In the current work various types of epoxy composites were added to concrete to enhance its effectiveness as a gamma- ray shield. Four epoxy samples of (E/clay/B4C) S1, (E/Mag/B4C) S2, (EPIL) S3 and (Ep) S4 were used in a comparative study of gamma radiation attenuation properties of these shields that calculating using Mont Carlo code (MCNP-5). Adopting Win X-com software and Artificial Neural Network (ANN), µ/ρ revealed great compliance with MCNP-5. By applying (µ/ρ) output for gamma at different energies, HVL, TVL and MFP have been also estimated. ANN technique was simulated to estimate (µ/ρ) and dose rates. According to the results, µ/ρ of all epoxy samples scored higher than standard concrete. Both S2 and S3 samples having higher values of µ/ρ, show minimum dose rate values. (µ/ρ) and RPE% values were enhanced, the concrete containing E/Mag/B4C (S2) had the best results, while the concrete containing Ep (S4) provide the worst results. The ANN prediction results take 15 sec for estimating gamma doses corresponding to seventeen shield thicknesses, while the theoretical MCNP-5 results took approximately between 7 to 10 hours for five gamma doses. ANN provides excellent predictions with a high degree of correlation depending on increasing the number of attenuation parameters used in the training process. Also, it predicts gamma dose rates for a large number of shield thicknesses that cannot be calculated theoretically in a very short time. This supports, the created epoxy composite offers good attenuation properties for many shielding applications and could be proposed as an injecting mortar for cracks in biological shields and the walls of diagnostic and radiotherapy rooms. However, further investigations are planned for different filler ratios, for comparison purposes, in order to reach optimal shielding properties
With the twenty - First century, It becomes clear to us that for 110 years the Japanese - Chinese relations have been witnessing big radical events and developments. ( we take the year of 1949 as the starting date for this relations). In order to prove hypothesis the study divided in to four chapters. - The first chapter deals with explaining the factors of the subject of the Japanese - Chinese relations which described as Indirect threat and aggressive relations from Japan to China after the Second World War by Japanese entering in the American world strategy, in order to destroy the communist china's system which decleard in 1949, because the united states understood that the new system in Beijing could threat American's Interest
... Show MoreBackground: Many types of instruments and techniques are used in the instrumentation of the root canal system. These instruments and techniques may extrude debris beyond the apical foramen and may cause post-instrumentation complications. The aim of this study was to evaluate the amount of apically extruded debris resulted by using 4 types of nickel-titanium instruments (WaveOne, TRUShape 3D conforming files, Hyflex CM, and One Shape files) during endodontic instrumentation. Materials and methods: Forty freshly extracted human mandibular second premolar with straight canals and a single apex were collected for this study. All teeth were cut to similar lengths. Pre-weighted glass vials were used as collecting containers. Samples were randoml
... Show MoreThis research is a critical methodological study deals with some Quranic verses abrogative,abrogated.
by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the in the holy Quraan.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThe research aims to identify the most important variables affecting shooting from jumping high and compare them for the two foot the weak and strong, where the researchers adopted the descriptive method, and the sample was chosen by the intentional method, which consists of (4) players from the Iraqi Sports Army Club, where these variables were studied and their impact on The accuracy of aiming at the two men, and the researchers concluded that most of the players have more accuracy in aiming at the strong leg than at the weak leg, which leads to the loss of many real opportunities during the match because of the players changing the situation or wasting the available opportunity when the position of correction is an opportunity for the w
... Show MoreIn this work, a comparative analysis for the behavior and pattern of the variations of the IF2 and T Ionospheric indices was conducted for the minimum and maximum years of solar cycles 23 and 24. Also, the correlative relationship between the two ionospheric indices was examined for the seasonal periods spanning from August 1996 to November 2008 for solar cycle 23 and from December 2008 to November 2019 for solar cycle 24. Statistical calculations were performed to compare predicted values with observed values for the selected indices during the tested timeframes. The study's findings revealed that the behavior of the examined indices exhibited almost similar variations throughout the studied timeframe. The seasonal variations were
... Show MoreIs to obtain competitive advantage legitimate objective pursued by all organizations to achieve, because they live today in environments of rapid change and dynamic in order to meet the demands of the customer changing as well as intense competition between the organizations, which requires them to get the location of competitive markets in order to do this will remain to do the building and strengthening competitive advantage to be able to achieve, but that this feature is not easy and is not only through the identification and use of a successful strategy for a competitive standard and then manage it successfully. Hence the research problem of determining the sources of differentiation strategy and its impact on the dimensions of compe
... Show MoreAbstract:
It is essential to provide health care directly or indirectly based on laboratory tests in order of diagnosing diseases. There is an urgent need for the results of such tests to be accurate and reliable. Therefore, the International Organization for Standardization has prepared special standards for medical laboratories to prove their efficiency, presented in standards 15189: 2012. The aim of the research is to determine the possibility of the Al-alwiya Women's Hospital in meeting the requirements of the standards 15189: 2012, which includes administrative requirements consisting of fifteen items and technical requirements consisting of ten items. The research is important because laboratories shou
... Show MoreAn experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative , flowery growth , yield and its components in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1= cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses)
... Show MoreThe question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.
In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes
... Show More