Preferred Language
Articles
/
ehbZB4cBVTCNdQwCxDDw
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two exponentiation. The number of multiplications is in range between (log 2 (m) and 2log 2 (m)-2). If m equals 163 then the number of multiplication operations is 9 and number of exponentiation operation each one with one clock cycle equals 10.

Scopus Crossref
View Publication
Publication Date
Tue Nov 15 2022
Journal Name
Journal Of Mechanical Engineering
Enhancement of Mechanical Properties and Corrosion Resistance of Cast Iron Alloy Using CO<inf>2</inf> Laser Surface Treatment
...Show More Authors

This work aimed to study the effect of laser surface treatment on the mechanical characteristics and corrosion behaviour of grey cast iron type A159. Many technical applications used conventional surface treatment, but laser surface hardening has recently been used to enhance the surface properties of many alloys. The mechanical characteristics, including microstructure, microhardness, and wear resistance of A159 grey cast iron, were studied, in addition to corrosion behaviour. The experimental laser parameters in this work were 0.9, 1.2, and 1.5 KW power with continuous wave carbon dioxide lasers with scanning speeds of 10 and 12 mm/s were used. The results found that phase-transitional alterations in microstructure were influenced by lase

... Show More
Preview PDF
Scopus (2)
Scopus
Publication Date
Tue Jan 01 2013
Journal Name
Chemical And Process Engineering Research
Synthesis and Characterization of Complexes of Schiff Base [1, 2-Diphenyl -2- 2-{[1-(3-Amino-Phenyl)-Ethylidene]-Hydrazono Methyl}-Phenol] with Mn(II), Fe(II), Co(II), Cu(II), Zn(II), Cd(II), Ni(II), and Hg(II) Ions
...Show More Authors

The new tridentate Schiff base ligand (HL)namely 2-{[1-(3-amino-phenyl)-ethylidene]-hydrazono methyl}- phenol containing (N N O)as donors atoms was prepared in two steps:Step (1): By the reaction of 3- aminoacetophenone with hydrazine monohydrate under reflux in methanol and drops of glacial acetic acid gave the intermediate compound 3-(1- hydrazono ethyl)-phenol amine.Step (2): By the reaction of 3-(1-hydrazono ethyl)-phenol amine with salicyaldehyde under reflux in methanol, gave the ligand (HL).The prepared ligand was characterized by I.R, U.V-Vis,1H- 13C NMR spectra and melting point and reacted with some metal ions under reflux in methanol with (1:1) ratio gave complexes of the general formula: [MClL]. Where: M= Mn(II), Fe(II), Co(II),

... Show More
Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Diyala Journal For Pure Sciences
Synthesis, Characterization and Biological Activity for Complexes VO(II), Mn(II), Co(II) and Ni(II) With New Multidentate Ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4- ylimino)acetic Acid][H2L] type (N2).
...Show More Authors

In this work, the precursor [2-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid] was synthesised from 4-aminoantipyrine and glyoxylic acid, this precursor has been used in the synthesis of new multidentate ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid][H2L] type (N2O2). The ligand was refluxed in ethanol with metal ions [VO(II), Mn(II), Co(II) and Ni(II)] salts to give complexes of general molecular formula:[M(H2L)2(X)(Y)].B, where: M=VO(II), X=0, Y=OSO3-2, B=2H2O; M=Mn(II),Co(II) ,X=Cl, Y=Cl, B=0; M=Ni(II), X=H2O, Y=Cl, B=Cl. These complexes were characterised by atomic absorpition(A.A), F.T-I.R., (U.V-Vis)spectroscopies (1H,13C NMR for ligand only), alon

... Show More
Publication Date
Fri Oct 17 2025
Journal Name
Journal Of Administration And Economics
Bayesian Method in Classification Regression Tree to estimate nonparametric additive model compared with Logistic Model with Application
...Show More Authors

The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
ON M- Hollow modules
...Show More Authors

Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Oct 17 2025
Journal Name
Iraqi Journal For Administrative Sciences
Using the Statistical Analysis to study the important reasons of the pollution in the Iraqi Marshlands Areas
...Show More Authors

The need for detection and investigation of the causes of pollution of the marshes and submit a statistical study evaluated accurately and submitted to the competent authorities and to achieve this goal was used to analyze the factorial analysis and then obtained the results from this analysis from a sample selected from marsh water pollutants which they were: (Electrical Conductivity: EC, Power of Hydrogen: PH, Temperature: T, Turbidity: TU, Total Dissolved Solids: TDS, Dissolved Oxygen: DO). The size of sample (44) sites has been withdrawn and examined in the laboratories of the Iraqi Ministry of Environment. By illustrating SPSS program) the results had been obtained. The most important recommendation was to increase the pumping of addit

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Memorizer Keeper      And his method in his masterpiece      Supervision by the parties
...Show More Authors

What has reached us from this great heritage left by our scientists book ((masterpiece of honor by knowing the parties)) to the conservative privilege, which Imam Safadi said ((Sheikh of time, and the preservation of the era, and critic of the time, if his son Ibn Makola had a drink and eaten, and make it to him So, after trusting in God, I thought that I should write a paper highlighting the life of this great world and explaining its methodology in this useful book in which Imam Ibn Hajar al-Asqalani said: `` The use of it took place east and west, and the scholars competed in collecting it after. And soon)).

View Publication Preview PDF