Preferred Language
Articles
/
ohfSXJIBVTCNdQwCTq08
A proposed dual size design for energy minimization in sub-threshold circuits
...Show More Authors

Sub-threshold operation has received a lot of attention in limited performance applications.However, energy optimization of sub-threshold circuits should be performed with the concern of the performance limitation of such circuit. In this paper, a dual size design is proposed for energy minimization of sub-threshold CMOS circuits. The optimal downsizing factor is determined and assigned for some gates on the off-critical paths to minimize the energy at the maximum allowable performance. This assignment is performed using the proposed slack based genetic algorithm which is a heuristic-mixed evolutionary algorithm. Some gates are heuristically assigned to the original and the downsized design based on their slack time determined by static timing analysis. Other gates are subjected to the genetic algorithm to perform an optimal downsizing assignment taking into account the previous assignments. The algorithm is applied for different downsizing factors to determine the optimal dual size for low energy operation without a performance degradation. Experimental results are obtained for some ISCAS-85 benchmark circuits such as 74283, 74L85, ALU74181, and 16 bit ripple carry adder. The proposed design shows an energy per cycle saving ranged from (29.6% to 56.59%) depending on the utilization of available slack time from the off-critical paths. © School of Engineering, Taylor’s University.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Diversity of designs decorative hearts in the holy threshold Kadhimiya: سؤدد مشعان حواس
...Show More Authors

The plant decorative arts field full of decorative Baltnoat from diversity in the design structure of vocabulary and whether units sepals, vase Aogsnah or written and what their catalog decorative hearts in Kadhimiya holy threshold of diversity in shapes and measurements and sizes.It is during the field visit of the researcher found that there are variations in the overall appearance and internal padding and this researcher has formulated the discussion by asking the following problem:(What is the diversity of designs decorative hearts in Kadhimiya holy threshold?)The importance of research in it:Research contributes to open the horizons of knowledge for researchers and scholars concerned with the teaching of the decorative arts, as well

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Fault Tolerance for Real Time Distributed System
...Show More Authors

This paper designed a fault tolerance for soft real time distributed system (FTRTDS). This system is designed to be independently on specific mechanisms and facilities of the underlying real time distributed system. It is designed to be distributed on all the computers in the distributed system and controlled by a central unit.

Besides gathering information about a target program spontaneously, it provides information about the target operating system and the target hardware in order to diagnose the fault before occurring, so it can handle the situation before it comes on. And it provides a distributed system with the reactive capability of reconfiguring and reinitializing after the occurrence of a failure.

View Publication Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Variable Structure Control Design for a Magnetic Levitation System
...Show More Authors

In this paper the variable structure control theory is utilized to derive a discontinuous controller to the magnetic levitation system. The magnetic levitation system model is considered uncertain, which subjected to the uncertainty in system parameters, also it is open-loop unstable and strongly nonlinear. The proposed variable structure control to magnetic levitation system is proved, and the area of attraction is determined. Additionally, the chattering, which induced due to the discontinuity in control law, is attenuated by using a non-smooth approximate. With this approximation the resulted controller is a continuous variable structure controller with a determined steady state error according to the selected control

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 26 2025
Journal Name
Alqalam Journal Of Medical And Applied Sciences
Dual Ligand Chelates: Preparation and Spectroscopic Characterization
...Show More Authors

Here, we synthesized three new blended ligand complexes of chromium (III), iron (III), and lanthanum (III) ions with a Schiff base made from the condensation of [o-aminophenol and 2-hydroxyacetophenone in the presence of concentrated sulphoric acid (HL1)] as a primary ligand and o-nitroaniline (L2) as a secondary. The Schiff base and its dual ligand chelate were characterized using several spectroscopic studies, IR, 1HNMR, electronic and mass spectra, in addition to elemental analyses, molar conductivity measurements, and magnetic moments. The spectroscopic and analytical outcomes confirmed the formation of the chelates in a 1:1:1(L1: M: L2) ratio. Similarly, an octahedral structure became counseled for all chelates.

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Proposed Hybrid Sparse Adaptive Algorithms for System Identification
...Show More Authors

Abstract 

For sparse system identification,recent suggested algorithms are  -norm Least Mean Square (  -LMS), Zero-Attracting LMS (ZA-LMS), Reweighted Zero-Attracting LMS (RZA-LMS), and p-norm LMS (p-LMS) algorithms, that have modified the cost function of the conventional LMS algorithm by adding a constraint of coefficients sparsity. And so, the proposed algorithms are named  -ZA-LMS, 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Nanomaterials
Comparative Studies on Thermal Performance of Conic Cut Twist Tape Inserts with SiO<sub>2</sub>and TiO<sub>2</sub>Nanofluids
...Show More Authors

This paper presents a comparison study on thermal performance conic cut twist tape inserts in laminar flow of nanofluids through a constant heat fluxed tube. Three tape configurations, namely, quadrant cut twisted tape (QCT), parabolic half cut twisted tape (PCT), and triangular cut twisted (VCT) of twist ratioy= 2.93 and cut depthde= 0.5 cm were used with 1% and 2% volume concentration of SiO2/water and TiO

... Show More
View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
International Journal Of Nanoscience
Study of the Transition State of SnO<sub>2</sub> Cluster with NO<sub>2</sub> Gas Molecule via Density Functional Theory
...Show More Authors

Density functional theory (DFT) with B3LYP level and 6-311G[Formula: see text] basis sets for light atoms like N and O and SDD basis sets for heavy atoms like Sn is used to examine the interaction of tin dioxide nanocrystals with nitrogen dioxide as a function of temperature from 273[Formula: see text]K to 373[Formula: see text]K through a Gaussian 09W software program. Gibbs free energy, enthalpy, and entropy of activation and reaction are calculated. The situation of transition of SnO2 clusters toward nitrogen dioxide is investigated. According to the findings, the activation energy of SnO2 clusters with nitrogen dioxide increases as the temperature rises (in negative value). Gauss view 0

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Metal Complexes of Multidentate N<sub>2</sub>S<sub>2</sub> Heterocyclic Schiff-base Ligands;Formation, Structural Characterisation and Biological Activity
...Show More Authors
Abstract<p>The synthesis of ligands with N<sub>2</sub>S<sub>2</sub> donor sets that include imine, an amide, thioether, thiolate moieties and their metal complexes were achieved. The new Schiff-base ligands; N-(2-((2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-ylidene)amino)ethyl)-2-((2-mercaptoethyl)thio)-acetamide (H<sub>2</sub>L<sup>1</sup>) and N-(2-((2,4-di-p-tolyl-3-azabicyclo[3.3.1]nonan-9-ylidene)amino)ethyl)-2-((2-mercaptoethyl)thio) acetamide (H2L<sup>2</sup>) were obtained from the reaction of amine precursors with 1,4-dithian-2-one in the presence of triethylamine as a base in the CHCl3 medium. Complexes of the general formula K<sub>2<</sub></p> ... Show More
View Publication
Scopus (11)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Automatic Spike Neural Technique for Slicing Bandwidth Estimated Virtual Buffer-Size in Network Environment
...Show More Authors

The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie

... Show More
View Publication Preview PDF
Crossref