Aim: to determine the effectiveness of women's self-care instructions on their post cesarean section care in Baghdad
teaching hospital.
Methodology: The present study used quasi-experimental study design in maternity words in Baghdad teaching
hospital. The sample was collected and follow up for the period (15) January 2014 until 15 May 2014 Nonprobability
(purposive sample) of (100) women post cesarean section divided in to two groups (50) women post
cesarean section considered as a study group, and another (50) women post cesarean section considered as the
control one, A questionnaire designed as a tool to collect data fit the purpose of the study a questionnaire include
demographic variables, Reproductive variables
A total of 30 specimens of house sparrow Passer domesticus biblicus Hartert, 1904 (15 females and 15 males) were collected from gardens of some houses in Baghdad city; all birds were dissected to identify the parasites in vesicle, gizzard, intestine, gall bladder and caecum. One species of trematodes Brachydistomum microscelis (Yamaguti, 1933) was found in the gall bladder and two species of cestodes Anonchotaenia globata (von Linstow, 1879) and Raillietina tetragona (Molin, 1858) were found in the small intestine of house sparrow. Morphologic and morphometric measurements were considered.
The genus Brachydistomum Travassos, 1944 is being recorded for the first time in Iraq in the gall bladder of house sparr
... Show MoreObjective: impact of the education program for nurses' knowledge toward children under mechanical
ventilation, and to find out the relationships between nurses' knowledge and their general information.
Methodology: Quasi experimental study was carried out at the respiratory care units of Baghdad
Pediatric Teaching Hospitals started from February15th, until September 26th, 2011, A purposive (nonprobability)
sample of (23) nurses working in the respiratory care units, were selected from Children
Welfare and Pediatric Central Teaching Hospitals. The data were gathered through using of the
constructed multiple choice questionnaire using to evaluate the nurses knowledge using checklist, The
questionnaire consists of two p
The present work included qualitative study of epiphytic algae on dead and living stems, leaves of the aquatic plant Phragmitesaustralis Trin ex Stand, in Tigris River in AL- Jadria Site in Baghdad during Autumn 2014, Winter 2015, Spring 2015, and Summer 2015. The physical and chemical parameters of River’s water were studied (water temperature, pH, electric conductivity, Salinity, TSS, TDS, turbidity, light intensity, dissolve oxygen, BOD5, alkalinity, total hardness, calcium, magnesium and plant nutrient). A total of 142 isolates of epiphytic algae were identified. Diatoms were dominant by 117 isolates followed by Cyanobacteria (13isolates), Chlorophyta (11 isolates) and Rhodophyta (1 isolate), Variations in the isolates number were rec
... Show MoreAbstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.