Preferred Language
Articles
/
ehbZB4cBVTCNdQwCxDDw
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two exponentiation. The number of multiplications is in range between (log 2 (m) and 2log 2 (m)-2). If m equals 163 then the number of multiplication operations is 9 and number of exponentiation operation each one with one clock cycle equals 10.

Scopus Crossref
View Publication
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The Graphic privacy in vector graphics design for children's publications
...Show More Authors

         The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 05 2016
Journal Name
Al-academy
Numbers and Its Uses in the Al-Abbass Holy Shrine
...Show More Authors

The present research studies numbers and its uses in the Islamic ornament. The study consists of four chapters; the first is dedicated to the problem of the research, the value of the study, and the aim of the study, and its limit. The problem of the study deals with the uses of numbers in Islamic ornament and how these numbers were used for aesthetic purposes. What are the analytical bases that enable us to read the geometrical compositions ornament numerically? The value of the research is the study forms an analytical and visual study of the numbers in the Islamic ornamentation. Additionally, this study is an aesthetic assessment to the philosophy of the number and its uses in Islamic architecture. The study is limited to the ornament

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Lecture Notes Of The Institute For Computer Sciences, Social Informatics And Telecommunications Engineering
Sensor Data Classification for the Indication of Lameness in Sheep
...Show More Authors

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
The first recording of leaf blight disease Defla in Iraq
...Show More Authors

The results showed the spread of disease blight leaves caused by injury fungus Alternaria in different areas of cultivation in the city of Baghdad where he was recording the highest rate and the severity of the disease of 100% and 80%, respectively, in the Abu Ghraib area and the least of 20% and 12% respectively in the Amiriya district results showed test pathogenicity of the fungus pathogen emergence of symptoms of the disease superficial discoloration Authority of black paper when wound areas and yellowing of leaves about race as centrist and leaky latest country clear ????? on Central race after 48 hours ....

View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Evaluating the Crop Coefficient for Cherries Plants in Michigan State
...Show More Authors

Crop coefficient for cherries was evaluated by measure the water consumption in Michigan State to find its variation with time as the plant growth. Crop coefficients value (Kc) for cherries were predicated by Michigan State University (MSU) and also by Food and Agriculture Organization (FAO) according to consume of water through the season. In this paper crop coefficients for cherries are modified accordingly to the actual measurements of soil moisture content. Actual evapotranspiration (consumptive use) were measured by the soil moisture readings using Time Domain Reflectometers (TDR), and compared with the actual potential evapotranspiration that calculated by using modified Penman-Monteith equation which depends on metrological statio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ellen Olenska’s Character in Edith Wharton’s The Age of Innocence
...Show More Authors

Old New York was Wharton's term to describe this wealthy and elite class at the top of
the developing city's social hierarchy, a society which was utterly intent on maintaining its
own rigid stability. Even though, the roles of women in American society changed drastically
from 1820’s to 1860’s due to the civil war and such a progression was due in part to the
revolutionary thoughts. Women started taking their right to speak up openly and frankly and
become more like men. The role of many women had changed from being homemaker to
being able to provide for the family by either getting a job or start to be allowed to have a
voice. They had important roles not only in helping the family, but in sharing to rebuild th

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 08 1999
Journal Name
Abhath Al- Yarmouk [basic Sciences And Engineering]
Model for Predicting the Cracking Moment in Structural Concrete Members
...Show More Authors

Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Role of Design And Decoration in Enriching Children’s Clothes
...Show More Authors

As the child is growing up, he goes through different phases which will be accompanied by physical and psychological changes. These changes set the basis for processes of designing and making children's clothes which in turn give its required benefits and meet the physiological, psychological and community needs. That will help provide the child with healthy physical and psychological growth.
The aim of this research is to recognize the decoration of clothes by colors and drawings and its role in clothes' richness and children's education. The research limits are objective, The limits are for female (3-5) years old. The research was done in teaching kindergarten in the college of education for women in 2016. The researchers found many

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Activating Letter of credits under the Swift system in Iraq
...Show More Authors

Abstract

               Documentary credits are considered successful means to reduce imports, especially unnecessary imports that lead to the outflow of foreign currency from the country. However, due to the backwardness of the banking methods, the reintroduction of documentary credits after 2003 did not effectively contribute to reducing import rates. This has had a negative impact on the Iraqi economy and made it vulnerable to external markets. Documentary credits are also considered the best way to ensure payment in international trade, providing independent credit support and sufficient security for exporters and importers against commerci

... Show More
View Publication Preview PDF