Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two exponentiation. The number of multiplications is in range between (log 2 (m) and 2log 2 (m)-2). If m equals 163 then the number of multiplication operations is 9 and number of exponentiation operation each one with one clock cycle equals 10.
In this paper, experimental study has been done for temperature distribution in space conditioned with Ventilation Hollow Core Slab (TermoDeck) system. The experiments were carried out on a model room with dimensions of (1m 1.2m 1m) that was built according to a suitable scale factor of (1/4). The temperature distributions was measured by 59 thermocouples fixed in several locations in the test room. Two cases were considered in this work, the first one during unoccupied period at night time (without external load) and the other at day period with external load of 800W/m2 according to solar heat gain calculations during summer season in Iraq. All results confirm the use of TermoDeck system for ventilation and cooling/heat
... Show MoreThis research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show MoreIn this work, the effects of size, and temperature on the linear and nonlinear optical properties in InGaN/GaN inverse parabolic and triangular quantum wells (IPQW and ITQW) for different concentrations at the well center were theoretically investigated. The indium concentrations at the barriers were fixed to be always xmax = 0.2. The energy levels and their associated wave functions are computed within the effective mass approximation. The expressions of optical properties are obtained analytically by using the compact density-matrix approach. The linear, nonlinear, and total absorption coefficients depending on the In concentrations at the well center are investigated as a function of the incident photon energy for different
... Show MoreThe research aims to identify the impact of using the electronic participatory learning strategy according to internet programs in learning some basic basketball skills for middle first graders according to the curricular course, and the sample of research was selected in the deliberate way of students The first stage of intermediate school.As for the problem of research, the researchers said that there is a weakness in the levels of school students in terms of teaching basketball skills, which prompted the researchers to create appropriate solutions by using a participatory learning strategy.The researchers imposed statistically significant differences between pre and post-test tests, in favor of the post tests individually and in favor of
... Show MoreAbstract: Recombinant Newcastle disease virus (rNDV) has shown an anticancer effect in preclinical studies, but has never been tested in a lung cancer models. In this study we explored the anticancer activity of genetically modified NDV expressing IL-2-P53 (rClone30–IL-2-P53) in lung cancer model. We have cloned IL-2 and P53 genes and inserted them in the viral genome of New Castle Disease Virus to create a genetically modified rNDV- IL-2-P53 virus and tested the anti-tumor activity of the new virus in vitro on different types of cancer cell lines by MTT assay. TheIL-2 and P53 gene were successfully cloned and inserted into the viral genome by using a Mlu I and Sfi I endonucleases, viral vector was constructed correctly and successf
... Show MoreThe Enhanced Thematic Mapper Plus (ETM+) that loaded onboard the Landsat-7 satellite was launched on 15 April 1999. After 4 years, the image collected by this sensor was greatly impacted by the failure of the system’s Scan Line Corrector (SLC), a radiometry error.The median filter is one of the basic building blocks in many image processing situations. Digital images are often distorted by impulse noise due to errors generated by the noise sensor, errors that occur during the conversion of signals from analog-to-digital, as well as errors generated in communication channels. This error inevitably leads to a change in the intensity of some pixels, while some pixels remain unchanged. To remove impulse noise and improve the quality of the
... Show More
This study is concerned with shedding light on the grammatical method of Ibn Hisham Al-Ansari (761 AH), in his explanation of Bant Souad’s poem by the poet Kaab bin Zuhair, and I included a brief description of Ibn Hisham’s life with a number of explanations of this poem, then clarified the most important features of this method The grammar represented by his reliance on hearing and presenting it to analogy with mention of types of analogy, as well as his attribution of opinions to their owners with weighting, selection and balancing, and his attention to reasoning and a number of grammatical ailments, and his approach is also distinguished by following the method of fractal.
... Show More
Imam Ibn Abi Shaybah counted in his book classified twenty-five and a hundred recent and impact claimed that Abu Hanifa has violated the provisions required by apparent, and these conversations and effects including with regard to worship and transactions, including with regard to personal status, including with regard to borders and felonies, and collected by Sheikh Muhammad Zahid Al-Kothari in his book funny jokes in talking about the responses of Ibn Abu Shaybah on Abu Hanifa, and these issues we will study in our research.
The corrosion behavior of mild sleet in saturated aerated and de-aerated Ca(OH)2 solution was investigated using electrochemical measurements. The work was carried out with small coupons immersed in solutions containing different quantities of NaCl in presence of various NaN02 concentrations as corrosion inhibitors. It has been found thal:(1 ) In presence of NaCl, the time required to reach O2 evolution potential in de-aerated Ca(OH)2 polarized at 10μA/cm 2 is function of inhibitor concentration and it becomes lass as NaN02 increases compared with zero presence indicating the effectiveness of N
... Show MoreThe importance of operational risks increases with the increase in technological development, the development of banking operations, the extent of banking compliance, and the attempt of many banks to achieve quality in banking services. And the extent of the position occupied by Iraqi banks for banking compliance and reducing operational risks. The Basel Committee (2) paid its attention to operational risks and the interest of international banks to follow policies that work to ensure banking compliance and cover operational risks, because of its role in reducing losses due to increased costs and achieving an increase in profits. Realizing and working to confront the best possible and traditional methods, that some risks Operational problem
... Show More