In the present work, radon gas concentrations in different surface soil samples in Baghdad governorate were measured using RAD-7 detector. The results have been shown that, the Radon gas concentrations ranged between (41.67±1.78Bq/m3), to (185.67±4.22Bq/m3), a map showing the distribution of the concentration of radon in selected areas was defined to identify areas with high pollution level. The reason for the high concentration of radon is that these surface soil samples are taken from agricultural areas. It is also known that fertilizers contain uranium levels as well as areas bombed in wars in the country. It is worth noting that all radon concentrations in Baghdad governorate are below the recommended minimum of 200-300Bq/m3) (International Commission on Radiation Protection, ICRP, 2009).
The body concept in the human sciences received significant attention through study and investigation, and has been dealt with by many studies, yet this research is an attempt to reveal the body transformations and its concept in the visualized picture (drawing field) in general and in the drawings of the artist Muhammed Mehraddin in specific. Therefore, the approach of the body, philosophically and technically, in this field has its nature and specificity in revealing the structures and relations in employing the body as a visual, spatially and temporally indicator through the drawing fields of the artist Muhammed Mehraddin, assuming that the body, for the artist's works, constitutes a cultural, artistic performance focus in his a
... Show MoreUsing the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha
... Show MoreThis research aims to evaluate the teaching methods used by intermediate Arabic language teachers. To achieve the goal, the researcher followed the descriptive-analytical approach. The research sample was limited to Arabic language teachers at intermediate school for the academic year (2017-2018) the researcher chose a random sample included (155) teachers which form a (40%) Of the original community at Baghdad/ Rusafa1th. The researcher has developed standards of teaching methods which are (7) standards with (39) paragraphs included three alternatives. The results showed the need to pay attention to the use of various modern teaching methods. Moreover, the researcher suggested making an evaluation of the teaching methods used by Arabic
... Show MoreFever is a common illness in the pediatric age group ,the causes could be viral ,bacterial and fungal , this study was focused on bacterial pathogens as gram positive like Staphylococci, coagulase positive or negative ,Streptococci and gram negative like E-coli , Klebsialla ,Proteus, Pseudomonas, Burkhoderia , Acinetobacter and others like Pusturella ,E-alkalescendiaper, Haemophillus influenza and yeast like candida . Four thousand and seventy eight blood samples (4078)were collected in a period between January 2011 and the end of May 2012 at the child welfare hospital ,all the samples were cultured on suitable culture media and then biochemical tests were done using API-E 20 and sugar fermentation tests ,sensitivity
... Show MoreThis article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the a
... Show Moreis divided into two chapter:Chapter one to ensure asyslematic framework for research amd included aresearch problem and also inchuded on the importance of research and the need for him as well as to clarify. The second chapter inchuded a theoretical framework: theoretical framework has been divided into two section. The first topic: poetics transformations The second topic: poetics and scale of rheloric in the film After the comp of the theoretical framework; so the researcher analyzed the film (Antichrist) has arrived ataset of resuits was including
This investigation was undertaken to evaluate the effectiveness of using Hydrated lime as a (partial substitute) by weight of filler (lime stone powder) with five consecutive percentage namely (1.0, 1.5, 2.0, 2.5, 3.0) % by means of aggregate treatment, by introducing dry lime on dry and 2–3% Saturated surface aggregate on both wearing and binder coarse. Marshall design method, indirect tensile test and permanent deformation under repeated loading of Pneumatic repeated load system at full range of temperature (20, 40, 60) C0 were examined The study revealed that the use of 2.0% and 1.5 % of dry and wet replacement extend the pavement characteristics by improving the Marshall properties and increasing the TSR%. Finally, increase permanent
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show More