Preferred Language
Articles
/
ehbZB4cBVTCNdQwCxDDw
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two exponentiation. The number of multiplications is in range between (log 2 (m) and 2log 2 (m)-2). If m equals 163 then the number of multiplication operations is 9 and number of exponentiation operation each one with one clock cycle equals 10.

Scopus Crossref
View Publication
Publication Date
Wed Sep 01 2021
Journal Name
Medical Journal Of Babylon
Serum Ghrelin Level in Type 2 Diabetes Mellitus Postmenopausal Women in Relation to Body Mass Index
...Show More Authors

Preview PDF
Scopus (1)
Scopus
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Engineering
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.

Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Use Simulation To Differentiate Between Some Modern Methods To the Model GM(1,1) To Find Missing Values And Estimate Parameters With A Practical Application
...Show More Authors

Abstract

       The grey system model GM(1,1) is the model of the prediction of the time series and the basis of the grey theory. This research presents the methods for estimating parameters of the grey model GM(1,1) is the accumulative method (ACC), the exponential method (EXP), modified exponential method (Mod EXP) and the Particle Swarm Optimization method (PSO). These methods were compared based on the Mean square error (MSE) and the Mean Absolute percentage error (MAPE) as a basis comparator and the simulation method was adopted for the best of the four methods, The best method was obtained and then applied to real data. This data represents the consumption rate of two types of oils a he

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 30 2018
Journal Name
Acs Omega
Catalytic Hydrogenation of <i>p</i>-Chloronitrobenzene to <i>p</i>-Chloroaniline Mediated by γ-Mo<sub>2</sub>N
...Show More Authors

Promoting the production of industrially important aromatic chloroamines over transition-metal nitrides catalysts has emerged as a prominent theme in catalysis. This contribution provides an insight into the reduction mechanism of p-chloronitrobenzene (p-CNB) to p-chloroaniline (p-CAN) over the γ-Mo2N(111) surface by means of density functional theory calculations. The adsorption energies of various molecularly adsorbed modes of p-CNB were computed. Our findings display that, p-CNB prefers to be adsorbed over two distinct adsorption sites, namely, Mo-hollow face-centered cubic (fcc) and N-hollow hexagonal close-packed (hcp) sites with adsorption energies of −32.1 and −38.5 kcal/mol, respectively. We establish that the activation of nit

... Show More
View Publication
Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Diala, Journal
Synthesis and characterization of ( L- proline ) amino acid with (Mn+2 , Fe+2 , Co+2 , Zn+2 and Cd+2 )
...Show More Authors

Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An efficient method for stamps recognition using Haar wavelet sub-bands
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Experimental and Quantum Chemical Studies on the Corrosion Inhibition of Mild Steel By 2-((Thiophen-2-Ylmethylene) Amino)Benzenethio in 1M HCl
...Show More Authors

The impact of a Schiff base namely 2-((thiophen-2-ylmethylene)amino)benzenethiol  to corrode mild steel in 1 M HCl  resolved was evaluated using different weight loss technique and scanning electron microscopy (SEM).different weight measurements to expand that the 2-((thiophen-2-ylmethylene) amino) benzenethiol  inhibits  the corrosion of mild steel through adsorbing  of  top for mild steel and block the active locality. The inhibitive impacts of 2-((thiophen-2-ylmethylene)amino)benzenethiol  increase with increasing concentration and decrease with increasing temperature. SEM to checking revealed that the alloy surface was quite unaffected and formed protective film on its surface. The investigated

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Comparison between the empirical bayes method with moments method to estimate the affiliation parameter in the clinical trials using simulation
...Show More Authors

In this research the Empirical Bayes method is used to Estimate the affiliation parameter in the clinical trials and then we compare this with the Moment Estimates for this parameter using Monte Carlo stimulation , we assumed that the distribution of the observation is binomial distribution while the distribution with the unknown random parameters is beta distribution ,finally we conclude that the Empirical bayes method for the random affiliation parameter is efficient using Mean Squares Error (MSE) and for different Sample size .

View Publication Preview PDF
Crossref
Publication Date
Fri May 01 2015
Journal Name
Ieee Transactions On Microwave Theory And Techniques
On the Design of Gyroelectric Resonators and Circulators Using a Magnetically Biased 2-D Electron Gas (2-DEG)
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref