12 research outputs found

    Prevalence and Predictors of Tobacco Use Among School Adolescents in Zakho, Kurdistan Region of Iraq

    Get PDF
    Knowledge regarding the smoking prevalence among the Kurdistan general population is not clear, at least for males. Here in the Kurdistan Youth Smoking Survey and Behaviours (KYSS&B) we tried to further expand our knowledge about the smoking profile of school students across Kurdistan. Five hundred students from four Zakho male basic schools were taken to participate in the study to determine the prevalence of smoking and socio-demographical factors associating with smoking among students aged 12 to 15 years. The KYSS&B questionnaire included various parameters such as age, gender, friends, parent history and blood groups. This study showed that the prevalence of students who ever tried smoking was 74%; about 65% of them started at age 12 years or less. Although the majority of participants (95%) knew that smoking is harmful and had negative impact on human health, 18% of them thought that they will never quit smoking. The study concluded that there was no strong association between family monthly income, parent education level and blood groups. On the other hand, the three most critical factors connected with smoking habit reported by students were age, peer influence and father smoking

    Syllabification Nature in Bedouin-North Yemeni Arabic Dialects (Bed-NYAD)

    Full text link
    This study is concerned with discussing the syllable structure or the syllable nature of the bedouin or nomadic north Yemeni Arabic dialect spoken mainly in five governorates namely, Aljawf, Tihamah, Amran, Sa'adah and Ma'rib, in Yemen referred to in the study as Bed-NYAD. The main goal of this paper is to show how many syllables are there in such dialects of the Yemeni Arabic and how they differ from those NYAD.  Data collection was achieved with the help of a digital recorder. Many speakers of Bed-NYAD have been recorded for the sake of proving our claim that Bed-NYAD have different syllable nature from those other Yemeni dialects of Arabic. The finding of the study revealed that Bed-NYAD have five main types CV, CV:, CVC, CVCC and CV:C while NYAD have only three types of syllables CV, CVV, CVC and the semisyllable C

    A Comprehensive Survey of 5G mm-Wave Technology Design Challenges

    No full text
    Physical layer protection, which protects data confidentiality using information-theoretic methods, has recently attracted a lot of research attention. Using the inherent randomness of the transmission channel to ensure protection in the physical layer is the core concept behind physical layer security. In 5G wireless communication, new challenges have arisen in terms of physical layer security. This paper introduces the most recent survey on various 5G technologies, including millimeter-Wave, massive multi-input multiple outputs, microcells, beamforming, full-duplex technology, etc. The mentioned technologies have been used to solve this technology, such as attenuation, millimeter-Wave penetration, antenna array architecture, security, coverage, scalability, etc. Besides, the author has used descriptions of the techniques/algorithms, goals, problems, and meaningful outcomes, and the results obtained related to this approach were demonstrated

    A Comprehensive Study of Kernel (Issues and Concepts) in Different Operating Systems

    No full text
    Various operating systems (OS) with numerous functions and features have appeared over time. As a result, they know how each OS has been implemented guides users' decisions on configuring the OS on their machines. Consequently, a comparative study of different operating systems is needed to provide specifics on the same and variance in novel types of OS to address their flaws. This paper's center of attention is the visual operating system based on the OS features and their limitations and strengths by contrasting iOS, Android, Mac, Windows, and Linux operating systems. Linux, Android, and Windows 10 are more stable, more compatible, and more reliable operating systems. Linux, Android, and Windows are popular enough to become user-friendly, unlike other OSs, and make more application programs. The firewalls in Mac OS X and Windows 10 are built-in. The most popular platforms are Android and Windows, specifically the novelist versions. It is because they are low-cost, dependable, compatible, safe, and easy to use. Furthermore, modern developments in issues resulting from the advent of emerging technology and the growth of the cell phone introduced many features such as high-speed processors, massive memory, multitasking, high-resolution displays, functional telecommunication hardware, and so on

    A State of Art Survey for Intelligent Energy Monitoring Systems

    No full text
    In this study, the significance and necessities of surveillance systems have been investigated in several areas - both in the use of neural networks, street lighting systems, factories, and laboratories - for the monitoring systems, especially concerning the design of artificial intelligence programs. The importance of these initiatives and how they can affect any sector and industry reach an essential point from here. Here we reach an important point. An algorithm and an extraordinary approach have been used in every field to develop an intelligent programmer. Something has been mentioned here: the ability to access these intelligent programs in all areas of life. We concentrate on a variety of fields of use and design of monitoring systems in this review article

    State of Art Survey for IoT Effects on Smart City Technology: Challenges, Opportunities, and Solutions

    No full text
    Automation frees workers from excessive human involvement to promote ease of use while still reducing their input of labor. There are about 2 billion people on Earth who live in cities, which means about half of the human population lives in an urban environment. This number is rising which places great problems for a greater number of people, increased traffic, increased noise, increased energy consumption, increased water use, and land pollution, and waste. Thus, the issue of security, coupled with sustainability, is expected to be addressed in cities that use their brain. One of the most often used methodologies for creating a smart city is the Internet of Things (IoT). IoT connectivity is understood to be the very heart of the city of what makes a smart city. such as sensor networks, wearables, mobile apps, and smart grids that have been developed to harness the city's most innovative connectivity technology to provide services and better control its citizens The focus of this research is to clarify and showcase ways in which IoT technology can be used in infrastructure projects for enhancing both productivity and responsiveness

    Universal PCR assays for the differential detection of all Old World Leishmania species

    No full text
    For the epidemiological monitoring and clinical case management of leishmaniasis, determination of the causative Leishmania species gains importance. Current assays for the Old World often suffer from drawbacks in terms of validation on a geographically representative sample set and the ability to recognize all species complexes. We want to contribute to standardized species typing for Old World leishmaniasis. We determined the ribosomal DNA internal transcribed spacer 1 sequence of 24 strains or isolates, and validated four species-specific polymerase chain reactions (PCRs) amplifying this target. They discriminate L. aethiopica, L. tropica, L. major, and the L. donovani complex, use the same cycling conditions, and include an internal amplification control. Our PCRs amplify 0.1 pg of Leishmania DNA, while being 100% specific for species identification on an extensive panel of geographically representative strains and isolates. Similar results were obtained in an endemic reference laboratory in Kenya. Species could also be identified in clinical specimens. The presented PCRs require only agarose gel detection, and have several other advantages over many existing assays. We outline potential problems, suggest concrete solutions for transferring the technique to other settings, and deliver the proof-of-principle for analyzing clinical samples

    Deep Learning Approaches for Intrusion Detection

    No full text
    Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and presents Deep Learning (DL) techniques for improving the Intrusion Detection System (IDS). Moreover, it provides a detailed comparison with evaluating performance, deep learning algorithms for detecting attacks, feature learning, and datasets used to identify the advantages of employing in enhancing network intrusion detection

    Comparison of Software Defined Networking with Traditional Networking

    No full text
    The Internet has caused the advent of a digital society; wherein almost everything is connected and available from any place. Thus, regardless of their extensive adoption, traditional IP networks are yet complicated and arduous to operate. Therefore, there is difficulty in configuring the network in line with the predefined procedures and responding to the load modifications and faults through network reconfiguring. The current networks are likewise vertically incorporated to make matters far more complicated: the control and data planes are bundled collectively. Software-Defined Networking (SDN) is an emerging concept which aims to change this situation by breaking vertical incorporation, promoting the logical centralization of the network control, separating the network control logic from the basic switches and routers, and enabling the network programming. The segregation of concerns identified between the policies concept of network, their implementation in hardware switching and data forwarding is essential to the flexibility required: SDN makes it less complicated and facilitates to make and introduce new concepts in networking through breaking the issue of the network control into tractable parts, simplifies the network management and facilitate the development of the network. In this paper, the SDN is reviewed; it introduces SDN, explaining its core concepts, how it varies from traditional networking, and its architecture principles. Furthermore, we presented the crucial advantages and challenges of SDN, focusing on scalability, security, flexibility, and performance. Finally, a brief conclusion of SDN is revised

    A global comparative evaluation of commercial immunochromatographic rapid diagnostic tests for visceral leishmaniasis

    Get PDF
    Background: Poor access to diagnosis stymies control of visceral leishmaniasis (VL). Antibody-detecting rapid diagnostic tests (RDTs) can be performed in peripheral health settings. However, there are many brands available and published reports of variable accuracy. Methods: Commercial VL RDTs containing bound rK39 or rKE16 antigen were evaluated using archived human sera from confirmed VL cases (n = 750) and endemic non-VL controls (n = 754) in the Indian subcontinent (ISC), Brazil, and East Africa to assess sensitivity and specificity with 95% confidence intervals. A subset of RDTs were also evaluated after 60 days' heat incubation (37°C, 45°C). Interlot and interobserver variability was assessed. Results: All test brands performed well against ISC panels (sensitivity range, 92.8%-100%; specificity range, 96%-100%); however, sensitivity was lower against Brazil and East African panels (61.5%-91% and 36.8%-87.2%, respectively). Specificity was consistently > 95% in Brazil and ranged between 90.8% and 98% in East Africa. Performance of some products was adversely affected by high temperatures. Agreement between lots and readers was good to excellent (κ > 0.73-0.99). Conclusions: Diagnostic accuracy of VL RDTs varies between the major endemic regions. Many tests performed well and showed good heat stability in the ISC; however, reduced sensitivity against Brazilian and East African panels suggests that in these regions, used alone, several RDTs are inadequate for excluding a VL diagnosis. More research is needed to assess ease of use and to compare performance using whole blood instead of serum and in patients coinfected with human immunodeficiency virus
    corecore