Preferred Language
Articles
/
injns-117
Examination the role of technical information in the development of nursing education for the Faculty of Nursing at the University of Baghdad
...Show More Authors

Objective(s): The study aims at examining the role of technical information used in nursing education, such as "the
Internet, e-mail services, video, audio conferencing and other "in the College of Nursing at the University of Baghdad.
Methodology: A descriptive and analytical study which was using the examination approach was conducted on a
non-probability sample (purposive sample) of (42) members of the faculty of the College of Nursing at the University
of Baghdad. A questionnaire was constructed for the purpose of the study. It was consisted of two parts; the first part
which included the demographic characteristics of faculty members (such as age, sex,
qualification, scientific title, and the scientific department in college) and the second part includes
(22) question about the technical information used in nursing education, Where it was built through the review of the
literature related to technical information used in education. Data were collected through a self- administration
method, from 4
th to 30th September, 2011. Data were analyzed through use of descriptive analysis (frequencies and
percentages), and inferential statistical measures which include the (ANOVA).
Results: The results of the study indicated that the majority of faculty members are encouraged to use various
technical information in education nursing.
Conclusion: The study concluded that the high qualification of faculty members led to a high familiarity with
technical information and its importance in nursing education.
Recommendations: The study recommend the need to develop a database on the use of technical information in
the college as well as for the other Nursing colleges universities in Iraq to facilitate the process of identifying needs,
planning services for information systems and the optimal allocation of resources for technical information in nursing
education.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Toxicology
Acute β - N -Methylamino-L-alanine Toxicity in a Mouse Model
...Show More Authors

The cyanobacterial neurotoxinβ-N-methylamino-L-alanine (BMAA) is considered to be an “excitotoxin,” and its suggested mechanism of action is killing neurons. Long-term exposure to L-BMAA is believed to lead to neurodegenerative diseases including Parkinson’s and Alzheimer’s diseases and amyotrophic lateral sclerosis (Lou Gehrig’s disease). Objectives of this study were to determine the presumptive median lethal dose (LD50), the Lowest-Observed-Adverse-Effect Level (LOAEL), and histopathologic lesions caused by the naturally occurring BMAA isomer, L-BMAA, in mice. Seventy NIH Swiss Outbred mice (35 male and 35 female) were used. Treatment group mice

... Show More
View Publication
Scopus (20)
Scopus
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Materials Research Express
Thermochromic and opacity behaviors in vanadium dioxide nanofilms: a theoretical study
...Show More Authors
Abstract<p>Vanadium dioxide nanofilms are one of the most essential materials in electronic applications like smart windows. Therefore, studying and understanding the optical properties of such films is crucial to modify the parameters that control these properties. To this end, this work focuses on investigating the opacity as a function of the energy directed at the nanofilms with different thicknesses (1–100) nm. Effective mediator theories (EMTs), which are considered as the application of Bruggeman’s formalism and the Looyenga mixing rule, have been used to estimate the dielectric constant of VO<sub>2</sub> nanofilms. The results show different opacity behaviors at different w</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 15 2021
Journal Name
Arab World English Journal For Translation And Literary Studies
Insanity and Murder in Robert Browning’ and Robert Lowell’s Dramatic Monologues
...Show More Authors

The study aims at fathoming Robert Browning’ and Robert Lowell’s intentions of choosing the dramatic monologue as a means of exploring human psyche. Significantly, the themes of insanity and murder are not ideal from an esthetic perspective, but for Browning and Lowell it provides the key to probe into human character and fundamental motives. This study examines Browning’ and Lowell’s dramatic monologues that address crime and the psyche of abnormal men. Browning’ and Lowell’s poetry in this regard unravels complicated human motivations and delineates morbid psychologies. Their monologues probe deep down into the mind-sets of their characters and dissect their souls to the readers. The main character of each of Browning

... Show More
View Publication
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Multi – Linear in Multiple Nonparametric Regression , Detection and Treatment Using Simulation
...Show More Authors

             It is the regression analysis is the foundation stone of knowledge of statistics , which mostly depends on the ordinary least square method , but as is well known that the way the above mentioned her several conditions to operate accurately and the results can be unreliable , add to that the lack of certain conditions make it impossible to complete the work and analysis method and among those conditions are the multi-co linearity problem , and we are in the process of detected that problem between the independent variables using farrar –glauber test , in addition to the requirement linearity data and the lack of the condition last has been resorting to the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 07 2021
Journal Name
Jurnal Teknologi
MODELS, DETECTION METHODS, AND CHALLENGES IN DC ARC FAULT: A REVIEW
...Show More Authors

The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm
...Show More Authors

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
Human Leukocyte Antigens Assosiation with Systemic Lupus Arythematosus In Iraqi Patients
...Show More Authors

Background: The etiology of Systemic lupus erythematosus seems to be multifactorial including environmental as well as genetic factors. The genetic predisposition was supported by the occurrence of Systemic lupus erythematosus in more than one member of a family as well as in identical twins.
Aim of the study: To determine the human leukocyte antigen typing class I (A and B) in patients with Systemic Lupus Erythematousus disease.
Methods: Patients group consisted of 44 Iraqi Arab Muslims patients with Systemic lupus erythematosus disease who presented to Baghdad Medical City from January 2010 to January 2012 from Baghdad Province. The second control group consisted from 80 Iraqi Arab Muslims volunteers from hospital employees and t

... Show More
View Publication Preview PDF