Objectives: to assess nurses' knowledge toward infection control measures for hepatitis a virus in hemodialysis
units and to detemine the relationship between nurses' knowledge and their demographical characteristics.
%eihs:::°mg:rA5th:e;:#tt£:eoscTodbyerw9¥,C22;5];e.d°utathem°dialysisunitsofBaghdadTeachingHospha|sstated
A non-probability `tturposive" sample of (51) nurses, who were working in hemodialysis units were selected
from Baghdad teaching hosphals. The data were collected through the use of constructed questionnaire, which
consists of two parts (I) Demographic data fom that consists of 10 items and (2) Nurses' knowledge form that
consists of 6 sections contain 79 items, by means of direct interview technique with the nurses. The validity of
#eo:u£Stla°#]:Tes#:t:)¥mwe:T:¥dp:::e#::gtitoth(e];)e:Poedc]:I:Sieipper¥La,n4dth:ts2:eo):abufi]t¥%aasyd:tthe,¥omoe8d
Descriptive statistical analysis procedures (frequency, percentage, mean of score) and inferential statistical
analysis procedures (person correlation coefficient, contingency coefficient) were used for the data analysis.
Results: The findings of the study indicated that there is a knowledge deficit of nurses in some aspects relative
to infection control measures. No sigrificant relationship was found between nurses' knowledge and their
gender, marital status and years of experience in hospital, while a significant relationship was found between
nurses' knowledge and their age, level of education, years of experience in hemodialysis unit, sharing in training
sessions and duration of training session that the nurses were engaged in it.
Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreThe research aims to find ways to minimize the use of quantities of chemical fertilizers in agriculture in order to get to an environment that is free of contaminants. Magnetized water technology used in the experience of planting seeds of tomatoes Thomson type to obtain a higher efficiency to absorb fertilizer NRK in the protected environment of the period from February to June. Magnetized water system used locally made levels Gaues (4800,2500,1500) concentrations of 50 to 100% for each level and the rate of (4) replicates, and results indicated that the severity of the magnet (4800 Gaues) and a concentration of 50% gave the highest percentage of tomato fruit size and intensity ( 1500 Gaues) and a concentration of 100% did not give any inc
... Show MoreWhoever contemplates the Qur'an and recites its texts finds that the Qur'an did not invent or invent words that were unknown before it. Rather, it is the language of the Qur'an which deals with all the matters of the saying. He chose the most honorable of the materials and connected them to the meaning. And in the places of prosperity or sweetness, we find his words easy, to go into the midst of the ills for which it is The Holy Quran chose vocabulary and structures without The son of Ajeeba was one of those distinguished by high taste and linguistic sciences. This ability helped him to analyze and draw, and to explain the ills for which he influenced the singular On the other, and installed on another, and to show the efforts of Ibn Aje
... Show MoreThe current study tackles how slavery and racial segregation, which have obviously made an enormous impact in the United States of America for many years, can be defeated through optimism. The study opens with an introduction that clarifies some background about Langston Hughes as a poet who writes against slavery and oppression done to the American Blacks during an era which was known for racial segregation in the United States of America. The poet sheds light , in his poetry, upon the role of African Americans in activating hope and optimism to get freedom which has been reached at the end. The first section of the study analyzes the meaning of slavery and segregation as reflected in some selected poems, showing the oppressive face of
... Show MorePurpose: To validate a UV-visible spectrophotometric technique for evaluating niclosamide (NIC) concentration in different media across various values of pH. Methods: NIC was investigated using a UV-visible spectrophotometer in acidic buffer solution (ABS) of pH 1.2, deionized water (DW), and phosphate buffer solution (PBS), pH 7.4. The characterization of NIC was done with differential scanning calorimeter (DSC), powder X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The UV analysis was validated for accuracy, precision, linearity, and robustness. Results: The DSC spectra showed a single endothermic peak at 228.43 °C (corresponding to the melting point of NIC), while XRD and FTIR analysis confirmed the identit
... Show MoreSuggestion Plan for the Reclassification of U.N Publications in Central Library
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreA Factorial Study for separation anxiety in students, of Baghdad City