Preferred Language
Articles
/
bsj-1318
Measurement of Radon-222 Concentration in Soil Samples of some Sulfuric Spring in Hit City Using CR-39 Detector
...Show More Authors

In this study, concentrations of radon were measured for seventeen samples of soil distributed in three Sulphuric Spring, in addition to other regions as a background in Hit City in AL-Anbar Governorate. The radon concentrations in soil samples measured by using alpha-emitters registration that emits from radon (222Rn) in (CR-39) track detector. The concentrations values were calculated by a comparison with standard samples. The results show that the radon concentrations in first spring varies from (258.253- 347.762 Bq/m3), second spring (230.374-305.209 Bq/m3), third spring (292.002-336.023 Bq/m3) and the average radon concentration in other regions (187.821 Bq/m3). As a conclusion of the study radon concentration in Sulphuric Spring is relatively higher than the background.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 03 2022
Journal Name
International Journal Of Health Sciences
Corrosion risk assessment of the oil flow line in Southern Iraq
...Show More Authors

The risk assessment for three pipelines belonging to the Basra Oil Company (X1, X2, X3), to develop an appropriate risk mitigation plan for each pipeline to address all high risks. Corrosion risks were assessed using a 5 * 5 matrix. Now, the risk assessment for X1 showed that the POF for internal corrosion is 5, which means that its risk is high due to salinity and the presence of CO, H2S and POF for external corrosion is 1 less than the corrosion, while for Flowline X2 the probability of internal corrosion is 4 and external is 4 because there is no Cathodic protection applied due to CO2, H2S and Flowline X3 have 8 leaks due to internal corrosion so the hazard rating was very high 5 and could be due to salinity, CO2, fluid flow rate

... Show More
Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
E3s Web Of Conferences
Mitigation of Reflection Cracking in Asphalt Concrete Overlay on Rigid Pavements
...Show More Authors

Reflective cracking is one of the primary forms of deterioration in pavements. It is widespread when Asphalt concrete (AC) overlays are built over a rigid pavement with discontinuities on its surface. Thus, this research work aims to reduce reflection cracks in asphalt concrete overlay on the rigid pavement. Asphalt Concrete (AC) slab specimens were prepared in three thicknesses (4, 5, and 6 cm). All these specimens were by testing machine designed and manufactured at the Engineering Consulting Office of the University of Baghdad to examine for the number of cycles and loads needed to propagate the reflection cracking in the asphalt concert mixture at three temperatures (20, 30, and 30°C). It was noticed that the higher thickness A

... Show More
View Publication
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Generalizations of Fuzzy k-ideals in a KU-algebra with Semigroup
...Show More Authors
Abstract<p>We present the notion of bipolar fuzzy k-ideals with thresholds (<italic>θ, λ</italic>) of a KU-algebra with semigroup and give some basic properties of this ideal. Also, we study some relations about a bipolar fuzzy k-ideal with thresholds (<italic>θ, λ</italic>) and a k-ideal of a KU-semigroup.</p>
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Assured Data Deletion Security Techniques in Cloud Storage
...Show More Authors

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Randomness of Stream Cipher Digital Sequences in the Field GF(28)
...Show More Authors

     A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field  to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 05 2023
Journal Name
Journal Of Pragmatics Research
Analysis of Impoliteness Strategies Used in Putin's Speech at Annexation Ceremony
...Show More Authors

This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Civil Engineering Journal
Measuring of Subjective and Objective Aesthetics in Planning and Urban Design
...Show More Authors

The article includes the concept of aesthetics through what has been dealt with in the literature by philosophers and researchers who have addressed this concept in an attempt to derive indicators of aesthetics. The article adopted a descriptive and analytical methodology by reviewing recent literature on the concept of aesthetics and its relation to urban planning and design issues. Many subjective and objective aesthetics indicators have been identified, some of which are classified under real aesthetics, and some under fake aesthetics. The indicators were applied to the Kufa Mosque complex and Sahla Mosque complex as a comparative case study. It was found that the indicators of real aesthetics have a higher weight in determining

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Effect of ginger alcoholic extract on the ovary tissue in quail
...Show More Authors

This research was carried out in quail in the laboratory of histopathology diseases during four months. The objectives of this study was to detecting the effects of the addition of the alcohol extract of ginger to ovary tissue of quail. The two groups of birds were in almost similar weights and were placed in cages. Each group consisted of 8 quails. The first group (control group) fed on regular feeding without adding alcoholic extract of ginger. The second group (treated group) fed on the same normal food after adding the alcohol extract of ginger at a concentration of 300 mg / kg. The results indicated that ginger have positive effects on folliculogenesis.

View Publication
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Impact of Glycetin Injection on Productive Traits in local Iraqi Chickens
...Show More Authors
Abstract<p>This study aimed to investigate the impact of implementing Glycetin by injection on the productive features of local Iraqi chickens. 100 female hens and 20 roosters from a local Iraqi chicken population, at age 26 weeks. The sample was divided into three groups, in addition to a control group. Each experimental group had 25 female hens, with the same procedure being performed for each individual hen, and 20 roosters, which were reared separately for the purpose of artificial insemination. The avian specimens were housed in separate enclosures, and the experimental conditions were allocated as follows: the initial condition (Control Group) did not receive any injections, whereas condit</p> ... Show More
View Publication
Scopus Crossref