In this paper, a FPGA model of intelligent traffic light system with power saving was built. The intelligent traffic light system consists of sensors placed on the side's ends of the intersection to sense the presence or absence of vehicles. This system reduces the waiting time when the traffic light is red, through the transition from traffic light state to the other state, when the first state spends a lot of time, because there are no more vehicles. The proposed system is built using VHDL, simulated using Xilinx ISE 9.2i package, and implemented using Spartan-3A XC3S700A FPGA kit. Implementation and Simulation behavioral model results show that the proposed intelligent traffic light system model satisfies the specified operational requirements.
Ti6Al4V alloy is widely used in aerospace and medical applications. It is classified as a difficult to machine material due to its low thermal conductivity and high chemical reactivity. In this study, hybrid intelligent models have been developed to predict surface roughness when end milling Ti6Al4V alloy with a Physical Vapor Deposition PVD coated tool under dry cutting conditions. Back propagation neural network (BPNN) has been hybridized with two heuristic optimization techniques, namely: gravitational search algorithm (GSA) and genetic algorithm (GA). Taguchi method was used with an L27 orthogonal array to generate 27 experiment runs. Design expert software was used to do analysis of variances (ANOVA). The experimental data were
... Show MoreIt is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.
In this paper, some relations between the flows and the Enveloping Semi-group were studied. It allows to associate some properties on the topological compactification to any pointed flows. These relations enable us to study a number of the properties of the principles of flows corresponding with using algebric properties. Also in this paper proofs to some theorems of these relations are given.
Receipt date:12/7/2020 accepted date:24/1/2021 Publication date:31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The constant characteristic of international relations is the constant change due to political, economic and military developments in addition to technology, and this in turn has led to many transformations in the concept of power, its uses, and the elements that form power and its distribution, and according to those variables, the concept of power has shifted from hard to soft, up to smart powe
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreJob stress is considered one of the most important obstacles that may appear in the work field. In order to deal with the obstacles and challenges , the idea to deal with job stress has come to address job stress as one of the most important trends that enable organizations to face those challenges through focusing on the role of job stress and the organizational climate of the organization.
The research deals with two variables: the job stress as an independent variable, and the organizational climate as a dependent one. Each variable includes five sub-dimensions. These dimensions have been involved in an interaction to form
... Show MoreLight is an important factor that influences the growth and photosynthetic efficiency of microalgae; however, little is known about how light intensity together with the wavelength affect the photosynthetic capacity and growth of marine microalgae. In the present study, the growth of the marine green microalga Dunaliella parva was studied and optimized under different light intensities (25 ~ 70 μmol m-2 s-1) and qualities (blue, green, and red) in comparison with white light at 40 μmol m-2 s-1 as a control. The growth was monitored by counting the cell number, pigment content, Chl a, Chl b, and carotenoids concentrations. The optimal growth and highest photosyntheti
... Show More