The effects of scattering and secondary radiation generated inside the material on dose equivalent rate where studied using Co60 and Cs137 sources of activity (199.8 , 177.6) MBq , respectively for different thicknesses of Al , Pb and Pb- glass . The results showed that the equivalent rate increases when the effect of scattering was included for Al and Pb shields with cobalt-60 source of energy 1.25 MeV ; and decreases for Pb shield with Cs-137 source of energy 0.662MeV .The results showed also that the atomic number of The material effects the dose equivalent rate . The Pb-glass shield was found to be more efficient in absorption than other shields.
BACKGROUND: Cough-variant asthma (CVA) is a type of asthma in which the main symptom is a dry, non-productive cough. OBJECTIVE: The objective of the study was to evaluate the therapeutic effect of Montelukast in CVA and to investigate the prevalence of Montelukast in CVA. METHODS: A cross-sectional study was conducted on 30 patients with chronic cough at least 8 weeks using Montelukast at Al-Kindy Hospital over the period of January 2018‒March 2018. An interview using questionnaire was used to collect the data that were specifically prepared to meet the objective of study including age, sex, associated disease, exacerbation factors, and classical therapy. RESULTS: There was a reduction of the symptoms associated
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe object of this research is to determine the effect in the differences of the correlation pattern of the micro blogging on the educational attainment of computer science curriculum for 12th grade students. I will try to test the best suited correlation and I might use the demo curriculum as well to achieve its objectives , The research method that will be used in this research is the quantitative method where we will use a sample of 60 students divided into two groups ( correlate the micro blogging - adopted the sequence pattern of relating the micro blogging) As a result, we found out that there are quantitative differences among the two groups' median , The differences goes back to the main effect of the correlation pattern of the m
... Show MoreBackground: COVID-19 is an ongoing disease that caused, and still causes, many challenges for humanity. In fact, COVID-19 death cases reached more than 4.5 million by the end of August 2021, although an improvement in the medical treatments and pharmaceutical protocols was obtained, and many vaccines were released. Objective: To, statistically, analyze the data of COVID-19 patients at Alshifaa Healthcare Center (Baghdad, Iraq). Methods: In this work, a statistical analysis was conducted on data included the total number, positive cases, and negative cases of people tested for COVID-19 at the Alshifaa Healthcare Center/Baghdad for the period 1 September – 31 December 2020. The number of people who got the test was 1080, where 424 w
... Show MoreDuring his tenure in Iraq, al-Hadjjaj bin Yusif undertook administrative and economic reforms as well as linguistic reform.
The efforts exerted by Abu al-Aswad al-Dawali to control the reading of the Holy Quran were not sufficient, so the melody and error continued and became more pronounced, especially since the letters were written until then without any distinguishing features.
Al- Hadjjaj bin Yusuf realized the seriousness of the continuation of these errors and what he talked with the days of the causes of division and disagreement between the Muslim community ordered his book to put these suspicious characters marks was at the head of the book Nasr bin Asim and Yehi bin Muammar
The research entitled: (The Constructive Mutation of installation Systems in the Artworks of the artist Ali Al-Najar) has dealt with the concept of Mutation and its systematizations in installation in the artworks of (Ali Al-Najjar).
The research has four chapters: The first Chapter deals with the methodological framework represented by the basic problem of the research, that is concerned with the constructive mutation of installation systems.
The research aims at finding out the constructive mutation of installation systems in the artwork of ( Ali al-Najar). The research is limited by analyzing visual samples of (Ali Al-Najjar) artworks betwen (1967-1991)
The second chapter deals with the theoretical framework, it has five s
Autorías: Ismael Saleem Abed, Imad Kadhim Khlaif, Salah Mahmood Salman. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 5, 2022. Artículo de Revista en Dialnet.