It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.
Background: psychiatric and behavioral side effects
are common in patients with epilepsy and it may
represent an intrinsic feature of the disease itself or a
side effect of the antiepileptic use. Our aim in the
present study is to assess the psychiatric side effects of
Sodium Valproate and Carbamazipine .as these drugs
are the most commonly used antiepileptic drugs in Iraq.
Methods: 80 patients with primary generalized
epilepsy on Carbamazipine and 50 patients on Sodium
Valproate were enrolled in the present study; all the
patients were assessed for any psychological
disturbances using semi-structural interview based on
the tenth edition of the international classification of
the diseases(ICD 10) ad
This paper proposes a novel finite-time generalized proportional integral observer (FTGPIO) based a sliding mode control (SMC) scheme for the tracking control problem of high order uncertain systems subject to fast time-varying disturbances. For this purpose, the construction of the controller consists of two consecutive steps. First, the novel FTGPIO is designed to observe unmeasurable plant dynamics states and disturbance with its higher time derivatives in finite time rather than infinite time as in the standard GPIO. In the FTGPO estimator, the finite time convergence rate of estimations is well achieved, whereas the convergence rate of estimations by classical GPIO is asymptotic and slow. Secondly, on the basis of the finite and fast e
... Show MoreThe analysis of survival and reliability considered of topics and methods of vital statistics at the present time because of their importance in the various demographical, medical, industrial and engineering fields. This research focused generate random data for samples from the probability distribution Generalized Gamma: GG, known as: "Inverse Transformation" Method: ITM, which includes the distribution cycle integration function incomplete Gamma integration making it more difficult classical estimation so will be the need to illustration to the method of numerical approximation and then appreciation of the function of survival function. It was estimated survival function by simulation the way "Monte Carlo". The Entropy method used for the
... Show MoreBackground: psychiatric and behavioral side effects are
common in patients with epilepsy and it may represent an
intrinsic feature of the disease itself or a side effect of the
antiepileptic use. Our aim in the present study is to assess
the psychiatric side effects of Sodium Valproate and
Carbamazipine .as these drugs are the most commonly
used antiepileptic drugs in Iraq.
Methods: 80 patients with primary generalized epilepsy
on Carbamazipine and 50 patients on Sodium Valproate
were enrolled in the present study; all the patients were
assessed for any psychological disturbances using semistructural interview based on the tenth edition of the
international classification of the diseases(ICD 10)
adopte
The electronic payment systems are considered the most important infrastructure for the work of banks, particularly after a steady and remarkable development in information and communication technology, Which created the reality of the work of the infrastructure for these systems and these systems also become one of the most important components of infrastructure for the work of banks, cause it is one of the most important channels through which the transfer of cash, financial instruments between financial institutions in general and banking in particular.
In order to achieve the objectives of the research, the most important to identify the concept of electronic payment systems, and its divisions, and th
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe research included five sections containing the first section on the introduction of the research and its importance and was addressed to the importance of the game of gymnastic and skilled parallel effectiveness and the importance of learning, but the problem of research that there is a difference in learning this skill and difficulty in learning may be one of the most important reasons are fear and fear of falling and injury, And a lack of sense of the movement of the movement is one of the obstacles in the completion of the skill and the goal of research to design a device that helps in learning the skill of descending Almtor facing with half a cycle according to the typical locomotor track on the parallel device of the technical men'
... Show MoreThis research explores the intricate relationship between environmental sustainability and urban design in Al-Jumhuriya Neighborhood, Baghdad, reflecting urban development challenges and opportunities. It highlights the need to balance growth, functionality, and quality of life with environmental responsibility in urban areas worldwide. The research includes a literature review on environmental sustainability in urban design and the utilization of multifunctional land in contemporary cities. The research employs a mixed-methods approach, combining quantitative and qualitative data collection methods. Survey results show a diverse range of perspectives, indicating concerns about air quality and local regulations but also positive views on co
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More