The aim of this work is to determine the uranium concentration in soil samples
taken from the north, south, east, west and center of the city of Baghdad and
measure its impact on the rate of cell division for non-smokers peoples and living in
those areas and that between the ages 25-30 year.
The uranium concentration in the samples determined by using CR-39 track
detector . As calculated for the ten samples of each site when irradiated by thermal
neutrons from the (Am - Be) source with flux (5x 103 n S-1cm-2), the concentration
values were calculated by a comparison with standard geological samples. The
results indicate that the extent of the concentration of uranium in the soil north and
east of Baghdad was 12.9 ± 0.7 in Al- Taji north of Baghdad and 12.4 ± 0.23ppm
in the Diyala- Bridge area east of Baghdad and the results were recorded lower
concentration of uranium in the western, central and southern Baghdad, which stood
at 0.60 ± 0.21 in the Abu Ghraib area west of Baghdad, and 4.6 ± 0.7ppm in the
Bab-Al-Sharqee of central Baghdad and 0.87 ± 0.7ppm in Al-Mhmodya area south
of Baghdad . The mitotic index assay MI in the north and east of Baghdad was 2.3 ±
0.059 in the north and 2.43 ± 0.059 in eastern Baghdad, while the lowest rate in
West and Central and South compared with the threshold level of 0.6 . Which
indicates contamination north and east of Baghdad as a result of uranium wars on
Iraq passed in 2003 which negatively affects the behavior of lymphocytes and on
the rate of division.
The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreText categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accu
... Show MoreThe aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
In this paper a method to determine whether an image is forged (spliced) or not is presented. The proposed method is based on a classification model to determine the authenticity of a tested image. Image splicing causes many sharp edges (high frequencies) and discontinuities to appear in the spliced image. Capturing these high frequencies in the wavelet domain rather than in the spatial domain is investigated in this paper. Correlation between high-frequency sub-bands coefficients of Discrete Wavelet Transform (DWT) is also described using co-occurrence matrix. This matrix was an input feature vector to a classifier. The best accuracy of 92.79% and 94.56% on Casia v1.0 and Casia v2.0 datasets respectively was achieved. This pe
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreThe current research seeks to identify the most important humanitarian issues of a sacred and very important group in all the heavenly religions and human societies, namely the elderly, to identify their significant problems and health problems, and What are the effects of these problems on their mental health and which is the ultimate goal of human resources in All parts of the world? The study relied on what is available from the sources in the literature starting from the messages of heaven and the Islamic religion followed with humanitarian, social, legal and psychological postulates. The research included four systematic chapters included the definition research and identification of the problem, importance, objectives and terminolo
... Show MoreThis work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m
... Show MoreRecent population studies have shown that placenta accreta spectrum (PAS) disorders remain undiagnosed before delivery in half to two-thirds of cases. In a series from specialist diagnostic units in the USA, around one-third of cases of PAS disorders were not diagnosed during pregnancy. Maternal