Objective(s): To determine the effectiveness of lactation counseling on maintenance of breastfeeding after
cesarean section for study group.
Methodology: A quasi-experimental study was conducted on non probability sample (purposive) of (60) women
who had cesarean section and sample divided in to two groups (30) of them as a study group from Fatima AlZahra'a
Maternity and Pediatric Teaching Hospital & implement lactation counseling on it and another group (30)
as control group from Baghdad Teaching Hospital in Baghdad City. Study implemented for the period of April 24th
2011 to August 2nd 2011. A questionnaire was used as a tool of data collection to fulfill with objective of the study
and consisted of three parts, including demographic, reproductive characteristics and maintenance of
breastfeeding of the sample. A pilot study was carried out to test the reliability of the questionnaire and content
validity was carried out through the 11 experts. Descriptive and inferential statistical analyses were used to
analyze the data.
Results: The results of the study revealed that most mothers their ages within ideal fertility age which ranged
between (20-24) years, and most of them had low educational level, and were housewives, and live in urban
area, with moderate socioeconomic status, and (53.3%), (50%) respectively of them were primigravida. The
study shows that (100%) of the study group had continued breastfeeding, while (76.7%) of the control group had
continued breastfeeding and the reasons for discontinuation of breastfeeding for control group are not enough
milk and newborn refuse lactation, (73.3%) of the study group had exclusive breastfeeding, while (26%) of the
control group had exclusive breastfeeding.
Recommendations: The study recommended to reactivate the role of Baby-Friendly Hospitals Initiative in
promoting of breastfeeding by implementation of ten steps successful of breastfeeding, and breastfeeding
counseling for women during pregnancy and after birth especially who have cesarean section which has important
role on maintenance of breastfeeding up to 6 months after birth.
This study investigated the effect of using brainstorming as a teaching technique on the students’ performance in writing different kinds of essays and self regulation among the secondary students. The total population of this study, consisted of (51) female students of the 5th Secondary grade in Al –kawarzmi School in Erbil during the academic year 2015-2016. The chosen sample consisted of 40 female students, has been divided into two groups. Each one consists of (20) students to represent the experimental group and the control one. Brainstorming technique is used to teach the experimental group, and the conventional method is used to teach the control group. The study inst
... Show MoreThis mini review provides an overview of methods for manufacturing expanded graphite (EGT) and the use of its composites with metal oxides in the field of photodegradation of dyes. Dyes from textile manufacturing represent a significant environmental pollution problem in waterways worldwide, highlighting the need for environmentally friendly and efficient technologies to remove dyes from industrial and local wastewater. Photodegradation technologies offer a low-cost, sustainable solution with minimal secondary pollution. Carbon-based materials, such as expanded graphite, are advantageous in enhancing catalytic activity. Accordingly, this review will explore the different fabrication techniques of expanded graphite and summarize the recent d
... Show MoreBackground: In human life, malnutrition may adversely affect various aspects of growth at different stages of life. Teeth are particularly sensitive to malnutrition. Malnutrition may affect odontometeric measurement involving arch width and length of primary dentition. The aim of this study is to estimate the effect of nutrition on arch width and length dimension measurements among children aged 5 years old. Material and methods: This study was conducted among malnourished group in comparison to well-nourished group matching with age and gender. The present study included 158 children aged 5 years (78 malnourished and 80 well-nourished). The assessment of nutritional status was done by using three nutritional indicators, namely Height-for-a
... Show MoreIn this study is the phenomenon of desertification risk assessment in the Abu Ghraib area west of Baghdad/Iraq, which has an area of about (384.168 km 2), that the annual mean temperature is more than (22 C). Rainfall was low, ranging from the (200 mm) per year for Iraq and (2.82) mm per year of the study area* temperature is high and evaporation is also high (mm 7.73) per year*, so the climate in general of the dry type and the system of soil moisture is the kind of Aridic (Torric). To this study was to identify three indicators to monitor for the period from 2001-2005 using GIS and these indicators are (soil, groundwater and the nature of land use), using ArcGIS 9.1. The results showed that the risk of desertification was part of the leve
... Show MoreRooting response in stem cuttings of mung bean increased considerably with inresing
seedling age, due to endogenous IAA or supplied IBA. However, after the day 7- or 8-old of
seedling age. The cotyledons sheivel and drop-off spontaneously at day-8 of seedling age. So
that cotyledons excision after cuttings were made during the period between seedling
emergence (the day 4) and cotyledons dropping off (which starts at day 8 and its completion
at day 10) causes decrease in rooting at any time during cutting treatment ,in particular, at
zero time . In addition, results of this study revealed that terminal buds do not influence
significantly adventitious root formation whether IBA supplied or not. Whereas in leafless
c
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper