Objective: The descriptive study was used to evaluate nursing staff performance in cardiac care units at teaching
and non teaching hospitals in kirkuk city: A comparative study.
Methodology: A descriptive study was used to evaluate nursing staff performance in cardiac care units. The study
was conducted from December 29th
, 2013 up to the 27th of Apr. 2014. A non-probability (purposive) sample of
(44) nurses who work in cardiac care unit at Azady teaching Hospital and Kirkuk general Hospital was evaluated by
a questionnaire which consisted of two parts; the first part is concerned with the demographic characteristics of
the nurses and the second part concerned Observation check list for evaluation nursing staff Performance in
Cardiac Care. Validity of the observational check list performed through a panel of (02) experts and the reliability of
the questionnaire is determined through the pilot study. Descriptive and inferential statistical used to analysis of
data.
Results: the study shows that (61.4%) of the samples age were (20-30) years old, (63.6%) were male. (68.2%) of
them Graduate B.Sc. of Nursing. most of the samples has (1-5) Years of experience in Nursing. the results shows
that a high assessment of observational Check List are reported for the following domains: Maintenance respiration
by adequate O2 supply, Decrease SVR (systematic vascular resistance), Monitor ABGs (Arterial blood gases)
frequently. Also the study reveals that moderate assessments of observational Check List are reported for reaming
domains.
Recommendations : Providing opportunity for nurses in cardiac care units to continuing updating their education
to maintain knowledge and skills.
The aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More