Ensuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capacity compared with many other code schemes. This candidate has high correction capability but with a high codeword size. In this work, the CCAEC code is compared to another well-known code scheme called Horizontal-Vertical-Diagonal (HVD) error detecting and correcting code through reliability analysis by deriving a new accurate mathematical model for the probability of residual error Pres for both code schemes and confirming it by simulation results for both schemes. The results showed that the HVD code could correct all single, double, and triple errors and failed to correct only 3.3 % of states of quadric errors. In comparison, the CCAEC code can correct a single error and fails in 1.5%, 7.2%, and 16.4% cases of double, triple, and quadric errors, respectively. As a result, the HVD has better reliability than CCAEC and has lower overhead; making it a promising coding scheme to handle the reliability issues for NoC.
Total quality management considers one of the modern scientific entrances which practiced by productivity service organizations alike to provide appropriate quality required outputs according to the needs and desires of customers manage , enable the organization seeking to continue and grow in light of the increasing competition from the satisfy and provide the appropriate total quality management requirements whenever led to face risks that they may have in a manner in which they can be addressed and find ways to avoid them in the future when repeated. &n
... Show MoreThis paper aims to validate a proposed finite element model to be adopted in predicting displacement and soil stresses of a piled-raft foundation. The proposed model adopts the solid element to simulate the raft, piles, and soil mass. An explicit integration scheme has been used to simulate nonlinear static aspects of the piled-raft foundation and to avoid the computational difficulties associated with the implicit finite element analysis.
The validation process is based on comparing the results of the proposed finite element model with those of a scaled-down experimental work achieved by other researchers. Centrifuge apparatus has been used in the experimental work to generate the required stresses to simulate t
... Show MoreSpeech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.
The purpose of this research is to study the organic planning in the United Industry Alliance, focusing on an applied model. It takes the concept of good planning, and its importance in the overall picture, well into political, economic, and military policy. It also analyzes how the United States has used this year to address the challenges that nationalism targets. The research draws on typical examples to illustrate the differences between researcher and decision effectiveness. It also discusses the factors that lead to the success or failure of dynamic planning, and draws lessons from it in other countries. Finally, the researcher begins to help in planning the goal as a basic tool in enhancing effectiveness.
Trace Elements (Cd, Pb, Cu, Zn, Ni) level were examined in hair of donors from industrial areas, cities and village, and in permanent contact with a polluted workplace environment in lattakia. Hair sample were analyzed for their contents of the trace elements by inductivity coupled plasma- mass spectrometer (ICP- MS). It was found that the contents of (Cd, Pb, Cu, Zn, Ni) in the hair were significantly higher in the industrial areas and cities, while in the village had the lower concentration of elements. Correlation coefficients between the levels of the elements in hair found in this study showed that hair is a good indicator of Environmental Pollution.
In order to improve the effectiveness, increase the life cycle, and avoid the blade structural failure of wind turbines, the blades need to be perfectly designed. Knowing the flow angle and the geometric characteristics of the blade is necessary to calculate the values of the induction factors (axial and tangential), which are the basis of the Blade Element Momentum theory (BEM). The aforementioned equations form an implicit and nonlinear system. Consequently, a straightforward iterative solution process can be used to solve this problem. A theoretical study of the aerodynamic performance of a horizontal-axis wind turbine blade was introduced using the BEM. The main objective of the current work is to examine the wind turbine blade’s perf
... Show Moreof the research is one of the poetic purposes that expresses the philosophy of the intellectual poet who experienced life and learned the tendencies and the gulf of the human soul and the fact that an intellectual attitude towards them, intensified within the poems do not need to be frequently narrated and elaborated, but based on the few words in the rich meanings and expressed the point of view he wanted to convey to the recipient without taking the position of disorientation and retreat to himself expressing his rejection of this reality, but faced this reality different manifestations and reflections and the conditions of human beings in it detailed His opinion is constructive criticism, and accurate observations reveal the culture o
... Show MoreThe Atoms in Molecules (AIM) analysis for triosmium cluster, which contains trihydridede, carbon, carbonyl and 2-methylbenzothiazolide ligands, [Os3(µ-H)3(µ3-ɳ2-CC7H3(2-CH3)NS)(CO)8] is reported. Bonding features in this cluster has been analyzed based on QTAIM ("Quantum Theory of Atoms in Molecules") in this work. The topological indices derived from electron density of relevant interactions in triosmium compound have been studied. The major interesting point of the AIM analyses is that the core of part (Os3H3) reveals the absence of any critical points and bond paths connecting any pairs of O
... Show MoreTwitter is becoming an increasingly popular platform used by financial analysts to monitor and forecast financial markets. In this paper we investigate the impact of the sentiments expressed in Twitter on the subsequent market movement, specifically the bitcoin exchange rate. This study is divided into two phases, the first phase is sentiment analysis, and the second phase is correlation and regression. We analyzed tweets associated with the Bitcoin in order to determine if the user’s sentiment contained within those tweets reflects the exchange rate of the currency. The sentiment of users over a 2-month period is classified as having a positive or negative sentiment of the digital currency using the proposed CNN-LSTM
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show More