In this study the Entrance Surface Dose (ESD) received by pediatrics patients undergoing chest, abdomen and skull X-ray examinations was estimated. The study was conducted in two hospitals in Najaf city where three radiographic systems were considered. The study participants were classified into four age groups 0-1 , 1-5 , 5-10 and 10-15 years. Calculations were performed using exposure factors, kVp, mAs and focal-skin distance, together with patient data age. The ESD was calculated for the involved patients who underwent an Antero-posterior (AP) chest, abdomen and skull X-ray examination. The resulted data were analyzed and compared with international dose references. For all studied radiographic examinations and all X-ray machines, the ESD increases with age. The lowest recorded radiation dose was from hospital 1 machine 2. In this facility ESD ranged from 19.93 µGy to 67.66 µGy for chest X-ray, from 39.03 µGy to 82.63 µGy for abdomen (AP), and from 35.47 µGy to 94.27 µGy for skull (AP). In contrast the highest dose levels are recorded from hospital 2 machine 1; the minimum ESD for chest X-ray is 247.51 µGy and the maximum is 2393.12 µGy; for abdomen X-ray the lowest ESD is 269.05 µGy and the highest value is 5106.15 µGy; and for skull X-ray minimum values is 430.96 µGy and the maximum value is 3072.77 µGy. In conclusion, for the considered pediatrics examinations, most of ESD values are within the international acceptable level and some are higher >100% .
International relations scholars have increasingly debated the evolving landscape of actors that challenge the traditional state-centric world order. A key element of this transformation is the rise of sub-state actors, which engages in alternative diplomacy parallel to the state, transcending traditional state-centric frameworks. This paper explores the significant shifts in international actorness over the late 20th century, focusing on the emergence and implications of sub-state diplomacy, or "paradiplomacy." First, the study introduces sub-state actors and their role in challenging the dominant state-centric discourse. It then examines the dynamic evolution of paradiplomacy, highlighting how sub-states have expanded their global
... Show MoreBackground: 37% phosphoric acid (PA) is the traditional enamel etching technique prior to bracket adhesion, yet it has been implicated in numerous enamel injuries. The purpose of the current study was to create a calcium phosphate (CaP) etching paste in a simplified capsule formula that can underpin clinically adequate bracket bond strength without jeopardizing the integrity of enamel upon the debracketing procedure. Materials and Methods: micro-sized hydroxyapatite (HA) powder was mixed with 40% PA solution to prepare experimental acidic CaP paste. Sixty human premolars were assigned into two groups of 30 each. Enamel conditioning was accomplished using 37% PA-gel for control group and CaP paste for e
... Show MoreField experiment was conducted to test the effect of saline water 2 and7 dSm-1 potassium fertilizer rate 150,300 and 450 kg/donum on nitrogen fixation in Pisum sativum L. nodules. The experiment included anatomy study .Results water salinity ( 2,7 dSm-1) as a main plot and fertilizer rates as a sub plot. Results indicated that irrigation with saline water 7 dSm-¹ caused a significant decrease in N contents especially in the lower parts of the plants. The percentage of the N decreased in lower leaves to (0.01%) under 7dSm-¹ and 300 kg/donum fertilizer; however the percentage increased in the upper leaves to (2.80%) under with 2dSm-¹of irrigation water and 300 kg/ donum fertilizer rate. Fresh weight decreased to 6.26g under 7 dSm
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreIn recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show MoreObjective(s): To measure serum C-reactive protein (CRP) titer as a predictive diagnosis of acute hepatitis C virus (HCV)
infection.
Methodology: Two hundred and ten patients with acute HCV infection and 234 apparently healthy individuals as
control group were enrolled in this study in Baghdad medical city (Teaching Laboratories). The patents include
74(35.2%) females and 136 (64.8%) males with mean age (27±16.5) years. The control group includes 114 (48.7%)
females and 120 (51.3%) males with mean age (26±5.8) years. Blood samples were collected from out patients from
Alfadul in Baghdad city. Sera were separated and stored at 20 0
C. The diagnosis of acute HCV infection was based on
detection of HC Ag and anti- H
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More