Background: Premature infant born with immature body system, their organs are not ready for extra uterine life, and they are unable to deal with external stress, which could alter body functions such as cardio-respiratory function. In addition, poor muscle tone increases the chance of developing an abnormal posture. To reduce this instability, applying developmental care such as nesting is vital to promote cardio-respiratory stability, maintain position, and reduce stress in preterm. Objectives: The study aims to assess the impact of the nesting technique on preterm cardio-respiratory parameters in various positions (supine, prone, and right lateral). Methodology: The research used randomized controlled trial design. By simple random sampling technique was choose 60 preterm infant, and they were divided into four groups equally (supine, prone, right lateral, and control group). The cardio-respiratory parameters (heart rate, respiratory rate, and oxygen saturation) were measured before and after applying the nesting and positioning techniques for 3 consecutive days. Data were analyzed by Statistical Package for Social Sciences (SPSS) program. Results: The study results showed a significant difference in the mean score of cardio-respiratory after three days of nesting technique with lateral, supine, and prone position groups at p= 0.000. While the control group showed there was non-significant change in the mean score of HR, RR, and Spo2 at p > 0.05. Conclusion: The Study concluded that the nesting technique was effective for stabilizing the cardio-respiratory parameters of preterm infants. The authors recommended routinely using nesting with the ideal position technique in preterm as a part of developmental care at the neonatal intensive care unit
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreAbstract:
the system of Administrative Control in organizations meets the need to check on the optimal use and proper resources and conservation to achieve the objectives sought by the organization, hence the system of Administrative Control is part of the overall system in any organization that has undergone evolution always to be able to keep up with progress in the development of other sciences, and that the growth of coherence between subordinates in the organization means the ability to influence the opinions, ideas and attitudes to change it for directions the organization and its values and this is reflected positively on the coherence of the organization, the researcher interest of the imp
Relation on a set is a simple mathematical model to which many real-life data can be connected. A binary relation on a set can always be represented by a digraph. Topology on a set can be generated by binary relations on the set . In this direction, the study will consider different classical categories of topological spaces whose topology is defined by the binary relations adjacency and reachability on the vertex set of a directed graph. This paper analyses some properties of these topologies and studies the properties of closure and interior of the vertex set of subgraphs of a digraph. Further, some applications of topology generated by digraphs in the study of biological systems are cited.
In this paper, the Normality set will be investigated. Then, the study highlights some concepts properties and important results. In addition, it will prove that every operator with normality set has non trivial invariant subspace of .
Vol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this study the adsorption of cefixime on to selected Iraqi clay bentonite. The aim of this study is to search for selective active surface in adsorption of the drug and to act as physical antidotes in treatment of poisoning if the drug is taken in quantities higher than the recommended dosages. Quantitative estimation of the drug adsorption has been done by utilizing the technique of UV spectrophotometry in λmax (273) nm at different conditions of temperature (25, 37, 45) ˚C found the adsorption decrease with increase the temperature. Study of clay weight of bentonite (0.1-1.5) gm found the adsorption increase with increase of clay weight, study effect of pH (1.2, 3, 5, 7) on adsorption of bentonite found the optimum adsorption
... Show More