Background: Post-partum depression (PPD) is a form of postnatal depression that affects mothers. Clinical manifestations usually appear within six months after delivery. Risk factors that influence the severity of post-partum depression are not fully known in the Iraqi population.
Objectives: We aim to evaluate the risk factors and identify potential predictors that may influence the symptom levels (severity) of post-partum depression among Iraqi women from Baghdad.
Subjects and Methods: The current study is cross-sectional, and we used the Edinburgh Postnatal Depression Scale (EPDS) and a cut-off value of 13 to differentiate patients into two those with lower symptom levels (LSL) and higher symptom levels (HSL). We also explored patients' attributes, newborn-related parameters, and socio-demographics.
Results: The total sample included almost one hundred patients (n=101), including females with lower symptom levels (EPDS<=13, 48.51%) and others with higher symptom levels (EPDS>13, 51.49%). There were two significant risk factors of PPD, including marital problems (OR=3.60, 95% CI=1.54 to 8.41, p=0.003) and perinatal mood disturbances (OR=3.23, 95% CI=1.40 to 7.46, p=0.005). The former results are congruent with our multivariable ordinal regression, while path analysis and structural modeling conveyed an additional risk factor: the personal history of depression. ROC analysis did not convey any significant difference between the two groups (LSL versus HSL) based on age. However, mothers with HSL were older than the other group (29.19±0.88 versus 27.08±0.79, p=0.099).
Conclusion: Post-partum depression with higher symptom levels is frequent among Iraqi mothers. Healthcare institutes should be vigilant concerning the underlying risk factors. Intervention requires integrating the role of social workers to understand the patient's family dynamics.
This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreLet M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.
Indium oxide In2O3 thin films fabricated using thermal evaporation of indium metal in vacuum on a glass substrate at 25oC using array mask, after deposition the indium films have been subjected to thermal oxidation at temperature 400 °C for 1h. The results of prepared Indium oxide reveal the oxidation method as a strong effect on the morphology and optical properties of the samples as fabricated. The band gap (Eg) of In2O3 films at 400 °C is 2.7 eV. Then, SEM and XRD measurements are also used to investigate the morphology and structure of the indium oxide In2O3 thin films. The antimicrobial activity of indium oxide In2O3 thin films was assessed against gram-negative bacterium using inhibition zone of bacteria which improved higher ina
... Show MoreThin films of CuPc of various thicknesses (150,300 and 450) nm have been deposited using pulsed laser deposition technique at room temperature. The study showed that the spectra of the optical absorption of the thin films of the CuPc are two bands of absorption one in the visible region at about 635 nm, referred to as Q-band, and the second in ultra-violet region where B-band is located at 330 nm. CuPc thin films were found to have direct band gap with values around (1.81 and 3.14 (eV respectively. The vibrational studies were carried out using Fourier transform infrared spectroscopy (FT-IR). Finally, From open and closed aperture Z-scan data non-linear absorption coefficient and non-linear refractive index have been calculated res
... Show MoreStructure of unstable 21,23,25,26F nuclei have been investigated
using Hartree – Fock (HF) and shell model calculations. The ground
state proton, neutron and matter density distributions, root mean
square (rms) radii and neutron skin thickness of these isotopes are
studied. Shell model calculations are performed using SDBA
interaction. In HF method the selected effective nuclear interactions,
namely the Skyrme parameterizations SLy4, Skeσ, SkBsk9 and
Skxs25 are used. Also, the elastic electron scattering form factors of
these isotopes are studied. The calculated form factors in HF
calculations show many diffraction minima in contrary to shell
model, which predicts less diffraction minima. The long tail
Water quality assessment offers a scientific basis for water resource development and management. This research aims to assessment of Al-Rustamiya sewage treatment plant depending on annually changes and produces maps that declare changes on parameter during a period (2015-2018). Based on prior Government Department Baghdad Environment data which annually feature changes for samples from Northern Rustamiya have been estimated as a working model. Drawn a map of the Diyala River shows annual changes in the characteristics of the Diyala River, based on northern and southern Rustamiya effluent samples, and Diyala River samples. The characteristics that research focused on were biochemical
This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show Moreأستهدفت الدراسة اختبار أثر التوجه السوقي والتزام العاملين على أداء المنظمة المسوقة لخدمات النقل الجوي. حيث تم اختيار شركة الخطوط الجوية الملكية الأردنية كمجال تطبيقي.وقد اعتمدت الدراسة في قياس المتغيرات على مقاييس مختبرة وقد تأكد صحتها وثباتها لقياس المتغيرات في البيئة الحالية. وقد بينت نتائج التحليل الإحصائي الذي استخدمت فيه أساليب إحصائية مختلفة بالاستعانة ببرنامج SPSS))
In present work, new tetra-dentate ligand, titled 3,5-bis ((E)-5-Bromo-2-hydroxy benzylidene amino) benzoic acid (H3L), was prepared via an acid-catalyzed condensation process. New four metallic ligand complexes with Co(II), Ni(II), Cu(II) and Zn(II) ions, were also prepared from the refluxing of equivalent moles. Ligand's structure and its complexes; were confirmed by numerous characterization methods, including Ultraviolet-Visible, Infrared, Mass Spectrometer, 1H and 13C Nuclear Magnetic Resonance spectra, atomic absorption, magnetic moments, and molar conductivity measurements. The results of the spectroscopic analyzes proved that the prepared ligand acts as tetradentate bi-ionic ligand and it was bond
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More