Objective: to evaluate body image and depression symptoms of children with precocious puberty, and find out association between children`s sociodemographic characteristics and their body image and depression signs. Methodology: A cross sectional study, sample of (80) child from both gender, > 7 years were included due to their ability to express their own feeling, diagnosed with precocious puberty, attending out-patient endocrine clinics at pediatric hospitals in Baghdad city. Data collected, during the period from May to November 2018. Consent form has taken from children and their guardians to participate in study. Child body image scale (CBIS) was used to evaluate children body satisfaction (1) and Mood and feeling questionnaire (M&FQ) to evaluate children degree of depression symptoms (2), the approved has taken from the ownership directly. SPSS version 23 was used to analyze data by applying descriptive analysis (percentages, frequencies and mean) as well as inferential analysis (T-test). Results: the finding shows that most children with precocious puberty experience body dissatisfaction, more than half of children experience depression signs, school achievement shows significant association with their depression signs. Recommendation: the study recommend to emphasis on psychosocial assessment during routine physical examination, in addition to provide psychological support for those children especially girls
Abstract: A novel design of Mach Zehnder Interferometer (MZI) in terms of using special type of optical fiber that has double clad with graded distribution of the refractive index that can be easily implemented practically was suggested and simulated in this work. The suggested design is compact, rapid, and is simple to be modified and tested. The simulated design contains a MZI of 1546.74 nm of central wavelength that is constructed using special type of double clad optical fiber that has two different numerical apertures. The first aperture will supply single mode propagation via its core, while the second numerical aperture supports a zigzag wave propagation (multimode) in the first clad region. The interferometer’s
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreExamining and comparing the image quality of degenerative cervical spine diseases through the application of three MRI sequences; the Two-Dimension T2 Weighed Turbo Spin Echo (2D T2W TSE), the Three-Dimension T2 Weighted Turbo Spin Echo (3D T2W TSE), and the T2 Turbo Field Echo (T2_TFE). Thirty-three patients who were diagnosed as having degenerative cervical spine diseases were involved in this study. Their age range was 40-60 years old. The images were produced via a 1.5 Tesla MRI device using (2D T2W TSE, 3D T2W TSE, and T2_TFE) sequences in the sagittal plane. The image quality was examined by objective and subjective assessments. The MRI image characteristics of the cervical spines (C4-C5, C5-C6, C6-C7) showed significant difference
... Show MoreThe searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding pro
... Show MoreIn this paper, we develop the work of Ghawi on close dual Rickart modules and discuss y-closed dual Rickart modules with some properties. Then, we prove that, if are y-closed simple -modues and if -y-closed is a dual Rickart module, then either Hom ( ) =0 or . Also, we study the direct sum of y-closed dual Rickart modules.
Digital image started to including in various fields like, physics science, computer science, engineering science, chemistry science, biology science and medication science, to get from it some important information. But any images acquired by optical or electronic means is likely to be degraded by the sensing environment. In this paper, we will study and derive Iterative Tikhonov-Miller filter and Wiener filter by using criterion function. Then use the filters to restore the degraded image and show the Iterative Tikhonov-Miller filter has better performance when increasing the number of iteration To a certain limit then, the performs will be decrease. The performance of Iterative Tikhonov-Miller filter has better performance for less de
... Show MoreThe research aimed to statement, which impact that the development of Iraqi auditing standards in the fight against corruption and to fulfill the reform requirements by conducting a comparative study analysis with a framework proposal to amend the Iraqi Audit directory number statement (6) issued by the Accounting and Auditing Standards Board of the Republic of Iraq dated 08/24/2002 on audit planning and supervision on the basis of the latest versions of international auditing standards in this regard.
The researchers concluded that there is a need to update the standards (evidence) audit accredited in the Republic of Iraq in accordance with international auditing standards to meet the requirements of the report of the external a
... Show MoreCertainly there is a negative impact on development due to corruption in its corruption forms It is administrative and financial as well as direct impact on all sectors Including the health sector, which has seen in Iraq a marked setback in performance and services , The research aims at the possibility of demonstrating the negative effects of financial and administrative corruption on health institutions and Inability to meet health needs The extent to which Regulatory institutions and institutions manage to reduce financial and administrative corruption and ways of dealing with it The phenomenon of financial and administrative corruption is the most serious phenomenon because of its impact on economic growth, which in turn impedes the
... Show MoreThis study has applied digital image processing on three-dimensional C.T. images to detect and diagnose kidney diseases. Medical images of different cases of kidney diseases were compared with those of healthy cases. Four different kidneys disorders, such as stones, tumors (cancer), cysts, and renal fibrosis were considered in additional to healthy tissues. This method helps in differentiating between the healthy and diseased kidney tissues. It can detect tumors in its very early stages, before they grow large enough to be seen by the human eye. The method used for segmentation and texture analysis was the k-means with co-occurrence matrix. The k-means separates the healthy classes and the tumor classes, and the affected
... Show MoreThe intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show More