Objective: To assess the Impact of Socio-economic status on age at menarche among secondary school students at
AL-Dora city in Baghdad, Iraq.
Methodology: This is a cross sectional study with multi-stage sampling was carried out during the period from the
3
th of December2013 to 12th of March 2014. The Sample comprised of 1760 girls, 1510 girls from urban area and
250 from rural area was included in the study. In first stage, selection of schools was done, and one class was
selected randomly from each level of Education, The data collection through a special questionnaire which Contain
the age of girl by year, class level, birth order, number of household, number of rooms, residency (urban/rural),
education level of parents, occupation of parents.
Results: The study showed that the mean age at menarche for adolescent secondary school girls in Al-Dora
was12.49±0.99 years, and the mean age at menarche of girls living in the urban area were 12.4±1.0 while 12.9±1.1
year for girls living in the rural area, which give a significant association, so the girls from urban area had earlier
menarche age than rural area, and earlier age at menarche of those girls who had fewer number of siblings than
those who had more siblings, Also the study discovered an earlier age at menarche in those girls whose Parents’
had a high educational level, occupation of mothers, While there was no association between occupation of father
and age at menarche.
Recommendation: According to the findings of the present study we recommended to further elaborated study is
required to estimate the age of menarche of Iraqi girls, because menarche age can vary by location, it may not be
possible to generalize these results to other communities in the Iraq government
One of the troublesome duties in chemical industrial units is determining the instantaneous drop size distribution, which is created between two immiscible liquids within such units. In this work a complete system for measuring instantaneous droplet size is constructed. It consists of laser detection system (1mW He-Ne laser), drop generation system (turbine mixer unit), and microphotography system. Two immiscible liquids, water and kerosene were mixed together with different low volume fractions (0.0025, 0.02) of kerosene (as a dispersed phase) in water (as a continuous phase). The experiments were carried out at different rotational speed (1180- 2090 r.p.m) of the turbine mixer. The Sauter mean diameter of the drops was determined by la
... Show MoreExpired drug Metoclopramide was investigated as an antibacterial corrosion inhibitor for carbon steel in 0.5M H3PO4 solution using the electrochemical method at 30oC and 60oC. The results showed that this drug is an efficient inhibitor for carbon steel and the efficiency reached to 82.244 % for 175 ppm at 30oC and 76.146% for 225 ppm at 60oC. The adsorption of drug on carbon steel surface follows Langmuir adsorption isotherm with small values of adsorption-desorption constant. The polarization plots revealed that Metoclopramide acts as mixed-type inhibitor. Some parameters of inhibition process were calculated and discussed. The surface morphology of the carbon steel speci
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreIn this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreIn the present work, the feasibility of formation near-ideal ohmic behavior of In/n-Si contact efficiently by 300 s duration Nd:YAG pulsed laser processing has been recognized. Several laser pulses energy densities have been used, and the optimal energy density that gives best results is obtained. Topography of the irradiated region was extensively discussed and supported with micrographic illustrations to determine the surface condition that can play the important role in the ohmic contact quality. I-V characteristics in the forward and reverse bias and barrier height measurements have been studied for different irradiated samples to determine the laser energy density that gives best ohmic behavior. Comparing the current results with
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More