In this study, the activity concentrations of indoor radon, thoron
and their progeny have been measured in air for 61 different
locations of Al-Maddan city using twin cup dosimeter. Furthermore,
some useful parameters concerning the health hazards have been
estimated; working level month (WLM), annual effective dose (Eff),
and excess lung cancer per million person per year (ELC).The results
show that the values of radon gas levels in the investigated districts
varied from 56.28 to 194.43Bq/m3with an overall average value
132.96Bq/m3, while 0.313 to 1.085 for WLM with an overall average
0.740, respectively. The value of Eff and ELC have been found to
vary from 1.420 to 4.918 mSv/y with an overall average value
3.354mSv/y, and 852 to 2951 with an overall average value 2013,
respectively. For thoron gas only, the results showed that the thoron
activity concentration varied from 15.05 to 172.40 Bq/m3 with an
overall average 76.48 Bq/m3, and 0.021to 0.240for WLM with an
overall average 0.106, respectively. The values of Eff and ELC have
been found to vary from 0.256 to 2.94 mSv/y with an overall
average1.30 mSv/y and from 57 to 652 with an overall average of
298, respectively. The concentration of radon progeny varied from
59.44 to 301.39 Bq/m3 with an overall average 157.62 Bq/m3. The
results illustrated that there is a large variation in the values of the
measured concentrations. This is due to the wide variation in the
construction of the houses in Al-Madaan city. However, all
investigated locations have radon concentration below the action
level (200-300Bq/m3) that recommended byICRP. Therefore, there is
no health hazard of radon in the region of Al-Madaan city where
measurements have been performed.
Аннотация
Взгляд на пол как на комплексное социальное отношение означает,что роль женщины в истории следует рассматривать не просто как новый для исторической науки предмет исследования, а как обойденный вниманием ученых вопрос об отношениях между людьми или группами людей.
Женщина играет особую и важную роль в обществе , даже скажут ,что она половина нашего общества ,поэтому она яв
... Show MoreThis study deals with examining UCAS students’ attitudes in Gaza towards learning Arabic grammar online during the Corona pandemic. The researcher has adopted a descriptive approach and used a questionnaire as a tool for data collection. The results of the study have statistically shown significant differences at the level of "0.01" between the average scores of students in favor of the students of the humanities specializations. It has also been found that the students’ attitudes at the Department of Humanities and Media towards learning Arabic grammar online are positive. Additionally, the results revealed no statistical significant differences due to the variable of UCAS students’ scientific qualifications. The results stressed
... Show MoreLet R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .
Background: With the increasing demands for adult orthodontics, a growing need arises to bond attachments to porcelain surfaces. Optimal adhesion to porcelain surface should allow orthodontic treatment without bond failure but not jeopardize porcelain integrity after debonding.The present study was carried out to compare the shear bond strength of metal bracket bonded to porcelain surface prepared by two mechanical treatments and by using different etching systems (Hydrofluoric acid 9% and acidulated phosphate fluoride 1.23%). Materials and Methods: The samples were comprised of 60 models (28mm *15mm*28mm) of metal fused to porcelain (feldspathic porcelain). They were divided as the following: group I (control): the porcelain surface left u
... Show MoreIn this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the