Preferred Language
Articles
/
joe-2075
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 19 2026
Journal Name
Modern Sport
The effect of Developing special endurance using multiple round periods on some physical and functional indicators for elite boxers
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Apr 10 2018
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Effect of Scan Rate and pH on Determination Amoxilline Using Screen Printed Carbon Electrode Modified with Functionalized Graphene Oxide
...Show More Authors

Graphene oxide GO was functionalized with 4-amino, 3-substituted 1H, 1, 2, 4 Triazole 5(4H) thion (ASTT) to obtain GOT. GOT characterized by FT-IR, XRD.via modification of the working electrode of the SPCE with the prepared nanomaterial (GOT) the effect of scan rate and pH on the determination of Amoxilline (AMOX) was studied using cyclic voltammetry. AMOX show various responses at pH ranging from 2 to 7 and also was observed sharp increase in the oxidation peaks in the pH 3. The formal potential (midpoint) for AMOX was highly pH-dependent. From the effect of scan rate, surface coverage concentration Γ of electroactive species the values of the electron transfer coefficient and the electron transfer constant rate ket was obtained as 5.39×

... Show More
Preview PDF
Publication Date
Wed May 31 2023
Journal Name
Iraqi Geological Journal
Studying the Effect of Permeability Prediction on Reservoir History Matching by Using Artificial Intelligence and Flow Zone Indicator Methods
...Show More Authors

The map of permeability distribution in the reservoirs is considered one of the most essential steps of the geologic model building due to its governing the fluid flow through the reservoir which makes it the most influential parameter on the history matching than other parameters. For that, it is the most petrophysical properties that are tuned during the history matching. Unfortunately, the prediction of the relationship between static petrophysics (porosity) and dynamic petrophysics (permeability) from conventional wells logs has a sophisticated problem to solve by conventional statistical methods for heterogeneous formations. For that, this paper examines the ability and performance of the artificial intelligence method in perme

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Mon Nov 30 2020
Journal Name
Iraqi Geological Journal
EXPERIMENTAL STUDY OF MICRO SILICA BEHAVIOR AND ITS EFFECT ON IRAQI CEMENT PERFORMANCE BY USING X-RAY FLUORESCENCE ANALYSIS
...Show More Authors

The cement slurry is a mixture of cement, water and additives which is established at the surface for injecting inside hole. The compressive strength is considered the most important properties of slurry for testing the slurry reliability and is the ability of slurry to resist deformation and formation fluids. Compressive strength is governed by the sort of raw materials that include additives, cement structure, and exposure circumstances. In this work, we use micro silica like pozzolanic materials. Silica fume is very fine noncrystalline substantial. Silica fume can be utilized like material for supplemental cementations for increasing the compressive strength and durability of cement. Silica fume has very fine particles size less

... Show More
View Publication
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Self-Evaluation of Nurses and Midwives Practices Using SBAR (Situation, Background, Assessment, Recommendation) Communication Tool on Maternal Health Documentation
...Show More Authors

Abstract:
Objective: To self-evaluate the effect of SBAR (Situation, Background, Assessment, and Recommendation) educational program on nurse and midwives practices in maternal health report documentation accuracy.
Methods: A quasi- experimental design was carried with the application of pre- post test for nurses and midwives’ knowledge and practices regarding SBAR communication tool. The study was held in Al-Elwia maternity teaching hospital, Al –Karckh maternity hospital and Al-Yarmouk teaching Hospital. purposive sample as it was convenient with inclusion criteria consisted of (84) nurse and midwives. The questionnaire comprised of demographic data, nurses- midwives practices of SBAR using (5) level Likert scale for assessme

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref