Preferred Language
Articles
/
bsj-7544
Heat Production Rate and Radiation Hazard Indices from Radioactive Elements in Different Types of Natural Water in Nineveh Governorate, Iraq.
...Show More Authors

The current study sheds light on the measurement and estimation of the radioactivity of radionuclides (238U, 226Ra, 232Th, and 40k) in natural waters of different regions of Nineveh Governorate in Iraq.15 samples were collected from different sources of natural waters, where gamma-ray spectroscopy was used using NaI)TI) sodium iodide detector to determine the concentration of radioactivity in the samples. According to the results, the radioactivity concentration in the tested water sample were ​​ranged from 0.36 ± 0.04-1.57 ± 0.09with an average value of 0.69 ± 0.06 Bq/l for 238U, and 2.9 ± 0.02-0.88 ± 0.03 with an average value of 0.65 ± 0.03 Bq/l for 226Ra Bq/l, and 0.48 ± 0.04-1.36 ± 0.06 with an average value of 0.88 ± 0.05 Bq/l for 232Th, while for 40K 13.00 ± 0.69-36.89 ± 1.12 with an average value of 25.1 ± 0.95 Bq/l, respectively. The results obtained from the water samples are below the safe and standard limits established by UNSCEAR. In addition to calculating the radiological hazard indicators that included Radium equivalent (Raeq), air absorbed dose rate (Dγ), effective annual equivalent dose rate (AEDE), indoor and outdoor radiation hazard (H) indices, lifetime cancer risk (ELCR), gonadotropin equivalent dose (AGDE), and ideal level index of gamma rays (Iγ) has been calculated. To verify its deleterious character. On the other hand, the results showed that the rate of heat production values ranged between 0.006-0.0015 µW/m3, which indicates a low rate of heat production and does not affect the temperature of the Earth's crust. Finally, In addition to physicochemical parameters such as PH, dissolved solids TDS, and electrical conductivity Ec. All tested data are within the permissible limit of WHO standards. The results of the current study can be used to provide essential baseline data for future epidemiological investigations and surveillance programs in the areas under study.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Thu Feb 02 2023
Journal Name
Journal Of The College Of Basic Education
Context and conveying meaning in the Iraqi theatrical show
...Show More Authors

يشكل السياق جانبا مهماً في فهم الخطاب والمقصود هنا العرض المسرحي، من خلال ما يمده السياق للمتلقي من مؤشرات، يتم الاعتماد عليها في استكمال المعنى الظاهر بالمعنى المستتر، فالسياق يعتمد في الاصل على المحيط المادي الاجتماعي الذي يتم فيه التواصل وفيه يتعرف المرسل والمتلقي أحدهما على الآخر وتتبلور الصورة التي يحملها الطرفان أحدهما عن الآخر، الى جانب كونه يمثل الاحداث التي سبق لهما أن عاشاها والتبادل القولي

... Show More
View Publication
Publication Date
Mon Jun 03 2024
Journal Name
International Journal Of Social Trends
Digital Literacy and Its Importance in the Modern Workforce
...Show More Authors

Digital literacy is crucial in the modern workforce, where technology plays an integral role in daily operations. This abstract explores the significance of digital literacy in enhancing productivity, efficiency, and competitiveness in the workplace. Digital literacy encompasses the ability to use and navigate digital tools and platforms effectively, including software, applications, and online communication tools. In today's digital age, employers increasingly value candidates with strong digital skills, as they are better equipped to adapt to rapidly evolving technologies. This abstract highlights the importance of digital literacy in empowering employees to perform tasks more efficiently, collaborate seamlessly, and innovate effecti

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 05 2024
Journal Name
The Journal Of Obstetrics And Gynecology Of India
Obstetric and Neonatal Outcomes in Overweight Adolescent Pregnant Mothers
...Show More Authors

Background The escalating global concern over increased body weight in adolescents, coupled with the rising rates of adolescent pregnancy worldwide, presents a significant challenge to healthcare systems. We plan to identify the maternal and neonatal consequences associated with pre-pregnancy overweight in adolescent women. Methods Throughout five years, all singleton adolescent pregnant women with pre-pregnancy self-reported body mass index (BMI) of 18.5– ≤ 29.9 were involved during the first-trimester visit. Two groups were generated: overweight and appropriate-weight (BMI 25–29.9 and 18.5–24.9, respectively). Obstetric and neonatal outcomes were observed prospectively and statistically adjusted for the confounding factors.

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Pyogenic Discitis in Female after Delivery and Pelvic Surgery
...Show More Authors

Background: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 23 2020
Journal Name
Medico-legal Update
Pro- and anti-inflammatory Cytokines in Coronavirus Disease 2019
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Pilot Based Channel Estimation and Synchronization in OFDM System
...Show More Authors

Channel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
CD34 and Wnt3 expression in potentially malignant oral disorders
...Show More Authors

Background: Potentially malignant oral disorders (PMODs) are common precursors of oral squamous cell carcinoma (OSCC). Neoangiogenesis and signalling are important intermediate biomarkers that may govern the progression of dysplastic mucosa into carcinoma. Aims: Evaluate the importance of CD34 and Wnt3 expression in PMODs and OSCCs in relation to their clinicopathological parameters. Settings and Design: Prospective cross-sectional study. Materials and Methods: Immunohistochemical staining for CD34 and Wnt3 was performed for 41 samples. These included 27 PMODs, six OSCCs and eight normal gingival and alveolar mucosa. Analysis of variance (ANOVA) and post-hoc tests were applied. P<0.05 was considered statistically significant. Results: CD34

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Suggestibility in Kindergarteners and its relation to some variables
...Show More Authors

The childhood of the most important stages throughout the human and which have been more vulnerable to various factors surrounding it and with the scientific and cognitive development in all fields surfaced many psychological phenomena that play a large role in influencing children and their behavior trends is the susceptibility of the lure of psychological phenomena which plays a major role in the social attitudes of individuals it may not be predictable so that individuals vary in between them in terms of vulnerability Balasthoa You do this only _bl that the same individual at different influenced Balasthoa different depending on the positions and this was research to achieve its objectives and that are known:
_ alasthoa The childre

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More