Preferred Language
Articles
/
injns-46
Assessment of Psychological Problems for Institutionalized and Noninstitutionalized Geriatric People in Baghdad City
...Show More Authors

objective : To assess for Psychological Problems. The study was carried out from 1st of December 2004 to 15th
March, 2005.
Mythology : A descriptive comparative study was conducted for elder in the geriatric home and the community;
A questionnaire was constructed to achieve the purposes of the study; it includes two parts dealing with the
elder demographic characteristics and psychological problems.
A purposive (no probability) sampling of (100) elderly include (50) elderly from the Geriatric Home and (50)
elderly from the community.
Data were collected and analyzed through a descriptive statistical approach (frequency, percentage, mean and
mean of scores, Standard deviation, Relative Sufficiency).
Result : the study concluded that Most of institutionalized geriatric people suffer from psychological problems
(Cognitive disorders( Sever Amnesia (RS(73.33%)), Mental confusion (RS(71.33%));Anxiety (RS(88%));
Depression (Sever sadness (RS(84.67%)); Anger(RS(94.67%)) ; and Low self-esteem (Feeling of in confidence
about future (RS(75.33%)) more than those who live in noninstitutionalized. The study recommended that
families who were caring for elderly person should receive financial support from government and establishing
geriatric centers for dealing with special medical, and psychological problems...

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Lithology and minerals identification from well logs for Mishrif Formation in Ratawi oilfield
...Show More Authors

   Lithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id

... Show More
View Publication
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Suggestive Framework for Applying Performance and Programs Budget in Iraqi Government Units Environment
...Show More Authors

Abstract

This research  aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This  is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 20 2024
Journal Name
Ingénierie Des Systèmes D Information
Enabling Technologies for Ultra-Low Latency and High-Reliability Communication in 6G Networks
...Show More Authors

View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
Abolition and suspension in the verbs of the novice and the news
...Show More Authors

In the Name of God, the Most Gracious, the Most Merciful
     Praise be to God, who taught the pen anthropology unless he knows, and peace and blessings be upon the master of bullying, and the imam of the eloquent Prophet Muhammad, the sincere and faithful, and his family and companions as a whole and whoever followed him to the Day of Judgment. And after:
       The science of grammar is among the most important of all language sciences at all, if not the most important of its sciences, due to the multiplicity of its doctrines and schools, the diversity of its methods, its phenomena and subjects, as well as the connection of this science with the most honorable languages,

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Wilson's Disease; Clinical Presentations among Patients Attending Gastroenterology Clinic/ Baghdad Teaching Hospital
...Show More Authors

Background:Wilson’s disease (WD) is an inherited
disorder of copper metabolism that is characterized
by tremendous variation in the clinical presentation.
Objective: To assess demographic distribution,
clinical presentations, diagnostic evaluation, and any
association between clinical presentations and other
studied variables of a sample of Iraqi patients with
WD.
Methods: A descriptive cross sectional study with
analytic elements was conducted during 2011, from
the 1st of February till the 10th of June. The sampling
method was a convenient non-random one, carried
out through consecutive pooling of registered WD
patients. A questionnaire-form paper had been
developed for the process of data col

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The importance of providing Islamic finance services for non- Muslims in Europe
...Show More Authors

Abstract

             This paper follows the growing interest and continuity of Islamic finance products worldwide, which has encouraged the formulation of financial institutions based on the concepts of Islamic Sharia in many countries of the world and is no longer limited to Islamic countries only, and  Not exclusive to Muslims which is due to Islamic finance services and their ability to apply in non-Islamic societies, and perhaps what encouraged the development and progress of this industry Islamic history, which was attended by many different models With the development of trade's share between different countries as well as trips carried out by Muslims

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 30 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology,
Effect of Diabetes and Hypertension on Right Carotid Artery Intima Media Thickness and Variable Spectral Waveform Indices And Parameters in Relation To Age for Iraqi Patients
...Show More Authors

Background: Arterial stiffness is related with atherosclerosis and cardiovascular disease events. Patients with atherosclerotic disease show to have larger diameters, reduced arterial compliance and lower flow velocities. Aim of study : To compare between patients of two age groups with concomitant diseases diabetes and hypertension in regard to intima media thickness and blood flow characteristics in order to estimate the blood perfusion to the brain via the common and internal carotid arteries. Subject and Methods : 40 patients with (diabetic and hypertension) diseases were enrolled , they were classified according to age. Color Doppler and B mode ultrasound was used to determine lumen Diameter (D), Intima – media thickness (IMT)

... Show More
Scopus (1)
Scopus