Preferred Language
Articles
/
yBYDBYcBVTCNdQwCmS3h
Lightweight hamming product code based multiple bit error correction coding scheme using shared resources for on chip interconnects
...Show More Authors

In this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other error control schemes. The low complexity and excellent residual flit error rate make the proposed code suitable for on chip interconnection links.

Scopus Crossref
View Publication
Publication Date
Tue Oct 20 2020
Journal Name
International Journal Of Civil Engineering
Structural Performance Under Monotonic Static Loading of Reinforced Concrete Gable Roof Beams with Multiple Web Openings
...Show More Authors

In the present study, an attempt has been made to experimentally investigate the flexural performance of ten simply supported reinforced concrete gable roof beams, including solid control specimen (i.e., without openings) and nine beams with web openings of different dimensions and configurations. The nine beams with openings have identical reinforcement details. All beams were monotonically loaded to failure under mid-span loading. The main variables were the number of the created openings, the total area of the created openings, and the inclination angle of the posts between openings. Of interest is the load-carrying capacity, cracking resistance and propagation, deformability, failure mode, and strain development that represent the behav

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Iraqi Journal Of Hematology
Evaluation of angiopoietin-2 level in patients with multiple myeloma at presentation and in remission state
...Show More Authors

The study aimed to assess the level of ANG‑2 in MM patients at diagnosis and in remission state and elaborate on its correlation with interleukin‑6 (IL‑6) and beta‑2 microglobulin (B2M) levels. Sixty MM patients; 20 newly diagnosed (ND), and 40 patients in remission were included. Twenty healthy individuals were included as a control group. Plasma levels of ANG‑2, B2M, and IL‑6 were tested by enzyme‑lin ked immunosorbent assay. There are significant statistical differences between ND patients and those in remission in hemoglobin, neutrophil count, blood urea, serum creatinine, glomerular filtration rate, B2M, IL6, and ANG‑2 (P = 0.001, 0.033, 0.005, 0.001, 0.001, 0.001, 0.004, and 0.001, respectively). ANG‑2 showed signifi

... Show More
View Publication
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Medical Journal Of Babylon
Dual and Multiple AV Nodal Pathways, What is The Deference in Typical Atrioventricular Nodal Reentrant Tachycardia
...Show More Authors

Abstractin adult typical atrioventricular nodal reentrant tachycardia (AVNRT) consider most common paroxysmalsupraventricular tachycardia. Dual pathway idea still accepted and used widely and commonly. According tothe guide line, ablations of slow pathway still the first treatment with good success rate.Identify the electrophysiological difference of atrioventricular nodal pathways pre and post ablation.Electrophysiological study was done to 54 patients with only typical type AVNRTs; they were 40 (74%)females and 14 (26%) males. Divided into two groups G1 with 38 patients (70.4%) having one pathway andG2 with 16 patients (29.6%) with multiple pathway. After induction we study the clinical andelectrophysiological feature of tachycardia and s

... Show More
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
Low-Rate High-Quality Parametric Audio Coder based on Sinusoidal plus Noise Representations
...Show More Authors

This paper presents a parametric audio compression scheme intended for scalable audio coding applications, and is particularly well suited for operation at low rates, in the vicinity of 5 to 32 Kbps. The model consists of two complementary components: Sines plus Noise (SN). The principal component of the system is an. overlap-add analysis-by-synthesis sinusoidal model based on conjugate matching pursuits. Perceptual information about human hearing is explicitly included into the model by psychoacoustically weighting the pursuit metric. Once analyzed, SN parameters are efficiently quantized and coded. Our informal listening tests demonstrated that our coder gave competitive performance to the-state-of-the- art HelixTM Producer Plus 9 from

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jan 25 2021
Journal Name
Engineering And Technology Journal
Performance evaluation of Photovoltaic Panels by a Proposed Automated System Based on Microcontrollers
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref