The research aims to evaluate the radioactivity in elected samples of cereals and legume which are wide human consumption in Iraq using Nuclear Track Detectors (NTDs) model CN-85.
The samples were prepared scientifically according to references in this field. After 150 days of exposure, the detector were collected and chemically treated according to scientific sources (etching chemical), nuclear effects have been calculated using the optical microscope.
Radon (222Rn) concentration and uranium (238U) were calculated in unit Bq/m3 and (ppm), the results indicate that the highest concentration of radon and uranium was in yellow corn where the concentration of radon was 137.17×102 Bq/m3 and uranium concentration 2.63 (ppm). The lowest concentration of radon and uranium was in Oats, where the concentration of radon was 24.27×102 Bq/m3, and uranium concentration 0.466 (ppm), concentrations of other cereals and legumes varied between these two values. These different in radon and uranium concentrations due to different in geological nature of the different agricultural soils, and the different absorption of plant roots for certain elements present in the soil solution. These values for the concentration of radon and uranium for cereals and legumes are within the permitted globally and as issued by the International Atomic Energy Agency (IAEA).
The study area is witnessing divergence where I am North wind North East wind as we find that the north wind is getting replicated as we move from the south, The reason can be attributed to the nature of the surface of the region, with at least repeat this wind the northern region to the presence of mountain ranges, while we find that energizes the surface in the center and south helped to increase repeat this wind gusts, It also finds that the North wind East prevail in the northern region and least replicated as we move from the north to the south and to the fact that North stations are within blowing this wind sites for the circles near the display of high pressure located centers to the north-east, north and distancing itself from pa
... Show MoreThis experiment was conducted in the season 2001-2000 in station Ishaqi the company's general industrial crops to plant livestock Vigna radala deleted (Khadrawi) carried out the experiment design panels splinter and order in RCBD with three balls two factors are levels nitrogen fertilizer (120 and, 100.0 kg urea / ha)nitrogen ratio of 46%, which put in the main panels mAIN PLOT and Alkiavat three levels that were placed in secondary panels .....
Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
Porous materials play an important role in creating a sustainable environment by improving wastewater treatment's efficacy. Porous materials, including adsorbents or ion exchangers, catalysts, metal–organic frameworks, composites, carbon materials, and membranes, have widespread applications in treating wastewater and air pollution. This review examines recent developments in porous materials, focusing on their effectiveness for different wastewater pollutants. Specifically, they can treat a wide range of water contaminants, and many remove over 95% of targeted contaminants. Recent advancements include a wider range of adsorption options, heterogeneous catalysis, a new UV/H2O
This paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.
Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreIn many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show More