The hierarchical organization of aggregates in soil is responsible for the presence of inter and intra-aggregate pores. This research aimed to investigate effects of soil surface liming, considering lime rates of 0, 10 and 15 t ha(-1), on the intra-aggregate porous system of soil aggregates with equivalent diameters of 2-4...
The computation of the inverse of a number in finite fields, namely Galois Fields GF(p) or GF(2ⁿ), is one of the most complex arithmetic operations in cryptographic applications. In this work, we investigate the GF(p) inversion and present several phases in the design of efficient hardware implementations to compute the...
Information security is an important concern in today’s communication and business world. To achieve these security functions, cryptography is utilized. RSA and the Diffie Hellman key exchange are some examples of cryptography algorithms that use modular multiplication to compute modular exponentiations. Modular multiplication requires division operations which becomes very time...
A main arithmetic operation for cryptographic systems is modular exponenti- ation. Exponentiation is computed by a long sequence of modular multiplications. Modular multiplication can be implemented in a general-purpose processor or a dedicated hardware, but dedicated hardware tends to be faster than a processor. Modular multiplication is a time-consuming operation,...
Modular exponentiation and modular multiplication are the most used operations in current cryptographic systems. Some well-known cryptographic algorithms, such as RSA, Diffie-Hellman key exchange, and DSA, require modular exponentiation operations. This is performed with a series of modular multiplications to the extent of its exponent in a certain fashion depending...
Modular multiplication is a widely used operation in cryptography. Several well-known applications, such as the decipherment operation of the RSA algorithm, the Diffie-Hellman key exchange algorithm, as well as some applications currently under development, such as the Digital Signature Standard and elliptic curve cryptography, all use modular multiplication and modular...
Memory hierarchy design is becoming more important as the speed gap be- tween processor and memory continues to grow. Investigations of memory perfor- mance have typically been conducted using trace-driven emulation, which could take tremendous resources (e.g. long emulation time, large storage requirements for traces, and high overall cost). Recent...
The first part of this manuscript is about the total synthesis of the Arundo donax bis(indole) natural products. The A. donax alkaloids were prepared using the first example of an ynindole Diels–Alder reaction. Each were then separated, isolated, and determined to have stable enantiomeric conformations at room temperature (Chen, J.;...
A method based on fatty acid (FA) analysis is used to profile microbial community structure (MCS). Various extraction protocols are available, which alter the types of FAs extracted from soils. The more time consuming but widely used protocol extracts only FAs from phospholipids (PLFA). This technique is desirable because PLFAs...
The first part of this manuscript is about the total synthesis of the aspidosperma alkaloids leuconoxine, melodinine E and mersicarpine. Our synthetic strategy used a radical translocation-conjugate addition cascade to construct the core of the natural product. Specifically, a vinyl radical was generated from the homolysis of the C–I bond...