Preferred Language
Articles
/
joe-1161
Performance Evaluation of Scalar Multiplication in Elliptic Curve Cryptography Implementation using Different Multipliers Over Binary Field GF (2233)
...Show More Authors

This paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.

The first approach attains a performance index of approximately 0.217610202 when its realization is over Virtex-6 (6vlx130tff1156-3). It uses an interleaved multiplier with 3077 register slices, 4064 lookup tables (LUTs), 2837 flip-flops (FFs) at a maximum frequency of 221.6Mhz. This makes it more suitable for high-frequency applications. The second approach, which uses the Montgomery multiplier, produces a PI of approximately 0.2228157 when its implementation is on Virtex-4 (6vlx130tff1156-3). This approach utilizes 3543 slices, 2985 LUTs, 3691 FFs at a maximum frequency of 190.47MHz. Thus, it is found that the implementation of the second approach on Virtex-4 is more suitable for applications with a low frequency of about 86.4Mhz and a total number of slices of about 12305.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
Determination of the Annual Optimal Reliable Frequency for Different Transmitter/Receiver Stations Distributed over the Iraqi Territory
...Show More Authors

This paper aimed to determine the Optimal Reliable Frequency (ORF) that can maintain certain connection link between different transmitter/receiver stations laid over the Iraqi territory. Three different transmitting sites were chosen as tested stations located in the northern, central, and southern regions of Iraq. These sites are Mosul, Baghdad, and Basra, respectively. In this study, the years 2009 and 2014, which represent the minimum and maximum years of solar cycle 24, were chosen to examine the effect of low and high solar activity on the determined ORF. The datasets of the Best Usable Frequency (BUF) were calculated using the ASAPS international communication model. An analytical study was made on the generated BUF parameter data

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Development Binary Search Algorithm
...Show More Authors

There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Evaluation of Traffic Performance of Ahmed Urabi Square in Baghdad City
...Show More Authors

At present, smooth movement on the roads is a matter which is needed for each user. Many roads, especially in urban areas geometrically improved because of the number of vehicles increase from time to time.

In this research, Highway capacity software, HCS, 2000, will be adopted to determine the effectiveness of roundabout in terms of capacity of roundabout, delay and level of service of roundabout.

The results of the analysis indicated that the Ahmed Urabi roundabout operates under level of service F with an average control delay of 300 seconds per vehicle during the peak hours.

The through movements of Alkarrada- Aljadiriya direction (Major Direction) represent the heaviest traff

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Recurrent Stroke Prediction using Machine Learning Algorithms with Clinical Public Datasets: An Empirical Performance Evaluation
...Show More Authors

Recurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning al

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Performance of Different Concatenated Coding Schemes for CDMA System
...Show More Authors

In this paper different channel coding and interleaving schemes in DS/CDMA system over multipath fading channel were used. Two types of serially concatenated coding were presented. The first one composed of Reed-Solomon as outer code, convolutional code as inner code and the interleaver between the outer and inner codes and the second consist of convolutional code as outer code, interleaved in the middle and differential code as an inner code. Bit error rate performance of different schemes in multipath fading channel was analyzed and compared. Rack receiver was used in DS/CDMA receiver to combine multipath components in order to enhance the signal to noise ratio at the receiver.

 

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Evaluation of Acid and Hydraulic Fracturing Treatment in Halfaya Oil Field-Sadi Formation
...Show More Authors

Sadi formation is one of the main productive formations in some of Iraqi oil fields. This formation is characterized by its low permeability values leading to low production rates that could be obtained by the natural flow.

Thus, Sadi formation in Halfaya oil field has been selected to study the success of both of "Acid fracturing" and "Hydraulic fracturing" treatments to increase the production rate in this reservoir.

   In acid fracturing, four different scenarios have been selected to verify the effect of the injected fluid acid type, concentration and their effect on the damage severity along the entire reservoir.

   The reservoir damage severity has been taken as "Shallow–Medium– Sever

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 02 2014
Journal Name
Arabian Journal Of Geosciences
Petrophysical evaluation study of Khasib Formation in Amara oil field, South Eastern Iraq
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Key Engineering Materials
Compressive Strength Performance of Reactive Powder Concrete Using Different Types of Materials as a Partial Replacement of Fine Aggregate
...Show More Authors

Reactive Powder Concrete (RPC) can be incorporate as a one of the most important and progressive concrete technology. It is a special type of ultra-high strength concrete (UHSC) that’s exclude the coarse aggregate from its constitutive materials. In this research an experimental study had been carried out to investigate the effect of using three types of materials (porcelain aggregate) and others sustainable materials (glass waste and granular activated carbon) as a partial replacement of fine aggregate. Four percentages had considered (0, 10, 15 and 20) % to achieve better understanding for the influence of these materials upon the compressive strength of RPC. Four curing ages had included in this study, these are; 7, 28, 60 and

... Show More
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Key Engineering Materials
Compressive Strength Performance of Reactive Powder Concrete Using Different Types of Materials as a Partial Replacement of Fine Aggregate
...Show More Authors

Reactive Powder Concrete (RPC) can be incorporate as a one of the most important and progressive concrete technology. It is a special type of ultra-high strength concrete (UHSC) that’s exclude the coarse aggregate from its constitutive materials. In this research an experimental study had been carried out to investigate the effect of using three types of materials (porcelain aggregate) and others sustainable materials (glass waste and granular activated carbon) as a partial replacement of fine aggregate. Four percentages had considered (0, 10, 15 and 20) % to achieve better understanding for the influence of these materials upon the compressive strength of RPC. Four curing ages had included in this study, these are; 7, 28, 60 and

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More