Preferred Language
Articles
/
JRaRBYcBVTCNdQwCyy9H
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.

Publication Date
Sun Jun 30 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of strategic planning for electronic services to developing cash bank deposits: An Applied research for a sample of Iraqi private banks
...Show More Authors

               The bank deposits is fuel banking activity and raw material products for the commercial bank and the basis of its activity and its lifetime So the bank, which seeks to continue the successful development of the volume of cash deposits has translated the work of the bank to meet the needs of different sectors by providing the necessary funding, and from this point of view was the research problem a lack of interest departments of banking services to commercial banks as a means for the development of electronic cash deposits have, and which represents the basis for the supplier commercial bank fund.

 

View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Dental Sciences
Evaluation of the efficacy of lycopene gel compared with minocycline hydrochloride microspheres as an adjunct to nonsurgical periodontal treatment: A randomised clinical trial
...Show More Authors

Scopus (10)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Dental Sciences
Evaluation of the efficacy of lycopene gel compared with minocycline hydrochloride microspheres as an adjunct to nonsurgical periodontal treatment: A randomised clinical trial
...Show More Authors

View Publication
Scopus (10)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis , Characterization and Study The Liquid Crystalline Properties of N-Acyl , Thiourea and Imidazole Derivatrives.
...Show More Authors

    The synthesis , characterization and mesomorphic behaviour of new Nacyl , thiourea and imidazole derivatives which derived from corresponding Schiff bases are reported.             All the synthesized compounds which contain flexible methylene group in the centre of the molecule did not show any liquid crystalline properties . The derivatives of N- acyl [III]e  and thiourea [VI]e  which contain  biphenyl and all compounds with one phenyl in the centre of the molecule display liquid crystalline behaviour .While the imidazoles did not show any liquid crystalline properties except [V]b [V]e  with biphenyl in the centre of the molecule . All th

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Stances on the damage to manuscripts and ways to address them
...Show More Authors

Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.

View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Determining of Cross Sections for 16O(n,α)13C reaction from Cross Sections of 13C(α,n)16O for the ground state
...Show More Authors

  In this study, light elements for 13C , 16O for  (α,n) and (n,α) reactions as well as α-particle energy  from 2.7 MeV  to 3.08 MeV are used as far as the data of reaction cross sections are available. The more recent cross sections data of (α,n) and (n,α) reactions are reproduced in fine steps 0.02 MeV for  16O (n,α) 13C  in the specified energy range, as well as cross section (α,n)  values were derived from the published data of (n,α) as a function of α-energy in the same fine energy steps by using the principle inverse reactions. This calculation involves only the ground state of  13C , 16O  in the reactions 13C (α,n) 16O  and  16O (n,α) 13C.

View Publication Preview PDF