Preferred Language
Articles
/
jeasiq-1341
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to include questions about population groups known to the number and other questions related to the target community, interviewed or interviewed by their parents at Ibn Rushd Hospital in Baghdad, with 104 persons for the period from April to June 2017.

In order to extract the indicators, we was used network's package in R. First, the estimation of the personal network size is estimated by relying on the number known of 20 groups. In the Recursive Back estimation of these groups, the groups whose estimation is very remote

 The real value and here will be used 3 methods for the purpose of deleting the groups with weak estimates, namely the method of (direct deletion , trimming and successive) method have been found that there are 8 groups were underestimated and this means will be based on 12 groups to estimate the number of users and the number of (33,183) people, including (6,636) persons under the age of 18 years.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 07 2018
Journal Name
Asian Journal Of Pharmaceutical And Clinical Research
KNOWLEDGE AND MALPRACTICES IN PEDIATRICS DIARRHEA MANAGEMENT BY IRAQI MOTHERS
...Show More Authors

Objectives: In developing countries like Iraq, diarrhea was responsible for 70% of deaths among pediatrics. This study was designed to determine Iraqi mothers’ knowledge and malpractices associated with diarrhea management in pediatrics.Methods: A cross-sectional pilot study was done on a convenient sample of mothers in Baghdad – Iraq. Data collection was done using a validated questionnaire specifically designed for this study.Result: Most participants preferred to consult physicians or pharmacists about pediatrics diarrhea management. Breastfeeding was stopped by 19% of participants, whereas 35% of mothers who depend on formulated milk discontinued it. Only 30% of participants use oral rehydration solution therapy always as a

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Iraqi Journal Of Agricultural Sciences
Predicting maize ear grain weight in situ by ear dimensions
...Show More Authors

To find out a simple and efficient equation to estimate maize ear grain weight on farm (in situ), twenty three maize crosses along with two synthetics were grown in the field. On the experimental farm of the Dept. of Field Crop Sci., College of Agric., Univ. of Baghdad, seeds of twenty five maize genotypes were grown in the fall season of 2013 with three replicates. At dough stage of the kernels, five naked ears of each experimental units were measured for length and maximum diameter. This will sum up 125 ears of the trial. The volumes of ears were calculated as cylinder (length× r2× 3.1416). Grain weight of all ears were determined after harvesting and drying to 15% grain moisture. A constant was calculated by dividing ear grain weight b

... Show More
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Enhancement of Stream Cipher by Using Variant Register in Length
...Show More Authors

         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper  presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
The Inverse Solution Of Dexterous Robot By Using Neural Networks
...Show More Authors

The inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 23 2025
Journal Name
Journal Of Physical Education
Criteria Some Power Defined By Speed Endurance In Youth Basketball
...Show More Authors

View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
Reactive Adsorption Desulfurization by Nanocrystalline ZnO/Zeolite A Molecular Sieves
...Show More Authors

      Nanocrystalline ZnO/Zeolite type A composite was prepared by simple method of operation by . the precipitation of zinc oxide and loading on zeolite 5A in one step. Characterization was made by X-ray diffraction (XRD), X-ray fluorescence(XRF), N2  adsorption- desorption for BET surface area, and Atomic force microscopy (AFM). Results showed that zinc oxide was loaded on zeolite as noticed by the characteristic peaks and was of nano scale having an average diameter of 88.57nm. The percentage loading of ZnO on zeolite A was 28.37% and the surface area was 222m2/g. The activity of the prepared catalyst was examined in the desulfurization of double hydrogenated diesel fuel. The process was investigated in a

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
Effect of the electric field on drilling Brass by Laser
...Show More Authors

The research include a pulsed Nd: YAG Laser with (300µs) pulse duration in the TEM00 mode at (1.06µm) wavelength for energies between (0.5-3) J was employed to drill Brass material which is use in industrial applications. The process of drill was assisted by an electric field. This resulted in an increase in the hole aspect ratio by the value (45%) and decrease in the hole taper by the value (25%) of its value under ordinary drilling conditions using the same input energy.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 21 2021
Journal Name
Physical Chemistry Research
Photocatalytic and optical performances of CeO2 by substitution of titanium
...Show More Authors

In this contribution, density functional theory-based calculations have been carried out to assess the electronic, photocatalytic and optical properties of Ce1-xTixO2 system. Ti incorporation leads to a decrease of Ce 4f states and enhancement of Ti 3d states in the bottom of conduction band. Furthermore, it was found that doping ceria with Ti-like transition metals could evidently shift the absorption of pure CeO2 towards higher wavelength range. These findings can provide some new insights for designing CeO2-based photocatalysts with high photocatalytic performance. To the best of our knowledge, this investigation calculates Mullikan’s charge transfer of Ce1-xTixO2 system for the first time. Charge transfer reveals an ionic bond between

... Show More
Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Effect gold nanoparticles generated by cold plasma for mineral blood
...Show More Authors

In the present study, gold nanoparticles (AuNPs) were prepared using a simple low cost method synthesized cold plasma at different exposure time . The nanoparticles were characterized using UV-Visible spectra, X-ray diffraction (XRD). The prepared AuNPs showed surface Plasmon resonance centered at 530, 540,and 533 nm. The XRD pattern showed that the strong intense peaks indicate crystalline nature and face centered cubic structure of gold nanoparticles for all samples were prepared .The average crystallite size of the AuNPs was 20-40 nm. Morphology of the AuNPs were carried out using FESEM. Observations show that the AuNPs synthesized we well dispersed with and particle sizes ranging from 9 to 31 nm with spherical shapes which are cle

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref