The aim of this work is to determine the uranium concentration in soil samples
taken from the north, south, east, west and center of the city of Baghdad and
measure its impact on the rate of cell division for non-smokers peoples and living in
those areas and that between the ages 25-30 year.
The uranium concentration in the samples determined by using CR-39 track
detector . As calculated for the ten samples of each site when irradiated by thermal
neutrons from the (Am - Be) source with flux (5x 103 n S-1cm-2), the concentration
values were calculated by a comparison with standard geological samples. The
results indicate that the extent of the concentration of uranium in the soil north and
east of Baghdad was 12.9 ± 0.7 in Al- Taji north of Baghdad and 12.4 ± 0.23ppm
in the Diyala- Bridge area east of Baghdad and the results were recorded lower
concentration of uranium in the western, central and southern Baghdad, which stood
at 0.60 ± 0.21 in the Abu Ghraib area west of Baghdad, and 4.6 ± 0.7ppm in the
Bab-Al-Sharqee of central Baghdad and 0.87 ± 0.7ppm in Al-Mhmodya area south
of Baghdad . The mitotic index assay MI in the north and east of Baghdad was 2.3 ±
0.059 in the north and 2.43 ± 0.059 in eastern Baghdad, while the lowest rate in
West and Central and South compared with the threshold level of 0.6 . Which
indicates contamination north and east of Baghdad as a result of uranium wars on
Iraq passed in 2003 which negatively affects the behavior of lymphocytes and on
the rate of division.
The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreIn this paper we study and design two feed forward neural networks. The first approach uses radial basis function network and second approach uses wavelet basis function network to approximate the mapping from the input to the output space. The trained networks are then used in an conjugate gradient algorithm to estimate the output. These neural networks are then applied to solve differential equation. Results of applying these algorithms to several examples are presented
The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show MoreFinding a new source of resistance is important to reduce the use of synthetic pesticides, which can meet the global need of suppressing pollution. In this study, the resistance of eight eggplant cultivars to Aphis gossypii was evaluated. Results of the current study highlighted that the cultivar Long-Green has a very strong resistance after 14 days post infestation whereas Pearl-Round and White-Casper cultivars were susceptible. The rest of the tested cultivars (Green-oblong, Purple-panter, Paris, Ashbilia, and Barcelona) had mild resistance. Also, the study found significant differences between the infested and non-infested plants among the tested cultivars in the plant’s height, fresh-, and dry-weight. The susceptible cultivars
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MorePerennial biofuel and cover crops systems are important for enhancing soil health and can provide numerous soil, agricultural, and environmental benefits. The study objective was to investigate the effects of cover crops and biofuel crops on soil hydraulic properties relative to traditional management for claypan soils. The study site included selected management practices: cover crop (CC) and no cover crop (NC) with corn/soybean rotation, switchgrass (SW), and miscanthus (MI). The CC mixture consisted of cereal rye, hairy vetch, and Austrian winter pea. The research site was located at Bradford Research Center in Missouri, USA, and was implemented on a Mexico silt loam. Intact soil cores (76‐mm diam. by 76‐mm long) were taken from the
... Show MoreIn a world that is accelerating day after day in the context of technical globalization, this speed appeared in the issue of electronic currency trading, which is linked to banks all over the world, then the virtual bitcoin coin appeared, and its place is the Internet, and contains an encryption system that is not related to the center or the bank. This coin spread widely and was invested by major companies.
In legislative terms, this currency was not granted its right or proper organization, while jurisprudence was dealt with in a simple way, as this coin needs further studies. This research explains the challenges arising from the concept of this currency to determine the legal nature that enters under it, in addition to discus
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show More