Objective(s): To determine the effectiveness of lactation counseling on maintenance of breastfeeding after
cesarean section for study group.
Methodology: A quasi-experimental study was conducted on non probability sample (purposive) of (60) women
who had cesarean section and sample divided in to two groups (30) of them as a study group from Fatima AlZahra'a
Maternity and Pediatric Teaching Hospital & implement lactation counseling on it and another group (30)
as control group from Baghdad Teaching Hospital in Baghdad City. Study implemented for the period of April 24th
2011 to August 2nd 2011. A questionnaire was used as a tool of data collection to fulfill with objective of the study
and consisted of three parts, including demographic, reproductive characteristics and maintenance of
breastfeeding of the sample. A pilot study was carried out to test the reliability of the questionnaire and content
validity was carried out through the 11 experts. Descriptive and inferential statistical analyses were used to
analyze the data.
Results: The results of the study revealed that most mothers their ages within ideal fertility age which ranged
between (20-24) years, and most of them had low educational level, and were housewives, and live in urban
area, with moderate socioeconomic status, and (53.3%), (50%) respectively of them were primigravida. The
study shows that (100%) of the study group had continued breastfeeding, while (76.7%) of the control group had
continued breastfeeding and the reasons for discontinuation of breastfeeding for control group are not enough
milk and newborn refuse lactation, (73.3%) of the study group had exclusive breastfeeding, while (26%) of the
control group had exclusive breastfeeding.
Recommendations: The study recommended to reactivate the role of Baby-Friendly Hospitals Initiative in
promoting of breastfeeding by implementation of ten steps successful of breastfeeding, and breastfeeding
counseling for women during pregnancy and after birth especially who have cesarean section which has important
role on maintenance of breastfeeding up to 6 months after birth.
RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show MoreCybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreVol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreResearch title: Ruling on abortion in Sharia and law.
The importance of research: Projection is of great importance because it touches the life of a living being who enjoys human qualities. However, this organism often wastes its rights and does not protect its human beings. These souls are lost in millions by the sake of casual desire or hidden desire.
The research plan: The research dealt with an introductory topic, four topics, and in each topic there are demands, branches, and a conclusion.
The most important findings of the study: The ruling on aborting the fetus in the Sharia is only permissible (and the necessity is valued at its va
... Show MoreTolerance and its impact on building society