Objectives: To determine the effectiveness of the instructional program on patients’ knowledge about home safety while receiving anti-cancer treatment at Al- Karama Teaching Hospital in Al-Kut City.
Methodology: A quasi-experimental design is conducted through the application of a pre-test and post-test approach for the study and control groups from February 5th, 2020 to April 25th, 2020. A non–probability (purposive) sample of (50) patients treated at the Blood Disease and Oncology Center is selected and divided into two groups. Each group contains (25) patients as control and study groups. An instrument is constructed that is comprised of two parts; t
... Show MoreThis research was conducted to measure the safety of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli, through studying its toxic effect on human blood lymphocyte, since it showed a promising effect in reducing the proliferation of colorectal cancer cells. the cytogenetic effects of (STa) by using five different concentrations (100, 200, 400, 800 and 1600μg/ml) in comparison with negative (PBS, Phosphate buffer saline) and positive (MMC, Mitomycin C) at concentration of 5μg/ml, controls on human blood lymphocytes obtained from both (10) normal healthy persons and (20) colorectal cancer patients was measured by employing the following parameters: mitotic index, blast index, chromosomal aberrations and micronucle
... Show MoreThe research amid to find out the extent of Iraqi oil companies commitment to implement internal control procedures in accordance with the updated COSO framework. As the research problem was represented in the fact that many of the internal control procedures applied in the Iraqi oil companies are incompatible with most modern international frameworks for internal control, including the integrated COSO framework, issued by the Committee of Sponsoring Organizations of the Tradeway Committee. The research followed the quantitative approach to handling and analysing data by designing a checklist to represent the research tool for collecting data. The study population was represented in the Iraqi oil companies, while the study sample
... Show MoreThe aim of the research is to measure the efficiency of the companies in the industrial sector listed in the Iraqi Stock Exchange , by directing these companies to their resources (inputs) towards achieving the greatest possible returns (outputs) or reduce those resources while maintaining the level of returns to achieve the efficiency of these companies, therefore, in order to achieve the objectives of the research, it was used (Demerjian.et.al) model to measure the efficiency of companies and the factors influencing them. The researchers had got a number of conclusions , in which the most important of them is that 66.6% of the companies in the research sample do no
... Show MoreThe aim of the research is to measure the efficiency of the companies in the industrial sector listed in the Iraqi Stock Exchange , by directing these companies to their resources (inputs) towards achieving the greatest possible returns (outputs) or reduce those resources while maintaining the level of returns to achieve the efficiency of these companies, therefore, in order to achieve the objectives of the research, it was used (Demerjian.et.al) model to measure the efficiency of companies and the factors influencing them. The researchers had got a number of conclusions , in which the most important of them is that 66.6% of the companies in the research sample do not possess relatively high efficiency and that the combined factors (the nat
... Show MoreAbstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt