second factor included 1.85, 3.75 and 5.62 km / h which represented sup plot , and Three levels of Soil Moisture was third factor included 21, 18 and 14 % in all of Vertical and Lateral Plowing Deviation, Practical and specific productivity, actual time for plowing one donam and appearance (goodness) of Tillage represented by the number of clods > 10 cm in silt clay loam soil with depth 22 cm were studied. the experiment was used Split – split plot design under randomized complete block design with three replications and Le

... Show More