In this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other error control schemes. The low complexity and excellent residual flit error rate make the proposed code suitable for on chip interconnection links.
The current study is designed to investigate the histological and immunohistochemical characteristics of the thyroid gland in adult male Sciurus anamalus. This study found that the thyroid gland of the Caucasian squirrel is located in the neck area, below the larynx, on both sides of the trachea. It has two lobes (right and left) with cylindrical shape. The histological studies revealed that the thyroid gland is surrounded by a capsule which consists of connective tissue and forming of two layers which are outer layer and inner layer, and a layer of adipose tissue appears overlapping the outer layer. The inner tissue of the gland consists of follicles with different shapes and sizes, and is lined with simple cuboidal epithelial tissue (foll
... Show MoreThe current study is designed to investigate the histological and immunohistochemical characteristics of the thyroid gland in adult male Sciurus anamalus. This study found that the thyroid gland of the Caucasian squirrel is located in the neck area, below the larynx, on both sides of the trachea. It has two lobes (right and left) with cylindrical shape. The histological studies revealed that the thyroid gland is surrounded by a capsule which consists of connective tissue and forming of two layers which are outer layer and inner layer, and a layer of adipose tissue appears overlapping the outer layer. The inner tissue of the gland consists of follicles with different shapes and sizes, and is lined with simple cuboidal epithelial tissue (foll
... Show MoreST segment, T wave changes, QT interval changes, and QTc dispersion are among the parameters used to diagnose ischemic heart disease. The increase in the QT dispersion can be caused by myocardial ischemia, among other heart diseases, whereas cardiac diseases such as coronary artery disease (CAD) can be diagnosed by observing an abnormally high QTc dispersion. This study aimed to evaluate the variations in the QTc dispersion (depolarization and repolarization) of surface electrocardiography as a result of percutaneous coronary intervention (PCI) in patients with chronic total occlusion. This study took place in the Iraqi Center for Heart Disease from October 2020 to February 2021. 110 patients who suffered from chronic occlusion of t
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreDates are considered one of the most important foods consumed in Arab countries. Dates are commonly infested with the sawtoothed grain beetle, Oryzaephilus surinamensis. Consequently, the date yield, quantity, and quality (economic value and seed viability) are negatively affected. This study was designed to investigate the effectiveness of air evacuation as eco-friendly and safe control method against adult O. surinamensis. Insects were obtained from the infested date purchased from a private store in sakaka city, Aljouf region, Saudi Arabia. Air evacuation (using a vacuum pump) and food deprivation were applied to O. surinamensis, and insect mortality was observed daily in comparison with the control group (a
... Show MoreSpecialized hardware implementations of Artificial Neural Networks (ANNs) can offer faster execution than general-purpose microprocessors by taking advantage of reusable modules, parallel processes and specialized computational components. Modern high-density Field Programmable Gate Arrays (FPGAs) offer the required flexibility and fast design-to-implementation time with the possibility of exploiting highly parallel computations like those required by ANNs in hardware. The bounded width of the data in FPGA ANNs will add an additional error to the result of the output. This paper derives the equations of the additional error value that generate from bounded width of the data and proposed a method to reduce the effect of the error to give
... Show More