Radiation is a form of energy, its emitted either in the form of particles such as α-particles and β-particles (beta particles including the electron and the positron) or waves such as sunlight, X-rays and γ-rays. Radiation found everywhere around us and it comes from many different sources naturally or man-made sources. In this study a questionnaire was distributed to people working in the field of X-rays that used for a medical imaging (X-ray and CT-scan) to evaluate the extent of awareness and knowledge in estimate the damage of ionizing radiation as a result of wrong use. The questionnaire was distributed to medical clinics in Al-Harithiya in Baghdad, which it’s considered as one of the important areas in Iraq to attract and treat patients. It’s found that most of the commitment of radiography clinics by safety and security procedures. Most of the radiology clinics abide by most of the Iraqi Ministry of Health laws. However, some clinics did not implement some of the security and safety conditions
The basic concept of diversity; where two or more inputs at the receiver are used to get uncorrelated signals. The aim of this paper is an attempt to compare some possible combinations of diversity reception and MLSE detection techniques. Various diversity combining techniques can be distinguished: Equal Gain Combining (EGC), Maximal Ratio Combining (MRC), Selection Combining and Selection Switching Combining (SS).The simulation results shows that the MRC give better performance than the other types of combining (about 1 dB compare with EGC and 2.5~3 dB compare with selection and selection switching combining).
ABSTRACTBackground: cochlear implants are electronic devices that convert sound energy into electrical signals to stimulate ganglion cells and cochlear nerve fibers. These devices are indicated for patients with severe to profound sensorineural hearing losses who receive little or no benefit from hearing aids. The implant basically takes over the function of the cochlear hair cells. The implant consists of external components (microphone, speech processor and transmitting coil) and internal components (receiver stimulator and electrode array). The implant is inserted via a trans mastoid facial recess approach to the round window and scala tympani.Objectives: to determine the effectiveness and safety of non fixation method in cochlear imp
... Show MoreSocial factors may affect the available sources of toxic substances and causes of poisoning, and these factors may change over time. Additionally, understanding the characteristics of poisoning cases is important for treating such patients. Therefore, the present study investigated the characteristics of poisoning cases in Baghdad Poisoning Consultation Center (PCC) and Forensic Medicine Institute (FMI). Data on all poisoning cases reported in PCC and FMI during 2013 were retrospectively obtained from medical records. Total of 1131 reports of poisoning cases (1082 from PCC and 49 from FMI) were analyzed according to age, sex, geographical distribution and causes of poisoning according to the type and class of poisoning agent. The results
... Show MoreExisting literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.
In total, 26 key technology adoption predictors
The research aims to know the extent of the impact of the risks of foreign exchange centers represented in the risks of commitment, exchange rate changes and liquidity risks in audit procedures, and accordingly the research will provide an applied framework of knowledge that shows the relationship between the variables addressed, and the importance of the research lies in the light of its presentation of intellectual, cognitive and applied contributions On the risks of foreign exchange centers and audit procedures, the research community is represented in the banking sector. The sample included nine private commercial banks listed in the Iraqi Stock Exchange. The research relied on a time series consisting of four years that extended fro
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreConstruction projects have a special nature and affect them many factors making them exposed to multiple risks as a result of the length of the implementation period and the multiplicity of stages, starting from the decision stage through implementation until the final delivery, which leads to increased uncertainty and the likelihood of risk.
The process of analysis and risk management is one of the effective and productive methods that are used in managing the construction projects for the purpose of increasing the chances of ending the project successfully in terms of cost, time and quality and at the lowest possible problems.
The research aims first to the effective planning for analysis and risk managemen
... Show More