Background: War represents a major human crisis; it destroys communities and results in ingrained consequences for public health and well-being
Objective: We set this study to shed light on the public health status in Iraq after the successive wars, sanctions, sectarian conflicts, and terrorism, in light of certain health indicators.
Design: The primary source of data for this analysis comes from the Iraqi Ministry of Health, and The World Health Organization disease surveillance.
Results: Most of the morbidity indicators are high, even those that are relatively declining recently, are still higher than those repor
... Show MoreCanonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.
In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe
... Show MoreSome experiments need to know the extent of their usefulness to continue providing them or not. This is done through the fuzzy regression discontinuous model, where the Epanechnikov Kernel and Triangular Kernel were used to estimate the model by generating data from the Monte Carlo experiment and comparing the results obtained. It was found that the. Epanechnikov Kernel has a least mean squared error.
Background Median sternotomy is the gold standard incision for most cardiac operations. However, with the advent of minimal invasive surgery, a new approach emerged in cardiac surgery named mini-sternotomy and has been successfully used to perform a variety of operations.
The aim of this paper is to present our experience of using mini-sternotomy to harvest the left internal mammary artery (LIMA) for off-pump revascularization of the left anterior descending artery (LAD)
Methodology Over a 2-year period (October 2012-October 2014), 100 patients underwent coronary artery bypass grafting (CABG) via conventional median sternotomy (CMS) (n=80) and mini-sternotomy (MS) (n=20). The
... Show MoreThe research aims to identify the level of functional engagement and hope-based thinking of kindergarten teachers, identify if there is a significant difference in functional engagement and hope-based thinking in terms of specialization and years of service for kindergarten teachers, identify if there is a significant correlation between functional engagement and hope-based thinking of kindergarten teachers. The current research is determined by kindergarten teachers in the Second Rusafa Baghdad Education Directorate for the academic year (2022-2023). In order to achieve the objectives of the research, the researcher prepared a functional engagement scale, which consists of (45) items in three areas: Perceptual and functional engagement
... Show MoreThe modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show MoreMagnesium-doped Zinc oxide (ZnO: Mg) nanorods (NRs) films and pure Zinc oxide deposited on the p-silicon substrates were prepared by hydrothermal method. The doping level of the Mg concentration (atoms ratio of Mg to Zn was chosen to be 0.75% and 1.5%. X-ray diffraction (XRD) and energy-dispersive X-ray spectroscopy (EDX) were performed to characterize the prepared films. X-ray diffraction analysis showed a decrease in the lattice parameters of the Mg-doped ZnO NRs. Under 10V applied bias voltage, the responsivity of p-n junction UV photodiode based on pure ZnO and Mg: ZnO with doping ratio (0.75% and 1.5%) was 0.06 A/W and (0.15A/W and 0.27A/W) at UV illumination of wavelength 365 nm respectively, 0.071 A/W and (0.084A/W and 0.11A/W) fo
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More