Preferred Language
Articles
/
yBYDBYcBVTCNdQwCmS3h
Lightweight hamming product code based multiple bit error correction coding scheme using shared resources for on chip interconnects
...Show More Authors

In this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other error control schemes. The low complexity and excellent residual flit error rate make the proposed code suitable for on chip interconnection links.

Scopus Crossref
View Publication
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Implication of Yield Lines Theory in Method Three of the ACI Code for Two-Way Reinforced Concrete Slabs
...Show More Authors
Abstract<p>Reinforced concrete slabs are one of the most important and complicated elements of a building. For supported edges slabs, if the ratio of long span to short span is equal or less than two then the slab is considered as two-way slab otherwise is consider as one-way slab. Two-way reinforced concrete slabs are common in use in reinforced concrete buildings due to geometrically arrangement of columns suggested by architects who prefer a symmetric distribution of columns in their plans. Elastic theory is usually used for analysis of concrete slabs. However, for several reasons design methods based on elastic principles are limited in their function. Correspondingly, limit state analysis o</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Inventive Engineering And Science,
Increase the Capacity Amount of Data Hiding to Least Significant BIT Method
...Show More Authors

Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Steganographic scheme to avoid statistical Steganalysis
...Show More Authors

significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.

View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Scopus (22)
Crossref (14)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Journal Européen Des Systèmes Automatisés
Developing Multiple-Actuator Pneumatic Circuits Using the Karnaugh Maps Designing PLC Controlled
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Multiple Mixing Ratios of Gamma Rays From Reaction Using a2-ratio Method
...Show More Authors

The -multiple mixing ratios of γ-transitions from levels of populated in the are calculated in the present work by using the a2-ratio methods. We used the experimental coefficient (a2) for two γ-transitions from the same initial state, the statistical tensor, which is related to the a2-coefficient would be the same for the two transitions. This method was used in a previous work for pure transitions or which can be considered pure. In these cases the multiple mixing ratios for the second transition ( ) equal zero, but in our work we applied this method for mixed γ-transitions and then the multiple mixing ratio ( ) is known for one transition. Then we calculate the ( ) value and versareversa. The weight average of the -values calcu

... Show More
Publication Date
Mon Nov 11 2019
Journal Name
Spe
Modeling Rate of Penetration using Artificial Intelligent System and Multiple Regression Analysis
...Show More Authors
Abstract<p>Over the years, the prediction of penetration rate (ROP) has played a key rule for drilling engineers due it is effect on the optimization of various parameters that related to substantial cost saving. Many researchers have continually worked to optimize penetration rate. A major issue with most published studies is that there is no simple model currently available to guarantee the ROP prediction.</p><p>The main objective of this study is to further improve ROP prediction using two predictive methods, multiple regression analysis (MRA) and artificial neural networks (ANNs). A field case in SE Iraq was conducted to predict the ROP from a large number of parame</p> ... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Mar 25 2022
Journal Name
Journal Of The College Of Basic Education
Semantic image coding in contemporary Theatrical performance
...Show More Authors

تعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تح

... Show More
View Publication
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Material Requirements Planning (MRP) for Electric Geyser Product by Using Goal Programming\ applicative research in the general company of electrical industrialization
...Show More Authors

Material Requirements Planning System (MRP) is considered as one of the planning and controlling of production and inventory systems which is used to prepare plan of the final production requirements and its parts of subcomponents raw materials and the time at which it was needed for the purpose of preparing orders of production and purchase.

The problem of the present work is represented in the general company of electrical industrialization adoption of traditional methods and personal experience of the process of the products and\or purchase quantity and inventory quantities and limiting the required time for acquiring the required quantities of the materials and parts used in the finish product of the

... Show More
View Publication Preview PDF
Crossref