Essential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represented by -1, 0, and 1, respectively. This research proposes new processor designs for addition. As a result, the design can achieve m addition operations with an operand length of n bits simultaneously. To explain and justify the theoretical design idea, the three steps of adding a BSD are numerically simulated. The constructing process is thought to be more precise and faster because the time to add does not depend on the length of the word. For all entries, all bits are implemented simultaneously, boosting the system's efficiency. A simulation model for six addition processes with a total bit count of 15 bits across all entries is presented in this work performing in a one-time parallelism manner.
South Sudan is known by its tribal and racial variation .Tribal Perception represents the
procedure of dealings in Southern society .And that what make Sudan as a stable country that
suffer from divisions . Everybody wants to rule in spite of his inability and un qualification
which enables the establishment of an urbanized country .the frustration of the state in
handling the interior variety on religious, tribal and racial basis and contracting national
ideality in spared by shared ingredients between gathered groups in one state, all these reasons
make it hard to create a united national identity which is able to unite atheist and religious
parties together. Due to this ,the study is established to clarify the nat
In this study, the global solar radiation for the locations of fourteen Iraqi metrological stations was studied and calculated. This was performed because most of the Iraqi stations lack solar radiation measuring devices. The equation postulated by Angström (1924) and modified by Prescott (1940) was utilized for the estimation of the solar radiation for the fourteen Iraqi metrological stations depending on sunshine duration measurements of these stations. Empirical constants of Angstrom-Prescott equation that are adopted by the Food and Agriculture Organization (FAO) were used for obtaining the results. The utilized data reported in this study were taken from the Republic of Iraq Meteorological Office (RIMO). The calculations and diag
... Show MoreIn this work, a flat-plate solar air heater (FSAH) and a tubular solar air heater (TSAH) were designed and tested numerically. The work investigates the effect of increasing the contact area between the flowing air and the absorber surface of each heater and predicts the expected results before the fabrication of the experimental rig. Three-dimensional two models were designed and simulated by the ANSYS-FLUENT 16 Program. The solar irradiation and ambient air temperature were measured experimentally on December 1st 2022, at the weather conditions of Baghdad City- Iraq, at three air mass flow rates, 0.012 kg/s, 0.032 kg/s, and 0.052 kg/s. The numerical results showed the advantage in the thermal performance of
... Show MoreIn this study, doped thin cadmium peroxide films were prepared by pulsed laser deposition with different doping concentrations of aluminium of 0.0, 0.1, 0.3, and 0.5 wt.% for CdO2(1-X)Al(X) and thicknesses in the range of 200 nm. XRD patterns suggest the presence of cubic CdO2 and the texture factor confirms that the (111) plane was the preferential growth plane, where the texture factor and the grain size decreased from 2.02 to 9.75 nm, respectively, in the pure sample to 1.88 and 5.65 nm, respectively, at a concentration of 0.5 wt%. For the predominant growth plane, the deviation of the diffraction angle Δθ and interplanar distance Δd from the standard magnitudes was 2.774° and 0.318 Å, respectively, for the pure sample decreased to
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThe aim: to evaluate combined microscopy techniques for determining the morphological and optical properties of methadone hydrochloride (MDN) crystals. Materials and methods: MDN crystal formation was optimized using a closed container method and crystals were characterized using polarized light microscope (PLM), scanning electron microscopy (SEM) and confocal microscopy (CM). SEM and CM were used to determine MDN crystal thickness and study its relationship with crystal retardation colours using the Michel-Levy Birefringence approach. Results: Dimensions (mean±SD) of diamond shaped MDN crystals were confirmed using SEM and CM. Crystals were 46.4±15.2 Vs 32.0±8.3 µm long, 28.03±8.2 Vs 20.85±5.5 µm wide, and 6.62±
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreThe objective of this work is to investigate the performance of a conventional three phase induction motor supplied by unbalanced voltages. An effort to study the motor steady state performance under this disturbance is introduced. Using per phase equivalent circuit analysis with the concept of symmetrical components approach, the steady state performance is theoretically calculated. Also, a model for the induction motor with the MATLAB/Simulink SPS tools has been implemented and steady state results were obtained. Both results are compared and show good correlation as well. The simulation model is introduced to support and enhance electrical engineers with a complete understanding for the steady state performance of a fully loaded induc
... Show More The vast majority of EC applications are the web-based deployed in 3-tire Server-Client environment, the data within such application often resides within several heterogeneous data sources. Building a single application that can access each data sources can be a matter of challenging; this paper concerns with developing a software program that runs transparently against heterogeneous environment for an EC-application.