Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two exponentiation. The number of multiplications is in range between (log 2 (m) and 2log 2 (m)-2). If m equals 163 then the number of multiplication operations is 9 and number of exponentiation operation each one with one clock cycle equals 10.
Background: One common undesirable side effect of orthodontic treatment with fixed appliances is the development of incipient caries lesions around brackets, particularly in patients with poor oral hygiene. Different methods have been used to prevent demineralization; the recent effort to improve the resistance against the demineralization is by the application of lasers. Materials and method: Thirty human premolars extracted for orthodontic purposes were used to test the effect of two energy level of ER-YAG laser on enamel resistance to demineralization. The brackets were bonded on the teeth and all the labial surface excluding 2 mm area gingival to the brackets were painted with acid resistance varnish. Three groups were generated. The fi
... Show MoreObjective: To assess the major anti-tuberculosis drugs available to patients at primary health care centers in Baghdad city. Methodology: A descriptive cross-sectional study design is carried out in order to achieve the objectives of the study by using the assessment technique in primary health care centers from December 29th, 2014 to July 10 th, 2015. probability sampling is select based on the study design. Eighteen primary health care centers are select according to criteria of sample to the study and for the purpose of the study, is select (6) sectors and (11) Primary Health Care Centers (PHCC) from Bagh
Abstract
Sovereign wealth funds are an important tool for achieving economic stability and avoiding the local economy from external shocks, including the shocks of international oil prices. The spread of these funds is the result of large current account surpluses in many Asian and oil-exporting economies. These surpluses are due to higher commodity prices Has led to a rapid accumulation of foreign assets in central banks. Many countries with rent economies face the problem of their dependence on non-renewable natural resources, especially the oil countries, including Iraq. Oil revenues are more than 97% of oil exports, so they suffer from structural imbal
... Show MoreBackground: The Streptococcus genus are the predominant bacteria in the mouth and the Streptococcus sanguinis is one of them which performing a primary function for expansion of dental biofilm. Gingival and periodontal disorders are caused by dental biofilm, today, there is a necessity to discover naturally presenting antibacterial compounds from herbs with less side effects as a substitutive to the commonly handled chlorohexidine. Thus, the purpose of this study was to assess the antibacterial activity of thymus vulgaris oil on Streptococcus sanguinis bacteria In vitro. Materials and Methods: Human supragingival plaque samples were taken from 10 subjects, then morphological and microscopical examination, bioch
... Show MoreThe present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show MoreAIM: The aim of this study was to measure the prevalence of myeloproliferative disorders in a sample of Iraqi patients and to measure the changes in patients’ blood parameters. BACKGROUND: Myeloproliferative disorders are a group of neoplasms affecting the bone marrow progenitor cells characterized by excess cells with a risk of transforming to acute leukemia. There is a gap in knowledge about the prevalence of Iraqi population. Thus, we investigated the prevalence and distribution of different types of myeloproliferative disorders in a sample of Iraqi patients. MATERIALS AND METHODS: Cross-sectional study is done at the National Center of Hematology from November 2019 till March 2020 on 75 patients who were diagnosed
... Show MoreAbstract
This study aims to identify the most prominent factors that lead to bullying of students with intellectual disabilities in primary and middle schools from the perspectives of special education teachers. A quantitative descriptive approach was utilized. A questionnaire was used as a tool for data collection. The sample consisted of (72) male and female teachers from the Asir region in the Kingdom of Saudi Arabia. The results revealed the most prominent factors that lead to bullying as follows: factors associated with the school and its policies, factors associated with peers, factors associated with students with intellectual disabilities, and factors associated with general education teachers. The findin
... Show MoreThe purpose of this paper is to build a simulation model by using HEC-RAS software to simulate the reality of water movement in the main river of Basra City (South of Iraq) which is known as Siraji-Khoura River. The main objective of the simulation is to detect areas where the water cycle is interrupted in some stations of the river stream, as this river has become an outlet for the disposal of sewage, leading to pollution and causing weakness in some sections of the river & obstructing the water cycle that takes place between this river and Shatt al – Arab river. A field survey data of the river and its banks were adopted to derive the grades, longitudinal and cross sections of the river, these data included three-dimensional coordinates
... Show MoreOnline service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show MoreThe current research aims to investigate the counseling services provided to gifted students in the Al-Baha region from their point of view, and to identify the differences in these views according to the students ’gender, educational stages, and the cities in which they study. The descriptive survey approach was followed in its relevance to the research objectives. Likewise, a random sample of gifted elementary, intermediate, and secondary school students was selected by the method of stratified sampling, as the sample reached (175) male and female students. The instrument of the research consisted of the questionnaire of counseling services presented to gifted students from their point of view prepared by researchers. The results sho
... Show More