Objective: The study aim is to identify factors that may contribute to children’s weight status variations. Methodology: A descriptive cross sectional study is carried out has been conducted at the AL- Samawah city in Primary Health Care Centers for the purpose of the screening children’s weight status of Age One to five Years Old. This study is started from December 16th 2018 to February 14th 2019. A(non propriety) purposive sample comprised of (20) primary health centers (10 main and 10 sub) are selected of 500 children who visit the primary health care center during the period for the purpose of the study; Data was collected through using a questionnaire designed and developed for the purpose of the study . It consists of two main parts: Part I. Mother Demographic Characteristics, Medical and Surgical History during Pregnancy, Obstetric History and Mothers Nutrition during Pregnancy and Lactation. . Part II: Childes Demographic Characteristics, Medical and Surgical History, Immunization, and Child Nutrition. Data collected by the researcher from children’s families through interview and filling a questionnaire format, while the section of anthropometric measurements carried out by the researcher after measuring weight and height doing Body Mass Index calculation Validity of the study instrument was determined through a panel of experts and reliability of the instrument was determined. The analysis of the data used was descriptive statistics and statistical inferential. Recommendations: The ministry of health can develop and implement effective strategies for the detection and treatment of malnutrition among children.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show Moreاطروحة ازمة كشمير واثرها على العلاقات الهندية - الباكستانية
يعد موضوع البرنامج النووي الايراني من الموضوعات التي تحظى بأهمية كبيرة في مجال الدراسات الدولية بشكل عام والدراسات الاستراتيجية بشكل خاص، وذلك لكونه لا يتعلق بمستقبل الجمهورية الاسلامية الايرانية فحسب بل بمستقبل منطقة الشرق الاوسط ولاسيما منطقة الخليج العربي، وهو ذو صله وثيقة بمستقبل انتشار الاسلحة النووية بين دول المنطقة والذي قد يؤدي انتشارها الى حروب اقليمية وقد يوظف فيها هذا النوع من الاسلحة النووية،
... Show MoreWithin the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreIn this research local wheat peel was used as an adsorbent surface for removal of Azure B (AB) dye from the aqueous solution. The adsorption process was performed at different experimental parameters, equilibrium time, temperature, ionic strength and solution pH. The isotherms of adsorption are of H-type as compared with Giles curves and the adsorption data were coincide with Freundlich equation. The adsorption kinetic data were analyzed using pseudo- first and second order kinetic models. The effect of temperature was studied and the amount of dye adsorbed was found to increase with the increasing of temperature from 25 to 50 oC. The values of thermodynamic functions like enthalpy and entropy have been estimated. The quantity of adso
... Show MoreThis study synthesized zeolite 4A, and hierarchical composite structure consisting of zeolite 4A- carbon were successfully prepared. Hydrothermal method was used to grow a layer of zeolite 4A over porous carbon surfaces to enhance mass transfer and increase surface area of zeolite. The products then were used to remove radioactive cesium137Cs from liquid wastewater. Iraqi dates leaves midribs (DM) were used as locally available agricultural waste to prepare low- cost porous carbon, using carbonization method in tubular furnace at 900C for two hours. Hierarchical porous structures including zeolite are prepared by mechanically activating the carbon surface via Ultrasonicating nanoparticles suspension of ground zeolite type 4A.F
... Show MoreAgricultural nozzles usually produce a different drops size depending on the pressure and the physical condition (work life) of the nozzle besides producing a wide range of the drops spectrum in the spray cloud. In this paper the standard flat fan nozzles were investigated regarding the effect of the working pressure and the nozzle physical condition (new and worn nozzles). The size of drops and the spectrum of drops across the long axis of the spray pattern were examined by using Sympatec GmbH Laser Diffraction. Reducing the working pressure from 3 to 2 and then to 1 caused production of larger drops, also using worn nozzles (especially with lower pressure) changed the drops size whi