Objective(s): The study aims at examining the role of technical information used in nursing education, such as "the
Internet, e-mail services, video, audio conferencing and other "in the College of Nursing at the University of Baghdad.
Methodology: A descriptive and analytical study which was using the examination approach was conducted on a
non-probability sample (purposive sample) of (42) members of the faculty of the College of Nursing at the University
of Baghdad. A questionnaire was constructed for the purpose of the study. It was consisted of two parts; the first part
which included the demographic characteristics of faculty members (such as age, sex,
qualification, scientific title, and the scientific department in college) and the second part includes
(22) question about the technical information used in nursing education, Where it was built through the review of the
literature related to technical information used in education. Data were collected through a self- administration
method, from 4
th to 30th September, 2011. Data were analyzed through use of descriptive analysis (frequencies and
percentages), and inferential statistical measures which include the (ANOVA).
Results: The results of the study indicated that the majority of faculty members are encouraged to use various
technical information in education nursing.
Conclusion: The study concluded that the high qualification of faculty members led to a high familiarity with
technical information and its importance in nursing education.
Recommendations: The study recommend the need to develop a database on the use of technical information in
the college as well as for the other Nursing colleges universities in Iraq to facilitate the process of identifying needs,
planning services for information systems and the optimal allocation of resources for technical information in nursing
education.
Developing a solid e-voting system that offers fairness and privacy for users is a challenging objective. This paper is trying to address whether blockchain can be used to build an efficient e-voting system, also, this research has specified four blockchain technologies with their features and limitations. Many papers have been reviewed in a study covered ten years from 2011 to 2020. As a result of the study, the blockchain platform can be a successful public ledger to implement an e-voting system. Four blockchain technologies have been noticed from this study. These are blockchain using smart contracts, blockchain relying on Zcash platform, blockchain programmed from scratch, and blockchain depending on digital signature. Each bl
... Show More
In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreIn this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm
To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading
... Show Moreconventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
The huge evolving in the information technologies, especially in the few last decades, has produced an increase in the volume of data on the World Wide Web, which is still growing significantly. Retrieving the relevant information on the Internet or any data source with a query created by a few words has become a big challenge. To override this, query expansion (QE) has an important function in improving the information retrieval (IR), where the original query of user is recreated to a new query by appending new related terms with the same importance. One of the problems of query expansion is the choosing of suitable terms. This problem leads to another challenge of how to retrieve the important documents with high precision, high recall
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreEmails have proliferated in our ever-increasing communication, collaboration and
information sharing. Unfortunately, one of the main abuses lacking complete benefits of
this service is email spam (or shortly spam). Spam can easily bewilder system because
of its availability and duplication, deceiving solicitations to obtain private information.
The research community has shown an increasing interest to set up, adapt, maintain and
tune several spam filtering techniques for dealing with emails and identifying spam and
exclude it automatically without the interference of the email user. The contribution of
this paper is twofold. Firstly, to present how spam filtering methodology can be
constructed based on the concep
In this work, using GPS which has best accuracy that can be established set of GCPs, also two satellite images can be used, first with high resolution QuickBird, and second has low resolution Landsat image and topographic maps with 1:100,000 and 1:250,000 scales. The implementing of these factors (GPS, two satellite images, different scales for topographic maps, and set of GCPs) can be applying. In this study, must be divided this work into two parts geometric accuracy and informative accuracy investigation. The first part is showing geometric correction for two satellite images and maps.
The second part of the results is to demonstrate the features (how the features appearance) of topographic map or pictorial map (image map), Where i