This research aims to study the radiation concentration distribution of the old District of Najaf (Iraq), where 15 samples were taken from featured sites in the District, which represents archaeological, religious, and heritage sites. Track detector CR-39 was used to calculate the concentration of three different soil weights for each sample site after being exposed for a month. Geographical information systems (GIS) were used to distribute the radioactive concentration on the sites of the samples, where two interpolation methods, namely the inverse distance weight method (IDW) and the triangle irregular network method (NIT), to study the distribution of the radioactivity concentration. The study showed that the western part of the district, which includes the old cemetery and the areas adjacent to the Najaf water depression, are characterized by a relatively high amount of radioactivity concentration compared to the eastern part, which represent the residential areas, and for all sample weights.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreThis article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show Moreresearch summary
Praise be to Allah، and prayers and peace be upon His Messenger and His chosen one، his family، companions and his family and his family.
After that، this is a study on the question of the claim، as one of the controversial questions that are the mainstay of debates، and I looked at it: the limit of the question of the claim، its importance، its impact، its aspects of corruption، its sections، and the representation of its sections of the fundamentalist controversy;
The research was according to the following plan:
Introduction، in which she mentioned: the importance of the research topic and the reason for its selection، its questions، its l
... Show MoreThe current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question: “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.
The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat
... Show MoreCrabs belong to the crustacean family (Decapods crustacean), and their shells contain natural ingredients from which the bioactive compounds are derived. It has been used as folklore medicine in cancer treatment. We investigate the possible anti-inflammatory and anti-oxidant effects for crab shells and whole crabs. Thirty-six rats (150–200 gm) from both sexes were used, divided into six groups, the anti-inflammatory and anti-oxidant activity measured using cotton pellet induce granuloma model. Detection of tumor necrosis factor alpha (TNF α), Interleukin 1 beta (IL-1β), superoxide (SOD), and malondialdehyde (MDA) levels using ELISA Kits. The data analysis by one-way ANOVA followed by the Tukey test. Values are significant at (p < 0.05).
... Show MoreAbstract:
The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of
... Show MoreThrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economic
... Show MoreA total of 72 specimens of the wild jungle cat Felis chaus furax De Winton, 1898 were
examined for the purpose of this study. The results show that 55.6% of the sample harbored
either single or mixed infections with ecto- and/ or endoparasites. The mode of infection
shows that only four specimens( 5.6% of the total sample) acquire single infections, the
double infections comprise 15.3%, the triple infections comprised 33.3%, while the
quadruplicate infections comprised 1.4%.
The systematic list of the parasites included six ectoparasites: Ctenocephalides felis (insect),
Sarcoptes scabiei (mite), Haemaphysalis adleri, Rhipicephalus leporis, Rhipicephalus
turanicus and Hyalomma anatolicum excavatum (ticks) and seven
The actor has mechanisms that were applied in the performance، as it formed a style in the theatrical form (weird)، and the researcher deliberately studied these mechanisms and divided them into four chapters.
The researcher divided it into two sections، the first is the actor's performance requirements، and the second is the boring performance methods in the directors' theater، and then the researcher concluded the second chapter with the most important indicators.
As for the third chapter، the researcher determined the society of his research and the method of selecting the sample (strange) and analyzing the sample and concluded with the most important results of the sample analysis.