The optical detectors which had been used in medical applications, and especially in radioactive treatments, need to be modified studied for the effects of radiations on them. This study included preparation of the MnS thin films in a way that vacuum thermal evaporation process at room temperature 27°C with thickness (400+-10nm) nm and a sedimentation rate of 0.39nm/sec on glass floors. The thin films prepared as a detector and had to be treated with neutron irradiation to examine the results gained from this process. The results decay X-ray (XRD) showed that all the prepared thin films have a multi-crystalline structure with the dominance of the direction (111), the two samples were irradiated with a neutron irradiation source (241Am-9Be) with activity (12 Ci) and flux (105 n/cm2.s). It emits fast neutrons from the (α, n) the first sample was irradiated for one week and the second sample was irradiated for two weeks, the X-ray diffraction (XRD) and UV-Visible Spectroscopy were examined before and after irradiation, and its properties were changed and become possible to use in optical detectors which in turn can be used in many industrial applications especially in medicine.
Learning programming is among the top challenges in computer science education. A part of that, program visualization (PV) is used as a tool to overcome the high failure and drop-out rates in an introductory programming course. Nevertheless, there are rising concerns about the effectiveness of the existing PV tools following the mixed results derived from various studies. Student engagement is also considered a vital factor in building a successful PV, while it is also an important part of the learning process in general. Several techniques have been introduced to enhance PV engagement; however, student engagement with PV is still challenging. This paper employed three theories—constructivism, social constructivism and cognitive load t
... Show MoreThis work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different video
... Show MoreAbstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.
A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.
Being unsatisfied with the job was as
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThis work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show Moreالأثر V بالنسبة إلى sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي
... Show More