The study of determing Uranium concentration in samples of teeth is the first of its kind in the Iraq . In this study Uranium concentration has been measured was (32) samples of child teeth distributed on the some of middle and south governorate of Iraq (Muthana – Dekar – Basrah – Najaf – Karbalah – Waset – Babel – Baghdad) . The Uranium concentration in teeth samples has been measured by using fission tracks registration in (CR-39) track detector that caused by the bombardment of (U235) with thermal neutrons falx from (24Am.Be) neutron source that has flux of (5x103n.cm-2S-1). The result obtained show that the Uranium concentrations in governorates were (0.18ppm), (0.172ppm), (0.160ppm), 0.150ppm) (0.89ppm), (0.07ppm) , (0.052ppm), (0.020ppm) (0.089ppm), (0.07ppm) , (0.052ppm) , (0.020ppm) (0.089ppm), (0.07ppm) , (0.052ppm) , (0.20ppm) respectively . As a conclusion from the study of Uranium concentration in Muthana governorate that found to be higher than Dekar and Basrah , Najaf , Karbalah, Waset , Babel and Baghdad . These result are higher thin the Uranium concentrations in one studies in Barazil – Bahia state its (0.016ppm) , and in another study in British about (0.018-0.079ppm).
In this study the isomerization of desulfuerized light Iraqi petroleum naphtha (Al-Dura Refinery) with boiling point range of 37 to 124 °C , 80.5 API specific gravity and 68.2 octane number has been investigated. Two types of catalysts were prepared (Pt/HX and Pt/SrX) by impregnation of 0.8 wt% Pt on l 3X-zeolite. The catalyst activity and selectivity toward isomerization, and catalyst deactivation were investigated.
The isomerization unit consisted of a vertical tubular stainless steel reactor of 2 cm internal diameter, 3 cm external diameter and 68 cm height. The operating pressure was atmospheric for all experimental runs. The liquid flow of lightnaphtha was 0.4 Uh, and the catalyst weight was 50 gm, H/
... Show Moreمدة تولي رئاسة السلطة في الفكر السياسي الاسلامي المعاصر
This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV
... Show MoreSediment samples were collected from main water processing and supply plants in Baghdad, and tested for radioactivity from both natural and artificial sources. These stations are: East Dijla (Tigris), Al-Kadisia, Al-Karama, Al-Rasheed, Al-Sader, Al-Wathba, and Al-Wihda supply stations. Qualitative measurements were made, and the results showed that most sediments exhibited natural radioactive level and sometimes less than the international regular standards. Specially, K-40 and Ra-226 results were much less than the standards for radioactive concentrations. Ac-228 concentration was found rather than Th-232 (in Al-Sader and Al-Wihda samples) but with low concentrations of about 10-15 Bg/kg and detection confidence ~45% , and Ce-141 and Be
... Show MoreCooling towers is one of the most important unit in industry, they are used to dispose heat from cooling media used in the integrated units. The choice of the cooling media plays recently an important rule due to fresh-water scarcity. The use of saline as a cooling media become of growing interest, but the corrosion problem has to be taken in consideration. In this study the simultaneous effect of cooling tower operation parameters on the corrosion rate of mild-steel is considered. The role of NaCl content is found to be pronounced more than the working solution temperature and flowrate. The corrosion of mild-steel in these studied factors had shown an interesting result especially with the NaCl% content. Firstly, there was an increase in t
... Show MoreThe purpose of the current investigation is to distinguish between working memory ( ) in five patients with vascular dementia ( ), fifteen post-stroke patients with mild cognitive impairment ( ), and fifteen healthy control individuals ( ) based on background electroencephalography (EEG) activity. The elimination of EEG artifacts using wavelet (WT) pre-processing denoising is demonstrated in this study. In the current study, spectral entropy ( ), permutation entropy ( ), and approximation entropy ( ) were all explored. To improve the classification using the k-nearest neighbors ( NN) classifier scheme, a comparative study of using fuzzy neighbourhood preserving analysis with -decomposition ( ) as a dimensionality reduction technique an
... Show MoreThis study aims to identfy virtual plastic art exhibitions in light of the challenges of the Corona pandemic. It used a descriptive analytical method through several questions and examining future challenges via the Internet in publishing virtual plastic art exhibitions in many parts of the world in light of the challenges of the Corona pandemic. For that, it used Arab and foreign references.
The study reached many results, the most important of which are: The detection of virtual reality applications and their impact on the plastic arts exhibitions sector. Besides, the insights gained from future art gallery research with VR technology could provide direct and practical value for this sector. By using a technology, similar to the “
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More