Preferred Language
Articles
/
ehbZB4cBVTCNdQwCxDDw
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two exponentiation. The number of multiplications is in range between (log 2 (m) and 2log 2 (m)-2). If m equals 163 then the number of multiplication operations is 9 and number of exponentiation operation each one with one clock cycle equals 10.

Scopus Crossref
View Publication
Publication Date
Tue Oct 25 2022
Journal Name
Aip Conference Proceedings
A new class of K-uniformly starlike functions imposed by generalized Salagean’s operator
...Show More Authors

Recently, numerous the generalizations of Hurwitz-Lerch zeta functions are investigated and introduced. In this paper, by using the extended generalized Hurwitz-Lerch zeta function, a new Salagean’s differential operator is studied. Based on this new operator, a new geometric class and yielded coefficient bounds, growth and distortion result, radii of convexity, star-likeness, close-to-convexity, as well as extreme points are discussed.

Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Spectrophotometric Determination of Mesalazine in Pharmaceutical Preparations by Oxidative Coupling Reactions with m-Aminophenol and 2,6- Dihydroxybenzoic Acid
...Show More Authors

     Tow simple, rapid and sensitive spectrophotometric methods for the determination of mesalazine in pharmaceutical preparations have been carried out. The proposed methods depend on oxidative coupling reaction of mesalazine with m-aminophenol in the existence of N-bromosuccinamide in alkaline medium (method A) and 2,6-dihydroxybenzoic acid in the existence of sodium metaperiodate in basic medium (method B) to produce colored products , show highest absorptions at 640 (nm) and 515 (nm), alternately. Beer’s law was consistent in concentrations extent of 1.25-30 and 0.5-12.5 (µg.mL-1) with molar absorptivity of 0.36×104 and 0.77×104 L.mol-1.cm<

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Isolation and Identification of Cryptosporidium sp. by Reverse Osmosis System of Tap water in Baghdad: Afkar M. Hadi
...Show More Authors

A total of 60 samples of drinking water filtrated by Reverser 0smosis Filtration System from April to October 2012, from different houses in Baghdad – Al Resafa, so as to identify the eggs and cysts of protozoa. Two methods applied direct smear and staining technique with zeal nelson stain, which appeared Tape warm eggs, Ascaris lumbrecoides eggs and oocyst of Cryptospordium sp. This study revealed that total contamination rate with intestinal parasites in tap water were 96.6% this high rate, refers to filtrate tap water by reverse osmosis system was useful to prevent or reduce the contamination of drinking water, in order to reduce risks to public health; So recommended to apply this method at water purification stations. Dis

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Genetic Variations of Echinococcus granulosus Isolated from Sheep and Cows by Using Fingerprint DNA Method in Iraq
...Show More Authors

The fingerprinting DNA method which depends on the unique pattern in this study was employed to detect the hydatid cyst of Echinococcus granulosus and to determine the genetic variation among their strains in different intermediate hosts (cows and sheep).  The unique pattern represents the number of amplified bands and their molecular weights with specialized sequences to one sample which different from the other samples.   Five hydatitd cysts samples  from cows and sheep were  collected, genetic analysis for  isolated DNA was done using PCR technique and  Random Amplified Polymorphic DNA reaction(RAPD) depending on (4) random primers, and the results showed:      

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 23 2026
Journal Name
Journal Of Administration And Economics
Bayesian Method in Classification Regression Tree to estimate nonparametric additive model compared with Logistic Model with Application
...Show More Authors

The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the Effect of Bone Morphogenetic Protein-2 on Stability of Dental Implant
...Show More Authors

Background: The healing period for bone–implant contact takes 3–6 months or even longer. Application of Escherichia coli-derived recombinant human bone morphogenetic protein-2 (ErhBMP-2) to implant surfaces has been of great interest on osseointegration due to its osteoinductive potential. The objective of this study was to evaluate the effect of ErhBMP-2 on implant stability. Materials and methods: A total of 48 dental implants were inserted in 15 patients. Twenty four implants coated with 0.5 mg/ml ErhBMP-2 (study group). The other 24 implants were uncoated (control group). Each patient was received at least two dental implants at the same session. Both groups were followed with repeated implant stability measurements by me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Therapeutic evaluation of 2% tea lotion in comparison with 5% zinc sulfate solution in the treatment of acne rosacea
...Show More Authors

KE Sharquie, AA Noaimi, SA Al-Hashimy, MM Al-Salih, Journal of Cosmetics, Dermatological Sciences and Applications, 2014 - Cited by 12

View Publication