Preferred Language
Articles
/
jkmc-255
A Population-Based Study on Agreement between Actual and Perceived Body Image
...Show More Authors

Background: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.

Objective: This study aims to determine the agreement between actual and perceived body image in the general population.

Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for assessing the actual body weight status. Cohen's Kappa statistics were performed.

Results: Out of 300 participants, n=143 were males, and n=157 were females. In reality, according to BMI, 6 % were underweight, 47 % were average, 28 % were overweight, and 19 % were obese. According to perception, 8% of participants were underweight, 39 % were average, about 45% were overweight, and 8 % were obese. The mean score of real BMI was 25. 51±5.62 and figure rating score was 4.81±1.75. r value showed a strong positive relationship between both variables with a a P-value of <0.001. Cohen's Kappa score was 0.362. The rate of agreement between actual and perceived body weight status in the general population was 53.88%, and the disagreement rate was 46.12%

Conclusion: There was a weak agreement in the perception and realities of the self-image of people have the wrong impression about their body image.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
Employment and Labor Union Laws in Japan between the 1889 and 1946 Constitutions: A Comparative Study: أفراح محمد علي
...Show More Authors

This research is based on the descriptive and analytical methodology. The importance of studying labor laws and labor unions in Japan between 1889 and 1946 constitutions is because Japan was out of a feudal phase, and had no idea about the factory system and industrialization in their modern sense before the Meiji era. Generally, its labor system used to be mostly familial, and the economic system was based on agriculture. This called for the enactment of legislations and laws appropriate for the coming phase in Meiji era. Thus, this paper examines the role of Meiji government in enacting labor legislations and laws when he came to power in 1896, and his new constitution in 1889 and the civil code of 1896. It further examines the way Mei

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The Relationship between Social Anxiety and Mindfulness In Iraqi Women Living In Iraq And The UK; A Comparison Study
...Show More Authors

The continuous pressure of work and daily life and the increasing financial and social stress that Iraqi women are experiencing (both inside and outside Iraq) is one of the main causes of anxiety, particularly in those of working class women. This group of women carry the burden of carrying out multiple roles and responsibilities at the same time. All this collectively make them more prone to developing anxiety compared to men. In addition, the physiological and psychological nature of women, as females, on top of the other roles in life, like being a wife or mother or daughter or sister, all add extra pressure on women especially for those who are considered as productive working individuals in the society. In order to study the relatio

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian methods to estimate sub - population
...Show More Authors

The aim of the research is to estimate the hidden population. Here، the number of drug users in Baghdad was calculated for the male age group (15-60) years old ، based on the Bayesian models. These models are used to treat some of the bias in the Killworth method Accredited in many countries of the world.

Four models were used: random degree، Barrier effects، Transmission bias، the first model being random، an extension of the Killworth model، adding random effects such as variance and uncertainty Through the size of the personal network، and when expanded by adding the fact that the respondents have different tendencies، the mixture of non-random variables with random to produce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 20 2014
Journal Name
Jurnal Teknologi
A Review of Snake Models in Medical MR Image Segmentation
...Show More Authors

Developing an efficient algorithm for automated Magnetic Resonance Imaging (MRI) segmentation to characterize tumor abnormalities in an accurate and reproducible manner is ever demanding. This paper presents an overview of the recent development and challenges of the energy minimizing active contour segmentation model called snake for the MRI. This model is successfully used in contour detection for object recognition, computer vision and graphics as well as biomedical image processing including X-ray, MRI and Ultrasound images. Snakes being deformable well-defined curves in the image domain can move under the influence of internal forces and external forces are subsequently derived from the image data. We underscore a critical appraisal

... Show More
Scopus (10)
Scopus
Publication Date
Sun Mar 12 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparative Anatomical Study between Typha domengensis and Phragmites communis
...Show More Authors

       Both of the species Typha domengensis and Phragmites communis among the most important plant endemic in flora of Iraq from monocotyledon.  Due to the similarity of the two species with each other in many morphological characteristics such as the environment where they live and the form of leaves and type of leaf venation and type of stomata….ets, also both of species belong to monocots plant therefore this research work was conducted find anatomical differences that have the same as taxonomic value to help distinguishing between both species under study.     Through this research, we found great importance to the anatomical characteristics which we reached by studying th

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fingerprint Angles and Patterns in the Population of Najaf Province
...Show More Authors

The values of fmgerprint angles were studied in 57 females and 44 males from Najaf province in the m iddle of Iraq. Some results of tlus sample were compared with the results of Southern provinces sample from Iraq i population.

The  rCS\tlts  revealed that the mean of  maximum fingerprint angle (MFA) and also the mean of absolute fingerprint angle (AFA) between samples in the studied provinces did nnt differ significantly. However, the unilateral analysis revealed only one significant diOerence in LS of  the male samples (r-2.89,  P<O.Ol), while the bilateral analysis revealed two significant differences, wluch occurred in Rl and R3 of the right hand.

As lbr the compari son between sexes of the

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Mobile-based Human Emotion Recognition based on Speech and Heart rate
...Show More Authors

Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to   record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,

... Show More
View Publication Preview PDF
Crossref