Preferred Language
Articles
/
injns-232
Mothers Information Regarding Asthmatic Child Care in Kirkuk City
...Show More Authors

Objectives: To assess the information of mothers regarding asthmatic child care, and to find out the relationship between information of mothers and some of demographic characteristic such as age of mothers, Level of education, and away of child feeding. Methodology: Quantitative design (a descriptive study) was conducted in pediatric hospital in Kirkuk city from the period of first of July 2011 to the end of March 2012. To achieve the objectives of the study, non probability sample of (50) mothers having asthmatic children who attend to the pediatric hospital. The data are collected through utilization of constructed questionnaire. It consists of two parts: part one include (8) items, about demographic characteristics of mothers and her children and part two include (26) items, which includes (3) sections, section (1) consist of (7) items, about aggravating factors of asthma, section (2) consist of (6) items, about symptom of sever attack of asthma, and section (3) consist of (13) items, about asthmatic child care. To content validity of instrument was established through penal of (5) expert. Data I collected by interview technique using the questionnaire, data I gathered and analyzed by the application of descriptive and inferential statistics methods. Results: The study indicated that the majority of children are aged between (1-3) years old, and highest percentage of children are male (62%). Regarding to the child feeding, the majority of children are food feeding and represent (48%). Regarding age of mother the study finding that the highest percentage (38 (% of the mothers their age group between (23-27) years, and concerning mothers’ educational level, the majority of them graduated from primary school (40%). The study also approves that there was a statistical significant association between mother's information and some of demographic characteristic such as (Age, and level education of mothers and way of child feeding). Recommendation: Education program should be provided to the mothers who have children with asthma and course training program should be developed and implemented.

 
 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Brokerage Firms under Information Asymmetry and its Effect on Common Stock Trade : Applied Research in the Iraq Stock Exchange
...Show More Authors

The research aims to Applied Study in the nature of the impact of information asymmetry for brokerage firms in the common stock trading, The research included the theoretical concepts associated with each of the brokerage firms ,information asymmetry and common stock trading, It used the financial methods on the practical side of the information asymmetry for brokerage firms based in the sector as well as trading volume and spread for common stock , The community of the research included the Iraq Stock Exchange,the sample of research the companies listed which have been trading on its stock for the period August 2015 until December 2015 as well as brokerage firms

amounting to 47 brokerage firm. The resea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using financial and non-financial information ) SASB standards) to enhance investor confidence
...Show More Authors

Companies seek to enhance investor confidence by achieving the highest level of transparency in disclosure of financial and non-financial information (SASB standards) for Iraqi insurance companies listed on the financial market. The aim of the research is to identify the extent of the ability of financial and non-financial information to enhance transparency in reporting, which is reflected in Investor confidence. And the standards of sustainability development accounting issued by (SASB) through the electronic questionnaire that was distributed. Companies seek to achieve a set of goals, the most important of which is to enhance investor confidence by improving transparency in disclosure. Concerning the employment of financial an

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Ieee Sensors Journal
Calibrating Distance Sensors for Terrestrial Applications Without Groundtruth Information
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Integrated System of Information hiding by Applying Three levels
...Show More Authors

MB Mahmood, BN Dhannoon

View Publication
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Asymmetry of accounting information - the reasons and proposed treatments
...Show More Authors

The research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So,  the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire   in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs ​​in the laws and regula

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Apr 04 2023
Journal Name
International Journal Of Professional Business Review
An Empirical Study to Measure the Impact of Information Technology Governance Under the Control Objectives for Information and Related Technologies on Financial Performance
...Show More Authors

Purpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration.   Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance.   Design/methodology/approach: To investigate the effect of information technology; we the valu

... Show More
View Publication
Scopus (26)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Research Journal Of Pharmacy And Technology
Obesity Prevalence in Primary School Children in Baghdad City
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref