Background: Although radiological diagnostic studies (RDS) are an important and acceptable part of medical practice, it is not without hazards. It is associated with increased risk of cancer. Unfortunately the typical and safe dose of each radiological examination is not known. Most of our knowledge of cancer risk comes from studies of survivors of those exposed to whole body radiation from atomic bomb in Hiroshima & Nagasaki, jobs associated with radiation exposure, Chernobyl survivors & patients treated with radiation therapy for cancer and other diseases.
Objectives To estimate radiation dose received by patients from diagnostic radiological examinations and lifetime
... Show MoreProducts’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers. In this research, we pr
... Show MoreProducts’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.
 
... Show MoreA new nano-sized NiMo/TiO2-γ-Al2O3 was prepared as a Hydrodesulphurization catalyst for Iraqi gas oil with sulfur content of 8980 ppm, supplied from Al-Dura Refinery. Sol-gel method was used to prepare TiO2- γ-Al2O3 nano catalyst support with 64% TiO2, 32% Al2O3, Ni-Mo/TiO-γ-Al2O3 catalyst was prepared under vacuum impregnation conditions to loading metals with percentage 3.8 wt.% and 14 wt.% for nickel and molybdenum respectively while the percentage for alumina, and titanium became 21.7, and 58.61 respectively. The synthesized TiO2- γ-Al2O3 nanocomposites and Ni-Mo /TiO2
... Show MoreIn this paper the specific activity of 238U, 232Th and 40K
radionuclides were determined by sodium iodide enhanced by
thallium NaI(Tl) detector and assessment the annual effective dose
in samples of powder milk from different companies such as
Almunaish, Seven Caw, Molty and Altunsa for adult available in
Baghdad markets. The specific activity of 40K has the greater value in
all the samples which is in the range of allowed levels globally that
suggested by UNSCEAR. The mean value of annual effective doses
were 0.121, 0.314775 and 0.305 mSv/y for 238U, 232Th and 40K
respectively.
With increased climate change pressures likely to influence harmful algal blooms, exposure to microcystin, a known hepatotoxin and a byproduct of cyanobacterial blooms can be a risk factor for NAFLD associated comorbidities. Using both
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show More