To determine the evaluation of education program on women's knowledge regarding managing BSE. The present quasi- experimental study, Non-probability (purposive), sample consisting of (260) women who are employee, and students in both colleges (Nursing college, Medical and Health Techniques College). The sample consist of two groups, study group (130) including those in (Nursing college), and control group (130) in (Medical and Health Techniques College). A questionnaire was constructed which included, Demographic information, Reproductive information, Family history, Previous medical history, and information about women's knowledge toward management of breast self examination (BSE). Instrument validity and reliability was determined. Data were collected through the use of the questionnaire, the application of the educational program a post-test was done for the study only which use the lectures, booklets, training practice of BSE, and video film. Analysis of data was performed through the application of descriptive and inferential statistical data analysis approach. Revealed that the women in the study group had benefited from the implementation of the educational program; their knowledge regarding managing BSE was adequately improved and developed. The study illustrated significant difference between women's knowledge means in pre and post test periods regarding their managing for BSE. Implementation of proposed model of continuous medical education for women for BSE within the scope of their work.
This study shows impoliteness as a form of face-threatening that can be intentionally caused by verbal threats in a particular setting. It investigates: what strategies and mitigators do Iraqi-Kurdish English as a foreign language (EFL) learners use in situations of threat responses? The present investigation paper aims to examine impoliteness strategies and mitigators by these learners when they respond to threatening situations in their context. Thus, it fills a gap in pragmatics literature by investigating the reactions to threats in an Iraqi-Kurdish EFL context. To this end, 50 participants have participated in this study. An open-ended questionnaire in the form of a Discourse Completion Task (DCT) is used to elicit responses fr
... Show MoreThe Results Of Interest In Capitals And Major Cities Have Become Major Attraction Centers For People In Rural Areas And Different Regions, Especially With The Concentration Of Industrial And Commercial Establishments And Public Services, Which Helped To Find The Wide Differences Between Them. Recently, The Trend To Develop Small Urban Centers In Rural Back Areas Great And Serious Attempt To Reduce Inflation. The Suburb Of Abu Ghraib Is One Of The Important Suburbs Near The City Of Baghdad And Through The Study Of The Reality Of The Suburb Shows That The Outcome Of Its Career And Urban Development Lies In Its Mutual Relationship With The City Of The Mother In The Light Of Considerations And Measures Of The Most Important Accessibility And
... Show MoreA solar cell was manufactured from local materials and was dyed using dyes extracted from different organic plants. The solar cell glass slides were coated with a nano-porous layer of Titanium Oxide and infused with two types of acids, Nitric acid and Acetic acid. The organic dyes were extracted from Pomegranate, Hibiscus, Blackberry and Blue Flowers. They were then tested and a comparison was made for the amount of voltage they generate when exposed to sunlight. Hibiscus sabdariffa extract had the best performance parameters; also Different plants give different levels of voltage.
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut
... Show MoreThe primary issue addressed in this research revolves around identifying the interactive elements provided by the Twitter platform and understanding their utilization by digital newspapers with official accounts. These newspapers broadcast content in line with their policies. This study is classified within descriptive research that employed a survey method and content analysis tool. The methodology relies on the "how was it said?" approach to categorize the analysis. The research yielded the following results:
Twitter utilized numerous interactive elements for disseminating tweets, which include "text, branching links, hashtags, digital images, digital videos, digital audio, and digital polls." However, thes