Preferred Language
Articles
/
ijs-6211
Radiological hazard Assessment Due to Natural Occurring Radioactive Materials (NORM) in Oil and Gas Production Industry –East Baghdad Oil Field
...Show More Authors

Concentration of NORM then radiological hazard indices were investigated and assessed in different stages of oil and gas production industry that belongs to East Baghdad Oil Field. Sixteen samples of different types of materials were collected representing oil and gas production from first stage to final stage. The samples are prepared then sent to Radiation Protection Center (RPC) / Ministry of Environment for radioactivity analysis using gamma ray spectrometry system based on HPGe. The results show that max value of Ra-226 is 252.4 Bq/kg in sediment sample collected from the final stage of water treatment before it is transferred to disposal well and min value is 1.2 Bq/kg in formation water. The max. activity of Th-232 is 79.4Bq/kg also in sediment sample and the min value 2.9 Bq/Kg in crude oil in storage tank while, the max. value for K-40 is 529.6 Bq/Kg in burning stage (burn pit) and the min value is 2.8Bq/kg in Pre-treatment crude oil. The ambient exposure dose values near the sampling locations were recorded using dosimeter type GMC-300. The results are corresponding with the values of NORMs in the locations. The ambient gamma rates in the study area range between (0.04-0.22) μSv/h corresponding to (57-314 nGray/h). Most locations have values above the average worldwide value of (58 nGray/h). NORMs are caused absorbed dose in max. contribution (79%) to the total ambient gamma dose. Radium caused the max. contribution among the others. All the hazard indices indicate that most of the sampling locations have indices acceptable and with no hazard.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Partial Substitution of Ge-S-Cd Alloys on the Density of Energy States
...Show More Authors

Five samples of the ternary alloy Ge-S-Cd were created using the melting point method, and the effects of partially substituting cadmium for germanium were determined. and partial substitution of germanium by cadmium was used to study the change in electrical conductivity. Electrical experiments were performed on Ge35-xS65Cdxternary alloy with x = 0, 5, 10, 15, and 20. It was discovered that the conductivity (σdc) rises with rising temperature in all samples under experiment. This confirms that the samples have semiconductor behavior. It has been observed that there are three regions of electrical conductivity in the electrical conductivity curve at low, moderate, and high temperatures. The pr

... Show More
View Publication
Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extend Nearly Pseudo Quasi-2-Absorbing Submodules (II)
...Show More Authors

The concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules was recently introduced by Omar A. Abdullah and Haibat K. Mohammadali in 2022, where he studies this concept and it is relationship to previous generalizationsm especially  2-Absorbing submodule and Quasi-2-Absorbing submodule, in addition to studying the most important Propositions, charactarizations and Examples. Now in this research, which is considered a continuation of the definition that was presented earlier, which is the Extend Nearly Pseudo Quasi-2-Absorbing submodules, we have completed the study of this concept in multiplication modules. And the relationship between the Extend Nearly Pseudo Quasi-2-Absorbing submodule and Extend Nearly Pseudo Quasi-2-Abs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Benchmarking Framework for COVID-19 Classification Machine Learning Method Based on Fuzzy Decision by Opinion Score Method
...Show More Authors

     Coronavirus disease (COVID-19), which is caused by SARS-CoV-2, has been announced as a global pandemic by the World Health Organization (WHO), which results in the collapsing of the healthcare systems in several countries around the globe. Machine learning (ML) methods are one of the most utilized approaches in artificial intelligence (AI) to classify COVID-19 images. However, there are many machine-learning methods used to classify COVID-19. The question is: which machine learning method is best over multi-criteria evaluation? Therefore, this research presents benchmarking of COVID-19 machine learning methods, which is recognized as a multi-criteria decision-making (MCDM) problem. In the recent century, the trend of developing

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
S-maximal Submodules
...Show More Authors

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ⊊ W ⊆ M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator
...Show More Authors

The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
Estructura y el análisis de los personajes en la novela“ Sotileza ” de José María de Pereda
...Show More Authors

Resumen

    Sotileza , localismo santandrino de sutileza , es la parte más fina del aparejo de pescar donde va el anzuelo. Es la obra maestro de José María de Pereda.Su ambiente , el Santander viejo, anterior al año 50,evocado emocionadamente - emociόn romántica contenida en los trazos sobrios y firmes de un naturalism psicolόgico y paisajista,el Santander que el autor confiesa poseer en el fondo de su corazόn,«y tenerlo esculpido en la memoria de tal suerte que ,a ojos cerrados,me atrevería a trazarle con todo su perímetro y sus calles, y el color de sus piedras, y el número, y los nombres, y hasta las caras de sus habitantes».Dentro de la grandeza primaria de las criaturas de Pere

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
Some types of fibrewise fuzzy topological spaces
...Show More Authors

The aim of this paper is to introduce and study the notion type of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where j = {δ, θ, α, p, s, b, β}.

Scopus (1)
Scopus Clarivate
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
An algorithm for binary codebook design based on the average bitmap replacement error (ABPRE)
...Show More Authors

In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates

... Show More
View Publication Preview PDF
Crossref