Objective: The study aims to determine the effectiveness of the continuing nursing education
program on nursing staffs knowledge in kidney transplantation unit and to find out the relationship
between nursing staffs knowledge and demographic characteristics (age, gender, education level, and
years of experiences in kidney transplantation unit).
Methodology: A quasiexperemental design (One-group Pretest - Posttest design) was carried out in
kidney transplantation units at Baghdad Teaching Hospitals, from December 2011 to July 2012. A nonprobability
(purposive sample) of (16) nurses were selected from kidney transplant units at Baghdad
teaching hospitals, the choice was based on the study criteria. The data were collected through the
use of constructed questionnaire and consist from two major parts, part one consist of demographic
characteristics contain (9) and part two consist of (58) items of a multiple choice questions
distributed in (8) major sections. Validity of the instrument was determined through a panel of (8)
experts, and reliability through a pilot study. The data were analyzed through the application of
descriptive and inferential statistical analysis procedures.
Results: The findings of the present study indicate that the continuing nursing education program
was effective on knowledge improvement of the participant’s nurses. The total percent of the
improvements resulted by the effects of applying the continuing nursing education program was
(43.31%). And there was a non-significant relationship between nurse’s knowledge and demographic
characteristics (age, gender, education level, and years of experiences in kidney transplantation unit).
Recommendation: Based on the result of the present study the researcher recommends to carrying
out additional studies on application of nursing education programs about nurses practice on kidney
transplantation in kidney transplant units, and nurses should be encouraged to participate in
continuing education programs and training sessions about kidney transplantation.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
Equilibrium adsorption isotherm for the removal of trifluralin from aqueous solutions using ? –alumina clay has been studied. The result shows that the isotherms were S3 according Giels classification. The effects of various experimental parameters such as contact time, adsorbent dosage, effect of pH and temperature of trifluralin on the adsorption capacities have been investigated. The adsorption isotherms were obtained by obeying freundlich adsorption isotherm with (R2 = 0.91249-0.8149). The thermodynamic parameters have been calculated by using the adsorption process at five different temperature, the values of ?H, ?G and ?S were (_1.0625) kj. mol-1, (7.628 - 7.831) kj.mol-1 and (_2.7966 - _2.9162) kg.
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreVehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show MoreIn this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.