Abstract :
This present paper sheds the light on dimensions of scheduling the service that includes( the easiness of performing the service, willingness , health factors, psychological sides, family matters ,diminishing the time of waiting that improve performance of nursing process including ( the willingness of performance, the ability to perform the performance , opportunity of performance) . There is genuine problem in the Iraqi hospitals lying into the weakness of nursing staffs , no central decision to define and organize schedules. Thus the researcher has chosen this problem as to be his title . The research come a to develop the nursing service
... Show MoreThe purpose of this paper is to find an arc of degree five in 31 ,29),(2, =qqPG , with stabilizer group of type dihedral group of degree five 5 D and arcs of degree six and ten with stabilizer groups of type alternating group of degree five 5 A , then study the effect of 5 D and 5A on the points of projective plane. Also, find a pentastigm which has collinear diagonal points.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe present study investigates the realization and significance of textual themes in the organizational structure of M.A theses and Ph.D. dissertations, namely: the abstracts, introductions and conclusions, since in such parts the students depend on their own expressions, styles and constructions to express different viewpoints, plans, inferences, etc. The study also investigates the similarities and differences between M.A theses and Ph.D. dissertations concerning the use of textual themes;it sets out to conduct a detailed analysis of textual themes used in such texts. In conducting such an analysis, the study adopts Halliday's (1994) approach of textual themes. The results of such an analysis have clearly shown that, in spite of the di
... Show MoreBackground: Patient satisfaction is of increasing importance and widely recognized as an important indicator of quality of the medical care. There was no homogeneous definition of patient satisfaction, since satisfaction concerns different aspects of care or settings, as well as care given by various professions.
Objective: The objective of this study is to assess the patients’ level of satisfaction with diabetes care and to identify the underlying factors influencing it.
Methods: This cross-sectional study had been conducted in the Specialized Center for Diabetes and Endocrinology in Baghdad Al- Rusafa 2018. Where150 type two diabetic patients attending their follow-up
... Show MoreThe article aims to study the liquidity that is required to be provided optimally and the profitability that is required to be achieved by the bank, and the impact of both of them on the value of the bank, and their effect of both liquidity and profitability on the value of the bank. Hence, the research problem emerged, which indicates the extent of the effect of liquidity and profitability on the value of the bank. The importance of the research stems from the main role that commercial banks play in the economy of a country. This requires the need to identify liquidity in a broad way and its most important components, and how to
... Show MoreThe study aims at showing the active role of the internal auditors through explaining what they should be obliged to in writing the reports and financial and non financial statements according to the international standards of accounting to be transparent and integral. It also aims at giving the independence that the auditors should enjoy through connecting them to an Auditing Commissions to submit additional services in addition to assessing the instrument of control to evaluate risks, give consultations and the services related to the governance and independence of Supervising Council.
... Show More