This study presents the results of atmospheric particulates sampling using high volume air sampler for selected places at Al Tuwaitha nuclear site. The collected samples were analyzed for gross alpha /beta radioactivity using Ludlum model 3030 and measurement particles activity in Al Tuwaitha nuclear site and the surrounding areas for the period from 28/12/2016 to 13/4/2017.The measurement of activity concentrations ranged from (0.42±0.03 to 4.18±0.13) Bq/m3 for alpha particles and from(0.93±0.06 to 9.21±0.26) Bq/m3for beta particles. The activity concentration of nuclides inversely proportional with air temperature and wind speed while humidity is directly proportional with it. Highest value of activity concentration has been found at(Near nuclear and radiation safety directorate/ In the center of planning department/T9)while the lowest value has been found at (the right side of Nuclear application and researches directorate / building 61/T42). The results of this study show that the region has natural nuclides which are the daughters of the two decay series, namely the thorium and the uranium series. In both cases, it is a radioactive Radon isotope which can escape from the soil and ascend into the air.
This paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl
... Show MoreGeneral Background: Deep image matting is a fundamental task in computer vision, enabling precise foreground extraction from complex backgrounds, with applications in augmented reality, computer graphics, and video processing. Specific Background: Despite advancements in deep learning-based methods, preserving fine details such as hair and transparency remains a challenge. Knowledge Gap: Existing approaches struggle with accuracy and efficiency, necessitating novel techniques to enhance matting precision. Aims: This study integrates deep learning with fusion techniques to improve alpha matte estimation, proposing a lightweight U-Net model incorporating color-space fusion and preprocessing. Results: Experiments using the AdobeComposition-1k
... Show MoreUse of computer simulation to quantify the effectiveness of blowing agents can be an effective tool for optimizing formulations and for the adopting of new blowing agents. This paper focuses on a mass balance on blowing agent during foaming including the quantification of the amount that stays in the resin, the amount that ends up in the foam cells, and the pressure of the blowing agent in the foam cells. Experimental data is presented both in the sense of developing the simulation capabilities and the validating of simulation results.
This study aimed to show the relationship between mental health and shyness for university students in Baghdad and Al – Mustansiria university which its subject was (200) students , ( 100) males and ( 100) females , Mental Health scale which is constructed by (Al – Janabi 1991) and developed by (Hassan 2006) was used for this aim ,The scale of shyness was built according to a questioner to the students and according to previous publications and studies .
Multiple regulation analysis step - wise was used for data analysis in order to identify the possibility to find single or couple indications for the independent variable (mental
... Show MoreAbstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire