Preferred Language
Articles
/
yBYDBYcBVTCNdQwCmS3h
Lightweight hamming product code based multiple bit error correction coding scheme using shared resources for on chip interconnects
...Show More Authors

In this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other error control schemes. The low complexity and excellent residual flit error rate make the proposed code suitable for on chip interconnection links.

Scopus Crossref
View Publication
Publication Date
Mon Feb 20 2017
Journal Name
Proceedings Of The 5th International Conference On Communications And Broadband Networking
Bit precision and Cyclic prefix effect on OFDM Power Consumption Estimation
...Show More Authors

View Publication
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Effects of Macroeconomic Variables on Gross Domestic Product in Saudi Arabia using ARDL model for the period 1993-2019
...Show More Authors

 

This paper analyses the relationship between selected macroeconomic variables and gross domestic product (GDP) in Saudi Arabia for the period 1993-2019. Specifically, it measures the effects of interest rate, oil price, inflation rate, budget deficit and money supply on the GDP of Saudi Arabia. The method employs in this paper is based on a descriptive analysis approach and ARDL model through the Bounds testing approach to cointegration. The results of the research reveal that the budget deficit, oil price and money supply have positive significant effects on GDP, while other variables have no effects on GDP and turned out to be insignificant. The findings suggest that both fiscal and monetary policies should be fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
. Interpolative Absolute Block Truncation Coding for Image Compression
...Show More Authors

Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Error Investigation for Free Form Surfaces in Bezier Techniques
...Show More Authors

Surface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch.  The model has been implemented to represent the surface. The interior data of the desired surfaces designed by M

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Economics And Administrative Sciences
Modeling Absolute Deviations Method by using Numerical Methods to measure the dispersion of the proposal for error
...Show More Authors

Is in this research review of the way minimum absolute deviations values ​​based on linear programming method to estimate the parameters of simple linear regression model and give an overview of this model. We were modeling method deviations of the absolute values ​​proposed using a scale of dispersion and composition of a simple linear regression model based on the proposed measure. Object of the work is to find the capabilities of not affected by abnormal values by using numerical method and at the lowest possible recurrence.

 

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Wireless And Ad Hoc Communication
Energy Aware Scheme for Underwater Wireless Sensor Networks
...Show More Authors

The development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Wireless And Ad Hoc Communication
Energy Aware Scheme for Underwater Wireless Sensor Networks
...Show More Authors

The development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Demand Priority in a Power System With Wind Power Contribution Load Shedding Scheme Based
...Show More Authors

The load shedding  scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy  resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po

... Show More
View Publication Preview PDF
Crossref (9)
Crossref