Background: An important factor influencing duration of breastfeeding is mother’s employment status. The nutritional, immunological, psychological and economic benefits of breastfeeding are well documented. Both UNICEF and the World Health Organization recommend mothers should breastfeed exclusively for at least 6 months.
Objectives: To determine how the employment and the employment variables (type of work, time of return to work and hours of work) influence the breast feeding practices.
Methods: A cross- sectional study was carried out on a sample of 200 employed mothers who had their last child been completed at least tow years. Data were collected using a questionnaire form. It was carried out during the period from 1st of April to 1st of September, 2000, in Baghdad city/ AL-Risafa in 6 different places where employed mothers of young children were expected to be found.
Results: The study revealed that the impact of employment status was noted on the breast feeding initiation time, breast feeding duration and complementary food initiation time. The majority of employed mothers (56.1%) who worked shorter hours breast-feed for longer durations and starts weaning after the fourth months of the infant’s age. The highest percentage of employed mothers (75.9%) with maternity leave of six months or more breast feed for a year or more and (66.1%) start weaning later than the fourth month of the infant’s life.
Conclusions: The study recognizes that employed mothers who worked shorter hours and mothers with longer maternity leaves breast feed for longer durations and start weaning later than mothers who worked long hours and mothers with shorter maternity leaves. It was concluded that most work-places lack accommodations to support breast-feeding.
In the present work, steady, laminar natural convection in nonrectangular enclosures is analyzed numerically with and without fin. Vertical walls insulated while horizontal walls maintained isothermal at different temperature and the fin was placed on horizontal surface. The length of fin was equal (B/L=0.22, 0.44 and 0.66) and thickness of fin was constant. Various parameters are studied: Rayleigh number (from 104 to 107 ), Prandtl number (0.7), number of fin change from (1-3) and aspect ratio (H/L= 0.15 to 0.5). The problem is formulated in terms of the vorticity-stream function procedure. A numerical solution based on program in Fortran 90 with Tec plot program. The finite difference method is used. Streamlines and isotherms are prese
... Show MoreThis search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as
... Show MoreThe study included the investigation of fungi which associated with heavy animal's leather (Cows and Buffalos) and light (Sheep’s and Goats )through different processing stages (raw hides ,dehairing ,pickling,chrome tanned and stainning or finished stages)there were 10 genera and 25 species in addition to sterile fungi associated with animal leathers which included Alternaria ,Aspergillus,Cladosporium,Fusarium, Mucor , Penicillium , Rhizopus , and Trichoderma .Aspergillus and Penicillium have observed in all leather samples and different processing stages, and that the first time isolate two genera Helminthosporium , Stemphylium form leather for staining stage.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreAbstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023