Objectives of the study: To assess nurses knowledge regarding oxytocin administration during labor and
delivery in maternity hospitals, and to find out the relationship between nurses knowledge and studied
variables (age, level of education, work times (shift) experience year, training course in nursing field).
Methodology: Descriptive analytic study was conducted on non-probability sample (convenient) of (70) nurses
to assess nurse’s knowledge related to oxytocin administration. The study is conducted at Al- kut Hospital for
Gynecology Obstetrics and Pediatrics and Al- Zahraa Teaching Hospital during periods 5th February to 24th
April 2013, A questionnaire was used as a tool of data collection to fulfill with objectives of the study and
consisted of three parts, including demographic characteristics (age, level of education, social status, work
times (shift ), professional characteristics (experience year, license of midwifery practice, Practice midwifery in
community, In service education, Number training course in nursing field) and nurse’s knowledge related to
oxytocin: (Action, Administration of oxytocin , Adverse effect of oxytocin on mother, Adverse effect of
oxytocin on fetus, Side effects, Contraindication and nurse's role in oxytocin administration. Content validity
and reliability of the questionnaire were determined through a panel of experts and pilot study. Descriptive
and inferential statistics are used to analyze the data.
Results: The results of the study showed that highest percentage (24.3%) were in age group (40-44) years,
nursing secondary school graduated, and (30%) of them had (1-5) years of experience in nursing, and (62.9%)
was not pass in service education. Their knowledge was adequate in some items and inadequate in certain
items. Regarding oxytocin administration, there were statistical significant association between level of
knowledge and (work time (shift), implementation of orders
Recommendations: Implementation of educational program for nurses about oxytocin administration to
increase their knowledge, further research in this field by using checklist to apply administration technique in
right method to prevent error occurrence.
The adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1, 2-diylidenebis (methan-1-yl-1-ylidene)) bis (2-methoxyphenol)] derived from condensation reaction of hydrazine hydrate and 4-hydroxy-3-methoxybenzaldehyde, from aqueous solutions has been investigated through columnar method.The ligand (H2L) adsorption found to be dependent on adsorbent dosage, initial concentration and contact time.All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.),at room temperature (25±2)°C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monol
... Show MoreEnticed by the present scenario of infectious diseases, four new Co(II), Ni(II), Cu(II), and Cd(II) complexes of Schiff base ligand were synthesized from 6,6′-((1E-1′E)(phenazine-2,3-dielbis(azanylidene)-bis-(methanylidene)-bis-(3-(diethylamino)phenol)) (
Green biosynthesized selenium nanoparticles from
Rehabilitation robots are widely recognized as vital for restoring motor function in patients with lower-limb impairments. A Modified Fractional-Order Proportional-Integral-Derivative (MFOPID) controller is proposed to improve trajectory tracking of a 2-DoF Lower Limb Rehabilitation Exoskeleton Robot (LLRER). The classical FOPID is augmented with a modified control formulation by which steady-state error is reduced and the transient response is sharpened. Controller gains and fractional orders were tuned offline using a hybrid metaheuristic Improved Elk Herd Optimization hybridized with Grey Wolf and Multi-Verse Optimization algorithms (IElk-GM) so that exploration and exploitation are balanced. Superiority over the classical FOPID
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More