CR-39 is a solid state nuclear track detector (SSNTD) that has been used in many research areas. In spite of the assumption that the CR-39 detectors are insensitive to beta and gamma rays, irradiation with these rays can have significant effects on the detector properties. In this study, beta and gamma rays mass attenuation coefficients μ/ρ (cm2 g-1) for the CR-39 detector have been measured using NaI(Tl) scintillation spectrometer along with a standard geometrical arrangement in the energy region of (0.546-2.274) MeV beta rays and standard gamma sources having energy 0.356, 0.5697, 0.6617 and 1.063 MeV. The total atomic cross-section (σtot), total electronic cross-section (σT E) and the effective atomic number (Zeff) of gamma rays at energy of 1keV- 105 MeV have been also calculated using the Winxcom and MathCAD programs. The data base and the calculated results were compared with the measured experimental values. It has been found that the mass attenuation coefficients vary with the type of interaction of radiation, photoelectric interaction gives dominant contribution to the total mass attenuation coefficients for CR-39 detectors. Further, the Zeff changes with change of energy.
Beta-lactamase was purified from local isolate Klebsiella pneumonia by several steps included precipitation with ammonium sulphate at 20-40% saturation, DEAE- ion exchange chromatography and gel filtration on Sephacryl S-200 column. The obtained purification fold and recovery were 32.66; 47.04% respectively. The characterization of the purified beta-lactamase showed that the molecular weight was about 4000 daltons as determined by gel filtration.Purified enzyme had an optimal pH of 7 for activity and an optimal stability between pH 6.5-7.5, results shows that the optimal temperature appear to be 35 ? C .During storage the enzyme retained 72% at -20 ? C and retained 25% of the activity at the same period at 4 ? C.
Joining tissue is a growing problem in surgery with the advancement of the technology and more precise and difficult surgeries are done. Tissue welding using laser is a promising technique that might help in more advancement of the surgical practice. Objectives: To study the ability of laser in joining tissues and the optimum parameters for yielding good welding of tissues. Methods: An in-vitro study, done at the Institute of Laser, Baghdad University during the period from October 2008 to February 2009. Diode and Nd-YAG lasers were applied, using different sessions, on sheep small intestine with or without solder to obtain welding of a 2-mm length full thickness incision. Different powers and energies were used to get maximum effect. Re
... Show MoreHysterectomy is one of the most common gynecological operations done worldwide. Early diagnosis of the psychosexual effects of a hysterectomy and the fast application of appropriate treatment can prevent further worsening and persistence of symptoms, especially with respect to higher levels of anxiety, depression, lower self-esteem, and sexual impact after a hysterectomy. The aim of this study was to assess the psychological and sexual problems of women with hysterectomy. A descriptive study was carried out from March 1, 2023 to May 25, 2023 to determine the level of psychosexual problems experienced by women after hysterectomy. A purposive (non-probability) sample of 120 women who visited the outpatient clinic at Baghdad Teaching H
... Show MoreIn recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p
... Show MoreIn his opus, Ted Hughes has annexed new and fresh territories of signification to the very notion of the literary animal. Building on the earlier modernist example of the Lawrencian legacy that dwells upon the question of animalism, Hughes seems to have stepped further into the terrain of the sheer struggle when, in his hands, the grotesquerie of survival and violence energizes the topos of the literary animal in his postmodern bestiary. In Hughes’s elemental poetic process this grotesquerie and violence stages the literary animal as a vital poetic device or motif that is finally restored to the primitive power of poetry. In his “Thrushes”, he thus defamiliarizes these tiny creatures’ acts of being to bring upfront into focus thi
... Show MoreAbstract
The research aims to measure family negligence and its relationship with internet addiction among university students. The researcher has developed a scale of (20) items to measure the negligence of family, which was applied to (308) male and female university students in the first and fourth stages. The research concluded that University students suffer from family negligence. The research sample has an addiction to the Internet. There is a relationship between family neglect and addiction to the Internet among university students. The researcher came out with a number of suggestions and recommendations.
Background: Most primary hypothyroidism patients also experience inefficiency and irregularity. It is possible to understand the significance of myo-inositol in treating the thyroid gland by relating it to the synthesis of thyroid hormones. Study aimed to estimate serum of inositol 1,4,5-triphosphate (IP3) in primary hypothyroidism disorder and through that level it can shed light on whether it is accused of inactivity of the thyroid gland and at the same time open the doors for the use as a treatment.
Subject and Methods: The study was taken from the analytical cross-sectional design.120 subjects were divided into three groups, the first group included 40 healthy subjects, the s
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show More