Preferred Language
Articles
/
joe-2075
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Dental Sciences
Evaluation of the efficacy of lycopene gel compared with minocycline hydrochloride microspheres as an adjunct to nonsurgical periodontal treatment: A randomised clinical trial
...Show More Authors

Scopus (12)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Dental Sciences
Evaluation of the efficacy of lycopene gel compared with minocycline hydrochloride microspheres as an adjunct to nonsurgical periodontal treatment: A randomised clinical trial
...Show More Authors

View Publication
Scopus (12)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Using Artificial Intelligence and Metaverse Techniques to Reduce Earning Management
...Show More Authors

This study aims to demonstrate the role of artificial intelligence and metaverse techniques, mainly logistical Regression, in reducing earnings management in Iraqi private banks. Synthetic intelligence approaches have shown the capability to detect irregularities in financial statements and mitigate the practice of earnings management. In contrast, many privately owned banks in Iraq historically relied on manual processes involving pen and paper for recording and posting financial information in their accounting records. However, the banking sector in Iraq has undergone technological advancements, leading to the Automation of most banking operations. Conventional audit techniques have become outdated due to factors such as the accuracy of d

... Show More
View Publication
Scopus (1)
Crossref (6)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Journal Of Engineering
Numerical Investigation Using Harmonic and Transient Analysis To Rotor Dynamics
...Show More Authors

The rotor dynamics generally deals with vibration of rotating structures. For designing rotors of a high speeds, basically its important to take into account the rotor dynamics characteristics. The modeling features for rotor and bearings support flexibility are described in this paper, by taking these characteristics of rotor dynamics features into standard Finite Element Approach (FEA) model. Transient and harmonic analysis procedures have been found by ANSYS, the idea has been presented to deal with critical speed calculation. This papers shows how elements BEAM188 and COMBI214 are used to represent the shaft and bearings, the dynamic stiffness and damping coefficients of journal bearings as a matrices have been found

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 04 2025
Journal Name
Al–bahith Al–a'alami
MOTIVES FOR STUDENTS TO BE EXPOSED TO EDUCATIONAL PROGRAMS ON TV CHANNELS (Iraqi educational channels as a model)
...Show More Authors

The educational function of television is one of the basic functions in light of the technical development that included the specialized satellite channels in all its fields, including the educational field, as its role became parallel to the role of educational institutions. These studies are among the descriptive studies in terms of the type of study methodology that describes the phenomenon, interprets its and extract the results and relationships between the variables. The study sample was multistage (random and intentional) included the students of the sixth academic and literary preparatory stage in the city of Baghdad.
The study problem was summarized by the following main question:
( What are the motives for the exposure of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2016
Journal Name
Spie Proceedings
Quantifying charge trapping and molecular doping in organic p-i-n diodes
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Physiological study to investigate the activity of an aqueous extract ofCinnamomum cassiabark on the blood glucose levels in healthy and diabetic rats induced by streptozotocin (stz)
...Show More Authors

The present study was investigated the activity of aqueous extract from Cinnamomum cassia bark on the blood glucose levels in healthy and diabetic rats induced by Streptozotcin (STZ). In healthy rats the blood glucose levels were slightly decreased after six hoursof single oral administration with dose (25 mg/kg) of body wight, as well as four weeks after twice daily repeated oral administration of aqueous extract of Cinnamomum cassia bark. In streptozotocin induced diabetic rats we absorved high significant decreased (p<0.05) in blood glucose levels, after four weeks of oral administration of aqueous extract (25 mg /kg ).And blood glucose levels seems to be normal after the period of treatment .Glibenclamide used as standard drug to com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Strategic Risk's Variation as a function of Competitive Intelligence Investment - An applied research on some Iraqi's manufacturing Companies –
...Show More Authors

 

ABSTRUCT

          The main aim of this research has been associated with the study of relationship between competitive intelligence and strategic risk, and to deduct their specific trends, which are interpreted as predicted by research hypotheses according to a review of literature including prior studies. The basic theme  of these hypotheses is related to the probability that declining levels of strategic risk and competitive positions of industrial companies is dependent upon the growing capacity to stay ahead of competitors in the market.

    A purposive non-random

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref