The presence of different noise sources and continuous increase in crosstalk in the deep submicrometer technology raised concerns for on-chip communication reliability, leading to the incorporation of crosstalk avoidance techniques in error control coding schemes. This brief proposes joint crosstalk avoidance with adaptive error control scheme to reduce the power consumption by providing appropriate communication resiliency based on runtime noise level. By switching between shielding and duplication as the crosstalk avoidance technique and between hybrid automatic repeat request and forward error correction as the error control policies, three modes of error resiliencies are provided. The results show that, in reduced mode, the scheme achieves up to 25.3% power savings at 3-mm wire length as compared to the original nonadaptive scheme at the cost of only 3.4% power overhead in high protection mode.
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreAbstract
The curriculum is amodern science which reflects the social philosophy and
what it needs . It searches for amothod that limits the knowledge that the
indiridual gets in the society and the sorts of the culture that suits the enrironment
in which they live. It also clears for them their history and their great in heritance.
It has a great in flunce in their mental growth ,and it teacher the students new
roles in the thin king ,and training then on what they have learned . According to
there points the problem concentrats on the mostimpotant difficulties which facer
thestudents in studing Arabic langnage text-books
In spite of the great care that the text taker but it is full of subjects and studies
w
he planning process is generally aimed at developing the city and making it meet the needs of different citizens. The green areas constitute one of the basic needs of the city and with the rapid and unusual growth in the size of cities, especially in the third world countries, which is often embodied in capitals. Which was achieved as a result of many reasons, including political, economic and social and even enshrined through some of the decisions that were issued and the city of Baghdad, but a clear example of these cities. The city and the environment are inseparable terms. The city is where people spend their lives and their daily experiences, and the environment is the center in w
... Show MoreABSTRACT
The research aims to know the reality of a two examined variables at the organization studied identifying the relationship between managerial processes reengineering and organizational citizenship behavior. The research applied on the Electronic Manufacturing Company encompassing a sample of managers and employees consisted of (100) individuals. A questionnaire is the main instrument for data gathering, which has been included (45) questions as well as personal interviews to support the questionnaire's questions and to achieve greater realism for collecting information.
Answers were analyzed to reach the final results through the use of a number of statistical methods via
... Show MoreThe importance of the current study lies in the importance of the Tax policy that being considered one of the most important tools working on fulfilling the social, financial and economic goals and improving the investment environment in the country to become having the ability to activate the national economy. The current study has referred that ( Has the tax planning practiced by the Iraqi contribution companies led to increase the far-term tax outcome through getting benefit of the monetary funds and expansion in&nbs
... Show MoreThe multi-focus image fusion method can fuse more than one focused image to generate a single image with more accurate description. The purpose of image fusion is to generate one image by combining information from many source images of the same scene. In this paper, a multi-focus image fusion method is proposed with a hybrid pixel level obtained in the spatial and transform domains. The proposed method is implemented on multi-focus source images in YCbCr color space. As the first step two-level stationary wavelet transform was applied on the Y channel of two source images. The fused Y channel is implemented by using many fusion rule techniques. The Cb and Cr channels of the source images are fused using principal component analysis (PCA).
... Show MoreThe performance of sewage pumps stations affected by many factors through its work time which produce undesired transportation efficiency. This paper is focus on the use of artificial neural network and multiple linear regression (MLR) models for prediction the major sewage pump station in Baghdad city. The data used in this work were obtained from Al-Habibia sewage pump station during specified records- three years in Al-Karkh district, Baghdad. Pumping capability of the stations was recognized by considering the influent input importance of discharge, total suspended solids (TSS) and biological oxygen demand (BOD). In addition, the chemical oxygen demands (COD), pH and chloride (Cl). The proposed model performanc
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More