BACKGROUND: Vaccine hesitancy and reluctant had an important obstacle in achieving protection and population immunity against coronavirus disease 19 (COVID-19). It is essential to achieve high COVID-19 vaccination acceptance rates among medical students and health care workers to provide recommendations and counseling vaccine hesitant population. AIM: This study aims to identify level of COVID-19 hesitancy, attitude, knowledge, and factors that affect vaccination decision. MATERIALS AND METHODS: A cross-sectional study was done among medical students in Al-Kindy College of Medicine, University of Baghdad, Baghdad, Iraq. Data collection was done through an online Google Forms questionnaire during 2021 from 810 medical students. RESULTS: A total of 810 adults’ medical students participated in this study. The majority of the study participants were female (488, 60.2%) while males were 322, 39.8%. Vaccine concept hesitancy among males was 65.21% and rest were vaccinated (34.78%) (OR = 0.13) (95% CI = 0.096–0.177) (p = 0.0001). Same hesitancy from COVID-19 vaccine was same with females (66.80%). CONCLUSIONS: This study evaluated and shed light on vaccine hesitancy among sample of Iraqi medical students toward COVID-19 vaccination program and considered medical students as leaders and guides in the health system for increased planning and education of the population for COVID-19 vaccine acceptability.
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreThe rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreIn the present paper, an eco-epidemiological model consisting of diseased prey consumed by a predator with fear cost, and hunting cooperation property is formulated and studied. It is assumed that the predator doesn’t distinguish between the healthy prey and sick prey and hence it consumed both. The solution’s properties such as existence, uniqueness, positivity, and bounded are discussed. The existence and stability conditions of all possible equilibrium points are studied. The persistence requirements of the proposed system are established. The bifurcation analysis near the non-hyperbolic equilibrium points is investigated. Numerically, some simulations are carried out to validate the main findings and obtain the critical values of th
... Show MoreBackground: There is a clear debate about the role of bad oral habits (thumb-sucking and biting nails) and on oral health and the state of the dental caries, but there is no doubt that continuing these bad habits until advanced ages will lead to deep and difficult problems to solve. Objective: The purpose of study was to evaluate the effect of bad habits, include finger sucking and nail biting on dental caries among children aged from 6 to 10 years old. Subjects and methods: In Al-Hilla city, Iraq, a comparative study was conducted in which (200) primary school students aged between 6 to10 years old were involved. A questionnaire filled out by their parents was used to gather information related to the bad oral habit, and then all the stude
... Show MoreBackground: Asthma is a common chronic disease in children in which the body’s airways swell, preventing the lungs from filling with air, there are many different inflammatory cells involved in asthma which can synthesize and release cytokines which are recognized to be important in chronic inflammation and play a critical role in the inflammatory response. Objectives: to assess the local effect of ICS on oral tissue by measuring Interlukine-12 level and Candida albicans colony in saliva among12 year's old asthmatic children who were collected from AL- Zahra Center Advisory for Allergy and Asthma, and compares them with non-asthmatic children of the same age and gender.Type of the study: Cross –sectional study.Methods: The total samp
... Show MoreAbstract
The current research aims to identify the effectiveness of social stories in increasing social interaction among children with an autism spectrum disorder. The researcher used the single-subject design methodology (Single Subject Designs, SSD) with
(A-B) design to answer the research questions. The study sample consisted of (3) children with autism spectrum disorder enrolled in a transit daycare center in the Asir region, Saudi Arabia. The results of the study showed that there is a positive functional relationship between social stories and play to increase social interaction among children with autism spectrum disorder, which contributed to the acquisition and generalization of this behav
... Show MoreIn this paper, the theoretical cross section in pre-equilibrium nuclear reaction has been studied for the reaction at energy 22.4 MeV. Ericson’s formula of partial level density PLD and their corrections (William’s correction and spin correction) have been substituted in the theoretical cross section and compared with the experimental data for nucleus. It has been found that the theoretical cross section with one-component PLD from Ericson’s formula when doesn’t agree with the experimental value and when . There is little agreement only at the high value of energy range with the experimental cross section. The theoretical cross section that depends on the one-component William's formula and on-component corrected to spi
... Show More