Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two exponentiation. The number of multiplications is in range between (log 2 (m) and 2log 2 (m)-2). If m equals 163 then the number of multiplication operations is 9 and number of exponentiation operation each one with one clock cycle equals 10.
What distinguishes the athlete in dealing with all stimuli is the ability to understand the cognitive rules through which he acts and directs behavior through thinking and regular planning methods in dealing with the environment in a realistic manner, and this comes through techniques and means based on modernity in obtaining information that makes the athlete arrange in His memory is the programs that are the most important crutch for relying on when he asks for them in applying and executing the skill assignment. One of the enhancers of awareness of variables is the ability of coaches to provide openness in modern ideas to find solutions, through which the player can sense and interpret events and produce outputs for quick and successful
... Show MoreBackground: This review aims to discuss various canine retraction techniques using frictionless mechanics. Methods: Between 1930 and February 2022, searches were conducted about various canine retraction techniques using fixed orthodontic appliances in various databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and manual searching. Results: After removing the duplicate articles, publications that described how to use archwires to perform canine retraction with the archwires were included. Conclusions: The pros and cons of various canine retraction techniques using archwires were thoroughly discussed. T-loop is the preferred spring of all because of it
... Show MoreThe primary purpose of this paper is to introduce the, 2- coprobabilistic normed space, coprobabilistic dual space of 2- coprobabilistic normed space and give some facts that are related of them
<span lang="EN-US">We are living in the 21<sup>st</sup> century, an era of acquiring necessity in one click. As we, all know that technology is continuously reviving to stay ahead of advancements taking place in this world of making things easier for mankind. Technology has been putting his part in introducing different projects as we have used the field programmable gate arrays (FPGAs) development board of low cost and programmable logic done by the new evolvable cyclone software is optimized for specific energy based on Altera Cyclone II (EP2C5T144) through which we can control the speed of any electronic device or any Motor Control IP product targeted for the fan and pump. Altera Cyclone FPGAs’ is a board thro
... Show More
Abstract
The current research aims to identify the impact of triangular bridging strategy in the acquisition of sociology of fourth-stage students. To achieve the research objective, the following null hypotheses were adopted: there are no statistically significant differences at a significance level (0, 05) between the average grades of the experimental group students who studied the triangular bridging strategy in acquiring concepts of sociology and average grades of the control group. The researcher has selected the fourth-stage students from Alexandronah School for girls that s related to the Directorate General of Baghdad the sample consisted of (87) students at litera
... Show MoreThe aim of the work is the synthesis and characterization of the tridentate Schiff base (HL) containing (N and O) as donor atoms type (ONO). The ligand is: (HL) phenyl 2-(2-hydroxybenzylidenamino)benzoate . This ligand was prepared by the reaction of (phenyl 2-aminobenzoate) with salicylaldehyde under reflux in ethanol and few drops of glacial acetic acid which gave the ligand (HL). The prepared ligand was characterized by (FT IR,UV–Vis) spectroscopy, Elemental analysis of carbon, hydrogen and nitrogen (C.H.N.) and melting point. The ligand was reacted with some metal ions under reflux in ethanol with (1 metal :2 ligand )mole ratio which gave complexes of the general formula: [M(L)2]Cl , M = Cr III La III and , Pr III Products were found
... Show MoreThe ligand 2-Hydroxy-N-pyridin-2-ylmethyl-acetamide(L) has been prepared from reaction of 2-(aminomethyl)pyridin with chloroacetic acid (1:1).It has been characterized by elemental analysis (C,H,N) ,'H, 13 C-NMR, IR and electronic spectra. The complexes of divalent (Co,Ni,Cu,Zn,Cd and Hg) ions and trivalent(Cr) ion have been synthesized and characterized by IR, electronic spectra, molar conductivity, atomic absorption and molar ratio (Ni 2+) complex. The analytical studies for the complexes show; octahedral for (Cr 3+),square planar for (Cu 2+) and (Co,Ni Zn, Cd and Hg) tetrahedral geometries. The study of biological activity of the ligand (L) and its complexes (Co,Ni,Cu,Cd,Hg) in two deferent concentration (1and5) mg/ml showed various acti
... Show More