Objective: The study aimed to screen the prepubertal children for idiopathic scoliosis at earlier stages, and find
out the relationship between idiopathic scoliosis and demographic data such as age, sex, body mass index,
heavy backpacks, and heart & lung diseases.
Methodology: A descriptive study was conducted on screening program for prepubertal children in primary
schools at Baghdad city, starting from 24th of February to the end of October 2010. Non- probability
(purposive) sample of 510 prepubertal children were chosen from primary schools of both sides of Al-Karkh
and Al-Russafa sectors. Data was collected through a specially constructed questionnaire format include (24)
items multiple choice questions, and researcher observation. The validity of the questionnaire was determined
through a panel of experts related to the field of the study, and the reliability through a pilot study. The data
were analyzed through the application of descriptive statistical analysis frequency, & percentages, and
inferential statistical analysis, chi-square, are used.
Results: The study results revealed that most of the prepubertal children have idiopathic scoliosis, two third of
the sample (88.4%) were at age 10-12 years and mostly boys. There is highly significant association with (low
Body Mass Index & carry of the school backpack) but no significant association with the age, gender, and lung
& heart diseases. There is highly significant association between prepubertal children's idiopathic scoliosis signs
& the researcher observation for the prepubertal body feature, and Adam's Bending Forward Test which
revealed highly significant association with their idiopathic scoliosis. The results of the study reflect that the
majority of prepubertal children's idiopathic scoliosis deformities have significant association at early detection
than the other spinal deformities (kyphosis & kyphoscoliosis).
Recommendation: The researchers recommended that Ministry Of Health should activate the screening program
of scoliosis within school health service programs, and Ministry of Education should be involved their teachers in
the screening & training program.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreDBN Rashid, Asian Quarterly: An International Journal of Contemporary Issue, 2018
Due to the importance of nanotechnology because of its features and applications in various fields, it has become the focus of attention of the world and researchers. In this study, the concept of nanotechnology and nanomaterials was identified, the most important methods of preparing them, as well as the preparation techniques and the most important devices used in their characterization.
The study included the collection of 75 bronchial wash samples from patients suspected to have lung cancer. These samples were subjected to a diagnostic cytological study to detect the dominant type of lung cancer. It was noticed that 33 patients proved to have a lung cancer out of 75 (44%) of these, 19 cases (57.6%)were diagnosed having Squamus cell carcinoma,7cases (21.21%) showed Adenocarcinoma ,6 cases (18.18%) were having small cell carcinoma while only one case (3.03%)was large cell carcinoma .Nearly 70% of cases were correlated with smokers .Bacteria were isolated from 53 patients in which 33 isolates were associated with the cancer cases while 20 of them from non infected patients. By using different morphological ,biochemical test
... Show MoreThis paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame
... Show MoreBecause of cost-effective production and abundant resources of calcium, Ca-ion batteries (CIBs) are an appropriate option to alternate Li-ion batteries (LIBs). A new category of anode materials for CIBs has emerged since the successful synthesis of carbon nanotubes, which are B and N doped derivatives of it. For high-performance CIBs, BC2N nanotube (BC2NNT) has been studied as promising anode materials. In order to comprehend electrochemical attributes, cycling stability, and adsorption behavior of BC2NNT, first-principles computations have been executed. Based on nuclear magnetic resonance computations, two types of hexagonal rings (B2C2N2 (I) and BC4N (II)) were specified that are non-aromatic. Ca has adsorption on B2C2N2 and BC4N with ad
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show More