Preferred Language
Articles
/
joe-3044
ORGANIZATION OF MEMORY CHIPS IN MEMORY SYSTEMS THAT HAVE WORD SIZE WIDER THAN 8-BIT
...Show More Authors

This paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 27 2021
Journal Name
Journal Of Engineering
Using Geographic Information Systems (GIS) Program and Water Quality Index (WQI) to Assess and Manage Groundwater Quality in the City of Baghdad
...Show More Authors

Groundwater is an essential source because of its high quality and continuous availability characterize this water resource. Therefore, the study of groundwater has required more attention. The present study aims to assess and manage groundwater quality's suitability for various purposes through the Geographical Information System GIS and the Water Quality Index WQI. The study area is located in the city of Baghdad in central Iraq, with an approximate area of ​​900 , data were collected from the relevant official departments representing the locations of 97 wells of groundwater in the study area for the year 2019, as it included physicochemical parameters such as  pH, EC, TDS, Na, K, Mg, Ca, Cl,  , and &nbs

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Aug 18 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Resource consumption accounting technique between traditional cost systems and contemporary cost management techniques in measuring the cost of products - A conceptual vision
...Show More Authors

The contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 12 2017
Journal Name
Journal Of Engineering
Prepare rules spatial data for soils and the Calculation of an Area in Iraq for Industrial Purposes using Geographic Information Systems (GIS)
...Show More Authors

 
      The process of soil classification in Iraq for industrial purposes is important topics that need to be extensive and specialized studies. In order for the advancement of reality service and industrial in our dear country, that a lot of scientific research touched upon the soil classification in the agricultural, commercial and other fields. No source and research can be found that touched upon the classification of land for industrial purposes directly. In this research specialized programs have been used such as geographic information system software The geographical information system permits the study of local distribution of phenomena, activities and the aims that can be determined in the loca

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 23 2026
Journal Name
Iraq Journal Of Market Research And Consumer Protection
Study of the qualitative characteristics of oils derived from fish waste running Asian Silurus triostequs and use of organic solvents in certain food systems
...Show More Authors

View Publication
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Al-rafidain Dental Journal
The Effect of Two Bonding Agents Generations On Microleakage Of Composite Resin Using Two Light Curing Systems.
...Show More Authors

Aim: To evaluate the effect of two bonding systems and two curing systems on sealing ability of class V composite restorative materials. Materials and methods: This study was performed in vitro on 40 caries free upper first premolar teeth. The Standardized class V cavity preparation on buccal and lin- gual surfaces of each tooth was done. Then the teeth were randomly divided into two major groups each of twenty. 40 cavities were performed on these teeth and the first group7th generation bonding agent (i Bond) were applied according to the manufacturer instructions and single increment of univer- sal composite (XRV Herculite) from kerr were applied and twenty of the cavities were cured with con- ventional light cure device (astralis-5) and t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 13 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceeding Of The 1st International Conference On Advanced Research In Pure And Applied Science (icarpas2021): Third Annual Conference Of Al-muthanna University/college Of Science
Theoretical study and calculation of electronic current flow at platinum metal contact with TFP molecule systems
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Thu Dec 15 2011
Journal Name
Iraqi Journal Of Laser
Generation of Truly Random QPSK Signal Waveforms for Quantum Key Distribution Systems Based on Phase Coding
...Show More Authors

In this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.

View Publication Preview PDF
Publication Date
Wed Jun 13 2012
Journal Name
Journal Of Kerbala University
Thermo physical behaviour of binary and ternary systems for cyclohexanol with some Ketones at three temperature
...Show More Authors