Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreHuge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig
... Show MoreThe logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables. The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreConstitutional Review of 1992 and 1996 and the role of the Party of Progress and Socialism
Iraq is Suffering nowadays from the criminal triad represented by the fiscal and administrative corruption, money laundering and terrorism, which are intertwined in a very related relations, as each of them support the other . Since the over growth has been one of its characteristics leaving behind a very dangerous negative effects whether it was social , economic or even political impacts . As a result , this trial is now represents a high risk that threatens the present and the future of Iraq . On the political , economic and social level , it is well to mention that the poor direct investment , the increasing rates of poverty , unemployment , inflation as well as the smuggling of goreign currency an
... Show MoreMS Elias, RGM AL-helfy, Plant Archives, 2019
Aluminum oxide (ALO) was grafted by acrylic acid monomer (AlO-AM) and then, it was polymerized to produce alumina grafted poly(acrylic acid) (AlO-AP). The prepared AlO-AM and AlO-AP were characterized by Fourier-transform infrared, differential scanning calorimetry , thermogravemetric analyzer and particle size distribution. Adsorption equilibrium isotherms, adsorption kinetics and thermodynamic studies of the batch adsorption process were used to examine the fundamental adsorption properties of phenol (P) and p-chlorophenol (PCP). The experimental equilibrium adsorption data were analyzed by three widely used two-parameters Langmuir, Freundlich and DubininRadushkevich isotherms. The maximum P and PCP adsorption capacities based on t
... Show MoreIn this work, the preparation of some new oxazolidine and thiazolidine derivatives has been conducted. This was done over two steps; the first step included the synthesis of Schiff bases A1-A5 in 72-88% yields by the condensation of isonicotinic acid hydrazide and aldehydes. The second step includes the cyclization of derivatives A1-A5 with glycolic acid and thioglycolic acid to obtain the desired products, oxazolidine derivatives B1-B5 (44-60% yields) and thiazolidine derivatives C1-C5 (41-61% yields), respectively. The structure of the prepared compounds was characterized using FT-IR, 1H NMR, and 13C NMR spectroscopy. Some of the produced compounds were tested for antioxidant properties.