Preferred Language
Articles
/
kRYkBYcBVTCNdQwCDC72
Investigating the impact of on-chip interconnection noise on Dynamic Thermal Management efficiency
...Show More Authors

Dynamic Thermal Management (DTM) emerged as a solution to address the reliability challenges with thermal hotspots and unbalanced temperatures. DTM efficiency is highly affected by the accuracy of the temperature information presented to the DTM manager. This work aims to investigate the effect of inaccuracy caused by the deep sub-micron (DSM) noise during the transmission of temperature information to the manager on DTM efficiency. A simulation framework has been developed and results show up to 38% DTM performance degradation and 18% unattended cycles in emergency temperature under DSM noise. The finding highlights the importance of further research in providing reliable on-chip data transmission in DTM application.

Scopus Crossref
View Publication
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Effect ofweight percentage chopped carbon fibers on the mechanism of cracks propagation for Epoxy composites
...Show More Authors

In this research, the mechanism of cracks propagation for epoxy/ chopped carbon fibers composites have been investigated .Carbon fibers (5%, 10%, 15%, and 20%) by weight were used to reinforce epoxy resin. Bending test was carried out to evaluate the flexural strength in order to explain the mechanism of cracks propagation. It was found that, the flexural strength will increase with increasing the percentage weight for carbon fibers. At low stresses, the cracks will state at the lower surface for the specimen. Increasing the stresses will accelerate the speed of cracks until fracture accorded .The path of cracks is changed according to the distributions of carbon fibers

View Publication Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
A Comparative Study on the Electrical Characteristics of Generating Plasma by Using Different Target Sources
...Show More Authors

In this research, the electrical characteristics of glow discharge plasma were studied. Glow discharge plasma generated in a home-made DC magnetron sputtering system, and a DC-power supply of high voltage as input to the discharge electrodes were both utilized. The distance between two electrodes is 4cm. The gas used to produce plasma is argon gas which flows inside the chamber at a rate of 40 sccm. The influence of work function for different target materials (gold, copper, and silver), - 5cm in diameter and around 1mm thickness - different working pressures, and different applied voltages on electrical characteristics (discharge current, discharge potential, and Paschen’s curve) were studied. The results showed that the discharge cur

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Dec 03 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Window Size Changing on Satellite Image Segmentation Using 2D Fast Otsu Method
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Effect of BaTio3 mixture on the structural, electrical properties and morphology for PET/ BaTiO3 composite
...Show More Authors

In the present work, the focusing was on the study of the x-ray diffraction, dielectric constant, loses dielectric coefficient, tangent angle, alter- natively conductivity and morphology of PET/BaTio3. The PET/BaTio3 composite was prepared for polyethylene terephthalate PET polymer composite containing 0, 10, 20, 30, 40, 50, and 60 wt. % from Barium titanate BaTi03 powder. The composite of two materials leads to form mixing solution and hot-pressing method. The effect of BaTio3 on the structure and dielectric properties with morphology was studied on PET matrix polymer using XRD, LCR meter and SEM.

View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Fri Jun 20 2025
Journal Name
Baghdad Science Journal
The Role of Fear and Predator Dependent Refuge on a Stage Structure Prey-Predator System
...Show More Authors

The present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Bulletin Of National Institute Of Health Sciences
Using of Propolis on the treated rats induced with Polysystic ovarian syndrome by Litrozol drug
...Show More Authors

View Publication
Publication Date
Fri May 06 2022
Journal Name
Razi Vaccine & Serum Research Institute
Effect of Betaine on Blood Parameters Related to the Iron Status in Acrylamide-Treated Rats
...Show More Authors

Archives of Razi Institute (ARI)

View Publication
Publication Date
Mon Dec 15 2025
Journal Name
Textual Turnings: An International Peer-reviewed Journal In English Studies
An Intersectional Perspective on Arab American Identity in Sahar Mustafah's The Beauty of Your Face
...Show More Authors

This study examines how Sahar Mustafah's book The Beauty of Your Face (2020) examines the intersectional aspects of Arab American identity. The novel traces the life of the Palestinian Arab American woman, Afaf Rahman who is a school principal. She negotiates the intricacies of gendered, religious, and cultural identities in America after 9/11. The analysis uses an intersectional lens to look at how Afaf's experiences as a woman, a Muslim, and an immigrant combine to influence how she sees herself and how she interacts with society at large. The book explores racial prejudice, misogyny, and Islamophobia, bringing to light the many difficulties Arab American women experience. Additionally, it shows the protagonist's autonomy and tenacity as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance
...Show More Authors

LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref