Preferred Language
Articles
/
jperc-1198
Measurement of Appreciation of Clothes of University’s Students
...Show More Authors

Clothes are considered a means of aesthetic and artistic expression that help to hide the flaws of the body and highlight its merits , it has importance in people's lives as it reflects the individual's idea of himself and his personality. Whereas  the appreciation  in clothing  is a reflection of a person's sense of artistic components and the application of this sense to the clothes of his choice. Regarding the differences in clothing tastes by the university students according to the following variables (gender, specialization, stage of study,  age, monthly income), the current research is considered quantitative descriptive research that is concerned with studying a phenomenon that exists in reality, measuring it and analyzing its data to extract results and generalize them ,The research sample consists of (150) male and female students of different scientific and humanities at University of Baghdad, who  were randomly selected, and the research tool consisted of (47) items, which included the following dimensions (modesty, adornment, keeping pace with fashion, attracting attention, belonging to the group, self-realization).The items are organized in the form of a questionnaire . The search results showed the following: The concentration of the highest percentage of the sample in the two levels (medium, low), which indicates that the students of the university have a weak taste in clothing, also there are statistically significant differences according to research variables ,gender in favor of females in the dimension,   age in favor of age (21 years - less than 24 years) in dimension (attract attention), age (24 years - less than 28 years) in dimension (belonging to the group).  There are no statistically significant differences according to the variables, specialization, stage of study, and the  monthly income. In the dimensions of clothing tasting measure, the research came out with a set of recommendations and suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Effects of sulpher foam and mycorrhizal fungi on Eggplant infested with Nematode(Meloidogyne javanica) at seed or seedling stage
...Show More Authors

Arbuscular mycorrhizal fungi and sulphur foam added either at direct seeding or at transplanting decreased the effects of nematode (Meloidogyne javanica) on eggplant growth, and improved plant health. Experiments were conducted to study the possible interactions between the Mycorrhizal fungi (Glomus mossae and Gigaspora spp.) and sulphur foam to control M. javanica on eggplant at seed or seedling stage. Experiment at seed stage treated with Mycorrhiza or sulphur foam alone or together stimulated the growth and reduced Nematode infestation significantly. Treated plant at seedling stage increased plant growth and reduced the number of galls /gm of root system. The interaction between Mycorrhiza and sulpher foam treatments was not significant

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 08 2022
Journal Name
Archives Of Phytopathology And Plant Protection
First molecular confirmation of the fungus <i>Leveillula taurica</i> causing powdery mildew disease on sweet pepper in Iraq
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Reasons for Partial Compliance and Non-compliance to the Routine Childhood Vaccination Schedule in Al-Karkh District
...Show More Authors

Abstract

      Objective (s): To evaluate reasons for partial compliance and non-compliance to the

                              routine childhood vaccination schedule in Al-Karkh district 

Methodology: Descriptive study , using the evaluation approach, is carried throughout the present study to determine the reasons for the Routine Childhood Vaccination at  health care sectors and primary health care centers at  Al-Karkh District in Baghdad City, Convenient, non-probability, sample of (90) mother who are recruited from health care sectors at Al-Karkh District in Baghdad City. All mothers, who ha

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 07 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Article Effectiveness of Instruction Program on Caregiver Knowledge concerning Emergency Care for Geriatrics at Geriatric Home in Baghdad City.
...Show More Authors

Objectives: The aim of the study is to evaluate the information of caregivers concerned emergency care for the elderly and to identify the relationship between caregiver information and their educational level, years of service and training courses. Methodology: A quasi-experimental study was conducted in the Geriatric Care Home in Baghdad City (the governmental and private geriatric care home ) for the period from October, 14th , 2018 to March, 20th , 2019 to find the effectiveness of the instructional program on caregivers knowledge about emergency care for the elderly.. A purposive sample (non-probability) was consisting of (30) males and females caregivers, the sample was selected from geriatric care home in Baghdad city .To implemen

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 14 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Women's Self-care Instructions concerning Wound, Perineal & Urinary System Care post cesarean section in Baghdad teaching hospital
...Show More Authors

Aim: to determine the effectiveness of women's self-care instructions on their post cesarean section care in Baghdad
teaching hospital.
Methodology: The present study used quasi-experimental study design in maternity words in Baghdad teaching
hospital. The sample was collected and follow up for the period (15) January 2014 until 15 May 2014 Nonprobability
(purposive sample) of (100) women post cesarean section divided in to two groups (50) women post
cesarean section considered as a study group, and another (50) women post cesarean section considered as the
control one, A questionnaire designed as a tool to collect data fit the purpose of the study a questionnaire include
demographic variables, Reproductive variables

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 16 2020
Journal Name
Frontiers In Pharmacology
Administration of Δ9‐Tetrahydrocannabinol (THC) Post‐Staphylococcal Enterotoxin B Exposure Protects Mice From Acute Respiratory Distress Syndrome and Toxicity
...Show More Authors

View Publication Preview PDF
Scopus (29)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Thu Feb 06 2020
Journal Name
Scientific Reports
Waste foundry sand/MgFe-layered double hydroxides composite material for efficient removal of Congo red dye from aqueous solution
...Show More Authors
Abstract<p>We aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure</p> ... Show More
Scopus (186)
Crossref (123)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
Al-kindy College Medical Journal
The Anxiety and Fear of COVID-19 Pandemic at the First Year in Dentists Working in Specialist Dental Centers
...Show More Authors

Background: COVID-19 pandemic has influenced all life aspects; Dental staff, like other healthcare providers, may be exposed to COVID-19 as part of their work and its psychological impacts on healthcare workers should not be ignored

Objectives: To assess the anxiety, and fear from COVID-19 pandemic in dentists working in specialist dental centers: sample the Al-Resafa health directorate, and its relation between the anxiety, and COVID-19 fear with some of their demographic variables

Subjects and Methods: A cross-sectional study was conducted on 2nd Jan. to 14th Feb. 2021, by an electronic version of questionnaire through Google-form; the questionnaire was formed based on Mental-Health-American-Org

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref