The research aims to evaluate the radioactivity in elected samples of cereals and legume which are wide human consumption in Iraq using Nuclear Track Detectors (NTDs) model CN-85.
The samples were prepared scientifically according to references in this field. After 150 days of exposure, the detector were collected and chemically treated according to scientific sources (etching chemical), nuclear effects have been calculated using the optical microscope.
Radon (222Rn) concentration and uranium (238U) were calculated in unit Bq/m3 and (ppm), the results indicate that the highest concentration of radon and uranium was in yellow corn where the concentration of radon was 137.17×102 Bq/m3 and uranium concentration 2.63 (ppm). The lowest concentration of radon and uranium was in Oats, where the concentration of radon was 24.27×102 Bq/m3, and uranium concentration 0.466 (ppm), concentrations of other cereals and legumes varied between these two values. These different in radon and uranium concentrations due to different in geological nature of the different agricultural soils, and the different absorption of plant roots for certain elements present in the soil solution. These values for the concentration of radon and uranium for cereals and legumes are within the permitted globally and as issued by the International Atomic Energy Agency (IAEA).
Transit agencies constantly need information about system operations and passengers to support their regular scheduling and operation planning processes. The lack of these processes and cultural motivations to use public transportations contributes enormously to the reliance on the private cars rather than public transportation, resulting in traffic congestions. The traffic congestions occur mainly during peak hours and the accidents happening as a result of road accidents and construction works. This study investigates the effects of weekday and weekend travel variability on peak hours of the passenger flow distribution on bus lines, which can effectively reflect the degree of traffic congestion. A study of passen
... Show MoreStealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the
... Show MoreAbstract
This research attempt to explain the essential aspects of one important model in management of Bank risks , that is (stress testing) , which increase the concentrate on it resulting the negative affects of Global financial crisis that it accuar in 2008 to study the application possibilities in iraqian banks to enhancing the safety and financial soundness Becuase the classical tools in Risk management don’t give clear image on Banks ability in facing risks, hence the Basel committee on Banking supervision focusing in agreement of Basel 2,3 on stress testing when it doing the internal capital adequacy assessment process (ICAAP) .
To achieving the reseach obje
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
A LiF (TLD-700) PTFED disc has adiameter of (13mm) and thickness of (0.4mm) for study the response and sensetivity of this material for gamma and beta rays by using (TOLEDO) system from pitman company. In order to calibrate the system and studying the calibration factor. Discs were irradiated for Gamma and Beta rays and comparing with the theoretical doses. The exposure range is between 15×10-2 mGy to 1000×10-2 mGy. These doses are within the range of normal radiation field for workers.