Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two exponentiation. The number of multiplications is in range between (log 2 (m) and 2log 2 (m)-2). If m equals 163 then the number of multiplication operations is 9 and number of exponentiation operation each one with one clock cycle equals 10.
There is currently a significantly larger concentration of toxins in our environment than there was in the past. This is mostly attributable to the expansion of modern industry. This investigation was conducted in order to investigate various haematological and biochemical changes in order to determine the effects of Cd on the liver and kidney. Because of its long biological half-life, it is considered hazardous to human health. The effect of sub-lethal doses (40, 80 and 120 mg\Kg) of Cadmium (Cd) on male mice were evaluated for 4 weeks, and analysis was done to estimate their biochemical parameters and antioxidant enzymes. The results showed that Cd-treated mice had considerably lower packed cell volume, red blood cells, and haemoglobin. W
... Show MoreBackground: The autism spectrum disorder (ASD) describes a wide range of symptoms, including difficulty with social interaction and communication skills. Controversial thinking about oral health of children with ASD, in general may have a lower hygiene level than healthy individuals, low caries rate and high body weight in comparison to healthy children. This study was conducted to assess the oral health status in relation to nutritional status among institutionalized autistic children and adolescents. Materials and methods: From 12 institutes in Baghdad, the study group contained 364 child and adolescent with ASD (Male= 294, Female=70), while control group included 441 normal child and adolescent (Male=357, Female=84) from primary and seco
... Show MoreCommercially pure titanium (cpTi) is widely used as dental implant material although it was found that titanium exhibited high modulus of elasticity and the lower corrosion tendency in oral environment. Niobium(Nb) was chosen for this study as an alternative to cpTi implant material due to its bioinert behavior and good elastic modulus and moderate cost in addition to corrosion resistance. This study was done to evaluate the effect of biomimetic coating on the surface properties of the commercially pure titanium and niobium implants by in vitro and in vivo experiments. The in vitro study was involved etching the samples of each material in HCl then soaking in 10M NaOH aqueous solution. These samples were then immersed in a 5 times concent
... Show MoreThe current research dealt with the issue of organizational skillfulness as an entry point to reach strategic agility. The study has been tested in Iraq's mobile operators - Asia Cell, Zain Iraq and Cork Telecom. The study was applied to a sample of (93) managers distributed at various levels of management (board members, general managers, commissioners, department managers, people managers, unit managers, office managers). The survey used the questionnaire as a key tool for collecting data and information as well as personal interviews. It has sought to test a number of hypotheses related to correlation and influence relationships between the variables of the study, in order to answer the questions related to the problem of stud
... Show MoreBackground: Menstrual problems with all manifestations ranging from life-threatening bleeding to amen- orrhea are considered patterns of abnormal uterine bleeding (AUB), which is until now a popular reason for referral to the gynaecologic clinic and requires a special diagnostic tool. Objective: To assess the accuracy of hysteroscopy in diagnosing endometrial pathologies and to compare it with sonographic and histopathologic reports. Patients and Methods: A prospective study conducted in the Baghdad Teaching Hospital on 60 Iraqi females having varying complaints from abnormal uterine bleeding in pre- and post-menopausal women, infertility, and chronic pelvic pain with normal or abnormal ultrasound findings. Office hysteroscopy was done and
... Show MoreIn the mist of developments in the course of scientific research in general and humanities in particular and the accompanying changes in the visions and policies inspired by the need for these sciences to follow the qualitative methods in dealing with many of the topics or problems that require for their solution to obtain qualitative information which can be provided by resorting to quantitative research. Therefore, a new trend has emerged in many public relations› researchers who believe that qualitative research methods should be used by establishing scientific foundations and methodological classification based on the use of these methods and determining the nature of the subjects applied in them to reach results that are character
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More