The MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as communication channel between the PC and the system. Software on both parties is developed to handle the communication protocol.
In this research the performance of 5G mobile system is evaluated through the Ergodic capacity metric. Today, in any wireless communication system, many parameters have a significant role on system performance. Three main parameters are of concern here; the source power, number of antennas, and transmitter-receiver distance. User equipment’s (UEs) with equal and non-equal powers are used to evaluate the system performance in addition to using different antenna techniques to demonstrate the differences between SISO, MIMO, and massive MIMO. Using two mobile stations (MS) with different distances from the base station (BS), resulted in showing how using massive MIMO system will improve the performance than the standar
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
The Costing Accounting is one the analytic tools which plays important role by support the management in planning& control and decisions-making ,as it became attendant necessity to establish any project whether industrial ,commercial ,service or agriculture ..etc.
The consolidated accounting system has committed the companies to have their active costing system in which the management can obtain their own data, but we found most of the economic units face problems of applying the costing system because of reasons related to the system design itself or might be related to the requirements of the application success.
... Show MoreThe telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer registration, billing and payment. However, the challenge confronting telecommunications industry is to meet the customer satisfaction in the billing system such as accuracy, easy to understand and unambiguous billing issue. In order to develop Customer Billing Telephony System,a user experience study is conducted to gather the user requirements. Hence, the CBTS was developed that takes into consideration user’s value experience that provides a support for managing and monitoring billing proce
... Show MoreHydroponics is the cultivation of plants by utilizing water without using soil which emphasizes the fulfillment of the nutritional needs of plants. This research has introduced smart hydroponic system that enables regular monitoring of every aspect to maintain the pH values, water, temperature, and soil. Nevertheless, there is a lack of knowledge that can systematically represent the current research. The proposed study suggests a systematic literature review of smart hydroponics system to overcome this limitation. This systematic literature review will assist practitioners draw on existing literature and propose new solutions based on available knowledge in the smart hydroponic system. The outcomes of this paper can assist future r
... Show MoreResearchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa
... Show More