Preferred Language
Articles
/
joe-1536
The Design and Simulation of a Novel Optical Adder Depending on Optical Tri-state Gates
...Show More Authors

Essential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represented by -1, 0, and 1, respectively. This research proposes new processor designs for addition. As a result, the design can achieve m addition operations with an operand length of n bits simultaneously. To explain and justify the theoretical design idea, the three steps of adding a BSD are numerically simulated. The constructing process is thought to be more precise and faster because the time to add does not depend on the length of the word. For all entries, all bits are implemented simultaneously, boosting the system's efficiency. A simulation model for six addition processes with a total bit count of 15 bits across all entries is presented in this work performing in a one-time parallelism manner.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Faithful representation of accounting information according requirements width financial statements depending on international standard (IFRS-15) revenue from contracts with customers: Applied research in a sample of the joint stock companies listed on the Iraq Stock Exchange
...Show More Authors

This study seeks to identify the possibility of achieving the property of faithful representation of accounting information and measure it by using the standard approach based on mathematical and statistical equations by comparing two financial periods before and after the application of (IFRS-15) Revenue from contracts with customers, during the period. (2014-2018), for the financial statements of the mixed joint stock companies listed on the Iraq Stock Exchange, which is one of the main pillars of the economic structure of the country, as a joint investment between the state and the private sector, and has importance in many aspects, including support for projects of public companies, S Absorption and employment of labor, as well as ra

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design and Implement an EC-Application Based on Multi Database Environment
...Show More Authors

 The vast majority of EC applications are the web-based deployed in 3-tire Server-Client environment, the data within such application often resides within several heterogeneous data sources. Building a single application that can access each data sources can be a matter of challenging; this paper concerns with developing a software program that runs transparently against heterogeneous environment for an EC-application.
 

View Publication Preview PDF
Publication Date
Wed Aug 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparison of Optimum Balance Values For Different Coefficients of Spherical Aberration of Optical System Including Different Apertures
...Show More Authors


         The optimum balance values for different coefficient of spherical aberration (third and fifth degree also focal shift) were studied, the optical system includes different apertures (circle, ellipse, square and triangle) using point spread function (PSF).       By using (Marechal) method; the minimum value of mean square of variance in wave front was founded, so we can get the maximum of central intensity according to (Strehl) criterion.

View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Political Sciences Journal
Article The reality of the settlements in the occupied West Bank, and its impact on the future of the Palestinian state
...Show More Authors

الخلاصة

تتناول هذه الورقة مخططات وسياسات الاستيطان في الضفة الغربية والقدس الشرقية منذ العام 1967، عبر سياسات قادها حزب العمل وأكملها حزب الليكود وكاديما وبقية الأحزاب الإسرائيلية، تلك السياسات التي استهدفت فرض السيطرة السياسية الكاملة على الأرض، وما نتج عن ذلك من سيطرة حصرية على الأرضوتقييد استخداماتها، ومحاصرة الوجود الفلسطيني والتضييق عليه، وتحويل مراكز ال

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2017
Journal Name
Ieee International Electrical Machines & Drives Conference Ieee (iemdc2017), Miami, Usa
The effect of power converter on the design of a Linear Alternator for use with a Joule Cycle-Free Piston Engine
...Show More Authors

Scopus (3)
Crossref (5)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ssrn Electronic Journal
Silence as a Tactic of Communication in Pragmatics, Novel, and Poetry
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Financial contribution of taxes on Foreign oil companies in support of the state budget: The case of a foreign oil company in the Iraq Study
...Show More Authors

Imposed on foreign oil companies from important sources in the financing of the general budget in most countries of the world income tax is considered as well as be used to achieve political, economic and social goals, and has developed the concept of the tax until it became play an important role in influencing the economic conditions of a country, and the aim of this research is to statement imposed on foreign oil companies operating in Iraq in the financing of the state budget income tax contribution, as well as clarify the contracts type contracts with these companies, which is in favor of Iraq, together with the Income Tax Law No. (19) for the year / 2010, and instructed No. (5) for the year / 2011, which organized the tax process s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
State, Democracy, and Opposition in the Political Thought of Taliban
...Show More Authors

Taliban has returned to the forefront since regaining control of Afghanistan in mid-August 2021, prompting the international community and researchers to speculate whether it has adopted a different political vision and ideology from its previous rule (1996-2001). The previous rule presented a distorted version of governance that lacked clear political and ideological foundations, characterized by impulsive and chaotic decisions, and the absence of a comprehensive theoretical and intellectual framework for governance.

Once again, Taliban returned to power on August 15, 2021, and took control of the country. This raised many questions about Taliban's return, the extent of its flexibility and adaptability that allowed the movement t

... Show More
View Publication Preview PDF
Crossref