Preferred Language
Articles
/
joe-1161
Performance Evaluation of Scalar Multiplication in Elliptic Curve Cryptography Implementation using Different Multipliers Over Binary Field GF (2233)
...Show More Authors

This paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.

The first approach attains a performance index of approximately 0.217610202 when its realization is over Virtex-6 (6vlx130tff1156-3). It uses an interleaved multiplier with 3077 register slices, 4064 lookup tables (LUTs), 2837 flip-flops (FFs) at a maximum frequency of 221.6Mhz. This makes it more suitable for high-frequency applications. The second approach, which uses the Montgomery multiplier, produces a PI of approximately 0.2228157 when its implementation is on Virtex-4 (6vlx130tff1156-3). This approach utilizes 3543 slices, 2985 LUTs, 3691 FFs at a maximum frequency of 190.47MHz. Thus, it is found that the implementation of the second approach on Virtex-4 is more suitable for applications with a low frequency of about 86.4Mhz and a total number of slices of about 12305.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Development and Verification of the Capacity Curve for Two Dimensional Reinforced Concrete Moment-Resisting Frames System under Earthquake Loading
...Show More Authors

Pushover analysis is an efficient method for the seismic evaluation of buildings under severe earthquakes. This paper aims to develop and verify the pushover analysis methodology for reinforced concrete frames. This technique depends on a nonlinear representation of the structure by using SAP2000 software. The properties of plastic hinges will be defined by generating the moment-curvature analysis for all the frame sections (beams and columns). The verification of the technique above was compared with the previous study for two-dimensional frames (4-and 7-story frames). The former study leaned on automatic identification of positive and negative moments, where the concrete sections and steel reinforcement quantities the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Classification & Evaluation of Evidence of deprivation in Iraq (2009) by using Cluster analysis
...Show More Authors

       The study aimed to reach the best rating for the views and variables in the totals characterized by qualities and characteristics common within each group and distinguish them from aggregates other for the purpose of distinguishing between Iraqi provinces which suffer from deprivation, for the purpose of identifying the status of those provinces in the early allowing interested parties and regulators to intervene to take appropriate corrective action in a timely manner. Style has been used cluster analysis Cluster analysis to reach the best rating to those totals from the provinces that suffer from problems, where the provinces were classified, based on the variables (Edu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Control of Non Isothermal CSTR Using Different Controller Strategies
...Show More Authors

In all process industries, the process variables like flow, pressure, level, concentration
and temperature are the main parameters that need to be controlled in both set point
and load changes.
A control system of propylene glycol production in a non isothermal (CSTR) was
developed in this work where the dynamic and control system based on basic mass
and energy balance were carried out.
Inlet concentration and temperature are the two disturbances, while the inlet
volumetric flow rate and the coolant temperature are the two manipulations. The
objective is to maintain constant temperature and concentration within the CSTR.
A dynamic model for non isothermal CSTR is described by a first order plus dead
time (FO

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 06 2025
Journal Name
International Journal Of Applied Mechanics And Engineering
Evaluation of microstructure and mechanical properties resulting from gas nitriding process for different types of steel
...Show More Authors

This work investigates the effect of the gas nitriding process on the surface layer microstructure and mechanical properties for steel 37, tool steel X155CrVMo12-1 and stainless steel 316L. Nitriding was conducted at a temperature of 550 °C for 2 hours during the first stage and at 750 °C for 4 hours during the second stage. SEM and X-ray diffraction tests were performed to evaluate the microstructural features and the major phases formed after surface treatment. SEM and X-ray diffraction tests were performed to assess the microstructural features and the primary phases formed after surface treatment. The new secondary precipitates were identified as γ′-Fe4N, ε (Fe2–3N), and α-Fe, exhibiting an uneven chain-like pattern wit

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
A Biochemical Study for Evaluation and Analysis of Serum Protein of Patients with Different Kidney Tumors
...Show More Authors

The amount of protein in the serum depends on the balance between the rate of its synthesis, and that of its catabolism or loss. Abnormal metabolism may result from nutritional deficiency, enzyme deficiency, abnormal secretion of hormones, or the actions of drugs and toxins. Renal cancer is the third most common malignancy of the genitourinary system, and accounts for 3% of adult malignancies globally. Total serum proteins were measured in malignant kidney tumor, benign kidney tumors, and non tumoral kidney diseases patient groups, as well as in healthy individuals. A significant decrease (p< 0.001) of total serum protein levels in patients with malignant kidney tumors when compared with those of benign tumors, non tumoral diseases, and hea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 21 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of shear bond strength of zirconia to tooth structure after different zirconia surface treatment techniques
...Show More Authors

Background: This study aimed to evaluate the effect of zirconia different surface treatments (primer, sandblast with 50μmAl2O3, Er,Cr:YSGG laser) on shear bond strength between zirconia surface and resin cement. Material and methods: Sixty presintered Y-TZP zirconia cylinder specimens (IPS e.max ZirCAD, Ivoclar vivadent) will be fabricated and sintered in high temperature furnace of (1500 C for 8 hours) according to manufacturer’s instructions to the selected size and shape of (5mm. in diameter and 6mm in height). All specimens were ground flat using 600.800.1000.1200, aluminum oxide abrasive paper to obtain a standardized surface roughness. Surface roughness values were then recorded in µm using surface roughness tester (profi

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 19 2024
Journal Name
Birth
Changes in attitudes to childbirth in modern times illustrated over three generations in Iraq
...Show More Authors
Abstract<sec><title>Objective

To describe changes in attitudes and expectations of labor over the previous six decades, comparing the Iraqi generation who labored at home without medical assistance with their descendants.

Study Design

We used semi‐structured telephone interviews with 22 women across three generations of one extended family living and giving birth in Iraq between the 1950s and the 2010s. Qualitative data were analyzed thematically using open, axial, and selective coding.

Results

Each generation experienced a paradigm shift in childbirth, from exclus

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 28 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
Design and Implementation of EEG-Based Smart Structure
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF