In this study the Entrance Surface Dose (ESD) received by pediatrics patients undergoing chest, abdomen and skull X-ray examinations was estimated. The study was conducted in two hospitals in Najaf city where three radiographic systems were considered. The study participants were classified into four age groups 0-1 , 1-5 , 5-10 and 10-15 years. Calculations were performed using exposure factors, kVp, mAs and focal-skin distance, together with patient data age. The ESD was calculated for the involved patients who underwent an Antero-posterior (AP) chest, abdomen and skull X-ray examination. The resulted data were analyzed and compared with international dose references. For all studied radiographic examinations and all X-ray machines, the ESD increases with age. The lowest recorded radiation dose was from hospital 1 machine 2. In this facility ESD ranged from 19.93 µGy to 67.66 µGy for chest X-ray, from 39.03 µGy to 82.63 µGy for abdomen (AP), and from 35.47 µGy to 94.27 µGy for skull (AP). In contrast the highest dose levels are recorded from hospital 2 machine 1; the minimum ESD for chest X-ray is 247.51 µGy and the maximum is 2393.12 µGy; for abdomen X-ray the lowest ESD is 269.05 µGy and the highest value is 5106.15 µGy; and for skull X-ray minimum values is 430.96 µGy and the maximum value is 3072.77 µGy. In conclusion, for the considered pediatrics examinations, most of ESD values are within the international acceptable level and some are higher >100% .
Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreThe advancement of digital technology has increased the deployment of wireless sensor networks (WSNs) in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, especially in critical applications. The pioneering technique in range-free localization schemes is a sequential Monte Carlo (SMC) method, which utilizes network connectivity to estimate sensor location without additional hardware. This study presents a comprehensive survey of state-of-the-art SMC localization schemes. We present the schemes as a thematic taxonomy of localization operation in SMC. Moreover, the critical characteristics of each existing scheme are analyzed to identify its advantages
... Show More The current paper studied the concept of right n-derivation satisfying certified conditions on semigroup ideals of near-rings and some related properties. Interesting results have been reached, the most prominent of which are the following: Let M be a 3-prime left near-ring and A_1,A_2,…,A_n are nonzero semigroup ideals of M, if d is a right n-derivation of M satisfies on of the following conditions,
d(u_1,u_2,…,(u_j,v_j ),…,u_n )=0 ∀ 〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=0 ∀u_1,v_1 〖ϵA〗_1,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u ;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=(u_
Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain
... Show MoreFree-Space Optical (FSO) can provide high-speed communications when the effect of turbulence is not serious. However, Space-Time-Block-Code (STBC) is a good candidate to mitigate this seriousness. This paper proposes a hybrid of an Optical Code Division Multiple Access (OCDMA) and STBC in FSO communication for last mile solutions, where access to remote areas is complicated. The main weakness effecting a FSO link is the atmospheric turbulence. The feasibility of employing STBC in OCDMA is to mitigate these effects. The current work evaluates the Bit-Error-Rate (BER) performance of OCDMA operating under the scintillation effect, where this effect can be described by the gamma-gamma model. The most obvious finding to emerge from the analysis
... Show MoreThe Legend between reality and its future Treatment in threatre analytics study
The aim of study to evaluated cinnamic acid and its activity on complete blood count(RBC,WBC,HG,HCV,MCH,MCHC and Plat.)and removed the cytoxan damage which caused bone marrow failure and leukemia and other that due to linked the cytoxan in 7- nitrogen of guanine based of DNA that lead to dead cells. Two concentration from pure cinnamic acid (5.6, 2.8 mg ? mice weight) in first step to choice the perfect concentration in comparison with each negative control ,positive control of cytoxan and the comparison group represent vitamin C. The second step to understand cinnamic acid mechanism activity towards cytoxan by used pre- cytoxan and post – cytoxan in interaction with perfect concentration of cinnamic acid dose (2.8 mg ? mice we
... Show MoreIn our research, we seek to shed a light on one of the most important and sensitive issues, namely, the Sufi influence in the Iraqi novel through the lame maqam of the novelist Jumaa Al-Lami, the Sufi discourse contains many semantic paradoxes between the text's apparent pronunciation and its interpretation of the format and the context that produced these patterns, and incited them, which concludes different results from the prevailing provisions and fixed ideas from the narrative text.The Arabic and Iraqi novel in particular became inspired by the power of Sufi discourse by talking about several Sufi figures by referring to it openly, or implicitly inspired by unauthorized concealment, in employing some of the ideas, or summoning
... Show More