Preferred Language
Articles
/
ijs-10668
Determination of Uranium Concentration in Soil of Baghdad Governorate and its Effect on Mitotic Index Assay
...Show More Authors

The aim of this work is to determine the uranium concentration in soil samples
taken from the north, south, east, west and center of the city of Baghdad and
measure its impact on the rate of cell division for non-smokers peoples and living in
those areas and that between the ages 25-30 year.
The uranium concentration in the samples determined by using CR-39 track
detector . As calculated for the ten samples of each site when irradiated by thermal
neutrons from the (Am - Be) source with flux (5x 103 n S-1cm-2), the concentration
values were calculated by a comparison with standard geological samples. The
results indicate that the extent of the concentration of uranium in the soil north and
east of Baghdad was 12.9 ± 0.7 in Al- Taji north of Baghdad and 12.4 ± 0.23ppm
in the Diyala- Bridge area east of Baghdad and the results were recorded lower
concentration of uranium in the western, central and southern Baghdad, which stood
at 0.60 ± 0.21 in the Abu Ghraib area west of Baghdad, and 4.6 ± 0.7ppm in the
Bab-Al-Sharqee of central Baghdad and 0.87 ± 0.7ppm in Al-Mhmodya area south
of Baghdad . The mitotic index assay MI in the north and east of Baghdad was 2.3 ±
0.059 in the north and 2.43 ± 0.059 in eastern Baghdad, while the lowest rate in
West and Central and South compared with the threshold level of 0.6 . Which
indicates contamination north and east of Baghdad as a result of uranium wars on
Iraq passed in 2003 which negatively affects the behavior of lymphocytes and on
the rate of division.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Fingerprints Identification and Verification Based on Local Density Distribution with Rotation Compensation
...Show More Authors

The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Int. J. Advance Soft Compu. Appl,
Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System
...Show More Authors

Preview PDF
Publication Date
Wed May 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Comparison between Radial Basis Function and Wavelet Basis Functions Neural Networks
...Show More Authors

      In this paper we study and design two feed forward neural networks. The first approach uses radial basis function network and second approach uses wavelet basis function network to approximate the mapping from the input to the output space. The trained networks are then used in an conjugate gradient algorithm to estimate the output. These neural networks are then applied to solve differential equation. Results of applying these algorithms to several examples are presented

View Publication Preview PDF
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Secure Big Data Transmission based on Modified Reverse Encryption and Genetic Algorithm
...Show More Authors

      The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jul 15 2023
Journal Name
Journal Of Aridland Agriculture
Estimating the infection severity and infection percentage by aphids on eggplant varieties
...Show More Authors

Finding a new source of resistance is important to reduce the use of synthetic pesticides, which can meet the global need of suppressing pollution. In this study, the resistance of eight eggplant cultivars to Aphis gossypii was evaluated. Results of the current study highlighted that the cultivar Long-Green has a very strong resistance after 14 days post infestation whereas Pearl-Round and White-Casper cultivars were susceptible. The rest of the tested cultivars (Green-oblong, Purple-panter, Paris, Ashbilia, and Barcelona) had mild resistance. Also, the study found significant differences between the infested and non-infested plants among the tested cultivars in the plant’s height, fresh-, and dry-weight. The susceptible cultivars

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Sun May 14 2023
Journal Name
Agrosystems, Geosciences & Environment
Cover crop and biofuel crop effects on hydraulic properties for claypan soils
...Show More Authors

Perennial biofuel and cover crops systems are important for enhancing soil health and can provide numerous soil, agricultural, and environmental benefits. The study objective was to investigate the effects of cover crops and biofuel crops on soil hydraulic properties relative to traditional management for claypan soils. The study site included selected management practices: cover crop (CC) and no cover crop (NC) with corn/soybean rotation, switchgrass (SW), and miscanthus (MI). The CC mixture consisted of cereal rye, hairy vetch, and Austrian winter pea. The research site was located at Bradford Research Center in Missouri, USA, and was implemented on a Mexico silt loam. Intact soil cores (76‐mm diam. by 76‐mm long) were taken from the

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Content Based Image Retrieval Based on Feature Fusion and Support Vector Machine
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Feb 10 2021
Journal Name
Journal Of Legal Sciences
Virtual currency (Bitcoin), legal adaptation and the ruling on dealing with it
...Show More Authors

In a world that is accelerating day after day in the context of technical globalization, this speed appeared in the issue of electronic currency trading, which is linked to banks all over the world, then the virtual bitcoin coin appeared, and its place is the Internet, and contains an encryption system that is not related to the center or the bank. This coin spread widely and was invested by major companies.

In legislative terms, this currency was not granted its right or proper organization, while jurisprudence was dealt with in a simple way, as this coin needs further studies. This research explains the challenges arising from the concept of this currency to determine the legal nature that enters under it, in addition to discus

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Human Face Recognition Based on Local Ternary Pattern and Singular Value Decomposition
...Show More Authors

There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref