Preferred Language
Articles
/
ehbZB4cBVTCNdQwCxDDw
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two exponentiation. The number of multiplications is in range between (log 2 (m) and 2log 2 (m)-2). If m equals 163 then the number of multiplication operations is 9 and number of exponentiation operation each one with one clock cycle equals 10.

Scopus Crossref
View Publication
Publication Date
Mon Oct 01 2018
Journal Name
2018 International Conference On Advanced Science And Engineering (icoase)
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity Technique
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
Intelligent Congestion Control of 5G Traffic in SDN using Dual-Spike Neural Network
...Show More Authors

Software Defined Networking (SDN) with centralized control provides a global view and achieves efficient network resources management. However, using centralized controllers has several limitations related to scalability and performance, especially with the exponential growth of 5G communication. This paper proposes a novel traffic scheduling algorithm to avoid congestion in the control plane. The Packet-In messages received from different 5G devices are classified into two classes: critical and non-critical 5G communication by adopting Dual-Spike Neural Networks (DSNN) classifier and implementing it on a Virtualized Network Function (VNF). Dual spikes identify each class to increase the reliability of the classification

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Materials Chemistry And Physics
Investigation of silica polymorphs stratified in siliceous geode using FTIR and XRD methods
...Show More Authors

View Publication
Crossref (64)
Crossref
Publication Date
Mon Nov 09 2020
Journal Name
Heat Transfer
Experimental performance of cooling photovoltaic panels using geothermal energy in an arid climate
...Show More Authors

View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2018
Journal Name
2018 15th European Radar Conference (eurad)
Delamination Detection in Glass-Fibre Reinforced Polymer (GFRP) Using Microwave Time Domain Reflectometry
...Show More Authors

View Publication
Scopus (18)
Crossref (15)
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
International Journal Of Computer Mathematics
Numerical solution of the two-dimensional Helmholtz equation with variable coefficients by the radial integration boundary integral and integro-differential equation methods
...Show More Authors

View Publication
Crossref (12)
Crossref
Publication Date
Wed Oct 09 2019
Journal Name
International Journal Of Drug Delivery Technology
The comparative study among the MRSAcin, Nisin A and vancomycin, on biofilm formation by Methicillin resistance Staphylococcus aureus isolated from food sources.
...Show More Authors

Biofilms formation by pathogens microbial Control considered important in medical research because it is the hazarded virulence factor leading to becoming difficult to treat because of its high resistance to antimicrobials. Glycopeptide antibiotic a (Vancomycin) and the commercial bacteriocin (Nisin A) were used to comparative with purification bacteriocin (MRSAcin) against MRSA biofilm. One hundred food samples were collected from Baghdad markets from July 2016 to September 2016, including (cheese, yogurt, raw milk, fried meat, grilled meat, and beef burger). All samples were cultures; S. aureus was confirmation by macroscopic culture and microscopic examination, in addition to biochemical tests. Methicillin resistance S. asureus (

... Show More
View Publication
Scopus (12)
Crossref (3)
Scopus Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
PREDATION BY THE MITE MACROCHELES GLABER (MÜLLER) (ACARINA: MACROCHELIDAE) ON THE HOUSE FLY MUSCA DOMESTICA L. WITH SOME NOTES ON ITS BIOLOGY
...Show More Authors

Macrocheles glaber (Müller) is one of several mites that feeds on eggs, newly hatched &
small larvae of house fly Musca domestica L. This mite was reared in the laboratory on house
fly frozen eggs at constant conditions of 28°C±1 and 90% relative humidity using sterilized
horse dung substrate. The predation rate of adult female and male on frozen eggs was (18, 3)
eggs/mite/day respectively, the number of frozen eggs destroyed by adult female through its
life was 185.6 eggs.
The mean duration of adult female from egg to adult stage was 2.67 days, the longevity of
female was 27.8 days, the mean daily egg production was 2.7 egg with total egg productivity
of 72.1 egg.

View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Indian Journal Of Forensic Medicine And Toxicology
Study the genotoxicity of aqueous and alcoholic extracts of adhatoda vasica on the roots of allium cepa L. By RAPD-PCR technique
...Show More Authors

Scopus (2)
Scopus