In this study, the fission track registration technique with the CR-39 detector are using to determination the uranium concentrations for seventeen samples of teeth distributed in four districts in Baghdad City .Five samples taken from both Al-Durra District and Al-Jadiriyia District, Four samples taken from Al-Karrda (Alaatar street) Taken four samples and three samples taken from Al-Zuafrania and by 0.5gm in weight and 1.5 mm in thickness. The uranium concentrations in teeth samples measured by using fission tracks registration in (CR-39) track detector that caused by the bombardment of (U) with thermal neutrons from (241 Am-Be) neutron source that has flux of (5 ×103 n cm-2 s-1). The concentrations values were calculated by a comparison with standard samples. The results showed that the maximum value of uranium is (0.071 ppm) equal to (0.686Bq) in Al-Zuafaraniya district and the minimum is (0.035 ppm) equal to (0.31Bq) in Al-Jadiriah district.
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreIn this research, the semiparametric Bayesian method is compared with the classical method to estimate reliability function of three systems : k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be
... Show MoreAn efficient modification and a novel technique combining the homotopy concept with Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced in this paper . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreA modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.
This paper proposes a new approach to model and analyze erect posture, based on a spherical inverted pendulum which is used to mimic the body posture. The pendulum oscillates in two directions, [Formula: see text] and [Formula: see text], from which the mathematical model was derived and two torque components in oscillation directions were introduced. They are estimated using stabilometric data acquired by a foot pressure mapping system. The model was quantitatively investigated using data from 19 participants, who were first were classified into three groups, according to the foot arch-index. Stabilometric data were then collected and fed into the model to estimate the torque’s components. The components were statistically proce
... Show MoreMeasuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.
This study is concerned with revealing the semiotics of thresholds, and its role in building textual coherence at the form and semantic level in Sunset Garden Diwan of the Saudi poet Ghazi Al-Qasaibi. This research aims to spotlight on the semiotic theme of the title threshold and its relation to other thresholds. As the death phenomenon and absence dominated the poetic achievement space through intertwined semiotic relationships that lead to each other through the parallel text semiotics.This study is based on the semiotic method which concerns with searching for the interpretive connotations and revealing the profound symbols in the threshold structure and its role in the whole formation of the Diwan. Among the most prominent conclusio
... Show MoreReceipt date:3/13/2021 accepted date:5/26/2021 Publication date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
energy is one of the strategic resources within international politics, and this is through the existing competition between the international powers on it, and the global powers have begun to rely on interest in new areas, such as import, depending on new projects an
... Show MoreHomosexuality is one of the important topics that have emerged in recent times in the Islamic and Arab world, as the topic was in the past one of the taboos and majorities and one of the topics that arouse disgust and is talked about secretly and practiced secretly as well.But today, with international and organizational support for this anomaly and its misrepresentation under the name of gender once again and gender again. It began to spread in all countries of the world, including Islamic and Arab countries, and with the presence of associations and influential people in the legislative and judicial authorities of countries that protect and defend homosexuals. Writing on this subject has become a necessity and a duty; to warn against the
... Show More