Radiation is a form of energy, its emitted either in the form of particles such as α-particles and β-particles (beta particles including the electron and the positron) or waves such as sunlight, X-rays and γ-rays. Radiation found everywhere around us and it comes from many different sources naturally or man-made sources. In this study a questionnaire was distributed to people working in the field of X-rays that used for a medical imaging (X-ray and CT-scan) to evaluate the extent of awareness and knowledge in estimate the damage of ionizing radiation as a result of wrong use. The questionnaire was distributed to medical clinics in Al-Harithiya in Baghdad, which it’s considered as one of the important areas in Iraq to attract and treat patients. It’s found that most of the commitment of radiography clinics by safety and security procedures. Most of the radiology clinics abide by most of the Iraqi Ministry of Health laws. However, some clinics did not implement some of the security and safety conditions
Objective: The objectives of the present study were to evaluate the effectiveness of the instructional intervention
about medical and health knowledge of patients with diabetes mellitus type II.
Methodology: A Quasi- experimental study was carried out in National Center for Diabetes Mellitus/ Almustansria
University, started from 4th January 2012, to 1st April 2012. Non-probability (purposive sample) of (50) diabetes
mellitus type II, who visit National Center for Diabetes Mellitus/ Almustansria University. The study sample is
divided equally into (25) study and (25) control groups. The study group received the instructional intervention.
While the control not exposed to the instructional intervention. The data are coll
'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
This study is concerned with the adsorption of Congo red from solution on the surface of Chaff. The adsorption isotherm is of L-curve type according to Giles classification and the experimental data were best fitted to Langmuir isotherm model. The adsorption phenomenon was examined as a function of temperature (25, 40, 55 oC). The extent of adsorption of Congo red on Chaff was found to increase with the increase of temperature (endothermic process). The basic thermodynamic functions have also been calculated. The effect of contact time was investigated and found that the adsorption process of dye on Chaff surface reached complete equilibrium within 90 min. The maximum uptake of Congo red by Chaff was found to be 92.9% at 25oC. The kineti
... Show MoreIn real situations all observations and measurements are not exact numbers but more or less non-exact, also called fuzzy. So, in this paper, we use approximate non-Bayesian computational methods to estimate inverse Weibull parameters and reliability function with fuzzy data. The maximum likelihood and moment estimations are obtained as non-Bayesian estimation. The maximum likelihood estimators have been derived numerically based on two iterative techniques namely “Newton-Raphson†and the “Expectation-Maximization†techniques. In addition, we provide compared numerically through Monte-Carlo simulation study to obtained estimates of the parameters and reliability function i
... Show MoreAbstract The main purpose of the research is to clarify and investigate in details about Susan Glaspell’s role in shedding light on the predicament of women in American society in the early twentieth century showing how sense of the place played an important role in limiting the opportunities of female protagonists who try to escape the roles imposed upon them by society. Glaspell lived in the early twentieth century in the Midwest and tackled the important issues like: women's suffrage, birth control, socialism, union organizing when women were not able to vote or sit as a member on juries. Her Feminist cause is quite obvious through her works from her first one act play Suppressed Desire to the final three act play, Alison’s House. Th
... Show MoreTwo series of Schiff Bases and 2,3-disubstituted-1,3-thiazolidin-4-one derivatives were synthesized . Reaction of 2-mercaptobenzothiazole with α-chloro acetic acid gave compound[I]. Esterification of carboxylic moity of compound [I] , using absolute methanol in the presence of conc . H2SO4 yielded acorresebonding ester [II] , wich was condensation with hydrazine hydrate to give acid hydrazide [III] . The new Schiff bases [V]n were synthesized by reaction of acid hydrizide with dialdehyde [IV]n in the presence of glacial acetic acid . The thiazolidinone derivatives [VI]n have been obtained from the azomethines through the addition of thioglycolic acid . Their chemical structures have been confirmed by mel
... Show MoreIn this paper, two of the local search algorithms are used (genetic algorithm and particle swarm optimization), in scheduling number of products (n jobs) on a single machine to minimize a multi-objective function which is denoted as (total completion time, total tardiness, total earliness and the total late work). A branch and bound (BAB) method is used for comparing the results for (n) jobs starting from (5-18). The results show that the two algorithms have found the optimal and near optimal solutions in an appropriate times.
It is well known that petroleum refineries are considered the largest generator of oily sludge which may cause serious threats to the environment if disposed of without treatment. Throughout the present research, it can be said that a hybrid process including ultrasonic treatment coupled with froth floatation has been shown as a green efficient treatment of oily sludge waste from the bottom of crude oil tanks in Al-Daura refinery and able to get high yield of base oil recovery which is 65% at the optimum operating conditions (treatment time = 30 min, ultrasonic wave amplitude = 60 micron, and (solvent: oily sludge) ratio = 4). Experimental results showed that 83% of the solvent used was recovered meanwhile the main water
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More