A preventing shield for neutrons and gamma rays was designed using alternate layers of water and iron with pre-fixed dimensions in order to study the possibility of attenuating both neutrons and gamma-rays. ANISN CODE was prepared and adapted for the shield calculation using radiation doses calculation: Two groups of cross-section were used for each of neutrons and gamma-rays that rely on the one – dimensional transport equation using discrete ordinate's method, and through transforming cross-section values to values that are independent on the number of groups. The memory size required for the applied code was reduced and the results obtained were in agreement with those of standard acceptable document samples of cross –section, this assists the possibility of using this program for calculation of shields and adopting the shield design shield in this research for shielding from neutron and gamma-rays because the calculation of this designed proved the possibility of efficient attenuation of both of these kinds of radiations through from this theoritical study.
In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
This study focused on treatment of real wastewater rejected from leather industry in Al-Nahrawan city in Iraq by Electrocoagulation (EC) process followed by Reverse Osmosis (RO) process. The successive treatment was applied due to high concentration of Cr3+ ions (about 1600 ppm) rejected in wastewater of this industry and for applying EC with moderate power consumption and better results of produced water. In Electrocoagulation process (EC), the effect of NaCl concentration (1.5, 3 g/l), current density (C.D.) (15-25 mA/cm2), electrolysis time (1-2 h), and distance between electrodes (E.D.) (1-2 cm) were examined in a batch cell by implementing Taguchi experimental design. According to the results obtained from multiple regression and signa
... Show MoreHepatocellular carcinoma (HCC) is the third most common cause of cancer-related death. Therefore, it is critical for researchers to understand molecular biology in greater depth. In several diseases including cancer, abnormal miRNA expression has been linked to apoptosis, proliferation, differentiation, and metastasis. Many miRNAs have been studied in relation to cancer, including miR-122, miR-223, and others. Hepatitis B and C viruses are the most important global risk factors for HCC. This study is intended to test whether serum miRNAs serve as a potential biomarker for both HCC and viral infections HBV and C. The expression of miRNA in 64 serum samples was analyzed by RT-qPCR. Compared to healthy volunteers, HCC patients' sera expre
... Show MoreIn this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes
The purpose of this experiment was to determine the relationship between the path coefficient and seed rate for four different barley cultivars (Amal, Ibaa 265, Ibaa 99, and Buhooth 244) during the 2019-2020 winter season. The experiment was carried out using a split plot design with three replications according to a randomized complete block design (RCBD). The highest positive thru effect on grain yield was found for flag leaf area and harvest index at aseeding rate of 130 kg.h-1; the highest positive direct effect on grain yield was found for flag leaf area and plant height at aseeding rate of 160 kg.h-1; and the highest positive direct effe
ZnO nanostructures were synthesized by hydrothermal method at different temperatures and growth times. The effect of increasing the temperature on structural and optical properties of ZnO were analyzed and discussed. The prepared ZnO nanostructures were characterized by X-ray diffraction (XRD), UV–Vis. absorption spectroscopy (UV–Vis.), Photoluminescence (PL), and scanning electron microscopy (SEM). In this work, hexagonal crystal structure prepared ZnO nanostructures was observed using X-ray diffraction (XRD) and the average crystallite size equal 14.7 and 23.8 nm for samples synthesized at growth time 7 and 8 hours respectively. A nanotubes-shaped surface morphology was found using scanning electron microscopy (SEM). The optic
... Show More