The present work determines the particle size based only on the number of tracks detected in a cluster created by a hot particle on the CR-39 solid state nuclear track detector and depending on the exposure time. The mathematical model of the cross section developed here gives the relationship between alpha particle emitting from the (n, α) reaction and the number of tracks created and distribution of tracks created on the surface of the track detector. In an experiment performed during this work, disc of boron compound (boric acid or sodium tetraborate) of different weights were prepared and exposed to thermal neutron from the source. Chemical etching is processes of path formation in the detector, during which a suitable etching solution attacks the detector at a sufficient speed and the damaged regions along the ion trails (latent track) are preferentially dissolved, removed and get transformed into a hollow channel. The most common etching for plastics is the aqueous solutions of NaOH and temperatures in between 50˚C - 80˚C.The program (CR-39) processing counting and calculations only take place depending on the number of tracks.
In recent years the interest in fractured reservoirs has grown. The awareness has increased analysis of the role played by fractures in petroleum reservoir production and recovery. Since most Iraqi reservoirs are fractured carbonate rocks. Much effort was devoted to well modeling of fractured reservoirs and the impacts on production. However, turning that modeling into field development decisions goes through reservoir simulation. Therefore accurate modeling is required for more viable economic decision. Iraqi mature field being used as our case study. The key point for developing the mature field is approving the reservoir model that going to be used for future predictions. This can
Background: Different diagnostic definition and criteria have been recommended by different expert groups for the diagnosis of metabolic syndrome, however, it’s prevalence in the same population could differ depending on the definition used yielding different results. In Iraq, there is a lack of research comparing these different diagnostic definitions.
Objective: To find out the most suitable metabolic syndrome definition to be used for Iraqi people.
Methods: 320 participants were recruited for this study, 53.4% men and 46.6% women, aged between 25-85 years, visiting Baghdad Teaching Hospital, the prevalence of metabolic syndrome according to different definition
... Show MoreMy research deals with the positions that the Prophet (PBUH) distressed. And condolences to those who lost her father and other problems and calamities that impede the life of women, has been given to the Lord of men, and good qualities, to strike the nation's finest proverbs in ensuring lost and lost of women and children, to be shown to us humanity in its finest form, and the best analyzed, and I hope God help And guidance and Rashad
An analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined whi
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe aim of the research is to identify the economic and cultural role of contemporary interactive artworks from the public's point of view, with knowledge of the most important obstacles and proposals to improve the level of design and spread of interactive artworks. The descriptive approach was used, and the researcher used a questionnaire tool that was distributed to the audience for the events of Noor Al Riyadh (2021) and the size of the participating sample was (194) individuals from all spectrums of society. It was found through the results of the existence of public approval of the economic role of contemporary interactive artworks, as they contribute to supporting the national economy. It attracts the public to attend various paid
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreObjective: To determine the effectiveness of an Educational Program in Enhancing Nurse’s Knowledge about Occupational Health Hazards at Medical City Hospitals in Baghdad City.
Methodology: The present study employed a quasi-experimental design held at Medical City Hospitals in Baghdad City. A non-probability sample (convenience sample) consisted of (60) nurse. Data were collected by using a self-report questionnaire which consisted of six parts (a) socio-demographic characteristics (b) physical hazards knowledge (c) chemical hazards knowledge (d) biological hazards knowledge (e) psychological hazards knowledge and (f) mechanical hazards knowledge. Data were analyzed using the statistical packag
... Show MoreThe goal of this work is demonstrating, through the gradient observation of a of type linear ( -systems), the possibility for reducing the effect of any disturbances (pollution, radiation, infection, etc.) asymptotically, by a suitable choice of related actuators of these systems. Thus, a class of ( -system) was developed based on finite time ( -system). Furthermore, definitions and some properties of this concept -system and asymptotically gradient controllable system ( -controllable) were stated and studied. More precisely, asymptotically gradient efficient actuators ensuring the weak asymptotically gradient compensation system ( -system) of known or unknown disturbances are examined. Consequently, under convenient hypo
... Show More