Preferred Language
Articles
/
CReXWpMBVTCNdQwCl9K_
IMPACT OF A SOCIAL SUPPORT FOR PREGNANT WOMEN UPON THEIR PREGNANCY OUTCOMES AT MATERNITY HOSPITALS IN BAGHDAD CITY
...Show More Authors

Objective: To assess the impact of a social support for pregnant women upon their pregnancy outcome Methodology: A descriptive purposive study was used to assess the impact of a social support on their pregnancy outcomes. The study was conducted from (22 \ September \ 2020 to 15 \ February \ 2021). A non-probability sample (purposive sample) was selected from 100 women. Data were collected through an interview with the mother in the counseling clinic, during the third trimester of pregnancy, as well as after childbirth in the labor wards to assess the outcome of pregnancy. Data were analyzed through descriptive statistics (frequency and percentages). Results: The most important thing observed in this study was the positive pregnancy outcome for women with high social support during pregnancy. But the women suffering from a low social support in this study (18%) stillbirth at P. value (.042). Recommendations: social support during pregnancy provides some buffer from its enduring effects. Interventions designed to enhance pregnancy social support may not only improve maternal wellbeing, but may also safeguard infant health. Increased social support may improve maternal mental health during pregnancy and this association should be assessed in longitudinalstudies.

Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 26 2025
Journal Name
Biobacta Journal Of Biochemistry And Molecular Biology
How Pantoea can help solve modern agriculture problems: A Review
...Show More Authors

Modern agriculture is challenged by soil degradation, nutrient depletion, plant diseases, and excessive dependence on chemical fertilizers and pesticides. By examining different strains of Pantoea, the study highlights their role in promoting plant growth, improving their tolerance to stress, reducing reliance on synthetic agricultural inputs, and contributing to more sustainable and environmentally friendly agricultural practices. Using a combination of practical qualitative methods and reliable quantitative data, the research gathers extensive information on how these microbes impact various crops and key soil health indicators. The improvements in plant growth statistics and nutrient levels are often quite astonishing. The result

... Show More
View Publication
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Programming a Pneumatic Processes Sequence based on PLC by Demonstration
...Show More Authors

Abstract

Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
Methionine as a Spacer between Poly Acrylic acid and Ampicillin
...Show More Authors

In this work a novel drug delivery system through modification of poly acrylic acid with Methionine as a spacer between the poly acrylic acid which was converted to its acyl chloride and reacted with Methionine as spacer unit which has been reacted with Ampicillin drug. In vitro drug release study had been conducted successfully in basic medium in pH 7.4 and acidic medium in pH 1.1 at 37?. Due to many problems associated with drug release and, this modification could decrease the side effect of drug. The prepared prodrug polymer was characterized by spectra method [FTIR and 1H?NMR]. Physical properties and intrinsic viscosity of drug polymer were determined. The good results were obtained in the presence of spacer unit with compar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 01 2014
Journal Name
2014 44th European Microwave Conference
A low magnetic bias sub-millimetre wave semiconductor junction circulator
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Asian Journal Of Pharmacy And Pharmacology
Genetic polymorphisms associated with diabetic foot ulcer: A review article
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
2018 Third Scientific Conference Of Electrical Engineering (scee)
A UWB Monopole Antenna Design based RF Energy Harvesting Technology
...Show More Authors

Recently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical.

... Show More
View Publication
Scopus (14)
Crossref (9)
Scopus Crossref