In this paper, a FPGA model of intelligent traffic light system with power saving was built. The intelligent traffic light system consists of sensors placed on the side's ends of the intersection to sense the presence or absence of vehicles. This system reduces the waiting time when the traffic light is red, through the transition from traffic light state to the other state, when the first state spends a lot of time, because there are no more vehicles. The proposed system is built using VHDL, simulated using Xilinx ISE 9.2i package, and implemented using Spartan-3A XC3S700A FPGA kit. Implementation and Simulation behavioral model results show that the proposed intelligent traffic light system model satisfies the specified operational requirements.
Due to the lack of statistical researches in studying with existing (p) of Exogenous Input variables, and there contributed in time series phenomenon as a cause, yielding (q) of Output variables as a result in time series field, to form conceptual idea similar to the Classical Linear Regression that studies the relationship between dependent variable with explanatory variables. So highlight the importance of providing such research to a full analysis of this kind of phenomena important in consumer price inflation in Iraq. Were taken several variables influence and with a direct connection to the phenomenon and analyzed after treating the problem of outliers existence in the observations by (EM) approach, and expand the sample size (n=36) to
... Show MoreSoftware Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show More- The sandy soil with high gypsum content (usually referred to as gypseous soil) covers vast area in south, east, middle and west regions of Iraq, such soil possess a type of cohesive forces when attached with optimum amount of water, then compacted and allowed to cure, but losses its strength when flooded with water again. Much work on earth reinforcement was published which concentrate on the gain in bearing capacity in the reinforced layer using different types of cohesive or cohesion less soil and various types of reinforcement such as plastic, metal, grids, and synthetic textile. Little attention was paid to there enforce gypseous soil. The objective of this work is to study the interaction between such soil and reinforcement strips
... Show MoreIn this paper, we will discuss the performance of Bayesian computational approaches for estimating the parameters of a Logistic Regression model. Markov Chain Monte Carlo (MCMC) algorithms was the base estimation procedure. We present two algorithms: Random Walk Metropolis (RWM) and Hamiltonian Monte Carlo (HMC). We also applied these approaches to a real data set.
This study represents an attempt to develop a model that demonstrates the relationship between HRM Practices, Governmental Support and Organizational performance of small businesses. Furthermore, this study assay to unfold the socalled “Black Box” to clarify the ambiguous relationship between HRM practices and organizational performance by considering the pathway of logical sequence influence. The model of this study consists two parts, the first part devoted to examining the causal relationships among HRM practices, employees’ outcomes, and organizational performance. The second part assesses the direct relationship between the governmental support and organizational performance. It is hypothesized that HRM practices positively influ
... Show More
Praise be to God, and prayers and peace be upon our master Muhammad, the Messenger of God, and upon his family, companions, and those who are guided by his guidance.
Then:
Our Islamic jurisprudence and its basic principles are fixed, namely: the Noble Qur’an, then the Prophet’s Sunnah, then consensus, then analogy. However, it is characteristic of what makes it developed to meet the requirements of renewed life, including: sent interests, custom, approval, blocking pretexts, changing times. That is why it went through different stages, growth, brilliance, stagnation and endowment; Therefore, many scholars of Islamic jurisprudence divided its stages into four sections: the stage of inf
... Show MoreA 2D geological model for Mauddud Formation in the Badra oil field is built using Rockworks 16 software. Mauddud Formation produces oil from limestone units; it represents the main reservoir in the Badra oil field. Six wells (BD-1, BD-2, BD-4, BD-5, P-15, and P-19) are selected to build facies and petrophysical (Porosity and Water saturation) models. Wells data are taken from the core and cutting samples and studied through the microscopic. The petrophysical data (effective porosity and water saturation) are derived from computer processes interpretation results that are calculated by using Interactive Petrophysics software. The 2D models are built to illustrate the vertical and horizontal distribution of petrophysical properties between we
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More