Background: Post-partum depression (PPD) is a form of postnatal depression that affects mothers. Clinical manifestations usually appear within six months after delivery. Risk factors that influence the severity of post-partum depression are not fully known in the Iraqi population.
Objectives: We aim to evaluate the risk factors and identify potential predictors that may influence the symptom levels (severity) of post-partum depression among Iraqi women from Baghdad.
Subjects and Methods: The current study is cross-sectional, and we used the Edinburgh Postnatal Depression Scale (EPDS) and a cut-off value of 13 to differentiate patients into two those with lower symptom levels (LSL) and higher symptom levels (HSL). We also explored patients' attributes, newborn-related parameters, and socio-demographics.
Results: The total sample included almost one hundred patients (n=101), including females with lower symptom levels (EPDS<=13, 48.51%) and others with higher symptom levels (EPDS>13, 51.49%). There were two significant risk factors of PPD, including marital problems (OR=3.60, 95% CI=1.54 to 8.41, p=0.003) and perinatal mood disturbances (OR=3.23, 95% CI=1.40 to 7.46, p=0.005). The former results are congruent with our multivariable ordinal regression, while path analysis and structural modeling conveyed an additional risk factor: the personal history of depression. ROC analysis did not convey any significant difference between the two groups (LSL versus HSL) based on age. However, mothers with HSL were older than the other group (29.19±0.88 versus 27.08±0.79, p=0.099).
Conclusion: Post-partum depression with higher symptom levels is frequent among Iraqi mothers. Healthcare institutes should be vigilant concerning the underlying risk factors. Intervention requires integrating the role of social workers to understand the patient's family dynamics.
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreLet R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes.
The study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac
... Show MoreThe idea of the design of combination Between split – plot and split block means that an experiment conducted with a design
formed by combination Between split – plot and split block, and it presents a precise manner to analytic who aimed to make appropriate statistical analysis for the experiment because such design contains four random errors , it make a high precision rather than another designs. The plan and the theoretical analysis were presented with application to show its idia and the ability to use it in many fields especially in agricultural experiments field .
Three isolated bacteria were examined to remove heavy metals from the industrial wastewater of the Diala State Company of Electrical Industries, Diyala-Iraq. The isolated bacteria were identified as Pseudomonas aeruginosa, Escherichia coli and Sulfate Reducing Bacteria (SRB). The three isolates were used as an adsorption factor for different concentrations of Lead and Copper (100, 150, and 200 ppm.), in order to examine the adsorption efficiency of these isolates. In addition, the effect of three factors on heavy metals adsorption were examined; temperature (25, 30, and 37 ?C), pH (3 and 4.5) and contact time (2 and 24 hrs). The results showed that the highest level of lead adsorption was obtained at 37 ?C by E. coli, P, aerugenosa and
... Show MoreIn present work, new tetra-dentate ligand, titled 3,5-bis ((E)-5-Bromo-2-hydroxy benzylidene amino) benzoic acid (H3L), was prepared via an acid-catalyzed condensation process. New four metallic ligand complexes with Co(II), Ni(II), Cu(II) and Zn(II) ions, were also prepared from the refluxing of equivalent moles. Ligand's structure and its complexes; were confirmed by numerous characterization methods, including Ultraviolet-Visible, Infrared, Mass Spectrometer, 1H and 13C Nuclear Magnetic Resonance spectra, atomic absorption, magnetic moments, and molar conductivity measurements. The results of the spectroscopic analyzes proved that the prepared ligand acts as tetradentate bi-ionic ligand and it was bond
... Show MoreThis study investigates the results of electrocoagulation (EC) using aluminum (Al) electrodes as anode and stainless steel (grade 316) as a cathode for removing silica, calcium, and magnesium ions from simulated cooling tower blowdown waters. The simulated water contains (50 mg/l silica, 508 mg/l calcium, and 292 mg/l magnesium). The influence of different experimental parameters, such as current density (0.5, 1, and 2 mA/cm2), initial pH(5,7, and 10), the temperature of the simulated solution(250C and 35 0C), and electrolysis time was studied. The highest removal efficiency of 80.183%, 99.21%, and 98.06% for calcium, silica, and magnesium ions, respectively, were obtained at a current de
... Show MoreIn this work, the classical continuous mixed optimal control vector (CCMOPCV) problem of couple nonlinear partial differential equations of parabolic (CNLPPDEs) type with state constraints (STCO) is studied. The existence and uniqueness theorem (EXUNTh) of the state vector solution (SVES) of the CNLPPDEs for a given CCMCV is demonstrated via the method of Galerkin (MGA). The EXUNTh of the CCMOPCV ruled with the CNLPPDEs is proved. The Frechet derivative (FÉDE) is obtained. Finally, both the necessary and the sufficient theorem conditions for optimality (NOPC and SOPC) of the CCMOPCV with state constraints (STCOs) are proved through using the Kuhn-Tucker-Lagrange (KUTULA) multipliers theorem (KUTULATH).
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreStructure of unstable 21,23,25,26F nuclei have been investigated
using Hartree – Fock (HF) and shell model calculations. The ground
state proton, neutron and matter density distributions, root mean
square (rms) radii and neutron skin thickness of these isotopes are
studied. Shell model calculations are performed using SDBA
interaction. In HF method the selected effective nuclear interactions,
namely the Skyrme parameterizations SLy4, Skeσ, SkBsk9 and
Skxs25 are used. Also, the elastic electron scattering form factors of
these isotopes are studied. The calculated form factors in HF
calculations show many diffraction minima in contrary to shell
model, which predicts less diffraction minima. The long tail