
In this study, gamma-ray spectrometry with an HPGe detector was used to measure the specific activity concentrations of 226Ra, 232Th, and 40K in soil samples collected from IT1 oil reservoirs in Kirkuk city, northeast Iraq. The “spectral line Gp” gamma analysis software package was used to analyze the spectral data. 226Ra specific activity varies from 9 0.34 Bq.kg-1 to 17 0.47 Bq.kg-1. 232Th specific activity varies from 6.2 0.08 Bq.kg-1 to 18 0.2 Bq.kg-1. 40K specific activity varies from 25 0.19 Bq.kg-1 to 118 0.41 Bq.kg-1. The radiological hazard due to the radiation emitted from natural r
... Show MoreThe accession of countries to the World Trade Agreement and the openness of markets to each other without restrictions led to the emergence of the philosophy of "a world without borders and business units without countries", which required adapting the modern business environment to that philosophy, which is considered as objectives for the activities of the units that must be implemented in order to achieve competition. The objective of the units has changed from making profit to meeting the desires of customers, which is what imposed a new role for management accounting as a field of knowledge renewed in it visions of competitiveness between units. Because of the increasing needs for information in light of environmental change
... Show MoreBackground: With the increase in composite material use in posterior teeth, the concerns about the polymerization shrinkage has increased with the concerns about the formation of marginal gaps in the oral cavity environment. New generation of adhesives called universal adhesive have been introduced to the market in order to reduce the technique sensitive bonding procedures to give the advantage of using the bonding system in any etching protocol without compromising the bonding strength. The aim of the study was to study marginal adaptation of two universal adhesives (Single bondâ„¢ Universal and Prime and Bond elect) using 3 etching techniques under thermal cycling aging. Materials and Methods: Forty-eight sound maxillary first premola
... Show MorePortable and stationary electrical generators became quite popular in Iraq soon after the shortage in national electrical
energy after 2003. Multi step risk assessment process is used in this study in the assessment of risks caused by
contamination of indoor air by lead particles emitted from domestic electrical generators. Two portable electrical
generators are tested under controlled indoor conditions (Radial LG (0.9 keV) fueled with benzene and oil and TigMax
(3 keV), fueled with benzene only). Lead particles in air were sampled by using portable dust sampler (Sniffer, L-30).
The atmospheric particulate sampling process is carried out in a flat located in the first floor of a three stories building
located in Baghdad
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreRadiation measuring devices need to periodic calibration process to examine their sensitivity and the extent of the response. This study is used to evaluate the radiation doses of the workers in the laboratories of the Directorate of Safety as a result of the use of point sources in calibrating of the devices in two ways, the first is the direct measurement by the FAG device and the others using RESRAD and RAD PRO programs. The total doses values using FAG were (2.57 μSv/y, 102.3 μSv/y and 20.75 μSv/y for TLD laboratory, Gamma spectroscopy analyses (GSA) laboratory and equipment store respectively, and the total doses that calculated using RESRAD and RAD PRO were 1.518 μSv/y, 76.65 μSv/y and 21.2 μSv/y for the above laboratories. t
... Show MoreObjectives: To assess pregnant women’s knowledge regarding syphilisand to find out the relationship between women’s knowledge regarding syphilis infection and demographic and reproductive variables. Methodology: A descriptive analytical study of non probable (purposive sample) of 250 pregnant women during their different gestational ages for the period (October 2nd to April 25th 2013) by using questionnaire format consists of demographic variables and items of women's knowledge regarding syphilis who are visiting primary health care centers in Al-Kharkh and Al-Rrusafa in Baghdad city. The coefficient relia
A 3D Geological model was generated using an advanced geostatistical method for the Cretaceous reservoir in the Bai Hassan oil field. In this study, a 3D geological model was built based on data from four wells for the petrophysical property distribution of permeability, porosity, water saturation, and NTG by using Petrel 2021 software. The geological model was divided into a structural model and a property model. The geological structures of the cretaceous reservoir in the Bai Hassan oil field represent elongated anticline folds with two faults, which had been clarified in the 3D Structural model. Thirteen formations represent the Cretaceous reservoir which includes (Shiranish, Mashurah, U.kometan, Kometan Shale, L. Kometan, Gulnen
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More