This article discusses the change of values in urban family, because of various communication media and modern technologies as one of the most important factors affecting the changing family values in urban areas, this means becoming part of urban life. And focuses on the family in urban areas, for the privacy of the social, economic, demographic and cultural help to this effect, and because cities are the most friction and interaction with modern technologies.
Background: Hypertension and dyslipidemia are
cardiovascular risk factors that commonly coexist .
Objective : To evaluate the effects of ß - blocker
(Atenolol) , ACE inhibitor (Captopril) calcium Channel
blocker (Nefidipin ) and diuretics on serum lipid profiles .
Method: Thirty untreated hypertensive and 147
hypertensive patient treated with these antihypertensive
drugs, attending different public health clinics in Basrah
pronivce were enrolled in this study .
Serum lipid profile were determined enzymaticaly using kits
from BioMerieux, France .
Result : The study has revealed that ß-blocker do not
significantly affect total cholesterol ( TC ) and LDLcholesterol , but increase significantly triglycer
Back ground: AIDS is considered a dreaded disease.
According to recent estimates, 42 million people suffer
from HIV/AIDS (90% of these being in the developing
countries), with 5 million people newly infected with HIV
and 3.1 million deaths in the year 2002 globally. At
present, there is no effective vaccine to prevent the
disease. Hence, Health education (Information, Education
and Communication) activities bringing about behavioral
changes in the community, promoting healthy sexual
behavior and preventing the risky ones is the best possible
solution to the problem of AIDS.
Objectives: To find out the knowledge, beliefs and
attitudes regarding various aspects of HIV/AIDS amongst
intermediate and sec
Theoretical and experimental investigations have been carried out on developing laminar
combined free and forced convection heat transfer in a vertical concentric annulus with uniformly
heated outer cylinder (constant heat flux) and adiabatic inner cylinder for both aiding and opposing
flows. The theoretical investigation involved a mathematical modeling and numerical solution for
two dimensional, symmetric, simultaneously developing laminar air flows was achieved. The
governing equations of motion (continuity, momentum and energy) are solved by using implicit
finite difference method and the Gauss elimination technique. The theoretical work covers heat flux
range from (200 to 1500) W/m2, Re range from 400 to 2000 an
This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreTraditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreBackground: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.
Objective: This study aims to determine the agreement between actual and perceived body image in the general population.
Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for ass
... Show MoreThe seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.
The research demonstrates new species of the games by applying separation axioms via sets, where the relationships between the various species that were specified and the strategy of winning and losing to any one of the players, and their relationship with the concepts of separation axioms via sets have been studied.