The aim of this research is to determine the uranium concentration in soil and water samples taken from different locations from the middle and south of Iraq using fission fragments track registration. Twelve samples of soil and water were taken from middle and South of Iraq. The nuclear reaction used as a source of nuclear fission fragments is U-235 (n.f) obtained by bombardment U-235with thermal neutrons from (Am-Be) neutron source with flux (5X103 n.cm-2.s-1). The concentration values were calculated by a comparison with standard samples recommended by IAEA.The results of the measurements show that the uranium concentration in soil samples were in Thekar (16.38 ppm), AL-Basra (16.1ppm) and (0.78 ppm) in Baghdad, from the results which show that this governorate were contaminated with depleted uranium after the Wars against Iraq . The uranium concentration in the water samples of Tigers river were in AL-Qurna (8.85 ?g/l) and in AL-Suwera (4.72 ?g/l).
Tuberculosis (TB) still remains an important medical problem due to high levels of morbidity and mortality worldwide. A series of innate immune mechanisms that create a cytokine network control the pathogenesis of tuberculosis and this response has the capacity to modify the host genomic DNA structure through epigenetic mechanisms such as DNA methylation which could constantly alter the local gene expression pattern that can modulate the metabolism of the tissues and the immune-response. Interferon-gamma (IFN-γ) is an important pro-inflammatory cytokine regulator of the innate immune response to TB. This study aims to determine DNA methylation patterns of INF-γ gene promoter and measure serum IFN- γ level in newly diagnosed TB patient
... Show MoreThe objective of the study is to study how to employ performance evaluation in achieving organizational integrity and the impact of performance evaluation on achieving organizational integrity. In light of this, the following questions were raised:
Are the dimensions of organizational integrity available in the field in question?
In order to answer the research questions, a questionnaire questionnaire was distributed to the sample of 30 members of the teaching staff at the Technical Institute in Mosul. The three-dimensional Lycert scale was used. The statistical methods were used, ie, the frequency distribution, the computational circles, the standard deviations, Pearson), simple
... Show MoreThe study aimed to establish the association of miR-153-3p expression with treatment response to IM in CML patients. Sixty CML patients were included and divided into two groups consistent with their response to treatment whether sensitive or resistant to IM. Ten healthy normal participants were enrolled as control group. RNA was extracted from serum to work out miR-153-3p expression utilizing real-time quantitative reverse transcription polymerase chain reaction. The primers were supplied by Macrogen Inc. Twenty seven patients were sensitive to imatinib and 33 were resistant to imatinib. The ratio of male to female was 1.14:1. The bulk (58%) of patients were within the age range of 41-60 years. Weight and gender did not significantly diffe
... Show Morethe researchers Sought to determine the impact of the customer contact (Within a client contact there are two times, first is the total time required to create a service and within it there is contact time while the second time is the time of client contact ؛ where means a time that records the physical presence of the customer during the process of service) on operations performance by concentrate attention on the cost (labor productivity) and quality (patient ratio to the doctor) and speed (cycle time) and flexibility (the flexibility range) , as well as ruling out variable of innovation because of impossibility to measure this variable in the Specialty Center for Dental in al-alwia due to the center is lacking of mechanisms t
... Show MoreIn recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS. This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreThis research aims to solve the problem of selection using clustering algorithm, in this research optimal portfolio is formation using the single index model, and the real data are consisting from the stocks Iraqi Stock Exchange in the period 1/1/2007 to 31/12/2019. because the data series have missing values ,we used the two-stage missing value compensation method, the knowledge gap was inability the portfolio models to reduce The estimation error , inaccuracy of the cut-off rate and the Treynor ratio combine stocks into the portfolio that caused to decline in their performance, all these problems required employing clustering technic to data mining and regrouping it within clusters with similar characteristics to outperform the portfolio
... Show MoreIn this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err
... Show More