Breastfeeding (BF) serves as a complete nutritional source for the first six months of infant’s life. Breast milk contains all essential nutrients that necessary for the physiological growth and development of infants. The aim of this study was to compare the physiological growth of infants including weight, height and head circumference who were exclusively breastfed for 6 months and those who were given bottle-fed or mixed fed and to find a percentage of exclusive breastfeeding among mothers who contributed in this study in Sulaimani city. This study was carried out in Sulaimani city/ Kurdistan region of Iraq and the cases were enrolled between the first of October 2018 and first of October 2019. The infants’ weight, height and head circumstances were measured at different age levels (At age two, six, nine and fifteen months). The results of this study found that Among 198 mothers who were contributed in this study; 92 (46.5%) of mothers had EBF while 90 (45.5%) had mixed feeding and only 16 (8%) had exclusive formula feeding (EFF) in the first six months of baby’s life. Infant’s weight at age 2 months were no differences between types of feeding. However, at ages 6 and 9 were significantly high in infants who breastfed compared to formula fed but no differences were found between EBF and mixed feeding. At age 15 months weights of infants were again no differences were found between all types of feeding. For height parameter, infants who exclusively breastfed for six months were significantly higher than those of formula fed at age 2, 6, 9 and 15 months. Regarding head circumferences no significant differences between types of feeding at age 2 months were showed. Nevertheless, at age 6 and 15 months were significantly high in infants who breastfed than formula fed. The present study conclude that infants who breast fed for first six months of life have a higher weight, height and head circumferences than infants who exclusively formula fed. The percentage of EBF among Kurdish mothers were similar with other countries of Iraq but was low compared to the recommended rate of WHO.
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Aim of the study: Using surface roughness and tensile bond strength tests, the objective of this investigation was to ascertain the impact of laser surface modification on the binding strength of injectable thermoplastic acrylic denture base material to acrylic-based soft-liner material. Materials and methods: Acrylic base soft liner material was bonded to injectable thermoplastic acrylic resin (Deflex). Forty specimens were created (20 disc, 20 dumbbells) 10 of each specimen type as control specimens, and 10 were treated with nano pulse Nd: YAG laser. The data were analyzed using the Kruskal-Wallis test and unpaired t-test (a=.05) and the roughness test was performed utilizing a double column universal test machine. Results: Compar
... Show MorePolynomial IIR digital filters play a crucial role in the process of image data compression. The main purpose of designing polynomial IIR digital filters of the integer parameters space and introduce efficient filters to compress image data using a singular value decomposition algorithm. The proposed work is designed to break down the complex topic into bite-sized pieces of image data compression through the lens of compression image data using Infinite Impulse Response Filters. The frequency response of the filters is measured using a real signal with an automated panoramic measuring system developed in the virtual instrument environment. The analysis of the output signal showed that there are no limit cycles with a maximum radius
... Show MoreThe research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.
The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.
Shabak is one of minority related to Kurdish nation , speaking Bajalan variety especially Goran Dialect.
This study is a historic and diactological study about Kurdish Bajalan variety.The study is composed an introduction and tw0 chapters. The first chapter talks about Bajalan variety , and it has two axes . In the first axe , I talk about the geography of Bajalan variety and in the second axes the map of goran dialect . The second chapter is about Shabak variety and it is constituted of three axes : The first section is about Shabak variety , in the second section is allocated to the domicile of Shabak variety and in the third section , talks about the saint of shabak and in the end the
... Show MoreThroughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.