Preferred Language
Articles
/
injns-235
Impact of Adolescents' Family Meal Eating Patterns upon their Weight Control Behaviors at Secondary Schools in Baghdad City
...Show More Authors

Objective: The study aimed to identify the adolescents' family meal eating patterns, and find out the relationship between adolescents' family meal eating patterns and their weight control behaviors. Methodology: A descriptive study was conducted on impact of adolescents' family meal eating patterns upon their weight control behaviors in secondary schools at Baghdad city, starting from 20th of April 2013 to the end of October 2014. Non- probability (purposive) sample of 1254 adolescents were chosen from secondary schools of both sides of Al-Karkh and Al-Russafa sectors. Data was collected through a specially constructed questionnaire format include (54) items multiple choice questions. The validity of the questionnaire was determined through a panel of experts related to the field of the study, and the reliability through a pilot study. The data were analyzed through the application of descriptive statistical analysis frequency, & percentages, and inferential statistical analysis, chi-square, are used. Results: The study results revealed the study sample mostly (38.4%, 40.3%, 40.3%, 31.4%, 38.5%, 41.4%, and 33.1%) always and sometimes eat meals rich with fat, carbohydrate and sweetly elements shown that in breakfast meal like fried eggs, fried vegetables and cream, better with jam, while in lunch and dinner mostly the adolescents and their family (41.0%, 67.2%, 55.7%, 37.7%, 52.5%, 41.3%, 32.3%, 41.2%, and 31.4%) sometimes interest bringing and eating burger, shawerma and falafel sandwich from out, also half percent the study sample sometimes eating healthy foods like cooking and fresh colure vegetables at home, more than one third and half of them (37.4%)and (38.1%)daily and sometimes eat fast food in or out home. The study sample eating habits with the family at home, eating snacks, fast food in and out home, have highly significant association with their total weight control behaviors methods. Recommendation: The study recommended that should adolescents' family have more intervention to follow regular mealtime and eating healthy foods to prevent and protect them from excessive risk weight gain at future.

 
 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 20 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis, Characterization and Biological Activity of New Compounds Derived from Dapsone
...Show More Authors

New derivatives of the anti-inflammatory, leprostatic drug dapsone 4 are synthesized, characterized and biologically screened by the treating the drug dapsone with chloroacetyl chloride in the presence of base. Both amino groups are acylated to give compound 6. The symmetrical acylated product then treated with Phenol, N-Acetyl-p-aminophenol, p-Chlorophenol, m-Chlorophenol, o-Hydroxybezoic acid and m-Hydroxybezoic acid to give compounds 8(a-f). The antimicrobial activity was tested for the synthesized compounds; activates were good compared to the parent drug. All the new compounds have scanned for their biological activities toward gram ‒ve and gram +ve (M. tuberculosis, S. pneumoniae, E. coli and P. mirabilis) bacteria, the synthesized

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
A New Approach for Developing Spectrophotometric Determination of Phenylephrine Drug in Pure, Pharmaceutics and Serum Samples Using Sodium Periodate as Oxidizing Agent via a Green Method of CFIA/Merging Zone Technique
...Show More Authors

     The research involved a rapid, automated and highly accurate developed CFIA/MZ technique for estimation of phenylephrine hydrochloride (PHE) in pure, dosage forms and biological sample. This method is based on oxidative coupling reaction of 2,4-dinitrophenylhydrazine (DNPH) with PHE in existence of sodium periodate as oxidizing agent in alkaline medium to form a red colored product at ʎmax )520 nm (. A flow rate of 4.3 mL.min-1 using distilled water as a carrier, the method of FIA proved to be as a sensitive and economic analytical tool for estimation of PHE.

Within the concentration range of 5-300 μg.mL-1, a calibration curve was rectilinear, where the detection limit was 3.252 μg.mL

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Controlling the Unbalanced Voltages of a Series-Connected Lead-Acid Batteries in a PV Power Storage System using Dynamic Capacitor Technique
...Show More Authors

Lead-acid batteries have been used increasingly in recent years in solar power systems, especially in homes and small businesses, due to their cheapness and advanced development in manufacturing them. However, these batteries have low voltages and low capacities, to increase voltage and capacities, they need to be connected in series and parallel. Whether they are connected in series or parallel, their voltages and capacities must be equal otherwise the quality of service will be degraded. The fact that these different voltages are inherent in their manufacturing, but these unbalanced voltages can be controlled. Using a switched capacitor is a method that was used in many methods for balancing voltages, but their respons

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The effect of the strategy of asking clustered questions on the acquisition and retention of the general Arabic language subject among students of the College of Languages
...Show More Authors

An experiment in the semester, the second semester of the academic year (2022-2023), and the data used was not processed (the second test for two independent, inaccurate samples, the Bermon correlation coefficient, and the Spearman correlation coefficient), and the following results were reached: There is a statistically significant difference at the level of ( 0) average, 05) between the third grade who studied the plan for asking cluster questions, and between the average of those who studied the special feature according to the traditional method of selecting achievement, and enjoyed completing the specialization, choosing the experimental group, because the strategy of asking cluster questions is one of the externalities that... Lear

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFECT OF ANIMAL FEED SUPPLEMENTATION WITH DIFFERENT CONCENTRATIONS OF FENUGREEK SEEDS (Trigonellafoenumgraecum) ON ANIMAL PRODUCTION AND MICROBIAL CHICKEN MEAT.: EFFECT OF ANIMAL FEED SUPPLEMENTATION WITH DIFFERENT CONCENTRATIONS OF FENUGREEK SEEDS (Trigonellafoenumgraecum) ON ANIMAL PRODUCTION AND MICROBIAL CHICKEN MEAT.
...Show More Authors

This study was conducted in the poultry field of Al-Mustansiriya University/ Baghdad, to show the effect of adding different levels 0, 1, 5 and 10% of the fenugreek seeds in the rations containing many contaminated microbes on the productive performance of broilers. 150-day-old rose meat was used with a 41 average weight (gm), were randomly allocated to 4 treatments with 3 replicates, and for each treatment 15 chicks per repetition: 0, 1, 5, and 10% (T0-T3), respectively. The results of this study showed that fenugreek seeds contain good amounts of protein, fat, ash and carbohydrates, which are 24.92, 8.82, 3.08 and 54.28 respectively. Fenugreek seeds also have high levels of tannins, coumarins and flavones, followed by saponins,

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Reliability Estimation Of Fuzzy Failure Times Of Free Distribution And It Use To Estimate The Fuzzy Reliability Of Mosul Dam
...Show More Authors

The way used to estimate the fuzzy reliability differs according to the nature of the information of failure time which has been dealt in this research.The information of failure times has no probable distribution to explain it , in addition it has fuzzy quality.The research includes fuzzy reliability estimation of three periods ,the first one from 1986 to 2013,the second one from 2013 to 2033 while the third one from 2033 to 2066 .Four failure time have been chosen to identify the membership function of fuzzy trapezoid represented in the pervious years after taking in consideration the estimation of most researchers, proffional    geologists and the technician who is incharge of maintaining of Mosul Dam project. B

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Collection, Storage and Protein Extraction Method of Gingival Crevicular Fluid for Proteomic Analysis
...Show More Authors

Gingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
An Investigation of Corona Domination Number for Some Special Graphs and Jahangir Graph
...Show More Authors

In this work,  the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref