This research included measuring the concentrations of natural radioactive isotopes U-238 and Th-232 and radiation dose rates for selected areas of Missan province, GR-460 system was used which has the potential to measure the concentrations of natural radioactive isotopes in (ppm) unit and measuring the radiation dose rates in μR/h unit. It was also used with the system the mobile device FH-40 which measures the radiation dose rates in units μSμ/h the measurement results showed the absence of a significant increase in the U-238 and Th-232 concentration where the concentration of isotopes of U-238 and natural Th-232 (3.35-5.46) ppm respectively it is authorized and universally accepted. In terms of radiation dose rates it ranged betwe
... Show MoreTransforming the common normal distribution through the generated Kummer Beta model to the Kummer Beta Generalized Normal Distribution (KBGND) had been achieved. Then, estimating the distribution parameters and hazard function using the MLE method, and improving these estimations by employing the genetic algorithm. Simulation is used by assuming a number of models and different sample sizes. The main finding was that the common maximum likelihood (MLE) method is the best in estimating the parameters of the Kummer Beta Generalized Normal Distribution (KBGND) compared to the common maximum likelihood according to Mean Squares Error (MSE) and Mean squares Error Integral (IMSE) criteria in estimating the hazard function. While the pr
... Show MoreThe influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr
... Show MoreAfter a temporary halt to forced thghebr in different cities of Iraq this methodlogy
opeations returned directiy in the areas of political conflict on the ground which are translated
operations and forced displacement violence es they operations aimed at completing the
forced displacement that occurred after the occupation in(2003)which took an upward curve
publicly after these events and some of which are aimed at the liquidation of some provinces
than any demographic diversity of religious or sectarian or alhens and others aimed at
redemographic distribution within the province itself to produce a net sectarian zones as is the
case in Diyala Nineveh and Babylon Baghdad has the epicenter of sectarian violence and th
Background: Teachers are considered as dynamic force who take a pivotal position in any educational system. Since they may play a significant role in passing the preventive information and health promotion, it is important that their own oral health knowledge, attitude, and practices conform to the professional recommendations. The aim of this study was to evaluate oral health knowledge, attitude and practices among kindergarten teachers, and their impact on teachers’ oral health condition in Al-Rusafa Sector, Baghdad, Iraq. Materials and Methods: This cross-sectional survey was conducted among 80 kindergarten teachers. A self-administered questionnaire was distributed among these teach¬ers. This questionnaire format contains two
... Show MoreBackground/objectives: Inflammatory mediators such as prostaglandin E2 (PGE2) and nitric oxide (NO) are key indicators of pulp response to mechanical trauma. However, the influence of cavity depth on their release dynamics remains unclear. This study aimed to evaluate the effects of different cavity depths—moderate (without pulp exposure) and deep (with pulp exposure)—on the release of PGE2 and NO in the pulp tissue of rat mandibular incisors at two time intervals (3 and 9 h).Methods: In total, 40 male Wistar rats were divided into two main groups (n = 20) based on cavity depth. A split-mouth design was used, with cavities of different depths prepared on the left mandibular incisors, leaving the right incisors without cavities as
... Show MoreThe urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More