Objective(s): To assess the burden of mothers` care for child with colostomy and find out relationships between child and mother socio-demographic data with mothers` burden. Methodology: a descriptive study was conducted from 1 August 2013 to 1 September 2014. The sample consisted of 100 children and their mothers at Baghdad Teaching hospital in Baghdad city. A questionnaire was prepared based on the previous literature review, meeting mothers of children with colostomy, and the Zarit Burden Interview scale. Data has collected through the application of questionnaire and interview techniques. Results: T
Background: Otitis media with effusion is a common and important pediatric clinical problem; it is the leading cause of hearing impairment in children. Medical treatment remains controversial. Aim: To evaluate the usefulness of using topical nasal steroids in the treatment of otitis media with effusion. Patients and Methods: Between November 2019 and October 2022, a prospective controlled clinical study was carried out in the department of otolaryngology at Al-Jerrahat Teaching Hospital in Medical City, Baghdad, Iraq. This study comprised 40 patients with bilateral otitis media with effusion (23 males, 17 females). Two groups were created for the patients. Patients in group A (20 patients) were treated with mometasone furoate nasal spra
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreTo promote sustainable steel-concrete composite structures, it is essential to develop special shear connectors that facilitate accelerated construction and deconstruction. A lockbolt demountable shear connector (LBDSC) was recently proposed. While the LBDSC has been evaluated using horizontal and vertical (standard) push-out tests, it is essential to further assess the disassembly mechanism and the positive flexural performance of prefabricated demountable composite beams (PDCBs) under both serviceability and ultimate limit states. Two full-scale test specimens of PDCBs with LBDSC were designed with partial shear connections and assessed using a three or four-point load beam setup under both cyclic and static monotonic loading conditions.
... Show MoreWireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show MoreIn this research, the semiparametric Bayesian method is compared with the classical method to estimate reliability function of three systems : k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be
... Show MoreA Genetic Algorithm optimization model is used in this study to find the optimum flow values of the Tigris river branches near Ammara city, which their water is to be used for central marshes restoration after mixing in Maissan River. These tributaries are Al-Areed, AlBittera and Al-Majar Al-Kabeer Rivers. The aim of this model is to enhance the water quality in Maissan River, hence provide acceptable water quality for marsh restoration. The model is applied for different water quality change scenarios ,i.e. , 10%,20% increase in EC,TDS and BOD. The model output are the optimum flow values for the three rivers while, the input data are monthly flows(1994-2011),monthly water requirements and water quality parameters (EC, TDS, BOD, DO and
... Show MoreThe modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter var
... Show More