The presence of different noise sources and continuous increase in crosstalk in the deep submicrometer technology raised concerns for on-chip communication reliability, leading to the incorporation of crosstalk avoidance techniques in error control coding schemes. This brief proposes joint crosstalk avoidance with adaptive error control scheme to reduce the power consumption by providing appropriate communication resiliency based on runtime noise level. By switching between shielding and duplication as the crosstalk avoidance technique and between hybrid automatic repeat request and forward error correction as the error control policies, three modes of error resiliencies are provided. The results show that, in reduced mode, the scheme achieves up to 25.3% power savings at 3-mm wire length as compared to the original nonadaptive scheme at the cost of only 3.4% power overhead in high protection mode.
Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents
... Show MoreThe important of present study is to design rehabilitation program by using hypermedia for some injuries of smooth tissues in shoulder joint. This joint is most important to help badminton players in achieving their daily and sport tasks due to upper limp movements depend on health and active of this joint. Experimental approach with a manner of equal single station was used in present study and study simple consisted of 6 badminton players from Babylon and Al-Mahaweel clubs who have less sharp tissue smooth injury such (muscles, ligaments, pocket). We used (SPSS) to analyses pre, medal, post-tests data. In conclusion, hypermedia is positive benefit to rehabilitee of injuries of smooth tissues in shoulder joint for badminton pla
... Show MoreAbstract
This research aims to know the effect of job burnout in the worker’s performance. The researcher presented a theoretical basis for job burnout and the worker's performance. In order to achieve the objectives of the research, a hypothesis was drawn up that determines the nature of the relationship between the independent variable of job burnout and its dimensions (reduced personal accomplishment, depersonalization, Emotional Exhaustion) and variable dependent performance of workers dimensions (productivity, job satisfaction, organizational commitment, creativity), And to represent the volume of this community according to (de Morgan, D. Morgan) glo
... Show MoreA novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreThe research aims to determine optimal urban planning and design indicators of the urban clusters form in hot arid zones through studying of three urban areas in Baghdad, analyzing their urban indicators which include floor area ratio (FAR), urban clusters height, building density or land coverage, green areas, paved areas, shading ratio and how they affect urban temperature. The research reached the conclusion that air outdoor temperature on urban areas affected primarily by shadows casted on the ground, the effect of shaded area equals (5) times the effect of paved areas and (3.7) times the effect of green areas, this means that increasing urban clusters height in hot arid zones could minimize air outdoor temperature, building
... Show MoreThe objective of this work was to study the effect of oral administration of Cyperus esculentus (CE) and its alcoholic extract on sperm function parameters in prepubertal mice as a model for human .The animals were divided into three groups each contains 6 animals .Group 1 was treated with 150 mg/ kg body weight /day of crude CE, group 2 was treated with same dose of alcohol extract of CE and group 3 regarded as control throughout six weeks period. The results showed a significant (p> 0.05) increase in the mean of sperm concentration ,sperm motility percent and progressive sperm motility between treated groups and control . There was no differences among groups in the mean of sperm normal morphology and sperm viability . No significa
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More