Preferred Language
Articles
/
injns-198
Screening Program for Idiopathic Scoliosis by Adam's Bending Forward Test of Prepubertal Children at Primary Schools in Baghdad City
...Show More Authors

Objective: The study aimed to screen the prepubertal children for idiopathic scoliosis at earlier stages, and find
out the relationship between idiopathic scoliosis and demographic data such as age, sex, body mass index,
heavy backpacks, and heart & lung diseases.
Methodology: A descriptive study was conducted on screening program for prepubertal children in primary
schools at Baghdad city, starting from 24th of February to the end of October 2010. Non- probability
(purposive) sample of 510 prepubertal children were chosen from primary schools of both sides of Al-Karkh
and Al-Russafa sectors. Data was collected through a specially constructed questionnaire format include (24)
items multiple choice questions, and researcher observation. The validity of the questionnaire was determined
through a panel of experts related to the field of the study, and the reliability through a pilot study. The data
were analyzed through the application of descriptive statistical analysis frequency, & percentages, and
inferential statistical analysis, chi-square, are used.
Results: The study results revealed that most of the prepubertal children have idiopathic scoliosis, two third of
the sample (88.4%) were at age 10-12 years and mostly boys. There is highly significant association with (low
Body Mass Index & carry of the school backpack) but no significant association with the age, gender, and lung
& heart diseases. There is highly significant association between prepubertal children's idiopathic scoliosis signs
& the researcher observation for the prepubertal body feature, and Adam's Bending Forward Test which
revealed highly significant association with their idiopathic scoliosis. The results of the study reflect that the
majority of prepubertal children's idiopathic scoliosis deformities have significant association at early detection
than the other spinal deformities (kyphosis & kyphoscoliosis).
Recommendation: The researchers recommended that Ministry Of Health should activate the screening program
of scoliosis within school health service programs, and Ministry of Education should be involved their teachers in
the screening & training program.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Fri Jan 05 2018
Journal Name
Asian Quarterly: An International Journal Of Contemporary Issue
Refugees and the Challenges for Language Education (LE): A Theoretical Study
...Show More Authors

DBN Rashid, Asian Quarterly: An International Journal of Contemporary Issue, 2018

View Publication
Publication Date
Wed Jan 01 2020
Journal Name
African Journal Of Hospitality, Tourism And Leisure
Social responsibility for tourism companies and its reflection on strategic reputation
...Show More Authors

Scopus
Publication Date
Sat Sep 04 2021
Journal Name
Neuroquantology
Nanotechnology and the Most Important Characterization Techniques for Nanomaterial's: A Review
...Show More Authors

Due to the importance of nanotechnology because of its features and applications in various fields, it has become the focus of attention of the world and researchers. In this study, the concept of nanotechnology and nanomaterials was identified, the most important methods of preparing them, as well as the preparation techniques and the most important devices used in their characterization.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
Bacteriological and Cytological study For bronchial washes from lung cancer patients
...Show More Authors

The study included the collection of 75 bronchial wash samples from patients suspected to have lung cancer. These samples were subjected to a diagnostic cytological study to detect the dominant type of lung cancer. It was noticed that 33 patients proved to have a lung cancer out of 75 (44%) of these, 19 cases (57.6%)were diagnosed having Squamus cell carcinoma,7cases (21.21%) showed Adenocarcinoma ,6 cases (18.18%) were having small cell carcinoma while only one case (3.03%)was large cell carcinoma .Nearly 70% of cases were correlated with smokers .Bacteria were isolated from 53 patients in which 33 isolates were associated with the cancer cases while 20 of them from non infected patients. By using different morphological ,biochemical test

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A Comparison Between Two Shape Parameters Estimators for (Burr-XII) Distribution
...Show More Authors

This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider  because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Materials Chemistry And Physics
BC2N nanotube as a promising anode for rechargeable calcium ion batteries
...Show More Authors

Because of cost-effective production and abundant resources of calcium, Ca-ion batteries (CIBs) are an appropriate option to alternate Li-ion batteries (LIBs). A new category of anode materials for CIBs has emerged since the successful synthesis of carbon nanotubes, which are B and N doped derivatives of it. For high-performance CIBs, BC2N nanotube (BC2NNT) has been studied as promising anode materials. In order to comprehend electrochemical attributes, cycling stability, and adsorption behavior of BC2NNT, first-principles computations have been executed. Based on nuclear magnetic resonance computations, two types of hexagonal rings (B2C2N2 (I) and BC4N (II)) were specified that are non-aromatic. Ca has adsorption on B2C2N2 and BC4N with ad

... Show More
View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 22 2016
Journal Name
Brazilian Journal Of Physics
Alpha Decay Preformation Factors for Even–Even 280–316116 Superheavy Isotopes
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF