Objective: To assess the Impact of Socio-economic status on age at menarche among secondary school students at
AL-Dora city in Baghdad, Iraq.
Methodology: This is a cross sectional study with multi-stage sampling was carried out during the period from the
3
th of December2013 to 12th of March 2014. The Sample comprised of 1760 girls, 1510 girls from urban area and
250 from rural area was included in the study. In first stage, selection of schools was done, and one class was
selected randomly from each level of Education, The data collection through a special questionnaire which Contain
the age of girl by year, class level, birth order, number of household, number of rooms, residency (urban/rural),
education level of parents, occupation of parents.
Results: The study showed that the mean age at menarche for adolescent secondary school girls in Al-Dora
was12.49±0.99 years, and the mean age at menarche of girls living in the urban area were 12.4±1.0 while 12.9±1.1
year for girls living in the rural area, which give a significant association, so the girls from urban area had earlier
menarche age than rural area, and earlier age at menarche of those girls who had fewer number of siblings than
those who had more siblings, Also the study discovered an earlier age at menarche in those girls whose Parents’
had a high educational level, occupation of mothers, While there was no association between occupation of father
and age at menarche.
Recommendation: According to the findings of the present study we recommended to further elaborated study is
required to estimate the age of menarche of Iraqi girls, because menarche age can vary by location, it may not be
possible to generalize these results to other communities in the Iraq government
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreA disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach
In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.
This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show More