It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.
Background: Antimicrobial prescribing patterns have an important role in the emergence of resistance, and community pharmacists have a substantial influence on this issue. Objective: To assess community pharmacists' behaviors and attitudes toward antimicrobial dispensing, determine their proportions and categories, and examine the underlying rationales for this practice. Methods: A descriptive cross-sectional survey of community pharmacists in Iraq was conducted from June to August 2023, using a self-administered validated questionnaire. The attitudes, practices, and motivations driving the distribution of antimicrobials without a prescription (AWP) were explored in three areas. Results: A sizable proportion (61.6%) of respondents rejected
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
Over application courier company (DHL) to keep the quality of service to achieve customer satisfaction the adoption of precedence delivery time - A prospective study))
Become attention to quality is a global phenomenon, and I took organizations and governments around the world attaches special attention, but we can say that quality has become the first function for many organizations, and has become a management philosophy
Praise to Allah, Lord of the Worlds. Thank you very much. Blessed. As his face should be majestic and great. His authority, and may peace and blessings be upon our master Muhammad, a perpetual blessing until the Day of Judgment
And upon the God of purity, His righteous companions, and those who follow them in righteousness until the Day of Judgment. But after:-
Anyone who looks into the history of nations, peoples, and the conditions of human beings will see that naturalization as a person’s affiliation to a particular state is something that happened only in recent centuries. In ancient times, a person’s loyalty was to the tribe to which the person belonged, and he was integrated into it and attributed to it, and in
... Show MoreThe sensitivity of SnO2 nanoparticles/reduced graphene oxide hybrid to NO2 gas is discussed in the present work using density functional theory (DFT). The SnO2 nanoparticles shapes are taken as pyramids, as proved by experiments. The reduced graphene oxide (rGO) edges have oxygen or oxygen-containing functional groups. However, the upper and lower surfaces of rGO are clean, as expected from the oxide reduction procedure. Results show that SnO2 particles are connected at the edges of rGO, making a p-n heterojunction with a reduced agglomeration of SnO2 particles and high gas sensitivity. The DFT results are in
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.