Preferred Language
Articles
/
bsj-2178
Measurement of radionuclides in imported Coffee Consumed in Basra southern of Iraq and estimation of its annual effective dose
...Show More Authors

Radioactive elements were identified in samples of imported coffee consumed in the province of Basra using gamma spectrometry SAM940TM. It is a scintillation detector of NaI(Tl) crystal and the dimensions of 2×2 inch. We have identified specific concentration As(Bq/kg) and annual effective dose D(Sv/y) for radioactive elements (_^40)K, (_^131)I, (_^134)Cs and (_^137)Cs. The estimated average effective dose for adults from coffee samples were found to be 0.037mSv/y, 88.434nSv/y, 46.909nSv/y, 27.212nSv/y for ((_^40)K,(_^131)I,(_^134)Cs,(_^137)Cs) respectively. The present results of the study revealed that the radioactivity was relatively low in the coffee and within the permissiblelimit.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 01 2012
Journal Name
Engineering Analysis With Boundary Elements
Radial integration boundary integral and integro-differential equation methods for two-dimensional heat conduction problems with variable coefficients
...Show More Authors

View Publication
Crossref (35)
Crossref
Publication Date
Thu Jan 25 2024
Journal Name
Iraqi Journal Of Agricultural Sciences
SPRAYING NANO CHITOSAN LOADED WITH NPK, NETTEL AND GREEN TEA EXTRACTS AS A TOOL FOR IMPROVEMENT POTATO PRODUCTIVITY
...Show More Authors

This study was aimed to evaluate the effect of spraying nano chitosan loaded with NPK fertilizer and nettle leaf and green tea extracts on the growth and productivity of potato for the spring and fall seasons of 2021.It was conducted at private farm in Wasit Governorate, Iraq, as a factorial experiment (5 × 5) within randomized complete block design using three replicates. The first factor included spraying with four concentrations of chitosan nanoparticles loaded with NPK fertilizer 0, 10. 15 and 20% in addition to chemical fertilization treatment, the second factor was spraying nettle leaf extract 25 and 35 gL-1 and green tea extract with 2 and 4 g.L-1, in addition to the control treatment, spraying with distilled water only. The

... Show More
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sat Nov 05 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Image Compression Based on Cubic Bezier Interpolation, Wavelet Transform, Polynomial Approximation, Quadtree Coding and High Order Shift Encoding
...Show More Authors

In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Causal Relationship between Stock Market Indices Volatility and Oil Prices Volatility: Empirical Evidence from Iraqi Stock Exchange
...Show More Authors

The study investigates the relationship between the volatility of the Iraqi Stock Exchange Index (ISX), and the volatility of global oil prices benchmarks, Brent and West Intermediate Texas (WTI), in additional to the Iraqi Oil, Basra Crude Light (BSL) which represents the most exported Iraqi oil and the major influential factor on the Iraqi governmental revenues. Using monthly data covering the period: 1/2005-12/1205, econometrical and technical tools represented by Co-incretion, Vector Error Correction Model – VECM, Granger Causality, and Bollinger band were employed in order to explore the relationship between the variables.

The econometric analysis revealed the impact of the oil prices volatility on

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
CALCULATION BIASES FOR COEFFICIENTS AND SCALE PARAMETER FOR LINEAR (TYPE 1) EXTREME VALUE REGRESSION MODEL FOR LARGEST VALUES
...Show More Authors

Abstract

Characterized by the Ordinary Least Squares (OLS) on Maximum Likelihood for the greatest possible way that the exact moments are known , which means that it can be found, while the other method they are unknown, but approximations to their biases correct to 0(n-1) can be obtained by standard methods. In our research expressions for approximations to the biases of the ML estimators (the regression coefficients and scale parameter) for linear (type 1) Extreme Value Regression Model for Largest Values are presented by using the advanced approach depends on finding the first derivative, second and third.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Ibn Al Anbari grammatical inferences On   Abu Hatim al-Sijistani through his book Clarify the stay and start
...Show More Authors

Ibn al-Anbari, however, turned to Abu Hatim al-Sijistani in eleven places of his book ((clarify the endowment and start)). The study showed that the right and right was with the son of Anbari and that what went to Sistani saying uniqueness, and contrary to the vast majority of scientists. The study also showed that the science of grammar affects the endowment and initiation, as the study showed that the science of endowment and initiation is one of the important sciences of the Koran, which must be carefully received, researchers.

View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Rawal Medical Journal
Elevated lactate dehydrogenase (LDH) and C- reactive protein (CRP) level as a risk factor for critical COVID-19
...Show More Authors

Abstract Objective: To identify correlation of elevated LDH & CRP levels with the outcomes of COVID-19. Methodology: The cross-sectional retrospective study consisted of 200 COVID-19 patients who presented at a private clinical in Baghdad, Iraq. It was carried out from February 2021 to February 2022. Data included age, gender and clinical presentation. Blood samples were taken for high sensitivity CRP and LDH in the serum. Results: Out of 200 patients, 50 were critical and 150 severe according to clinical features. LDH and CRP showed a significant increase (p=0.000) in critical patients. This group involved admission to the respiratory intensive care unit requiring mechanical ventilation than in patients with severe COVID-19 (760.5±6.3 vs.

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Branch and Bound Algorithm with Penalty Function Method for solving Non-linear Bi-level programming with application
...Show More Authors

The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.

View Publication
Crossref
Publication Date
Thu Oct 25 2018
Journal Name
Journal Of Optical Communications
320 Gbps Free Space Optic Communication System Deploying Ultra Dense Wavelength Division Multiplexing and Polarization Mode Division Multiplexing
...Show More Authors
Abstract<p>This work aims to investigate the integrated ultra-dense wavelength division multiplexing (UDWDM) and polarization division multiplexing (PDM) schemes incorporated in the free space optic (FSO) communication system. Erbium-doped fiber amplifiers (EDFAs) are used as post and pre-amplifiers in the proposed UDWDM–PDM–FSO system to boost the transmission power for increasing the distance. Thirty-two channels are transported over the FSO link to realize the total data transmission of 160 and 320 Gbps with 0.08 and 0.1 nm channel spacing, respectively. Results are also reported with non-return to zero modulation schemes. The performance of the proposed UDWDM–PDM–FSO transmission sys</p> ... Show More
View Publication
Scopus (10)
Crossref (8)
Scopus Crossref