High cost of qualifying library standard cells on silicon wafer limits the number of test circuits on the test chip. This paper proposes a technique to share common load circuits among test circuits to reduce the silicon area. By enabling the load sharing, number of transistors for the common load can be reduced significantly. Results show up to 80% reduction in silicon area due to load area reduction.
Petrophysical properties evaluation from well log analysis has always been crucial for the identification and assessment of hydrocarbon bearing zones. East Baghdad field is located 10 km east of Baghdad city, where the southern area includes the two southern portions of the field, Khasib formation is the main reservoir of East Baghdad oil field.
In this paper, well log data of nine wells have been environmentally corrected, where the corrected data used to determine lithology, shale volume, porosity, and water saturation. Lithology identified by two methods; neutron-density and M-N matrix plots, while the shale volume estimated by single shale indicator and dual shale indicator, The porosity is calculated from the three common po
... Show MoreConcentrations of uranium were measured in this study for twenty soil samples from four areas with different depths (soil surface-20-40-60-80)cm .The study regions include Missan Governorate (Al-Iskan area,Al-Shibbana area ,Hai-Al Moualimin Al Jadied area ,Sector 30 area). The Uranium concentrations in soil samples measured by using fission tracks registration in (CR-39) track detector that caused by the bombardment of (U-283) with thermal neutrons from (241Am-Be) neutron source that has flux neutron thermal of (5 ×103 n cm-2 s-1). The concentrations values were calculated by a comparison with standard samples. Through out the result, it was found that averages of uranium concentrations in soil samples were as the following : Al - Iskan
... Show MoreE-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and
... Show MoreThe research presented the experience of creating a new sustainable city, and this experience of establishing an Eco-City (Environmentally friendly) is considered the first experience in Iraq. The current study stressed the importance of the need for environmental planning in the early stages of planning new cities based on realism in planning, design and implementation. Subsequently, that aims to preserve the ecosystem, which is difficult to compensate if degraded or polluted. The research incorporated environmental planning indicators within sustainable urban planning (Reliance on generating electric power that is based on clean and renewable energy sources, Availability of public t
Although the number of stomach tumor patients reduced obviously during last decades in western countries, but this illness is still one of the main causes of death in developing countries. The aim of this research is to detect the area of a tumor in a stomach images based on fuzzy clustering. The proposed methodology consists of three stages. The stomach images are divided into four quarters and then features elicited from each quarter in the first stage by utilizing seven moments invariant. Fuzzy C-Mean clustering (FCM) was employed in the second stage for each quarter to collect the features of each quarter into clusters. Manhattan distance was calculated in the third stage among all clusters' centers in all quarters to disclosure of t
... Show MoreBackground Median sternotomy is the gold standard incision for most cardiac operations. However, with the advent of minimal invasive surgery, a new approach emerged in cardiac surgery named mini-sternotomy and has been successfully used to perform a variety of operations.
The aim of this paper is to present our experience of using mini-sternotomy to harvest the left internal mammary artery (LIMA) for off-pump revascularization of the left anterior descending artery (LAD)
Methodology Over a 2-year period (October 2012-October 2014), 100 patients underwent coronary artery bypass grafting (CABG) via conventional median sternotomy (CMS) (n=80) and mini-sternotomy (MS) (n=20). The
... Show MoreABSTRACT This paper has a three-pronged objective: offering a unitary set of semantic distinctive features to the analysis of nominal “hatred synonyms” in the lexicon of both English and Standard Arabic (SA), applying it procedurally to test its scope of functionality crosslinguistically, and singling out the closest noun synonymous equivalents among the membership of the two sets in this particular lexical semantic field in both languages. The componential analysis and the matching procedures carried have been functional in identifying ten totally matching equivalents (i.e. at 55.6%), and eight partially matching ones (i.e. at %44.4%). This result shows that while total matching equivalences do exist in the translation of certain Eng
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreIn this paper, a Monte Carlo Simulation technique is used to compare the performance of the standard Bayes estimators of the reliability function of the one parameter exponential distribution .Three types of loss functions are adopted, namely, squared error loss function (SELF) ,Precautionary error loss function (PELF) andlinear exponential error loss function(LINEX) with informative and non- informative prior .The criterion integrated mean square error (IMSE) is employed to assess the performance of such estimators