It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.
Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreImage databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreThe current research aims to shed light on the Global Reporting Initiative (GRI), which helps to report financial and non-financial information by economic units in general and listed on the Iraq Stock Exchange in particular. The research was based on a main premise that apply the criteria of the Global Reporting Initiative (GRI) would provide useful information to users to help them make appropriate decisions. To achieve the goal of the research, the descriptive analysis method was used, and quantitative analysis was used. At the level of the descriptive analysis method, a desk survey was conducted. As for the quantitative analysis, it relied on applied data through a questionnaire form (Questioners) as a research tool, and the
... Show MoreThe problem of the study and its significance:
Due to the increasing pressures of life continually, and constant quest behind materialism necessary and frustrations that confront us daily in general, the greater the emergence of a number of cases of disease organic roots psychological causing them because of severity of a lack of response to conventional treatments (drugs), and this is creating in patients a number of emotional disorders resulting from concern the risk of disease
That is interested psychologists and doctors searchin
... Show MoreStealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the
... Show MoreThe temperature control process of electric heating furnace (EHF) systems is a quite difficult and changeable task owing to non-linearity, time delay, time-varying parameters, and the harsh environment of the furnace. In this paper, a robust temperature control scheme for an EHF system is developed using an adaptive active disturbance rejection control (AADRC) technique with a continuous sliding-mode based component. First, a comprehensive dynamic model is established by using convection laws, in which the EHF systems can be characterized as an uncertain second order system. Second, an adaptive extended state observer (AESO) is utilized to estimate the states of the EHF system and total disturbances, in which the observer gains are updated
... Show MoreBackground: Determination of sex from an unknown human bone is an important role in forensic and anthropology field. The mandible is the largest and hardest facial bone, that commonly resist postmortem damage and forms an important source of information about sexual dimorphism. Mandibular ramus can be used to differentiate between sexes and it also expresses strong univariate sexual dimorphism. This study was undertaken to assess the usefulness of mandibular ramus as an aid in sex differentiation using CT scanning among Iraqi population. Materials and methods: 3D reconstructed computed tomography scanning of 140 Iraqi Arab subjects, (7 0 males and 70 females) were analyzed with their age range from 20-60 years old. The linear measurements w
... Show MoreTo evaluate the efficiency and effectiveness of three minimally invasive (MI) techniques in removing deep dentin carious lesions. Forty extracted carious molars were treated by conventional rotary excavation (control), chemomechanical caries removal agent (Brix 3000), ultrasonic abrasion (WOODPECKER, GUILIN, China); and Er, Cr: YSGG laser ablation (BIOLASE San Clemente, CA, USA). The assessments include; the excavation time, DIAGNOdent pen, Raman spectroscopy, Vickers microhardness, and scanning electron microscope combined with energy dispersive X-ray spectroscopy (SEM–EDX). The rotary method recorded the shortest excavation time (p < 0.001), Brix 3000 gel was the slowest. DIAGNOdent pen va
It is very well known in the planning publications that when creating spacing development to a region or sub-region, it can be able to make more than an alternative consisting with the strategic directions overtaken from the actual development of region and the situational and developmental objectives needed. However, the difficulty facing the situational planning is in selecting one of these alternatives to be the best in order to make a balanced situational re-structure, and achieving the economic, social and civil objectives. The developmental situation elements in the regions and governorates, including (Karbala) impose themselves as situational power which implies the process of re-structural arrangement where the situational develo
... Show More