Objectives: To determine Smartphone addiction among primary school students and its impacts. The samples of the study were240primary school students in derived from stratified random sampling. The questionnaire was used to collect the data. The data were then an- analyzed using correlation statistics. It also caused a negative impact on demic performance of the primary school students.
Methodology: A cross- sectional study in assessment approach in applied in order to achieve the earlier stated objectives. The study was initiated from October 1st, 2019 to April 30th, 2020. Simple random sampling (probability) sample of (240) Pupils study In primary school at Al-Rusafa first directorate schools in Baghdad City.
Results: The study results show that the longer the duration of using smartphone, the worse the health and behavioral aspects as perceived by. The longer the average of daily smartphone use, the poorer the school achievement. The longer the average of daily use of social media texts and each of adverse effects of smartphone use, the better the health and behavioral aspects as perceived by parents.
Recommendations: The study recommends that there is a need for community health nurses to initiate health education activities that aim to increase public’s awareness about the adverse effects of using smartphone by children. There is a need to devote more efforts to increase parents’ awareness; particularly those who are young and with low educational levels, about the adverse effects of using smartphone by children and never allowing their children to own their smartphone.
Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreLittle is known about hesitancy to receive the COVID‐19 vaccines. The objectives of this study were (1) to assess the perceptions of healthcare workers (HCWs) and the general population regarding the COVID‐19 vaccines, (2) to evaluate factors influencing the acceptance of vaccination using the health belief model (HBM), and (3) to qualitatively explore the suggested intervention strategies to promote the vaccination.
This was a cross‐sectional study based on electronic survey data that was collected in Iraq during December first‐19th, 2020. The electronic surve
Background: The best material for dental implants is polyetherketoneketone (PEKK). However, this substance is neither osteoinductive nor osteoconductive, preventing direct bone apposition. Modifying the PEKK with bioactive elements like strontium hydroxyapatite is one method to overcome this (Sr-HA). Due to the technique's capacity to provide better control over the coating's properties, RF magnetron sputtering has been found to be a particularly useful technique for deposition.
Materials and methods : With specific sputtering conditions, the RF magnetron technique was employed to provide a homogeneous and thin coating on Polyetherketoneketone substrates.. the coatings were characterized by Contact angle, adhesion test, X-ray dif
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More