Objective: The study aims to assess the knowledge and practices of mothers with hemophilia children type - A - ,
socio-economic status and association between mother demographic information with their knowledge and practices
toward their children in Azadi Teaching Hospital in Kirkuk.
Methodology: Descriptive study no probability (purposive) sample. Selected Fifty-five of mothers having hemophilia
children, started from November 2012 to May 2013. Study was carried out in the Azadi teaching hospital in
Kirkuk. By using questionnaire which consists from five parts include demographic characteristics for mother and
children, socio-economic, Knowledge and practices data gathered, by direct interview with the mothers in the
Sediment accumulated in sewers is a major concern source as it induces numerous operational and environmental problems. For instance, during wet weather flow, the re-suspension of this sediment accompanied by the combined sewer overflow may cause huge pollutant load to the receiving water body. The characteristics of the sewer sediment are important as it shapes its behaviour and determines the extent of the pollution load. In this paper, an investigation of sewer sediment and its characterization is done for a case study in Baghdad city. Sediment depth covers more than 50% of the sewer cross-sectional area; several operational causes are comprised to cause this huge depths of sediment depositions. The testing and analysis of the s
... Show MoreIncreased attention to corporate governance with the increasing need for investors and other parties in the Iraqi market for securities of the information credible and confidence and greater transparency in the disclosure as well as the systems of governance lead to raise the value of the company and that by reducing the cost of capital and reduce the cost of financing, as well as that there are indications modern measurement can be adopted by the Iraqi market for securities for the purpose of evaluating the performance of listed companies and then raise their value.
The research problem is that there is no framework or structure of the legal and local rules for the application of corporate governance in Iraq obliges
... Show MoreThis paper is a review of the genus Sitta in Iraq, Five species of this genus are recognized
Sitta kurdistanica, S. neumayr, S. europaea, S.dresseri and S. tephronota. Geographical
distribution and systematic nots were given for separation and identification, also some notes
on nest building and nest sites of S. tephronota supporting by figures are presented.
The researcher tried to show the importance of obligation with the rules of professional conduct set by the Association of Accountants and Auditors of Iraqis when expressing an opinion the financial statements submitted tax administration and enhance the confidence of these lists, and adopted in the tax settling accounts process and its impact on tax revenues, and touched a researcher at the theoretical side of the search to the problem of research and of my Is there a trace of non- not to obligation by the rules of professional conduct in Iraq affect the tax revenue with the rules of professional conduct in tax revenue for companies research sample, the research aims to study the rules of professional conduct set by the Associatio
... Show MoreThe main source of water supply in Iraq is the surface water, especially Tigris and Euphrates Rivers and their tributaries. In the recent years there was a great drop in the water levels of Tigris River within Baghdad City which had affected the operation of twelve water supply projects located on the banks of Tigris River in Baghdad City, due to significant climate changes, and the expansion of hydraulic construction (dams) and implementation of new irrigation projects in Turkey, these factors have greatly reduced the water flowrates of river by about 46%. In the present study the flow characteristics of Tigris River within Baghdad City was studied, the reach involved was about 49km in which it represents the urban zone
... Show MoreThis study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreAbstract
The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More