Preferred Language
Articles
/
MBfgAo4BVTCNdQwCuC8V
The Impact of Teenage Pregnancy on Maternal, Fetal and Neonatal Outcomes
...Show More Authors

Adolescent pregnancy is common health problem still found in both developed and developing countries; as adolescent may have early sexual practice or early marriage. Adolescent mothers face substantially higher maternal and perinatal morbidity and mortality than adult women. This is a randomized prospective clinical study conducted at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The objective of this work is to assess the adverse maternal, fetal and neonatal outcomes in early and late teenage pregnant mothers. Study sample consisted of 220 primigravid women with a singleton, cephalic, viable fetus and no congenital abnormality that gave birth at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The 1stgroup: early teenage (46 women between 11-14 years), the 2nd group: late teenage (74 women between 15-19 years) and the 3rdgroup: control group (100 women between 20-29 years). Pregnancy outcomes were observed for mothers: mode and duration of labor, post-partum hemorrhage and endometritis and for neonates: gestational age, birth weight, Apgar score, admission to neonatal care unit and neonatal outcome. Anemia was the only significant medical complication associated with pregnancy that was observed in both teenage groups (P-value= 0.0001). Prolonged labor, postpartum hemorrhage and blood transfusion all were significantly higher in teenage groups (P-value= 0.019, 0.0001 and 0.0001 successively). Adolescents showed lower birth weights as compared to adults (mean birth weight was 2.8 kg, 2.98 kg in both teenage groups and 3.98 kg in the control group), Lower Apgar scores at 1 minute and …

Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Thu Apr 06 2017
Journal Name
Global Journal Of Engineering Science And Researches 4(2348-8034):48-52
ON SEMI-STRONG (WEAK)CJ-TOPLOGICAL SPACES
...Show More Authors

Publication Date
Sat May 03 2025
Journal Name
Aip Conference Proceedings
On a graph associated to Ly group
...Show More Authors

For the graph ⁠, the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.

View Publication
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (23)
Scopus Crossref
Publication Date
Tue Sep 10 2013
Journal Name
Nature Communications
Carbon nanotubes on a spider silk scaffold
...Show More Authors

Understanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.

View Publication Preview PDF
Scopus (140)
Crossref (139)
Scopus Clarivate Crossref
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Characteristics of Melody Structure of the Cello and Contrabass in Works of Iraqi Symphony Orchestra: تقى سعد جعفر
...Show More Authors

The idea of this research is based on presenting a study specialized with the rules and bases of the Iraqi methodological music composition of the Symphony Orchestra according to the construction of the musical compositions of great forms and which are characterized by the melody difference and variation within their musical fabric according to the method of distributing the instruments and their types within the orchestra. The researcher has been interested in studying this building based on what is written for him according to the stringed instruments arc instruments and bass, which is represented by the cello and the contrabass. It is possible through the analysis of the melody structure features of these instruments and the melody re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
The Determination of Critical-Sampling Scheme of Preprocessing for Multiwavelets Decomposition as 1st and 2nd Orders of Approximations.
...Show More Authors

One of the important differences between multiwavelets and scalar wavelets is that each channel in the filter bank has a vector-valued input and a vector-valued output. A scalar-valued input signal must somehow be converted into a suitable vector-valued signal. This conversion is called preprocessing. Preprocessing is a mapping process which is done by a prefilter. A postfilter just does the opposite.

The most obvious way to get two input rows from a given signal is to repeat the signal. Two rows go into the multifilter bank. This procedure is called “Repeated Row” which introduces oversampling of the data by a factor of 2.

 For data compression, where one is trying to find compact transform representations for a

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Processing and re-interpretation of gravity bouguer map of a selected area in the W-NW of Iraq
...Show More Authors
Abstract<p>Geophysical data interpretation is crucial in characterizing the subsurface structure. The Bouguer gravity map analysis of the W-NW region of Iraq serves as the basis for the current geophysical research. The Bouguer gravity data were processed using the Power Spectrum Analysis method. Four depth slices have been acquired after the PSA process, which are: 390 m, 1300 m, 3040 m, and 12600 m depth. The gravity anomaly depth maps show that shallow-depth anomalies are mainly related to the sedimentary cover layers and structures, while the gravity anomaly of the deeper depth slice of 12600 m is more presented to the basement rocks and mantle uplift. The 2D modeling technique was used for </p> ... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref