Preferred Language
Articles
/
joe-1536
The Design and Simulation of a Novel Optical Adder Depending on Optical Tri-state Gates
...Show More Authors

Essential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represented by -1, 0, and 1, respectively. This research proposes new processor designs for addition. As a result, the design can achieve m addition operations with an operand length of n bits simultaneously. To explain and justify the theoretical design idea, the three steps of adding a BSD are numerically simulated. The constructing process is thought to be more precise and faster because the time to add does not depend on the length of the word. For all entries, all bits are implemented simultaneously, boosting the system's efficiency. A simulation model for six addition processes with a total bit count of 15 bits across all entries is presented in this work performing in a one-time parallelism manner.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
SBOA: A Novel Heuristic Optimization Algorithm
...Show More Authors

A new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (9)
Scopus Crossref
Publication Date
Mon May 01 2017
Journal Name
Ieee International Electrical Machines & Drives Conference Ieee (iemdc2017), Miami, Usa
The effect of power converter on the design of a Linear Alternator for use with a Joule Cycle-Free Piston Engine
...Show More Authors

Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Relations Between Ottoman State and Egypt (1863 – 1879)
...Show More Authors

Facts and information contained showing in axes Find Egyptian Ottoman relations
(1863-1879), has gone through stages varying between tides, has witnessed the Khedive
Ismail three sultans Ottomans were Abdul Aziz Murad V, Abdul Hamid II, and since the
Khedive Ismail to judge sought to expand independence Egypt access to many privileges of
the sovereign on Egypt Ottoman Empire, in order to reach the country to independence, has
been chosen by the payment of money and gifts to gain independence, without resorting to
arms, and from this point of Khedive make a lot of money to get the privileges, the state of
the Ottoman were not to issue Farmans but against the huge amounts of money, and as a
result of that policy got

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Ssrn Electronic Journal
Silence as a Tactic of Communication in Pragmatics, Novel, and Poetry
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 15 2019
Journal Name
Arab World English Journal For Translation And Literary Studies
Silence as a Tactic of Communication in Pragmatics, Novel, and Poetry
...Show More Authors

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 10 2023
Journal Name
Journal Of Namibian Studies : History Politics Culture
The Sufi influence in the Iraqi novel, the Lamia, is a model
...Show More Authors

In our research, we seek to shed a light on one of the most important and sensitive issues, namely, the Sufi influence in the Iraqi novel through the lame maqam of the novelist Jumaa Al-Lami, the Sufi discourse contains many semantic paradoxes between the text's apparent pronunciation and its interpretation of the format and the context that produced these patterns, and incited them, which concludes different results from the prevailing provisions and fixed ideas from the narrative text.The Arabic and Iraqi novel in particular became inspired by the power of Sufi discourse by talking about several Sufi figures by referring to it openly, or implicitly inspired by unauthorized concealment, in employing some of the ideas, or summoning

... Show More
View Publication
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Programmable System for Failure Modes and Effect Analysis of Steam-Power Plant Based on the Fault Tree Analysis
...Show More Authors

In this paper, the system of the power plant has been investigated as a special type of industrial systems, which has a significant role in improving societies since the electrical energy has entered all kinds of industries, and it is considered as the artery of modern life.

   The aim of this research is to construct a programming system, which could be used to identify the most important failure modes that are occur in a steam type of power plants. Also the effects and reasons of each failure mode could be analyzed through the usage of this programming system reaching to the basic events (main reasons) that causing each failure mode. The construction of this system for FMEA is dependi

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Sciencerise: Pharmaceutical Science
The morphological analysis of crystalline methadone: a novel combination of microscopy techniques
...Show More Authors

The aim: to evaluate combined microscopy techniques for determining the morphological and optical properties of methadone hydrochloride (MDN) crystals. Materials and methods: MDN crystal formation was optimized using a closed container method and crystals were characterized using polarized light microscope (PLM), scanning electron microscopy (SEM) and confocal microscopy (CM). SEM and CM were used to determine MDN crystal thickness and study its relationship with crystal retardation colours using the Michel-Levy Birefringence approach. Results: Dimensions (mean±SD) of diamond shaped MDN crystals were confirmed using SEM and CM. Crystals were 46.4±15.2 Vs 32.0±8.3 µm long, 28.03±8.2 Vs 20.85±5.5 µm wide, and 6.62±

... Show More
View Publication Preview PDF
Scopus Crossref