Preferred Language
Articles
/
2Rd1VI8BVTCNdQwCwmxn
Evaluation the Safety and Security Procedures used In X-ray Clinics in Al-Harthiya-Baghdad
...Show More Authors
Abstract<p>Radiation is a form of energy, its emitted either in the form of particles such as α-particles and β-particles (beta particles including the electron and the positron) or waves such as sunlight, X-rays and γ-rays. Radiation found everywhere around us and it comes from many different sources naturally or man-made sources. In this study a questionnaire was distributed to people working in the field of X-rays that used for a medical imaging (X-ray and CT-scan) to evaluate the extent of awareness and knowledge in estimate the damage of ionizing radiation as a result of wrong use. The questionnaire was distributed to medical clinics in Al-Harithiya in Baghdad, which it’s considered as one of the important areas in Iraq to attract and treat patients. It’s found that most of the commitment of radiography clinics by safety and security procedures. Most of the radiology clinics abide by most of the Iraqi Ministry of Health laws. However, some clinics did not implement some of the security and safety conditions</p>
Scopus Crossref
View Publication
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Proposal framework to activate the international accounting procedures for disasters and wars effects in the local environment
...Show More Authors

natural and non-natural disasters, is an environmental challenges the society and the economy as well as a direct and indirect economic affect, and the units are part of the system overlapping among themselves and thus affected by external indicators, directly or indirectly, these direct effects appear in the destruction or damage inflicted by disasters in property , infrastructure , superstructure , accounting information systems and indirectly in the outcome of future business, comes research problem through access to accounting treatments issued by the Federal Office of financial supervision to address the damage caused by the disasters and prepare the missing financial accounts it turns out us that there is negligence of a nu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Practice Periodical On Structural Design And Construction
Hazards and Risk in Construction and the Impact of Incentives and Rewards on Safety Outcomes
...Show More Authors

View Publication
Scopus (29)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Modeling the Contamination of Soil Adjacent to Mohammed AL-Qassim Highway in Baghdad
...Show More Authors

The aim of this paper is to estimate the concentrations of some heavy metals in Mohammed AL-Qassim Highway in Baghdad city for different distances by using the polynomial interpolation method for functions passing from the data, which is proposed by using the MATLAB software. The sample soil in this paper was taken from the surface layer (0-25 cm depth) at the two sides of the road with four distances (1.5, 10, 25 and 60 m) in each  side of the road. Using this method, we can find the concentrations of heavy metals in the soil at any depth and time without using the laboratory, so this method reduces the time, effort and costs of conducting laboratory analyzes.

Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Effectiveness and safety of non-fixation method in cochlear implantation
...Show More Authors

ABSTRACTBackground: cochlear implants are electronic devices that convert sound energy into electrical signals to stimulate ganglion cells and cochlear nerve fibers. These devices are indicated for patients with severe to profound sensorineural hearing losses who receive little or no benefit from hearing aids. The implant basically takes over the function of the cochlear hair cells. The implant consists of external components (microphone, speech processor and transmitting coil) and internal components (receiver stimulator and electrode array). The implant is inserted via a trans mastoid facial recess approach to the round window and scala tympani.Objectives: to determine the effectiveness and safety of non fixation method in cochlear imp

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Sep 19 2019
Journal Name
Engineering, Construction And Architectural Management
Influential safety technology adoption predictors in construction
...Show More Authors
Purpose

Existing literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.

Design/methodology/approach

In total, 26 key technology adoption predictors

... Show More
View Publication
Scopus (56)
Crossref (56)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
What are the unique words used in the Holy Qur’an
...Show More Authors


Summary:
We are aware that we cannot reach a correct level of understanding of the Arabic language without using the Quran as our main source in our research. Since the word of the Quran that put an end to all words which kneeled before it all the phrases that lead to the showcasing of the Arabic language in its best self.
Arab scientist realized this truth and gave all their attention to the singular and created from it an important subject for their research in the origins of the language and the science behind. Thus, since they dealt with the structure and studied the significance of the context through the use of vocabulary. Therefore, researching Islamic words or the “surat” mentioned in the Qur’an was necessar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 21 2009
Journal Name
Arab J Geosci
Mineralogical, geochemical, and geotechnical evaluation of Al-Sowera soil for the building brick industry in Iraq
...Show More Authors

The raw material soil of Al-Sowera factory quarry (quarry soil and mixture) used for building brick industry was tested mineralogically, geochemically and geotechnically. Mineral components of soil are characterized by Clay minerals (Palygoriskite and chlorite) and nonclay minerals like calcite, quratz, feldspar, gypsum and halite. The raw material is deficient in SiO2, Al2O3, K2O, Fe2O3 and MgO, while enriched in CaO. Loss on ignition and Na2O are in suitable level and appear to be concordant with the standard. Grain size analyses show that the decreasing sand and clay, and increasing silt ratio in both quarry soil and mixture caused decreasing in strength of brick during molding and after firing. The quarry soil is characterized by high p

... Show More