Radiation is a form of energy, its emitted either in the form of particles such as α-particles and β-particles (beta particles including the electron and the positron) or waves such as sunlight, X-rays and γ-rays. Radiation found everywhere around us and it comes from many different sources naturally or man-made sources. In this study a questionnaire was distributed to people working in the field of X-rays that used for a medical imaging (X-ray and CT-scan) to evaluate the extent of awareness and knowledge in estimate the damage of ionizing radiation as a result of wrong use. The questionnaire was distributed to medical clinics in Al-Harithiya in Baghdad, which it’s considered as one of the important areas in Iraq to attract and treat patients. It’s found that most of the commitment of radiography clinics by safety and security procedures. Most of the radiology clinics abide by most of the Iraqi Ministry of Health laws. However, some clinics did not implement some of the security and safety conditions
The aim of this paper is to estimate the concentrations of some heavy metals in Mohammed AL-Qassim Highway in Baghdad city for different distances by using the polynomial interpolation method for functions passing from the data, which is proposed by using the MATLAB software. The sample soil in this paper was taken from the surface layer (0-25 cm depth) at the two sides of the road with four distances (1.5, 10, 25 and 60 m) in each side of the road. Using this method, we can find the concentrations of heavy metals in the soil at any depth and time without using the laboratory, so this method reduces the time, effort and costs of conducting laboratory analyzes.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show More
Summary:
We are aware that we cannot reach a correct level of understanding of the Arabic language without using the Quran as our main source in our research. Since the word of the Quran that put an end to all words which kneeled before it all the phrases that lead to the showcasing of the Arabic language in its best self.
Arab scientist realized this truth and gave all their attention to the singular and created from it an important subject for their research in the origins of the language and the science behind. Thus, since they dealt with the structure and studied the significance of the context through the use of vocabulary. Therefore, researching Islamic words or the “surat” mentioned in the Qur’an was necessar
Objectives: To determine the effectiveness of the instructional program on patients’ knowledge about home safety while receiving anti-cancer treatment at Al- Karama Teaching Hospital in Al-Kut City.
Methodology: A quasi-experimental design is conducted through the application of a pre-test and post-test approach for the study and control groups from February 5th, 2020 to April 25th, 2020. A non–probability (purposive) sample of (50) patients treated at the Blood Disease and Oncology Center is selected and divided into two groups. Each group contains (25) patients as control and study groups. An instrument is constructed that is comprised of two parts; t
... Show MoreThe raw material soil of Al-Sowera factory quarry (quarry soil and mixture) used for building brick industry was tested mineralogically, geochemically and geotechnically. Mineral components of soil are characterized by Clay minerals (Palygoriskite and chlorite) and nonclay minerals like calcite, quratz, feldspar, gypsum and halite. The raw material is deficient in SiO2, Al2O3, K2O, Fe2O3 and MgO, while enriched in CaO. Loss on ignition and Na2O are in suitable level and appear to be concordant with the standard. Grain size analyses show that the decreasing sand and clay, and increasing silt ratio in both quarry soil and mixture caused decreasing in strength of brick during molding and after firing. The quarry soil is characterized by high p
... Show MoreThe basic concept of diversity; where two or more inputs at the receiver are used to get uncorrelated signals. The aim of this paper is an attempt to compare some possible combinations of diversity reception and MLSE detection techniques. Various diversity combining techniques can be distinguished: Equal Gain Combining (EGC), Maximal Ratio Combining (MRC), Selection Combining and Selection Switching Combining (SS).The simulation results shows that the MRC give better performance than the other types of combining (about 1 dB compare with EGC and 2.5~3 dB compare with selection and selection switching combining).