The principal forms of radiation dosage for humans from spontaneous radiation material are being recognized as radon and its progenitors in the interior environment. Radiation-related health risks are caused by radon in water supply, which can be inhaled or ingested. Materials and Methods: The solid-state CR-39 nuclear trace detectors method was using in this research for measuring accumulation of radioactivity in water supply in different locations of Iraq's southwest corner of Baghdad. In Baghdad district, 42 samples were selected from 14 regions (3 samples out of each region) and put in dosimeters for 50 days. Results: The mean radon concentration was 49.75 Bq/m3, that is lower than the internationally recognized limit of 1100 Bq /m3. The total absorbed dose in micro sieverts each year (mSv/y) and concentration about alpha energy has be estimated. Within the area under study, the linear relation between annual effective dose in (mSv/y) and radon concentration has been established. Conclusion: According on the, findings radon concentrations in drinking water supplies are below than EPA's and WHO's recommended levels.
This paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition. This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.
This model is an extension to H.M.M.S and related developments models of a single product. These models will be converted to deal with Multiproduct for productive company. This model executed by computer programming technique to maximize profits
Objectives: To identify child or family related risk factors for
unintentional childhood poisoning in Sulaymaniyah, Iraq and to suggest
possible causes and preventive measures.
Methods: This is an epidemiological description and a case-control study. The study was undertaken in Sulaymani ,in 2004-2005. Cases were 200 children who were admitted to the hospital for treatment of poisoning. For every case two controls were selected. Al l parents of the children were interviewed by using a questionnaire that incl uded demographic and poisoning characteristic information.<
... Show MoreChildhood is characterized by ahigh privacy in the life of the child overall educational institutions in the world. Based on this specificity, modern education begins with a holistic vision of the child through all developmental aspects (moral, religious, emotional, social, linguistic, physical, health, and mental). This integration could be achieved through taking into consideration the needs and rights of children and developing curricula that consider these needs and capacities to provide opportunities for developing and supporting the developmental aspects of the child. The contemporary technological developments in the field of computer and the Internet have brought with it new forms, ideas, and problems for children in recent years
... Show MoreConstruction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
Let ℛ be a commutative ring with unity and let ℬ be a unitary R-module. Let ℵ be a proper submodule of ℬ, ℵ is called semisecond submodule if for any r∈ℛ, r≠0, n∈Z+, either rnℵ=0 or rnℵ=rℵ.
In this work, we introduce the concept of semisecond submodule and confer numerous properties concerning with this notion. Also we study semisecond modules as a popularization of second modules, where an ℛ-module ℬ is called semisecond, if ℬ is semisecond submodul of ℬ.