Preferred Language
Articles
/
iqjmc-1870
Caregivers’ Satisfaction toward Under-Five Health Care Services Provided at Primary Health Care Centers in Al Karkh, Baghdad, 2020
...Show More Authors

Background: Satisfied caregivers are more likely to return for further care and to recommend the primary health care center services to others. Satisfied caregivers usually are compliant with the medical provider advice and the recommended treatment plan. Compliance will eventually lead to better health outcomes.


Method
: A cross-sectional study with an analytic element was conducted during the period from the beginning of July to the end of September 2020. A convenient sample was collected from six primary health care centers in Al-Karkh side of Baghdad city where caregivers who attend those centers with their children for under-five health care services were interviewed using a structured questionnaire.Objective: To measure the caregivers’ satisfaction toward under-five health care services at primary health care centers in Baghdad Al-Karkh and their association with certain socio-demographic characteristics.

Results: A total of 500 caregivers were interviewed during the study period, the overall satisfaction was (64%). Caregivers were satisfied with primary health care centers cleanliness (77.8%), while they were highly dissatisfied with the communication with the nurses (78.8%), with the waiting time for a routine visit (74.6%), with nurses’ antiseptic methods (59.2%), and with the availability and adequacy of their children’s vaccines (65.4%).

Conclusions: The level of satisfaction of caregivers with under-five health care services provided at primary health care centers was relatively low. The study revealed that the less educated and older caregivers showed a significant higher level of satisfaction.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Generating dynamic S-BOX based on Particle Swarm Optimization and Chaos Theory for AES
...Show More Authors

Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm  in order to remove these weakness points, Will be generated dynamic substitution box (S-B

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
A Mathematical Approach for Computing the Linear Equivalence of a Periodic Key-Stream Sequence Using Fourier Transform
...Show More Authors

A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 16 2022
Journal Name
Journal Of The College Of Languages (jcl)
MCD (LOS MARCADORES DISCURSIVOS) The pragmatic analysis of discourse markers (The argumentative texts of the ABC newspaper as a model): El análisis pragmático de los marcadores discursivos (Los textos argumentativos del periódico ABC como modelo)
...Show More Authors

When writing a text, such as a newspaper article, various types of discourse markers are frequently used to group sentences into paragraphs and parts in order to establish a discourse with certain functions, such as coordination, orientation, emphasizing the concepts presented, etc. It should also be noted that this type of mark exists in both written and spoken language. Therefore, it is convenient to dedicate a chapter to these linguistic elements to clarify their use and their classification, which is mainly based on Jose Portolés (2001), as well as the main features, specifically their features (prosodic, morphological, semantic and pragmatic).

Resumen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESIS AND CHARACTERIZATION OF NEW β-LACTAM DERIVATVE FROM SULFADIAZINE DRUG BY MANY STEPS: SYNTHESIS AND CHARACTERIZATION OF NEW β-LACTAM DERIVATVE FROM SULFADIAZINE DRUG BY MANY STEPS
...Show More Authors

This research involved synthesis of new β-Lactam derivative from Azo compound[4-amino-N-(pyrimidine-2-yl)-3-(pyrimidine-2-yldiazenyl) benzene sulfonamide] (S1) record previously by many steps. Starting conversion the free amino group in an azo comp. to chloro acetamide derivative(S2), then reacted it with urea to give the oxazole ring  derivative (S3) that which containing free amino group. The condensation reaction between the amino group and P-bromobenzaldehyde to produce Shiff base (B14). Finally staudinger's cyclo addition reaction go run between the Shiff base derivative (B14) and chloro acetyl chloride in the presence of tri ethyl amine (Et3N) as Base catalyst and dioxane a

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An Adaptive Harmony Search Part-of-Speech tagger for Square Hmong Corpus
...Show More Authors

Data-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. It proposes an improved harmony search algorithm utilizing the roulette and local evaluation strategies for handling the square Hmong part-of-speech tagging problem. The experiment shows that the average accuracy of the proposed model is 6%, 8% more than HMM and BiLSTM-CRF models, respectively. Meanwhile, the average F1 of the proposed model is also 6%, 3% more than HMM and BiLSTM-CRF models, respectively.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
New Approach of Generating Ground-Truth for Local Surveillance Dataset Tested with Benchmark Background Subtraction Models
...Show More Authors

     Background subtraction is the dominant approach in the domain of moving object detection. Lots of research has been done to design or improve background subtraction models. However, there are a few well-known and state-of-the-art models that can be applied as a benchmark. Generally, these models are applied to different dataset benchmarks. Most of the time, choosing an appropriate dataset is challenging due to the lack of dataset availability and the tedious process of creating ground-truth frames for the sake of quantitative evaluation. Therefore, in this article, we collected local video scenes of a street and river taken by a stationary camera, focusing on dynamic background challenges. We presented a new technique for creati

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Experimental and Theoretical Determination of Settlement of Shallow Footing on Liquefiable Soil
...Show More Authors

A high settlement may take place in shallow footing when resting on liquefiable soil if subjected to earthquake loading. In this study, a series of shaking table tests were carried out for shallow footing resting on sand soil. The input motion is three earthquake loadings (0.05g, 0.1g, and 0.2g). The study includes a reviewing of theoretical equations (available in literatures), which estimating settlement of footings due to earthquake loading, calibration, and verification of these equations with data from the shaking table test for improved soil by grouting and unimproved soil. It is worthy to note that the grouting materials considered in this study are the Bentonite and CKD slurries. A modification to the seismic set

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus Crossref