The actual observations for Jupiter radio storm were taken for Hawaii station within multi years from 2001 to 2012. The Central Meridian Longitude (CMLІІІ) and Io's phase (γIo) were calculated for each year from Radio Jove program, the results of CMLІІІ for year 2006 was A=(180-300)º,B=(15-239)º, C=(60-280)º, phase was A=(182-260)º,B=(40-109)º, C=(200-260)º, which were close to the theoretical values, longitude was A=(180-300)º, B=(15-240)º, C=(60-280)º and phase was A=(180-260)º,B=(40-110)º and C=(200-260)º.
Background: One of the significant public health problems is the traumatic dental injury to the anterior teeth, it has a great impact on children’s daily. Physical and psychological disturbance, pain and other negative impacts, such as tendency to avoid laughing or smiling may be associated with traumatic dental injuries, that may affect the social relationships. To determine the occurrence of traumatic dental injuries in relation to quality of life, this study was established among children of primary schools. Material and Methods: A cross-sectional study was conducted among private (574) and governmental (1026) primary school children in Baghdad city. Dental trauma was assessed according to Ellis and Davey classification in1970
... Show MoreJoints are among the most widespread geologic structures as they are found in most each exposure of rock. They differ greatly in appearance, dimensions, and arrangement, besides they occur in quite different tectonic environments. This study is important because joints provide evidence on what kind of stress produced them (history of deformation) and also because they change the characteristics of the rocks in which they occur. The Measured data of joints from the studied area which are located in the high folded zone – Northeast of Iraq, were classified according to their relationship with the tectonic axes by projecting them stereographically using Schmidt net in GEOrient ver.9.5.0 software. The joint systems revealed the orientation of
... Show MorePolarization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface grating polarize
... Show MoreThis study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.
IA Ali, FK Emran, DF Salloom, Annals of the Romanian Society for Cell Biology, 2021
For many years it was argued that there may be a gender differences in adverse drug reactions (ADRs). This assumption was based on many possible factors such as hormonal or behavior differences, and it was not clearly identified since the female gender was not preferred to be enrolled in many clinical trials. The primary aim of this study was to assess the extent of possibly relevant gender differences in drug–ADRs regarding causality, severity, preventability, seriousness, expectedness and outcome. While the secondary aim was to assess for which group of drugs and for which ADRs gender differences are identified most often. The study was a retrospective one that depends on processing a specially selected group of data obtained from th
... Show MoreThis research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MoreIn this study, an experimental investigation had conducted for six high strength laced reinforced concrete one-way slabs to discover the behavior of laced structural members after being exposed to fire flame (high temperature). Self-compacted concrete (SCC) had used to achieve easy casting and high strength concrete. All the adopted specimens were identical in their compressive strength of ( , geometric layout 2000 750 150 mm and reinforcement specifics except those of lacing steel content, three ratios of laced steel reinforcement of (0.0021, 0.0040 and 0.0060) were adopted. Three specimens were fired with a steady state temperature of for two hours duration and then after the specimens were cooled suddenly by spraying water. The
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreSpices are natural substances taken from special plants and have a different taste when added to food and some of them have great benefits for health and body. These plants vary from country to country depending on the type of soil and how they are grown and this affects their quality. In this study, the specific activity of 40K, 238U and 232Th series and 137Cs in some selected natural food spices commonly used in Iraq kitchen were determined using gamma spectrometry and the ingested doses via food consumption were also assessed. The average specific activity of 40K, 238<