Achieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number of wires. In addition, it has small penalty on the network performance, represented by the average latency and comparable codec area overhead to other schemes.
In this paper, we introduce new conditions to prove that the existence and boundedness of the solution by convergent sequences and convergent series. The theorem of Krasnoselskii, Lebesgue’s dominated convergence theorem and fixed point theorem are used to get some sufficient conditions for the existence of solutions. Furthermore, we get sufficient conditions to guarantee the oscillatory property for all solutions in this class of equations. An illustrative example is included as an application to the main results.
Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
The purpose of the study is the city of Baghdad, the capital of Iraq, was chosen to study the spectral reflection of the land cover and to determine the changes taking place in the areas of the main features of the city using the temporal resolution of multispectral bands of the satellite Landsat 5 and 8 for MSS and OLI sensors respectively belonging to NASA and for the period 1999-2021, and calculating the increase and decrease in the basic features of Baghdad. The main conclusions of the study were, This study from 1999 to 2021 and in two different seasons: the Spring of the growing season and Summer the dry season. When using the supervised classification method to determine the differences, the results showed remarkable changes. Where h
... Show MoreThe purpose of the study is the city of Baghdad, the capital of Iraq, was chosen to study the spectral reflection of the land cover and to determine the changes taking place in the areas of the main features of the city using the temporal resolution of multispectral bands of the satellite Landsat 5 and 8 for MSS and OLI sensors respectively belonging to NASA and for the period 1999-2021, and calculating the increase and decrease in the basic features of Baghdad .The main conclusions of the study were,
This study from 1999 to 2021 and in two different seasons: the Spring of the growing season and Summer the dry season. When using the supervised classification method to determine the differences, the results showed rema
... Show MoreObjective: To identify the role and importance of the clinical pharmacist in the Emergency Department on prevent
or reduced the medication error.
Methodology: We collected the medical file of 3400 patients, 1400 patient's file in (A) hospital, and 1000 patient's
file in each of (B and C) hospital, who admitted to the ED, at primary weekdays between 8 am to 2 pm, and
recorded all the intervention made by clinical pharmacist through an active search in clinical charts, with analysis
of the daily medical prescription. The potential severity of harm of the medication error judged by two reviewers,
a permanent emergency physician, and clinical pharmacist based on the National Coordinating Council (NCC) of
Medication Error
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreTracking moving objects is one of a very important applications within the computer vision. The goal of object tracking is segmenting a region of interest from a video scene and keeping track of its motion and positioning. Track moving objects used in many applications such as video surveillance, robot vision, and traffic monitoring, and animation. In this paper a four-wheeled robotic system have been designed and implemented by using Arduino-Uno microcontroller. Also a useful algorithms have been developed to detect and track objects in real time. The main proposed algorithm based on the kernel based color algorithm and some geometric properties to tracking color object. Robotic system is a compromise of two principal parts which are th
... Show MoreMedical imaging is a technique that has been used for diagnosis and treatment of a large number of diseases. Therefore it has become necessary to conduct a good image processing to extract the finest desired result and information. In this study, genetic algorithm (GA)-based clustering technique (K-means and Fuzzy C Means (FCM)) were used to segment thyroid Computed Tomography (CT) images to an extraction thyroid tumor. Traditional GA, K-means and FCM algorithms were applied separately on the original images and on the enhanced image with Anisotropic Diffusion Filter (ADF). The resulting cluster centers from K-means and FCM were used as the initial population in GA for the implementation of GAK-Mean and GAFCM. Jaccard index was used to s
... Show More