This cross-sectional, questionnaire-based study evaluated the knowledge, attitude and practice towards breast cancer and breast self-examination [BSE] among 387 [302 females and 85 males] educated Iraqis affiliated to 2 Iraqi universities. The participants were categorized into 3 occupations: student [71.3%], teaching staff [10.3%] and administrative staff [18.3%]. About half of the participants had a low knowledge score [< 50%]; only 14.3% were graded as [Good] and above. Almost 75% of the participants believed that the best way to control breast cancer was through early detection and other possible preventive measures. Most participants [90.9%] had heard of BSE, the main source of information being television. However, only 48.3% practised BSE; the most common reason for not doing so was lack of knowledge of how to perform the technique correctly. Almost 84% of the female participants were willing to instruct others in the technique of BSE
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThe current study aims to show the importance of plant products as mosquitocides against Culex quinquefasciatus. Castor oil Nanoemulsions were subedit in various ratios including castor oil, ethanol, tween 80, and deionized water by using ultrasonication. Thermodynamic, centrifugation, PH, assay which improved that the formula of 10 ml of castor oil, ethanol 5ml, tween 80 (14 ml) and deionized water 71ml was more stable than other formulas. The stable formula of castor oil nanoemulsion was characterized by transmission electron microscopy (TEM) and dynamic light scattering (DLS). Nanoemulsion droplets were spherical in shape and were found to have a Z-average diameter of 87.4nm. A concentration of ca
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More