Preferred Language
Articles
/
ijp-820
Natural radioactivity survey in Al-Jabal Al-Gharbi Mountain Region Libya
...Show More Authors

The measurement of natural radioactivity in a given region or country is essential to provide a reference base-line map to follow up a possible variation in future. In order to perform such measurement, the natural radioactivity was measured in different locations. The locations (50 sites) were distributed over Al-Jabal Al-Gharbi Mountain, starting from the city Al-Azeeziah in the eastern part to Wazen on the Tunisian border in the west. The measurements showed obvious variation from one site to another. The levels were fluctuating from (12.8 counts/minute) in Bir-Ayad to (45.7 counts/minute) in Gherian.
In order to investigate the cause for such variation, samples were collected from (27) sites for detailed study. The levels of natural radioactivity were determined in the laboratory, and were ranging from (58.7 Bq/kg) in Bir-Ayad to (102.1 Bq/kg) in Gherian.
The variation in measured radioactivity was related to the geological structures taken in six perpendicular sections, namely, Gharian, Yevren, Zintan, Nalut, Wazen and Al-Azeeziah taking the naturally occurred radioisotopes concentration of 40K, 232Th and 238U present in consideration

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Hyperprolactenemia in Women with Systemic Lupus Erythematusus
...Show More Authors

Recent accumulated evidences suggest that prolactin is an important immunomodulator and may have a role in the pathogenesis of systemic lupus erythematosus (SLE). The aim of this study was to assess the frequency of hyperprolactinemia in women with SLE and to evaluate its correlation with disease flares. Serum prolactin levels were measured in 62 women with SLE and 50 age- and sex-matched healthy controls. In patients and control groups prolactin levels were determined by immunoradiometric assay (IRMA). The prolactin level was found to be higher than normal rang in (40.3%) of SLE patients in active stage versus only (8.06%) of the same SLE patients but in the inactive stage and in (4%) of control group, the elevation was ranging between mi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Immanence in S. Abdu; Saboor Poetry
...Show More Authors

The Immanence in S. Abdu; Saboor Poetry

View Publication Preview PDF
Publication Date
Fri Jan 04 2019
Journal Name
Drinking Water Engineering And Science Discussions
Froth Production in Potable Water without Chemicals
...Show More Authors

Abstract. Froth flotation is a well-known solid-liquid separation technique. Hydrophobicity is the main driving force for such processes. Hydrophobic solids attach to air bubbles and rise up while hydrophilic or less hydrophobic species settle down. Froth can be produced with chemical frothers such as alcohols and polyglycols. However, the use of chemicals limits the use of this separation method in applications such as drinking water, food, and pharmaceutical industries. Therefore, developing a technique that produces froth without adding any chemicals would be useful to such industries. This work demonstrates that with suitable operating parameters a 27 cm froth height can be obtained in a 20 cm diameter column by using an air

... Show More
View Publication
Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Role of Christian Wives in Elijahian Policy
...Show More Authors

Role of Christian Wives in Elijahian Policy

View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Evaluate Experience of Islamic Education in kindergartens
...Show More Authors

Evaluate Experience of Islamic Education in kindergartens

View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
2016 International Conference On Computing, Networking And Communications (icnc)
Connectivity and rendezvous in distributed DSA networks
...Show More Authors

In this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Peace Indicating Words in Pre- Islamic Poetry
...Show More Authors

In pre- Islamic poetry, there are a lot of words that indicate
peacefulness of one sort of another, in addition to the inspirations of semantic
modeling in which the poet sets himself in various horizons.
Among these words: brother, comrade, friend, companion, lover,
people, prince, home, land, country, blessing, honesty, contract, company,
justice, thankfulness, forgiveness, pardoning, guest, goodness, faithfulness,
silence, death, peace,….
In addition, there are their derivatives from various aspects that indicate
peacefulness either directly or indirectly.

View Publication Preview PDF
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
Creative formations in honorable prophetic decoration lines
...Show More Authors

The Islamic art is filled with precious and holiness contents for what it carries of spiritual meanings represented by the Holy Quran, Hadith and texts which inspired the Calligrapher fertile imagination draw from it a wide space for holiness and spiritual expression with artistic explanation of aesthetic and decorative nature, its issuance pivots depended on decoration and calligraphy elements. The main elements which enriched the aesthetic and expressional side are the texts which used by the Calligraphers whom tried to be perfect and creative by presentation techniques and issuance treatments hold within the beauty of the shape and content. The most remarkable artistic achievements are honorable prophetic decoration for what it has of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 25 2022
Journal Name
Journal Of The College Of Basic Education
Semantic image coding in contemporary Theatrical performance
...Show More Authors

تعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تح

... Show More
View Publication