Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two exponentiation. The number of multiplications is in range between (log 2 (m) and 2log 2 (m)-2). If m equals 163 then the number of multiplication operations is 9 and number of exponentiation operation each one with one clock cycle equals 10.
The minimization, treatment and disposal of drilling wastes especially oily wastes are important environmental issues.
In this research two fungal isolates named Pleurotus ostreatus and Trichoderma harzianum were chosen carefully f or the purpose of biotreatment of oily drilled cuttings which resulting from drilling oil wells using oil based muds (OBMs).
A relationship of total petroleum hydrocarbon degradation in oily drilled cuttings with time has been obtained. The results showed that Pleurotus ostreatus and Trichoderma harzianum can be considered hydrocarbon degrading microorganisms and the used biotreatment is cost effective process since most of the materials used in the cultivation and growth of the present f
... Show MoreIn the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p
... Show MoreBiomarkers to detect Alzheimer’s disease (AD) would enable patients to gain access to appropriate services and may facilitate the development of new therapies. Given the large numbers of people affected by AD, there is a need for a low-cost, easy to use method to detect AD patients. Potentially, the electroencephalogram (EEG) can play a valuable role in this, but at present no single EEG biomarker is robust enough for use in practice. This study aims to provide a methodological framework for the development of robust EEG biomarkers to detect AD with a clinically acceptable performance by exploiting the combined strengths of key biomarkers. A large number of existing and novel EEG biomarkers associated with slowing of EEG, reductio
... Show MoreLifestyle Medicine is the application of evidence-based lifestyle approaches for the prevention, treatment, and even the reversal of lifestyle-related chronic diseases such as diabetes, hypertension, heart disease, obesity, polycystic ovarian diseases, dementia, arthritis, and cancers
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show Moreالمستودع الرقمي العراقي. مركز المعلومات الرقمية التابع لمكتبة العتبة العباسية المقدسة
The present study deals with the effect of self -observation on EFL University students` achievement in conversation classes. The process of self-observation helps the teacher to understand one’s own actions and the reactions in the process of teaching. The sample of this study is EFL students in the third stage at the Department of English Language, morning studies, College of Education /Ibn-Rushd .The sample of the study consists of (84) students distributed on experimental group(A) includes (42) students, and (42) students as control group(B). In order to achieve the aim of the study ,and to gain a closer idea about the impact of reflective teaching technique(self-observation) on the students achievement in conversation classes, a chec
... Show MoreThe problem of generated waste as a result of the implementation of construction projects, has been aggravated recently because of construction activity experienced by the world, especially Iraq, which is going through a period of reconstruction, where construction waste represents (20-40%) of the total generated waste and has a negative effect on the environment and economic side of the project. In addition, the rate of consumpted amounts of natural resources are estimated to be about 40% in the construction industry, so it became necessary to reduce waste and to be manage well. This study aims to identify the key factors affecting waste management through the various phases of the project, and this is accom
... Show MoreReduce the required time for measuring the permeability of clayey soils by using new manufactured cell