Background: An important factor influencing duration of breastfeeding is mother’s employment status. The nutritional, immunological, psychological and economic benefits of breastfeeding are well documented. Both UNICEF and the World Health Organization recommend mothers should breastfeed exclusively for at least 6 months.
Objectives: To determine how the employment and the employment variables (type of work, time of return to work and hours of work) influence the breast feeding practices.
Methods: A cross- sectional study was carried out on a sample of 200 employed mothers who had their last child been completed at least tow years. Data were collected using a questionnaire form. It was carried out during the period from 1st of April to 1st of September, 2000, in Baghdad city/ AL-Risafa in 6 different places where employed mothers of young children were expected to be found.
Results: The study revealed that the impact of employment status was noted on the breast feeding initiation time, breast feeding duration and complementary food initiation time. The majority of employed mothers (56.1%) who worked shorter hours breast-feed for longer durations and starts weaning after the fourth months of the infant’s age. The highest percentage of employed mothers (75.9%) with maternity leave of six months or more breast feed for a year or more and (66.1%) start weaning later than the fourth month of the infant’s life.
Conclusions: The study recognizes that employed mothers who worked shorter hours and mothers with longer maternity leaves breast feed for longer durations and start weaning later than mothers who worked long hours and mothers with shorter maternity leaves. It was concluded that most work-places lack accommodations to support breast-feeding.
The physical and morphological characteristics of porous silicon (PS) synthesized via gas sensor was assessed by electrochemical etching for a Si wafer in diluted HF acid in water (1:4) at different etching times and different currents. The morphology for PS wafers by AFM show that the average pore diameter varies from 48.63 to 72.54 nm with increasing etching time from 5 to 15min and from 72.54 to 51.37nm with increasing current from 10 to 30 mA. From the study, it was found that the gas sensitivity of In2O3: CdO semiconductor, against NO2 gas, directly correlated to the nanoparticles size, and its sensitivity increases with increasing operating temperature.
Lacing reinforcement plays a critical role in the design and performance of reinforced concrete (RC) slabs by distributing the applied loads more evenly across the slab, ensuring that no specific area of the slab is overloaded. In this study, nine slabs, divided into three groups according to the investigated parameters, were meticulously designed and evaluated to study the interplay between the lacing reinforcement and other key parameters. Each slab was crafted for simple support and was subjected to both static and repeated two-point load tests. The lacing reinforcement had an angle of 45° with various tension and lacing steel. The repeated-tested specimens with lacing reinforcement experienced smaller ductility than those of s
... Show MoreNano crystalline copper sulphide (Cu2S) thin films pure and 3% Bi doped were deposited on glass substrate by thermal evaporation technique of thickness 400±20 nm under a vacuum of ~ 2 × 10− 5 mbar to study the influence of annealing temperatures ( as-deposited, and 573) K on structural, surface morphology and optical properties of (Cu2S and Cu2S:3%Bi). (XRD) X-ray diffraction analysis showed (Cu2S and Cu2S:3%Bi) films before and after annealing are polycrystalline and hexagonal structure. AFM measurement approves that (Cu2S and Cu2S:3%Bi) films were Nano crystalline with grain size of (105.05-158.12) nm. The optical properties exhibits good optical absorption for Cu2S:3%Bi films. Decreased of optical band gap from 2.25 to 2 eV after dop
... Show MoreStatistical learning theory serves as the foundational bedrock of Machine learning (ML), which in turn represents the backbone of artificial intelligence, ushering in innovative solutions for real-world challenges. Its origins can be linked to the point where statistics and the field of computing meet, evolving into a distinct scientific discipline. Machine learning can be distinguished by its fundamental branches, encompassing supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning. Within this tapestry, supervised learning takes center stage, divided in two fundamental forms: classification and regression. Regression is tailored for continuous outcomes, while classification specializes in c
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show More