Preferred Language
Articles
/
MBfgAo4BVTCNdQwCuC8V
The Impact of Teenage Pregnancy on Maternal, Fetal and Neonatal Outcomes
...Show More Authors

Adolescent pregnancy is common health problem still found in both developed and developing countries; as adolescent may have early sexual practice or early marriage. Adolescent mothers face substantially higher maternal and perinatal morbidity and mortality than adult women. This is a randomized prospective clinical study conducted at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The objective of this work is to assess the adverse maternal, fetal and neonatal outcomes in early and late teenage pregnant mothers. Study sample consisted of 220 primigravid women with a singleton, cephalic, viable fetus and no congenital abnormality that gave birth at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The 1stgroup: early teenage (46 women between 11-14 years), the 2nd group: late teenage (74 women between 15-19 years) and the 3rdgroup: control group (100 women between 20-29 years). Pregnancy outcomes were observed for mothers: mode and duration of labor, post-partum hemorrhage and endometritis and for neonates: gestational age, birth weight, Apgar score, admission to neonatal care unit and neonatal outcome. Anemia was the only significant medical complication associated with pregnancy that was observed in both teenage groups (P-value= 0.0001). Prolonged labor, postpartum hemorrhage and blood transfusion all were significantly higher in teenage groups (P-value= 0.019, 0.0001 and 0.0001 successively). Adolescents showed lower birth weights as compared to adults (mean birth weight was 2.8 kg, 2.98 kg in both teenage groups and 3.98 kg in the control group), Lower Apgar scores at 1 minute and …

Publication Date
Fri Apr 23 2021
Journal Name
Al-nahrain Journal Of Science
A Clinical-Statistical Study on COVID-19 Cases in Iraq: A Case Study
...Show More Authors

Background: COVID-19 is a disease that started in Wuhan/China in late 2019 and continued through 2020 worldwide. Scientists worldwide continue to research to find vaccines, treatments, and medication for this disease. Studies also conenue to find the pathogenicity and epidemiology mechanisms. Materials and Methods: In this work, we analyzed cases obtained from Alshifaa center in Baghdad/Iraq for 23/2/2020-31/5/2020 with total instances of 797, positive cases of 393, and death cases of 30. Results: Results showed that the highest infection cases were among people aged between 41-45. Also, it was found that males' number of cases was more than females. In contrast, death cases were significantly higher in males than females. It was not

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Big-data Management using Map Reduce on Cloud: Case study, EEG Images' Data
...Show More Authors

Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jun 02 2023
Journal Name
Bandaoti Guangdian/semiconductor Optoelectronics
NMUSING AN INNOVATIVE DEVICE TO IMPROVE THE EFFICIENCY OF THE ANTERIOR QUADRICEPS MUSCLE OF THE INJURED KNEE JOINT AFTER SURGICAL INTERVENTION OF THE ANTERIOR CRUCIATE LIGAMENT IN ADVANCED SOCCER PLAYERS
...Show More Authors

This study aimed to manufacture an innovative device that enables the player to walk after the operation and improves the functional efficiency through the improvement in the range of motion as well as the improvement in the size of the muscles working on the knee joint. The research, the study population consisted of players with severing the anterior cruciate ligament of the advanced soccer players, and the number of the research sample was (5) injured for the control sample and (5) for the experimental sample in Abu Ghraib Hospital and some rehabilitation centers for a period of six months, and the pre-tests were conducted after two weeks of The cruciate ligament surgery was performed, and the innovative device was used for the e

... Show More
Preview PDF
Publication Date
Tue Dec 23 2025
Journal Name
Webology
Is the Stealth Marketing an Element of Promotion Mix? A Review of the Techniques
...Show More Authors

Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the

... Show More
View Publication
Publication Date
Sat May 11 2013
Journal Name
Journal Of Arts Of Thiqar
Mistranslation of Sex-related Euphemistic Expressions with reference to the Translations of the Qur'an
...Show More Authors

Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Process in the Acquisition of Rhetorical Concepts of Students in The Fifth Grade Literary
...Show More Authors

   To investigate the research objectives, the researchers put the following hypothesis:

There was no statistically significant difference at the level of (0.05) between the average score of the students of the experimental group who studied the language of rhetoric according to model of learning method, and the average score of the students of the control group who studied the same article in the traditional way acquiring rhetorical concept.    The researchers relied on the experimental design with the partial setting of the post-test, which depends on the experimental group that is taught using the model of the learning method, and the control group taught using the traditional method.   

... Show More
View Publication Preview PDF