Objective: To assess knowledge and skills level regarding oxygen administration methods at p
ediatric teaching hospitals in Mosul City.
Methodology: A descriptive study was applied at pediatric teaching hospitals (Al-Kansaa, and Ibn Al-Atheer) in Mosul City from 8 of October / 2018 till 29 of May / 2019. The selection of the sample was non- probability (Purposive). This sample involved of (52) nurses. The questionnaire was constructed which consists of three parts and provided for nurses. The questionnaire validity was carried out through a panel of experts. To evaluate statistically the reliability of instruments, the pilot study was applied through period from 20– till –31 of January / 2019. Non-randomly (6) nurses from Ibn Sina teaching hospitals, the correlation of Pearson's coefficient result are (r= 0.798) and are significant at p ≤ 0.05 level was used to approximation the scale (test – retest) by using SPSS version 25.
The Result show statistical knowledge and skills results for nurse's in concerning the oxygen administration methods for pediatric, that knowledge results are 84.6% (44) of them at not acceptable level, and the skills results are 65.4 % (34) of them also at not acceptable level. There are not significant relationships between the knowledge, skills results and all the demographic variables except the skills results with training courses only there are significant relationships at p≤ 0.05.
Recommendations: Training course and workshops for nurses of teaching hospitals regarding oxygen administration methods
The analysis of time series considers one of the mathematical and statistical methods in explanation of the nature phenomena and its manner in a specific time period.
Because the studying of time series can get by building, analysis the models and then forecasting gives the priority for the practicing in different fields, therefore the identification and selection of the model is of great importance in spite of its difficulties.
The selection of a standard methods has the ability for estimation the errors in the estimated the parameters for the model, and there will be a balance between the suitability and the simplicity of the model.
In the analysis of d
... Show MoreIn this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company. The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system. This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system. We calculate the range for each estimator by using the Maximum Likelihood estimator. We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after it checked by the
... Show MoreThis semiotic analytical study has shown that there is a wide diversity in the aesthetic systems and the ranges of reception for the rhetoric and the discourse. The fertility of this semiotic conceptual system monitored this new mature, innovative and advanced level of this new critical analytical method with its different technical and theoretical foundations. Thus, it opened the door wide to new discoveries in the laws, which motivate different artistic texts. Finally, the research is just a start. Can the linguistic methods read the artistic works outside the linguistic authorities? Is it possible to capture the structural transformation in Picasso drawings? Semiotically another researcher in another method (such as deconstruction) ca
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreBeta Distribution
Abstract
Gamma and Beta Distributions has very important in practice in various areas of statistical and applications reliability and quality control of production. and There are a number of methods to generate data behave on according to these distribution. and These methods bassic primarily on the shape parameters of each distribution and the relationship between these distributions and their relationship with some other probability distributions. &nb
... Show MoreThere many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma
... Show MoreThis research aims to identify the impact of the reciprocal reading strategy on developing the innovative reading skills of fifth-grade secondary school students/ scientific branch. To achieve the goal of the research, an achievement test to measure the academic achievement of fifth-grade secondary school students in Arabic language grammar was prepared, a sample of (60) female students from the secondary school of Al- Bawaba Al-Sharkey for Girls in Baghdad were chosen for the academic year (2019-2020). For the purpose of applying the experiment, the test was applied on a pilot sample consisting of (30) students from the same research community. The researcher herself had taught the three
... Show MoreBaghdad and the other Iraqis provinces have witnessed many of celebrations which have the significant effect on the souls of Arabic and Islamic people in general , and Iraqi people, especially the birthday and death of two al-kadhimen Imams(peace upon them) and others .From here the researcher begin to study the visiting of imam kadhimen (peace upon him) on 25 Rajab the commemoration of his sacrifice, simply because have implications of religious, ideological and cultural sectors which represents in finding the greatest flow of visitors .the problem of research appeared due to the clear difference in number of visitors during one day, beside the significant increase in number of visitors throu
... Show More؛ ١٨his study male and female albino mice werdministr^d doses of alkaloid and phenolic extracts of Allium cepa at doses of( 25 ,50,100, 200) mg / kg of( body weight). males and females were divided into four groups and each croup comprised mice were injected intra^ritonially daily for one week and orally ٢٠٢ one month . After which animals were killed and the serum was separated for biochemical analysis (total blood suger, total protein , otal cholesterol). Results showed significant decrease ( p< 0,05) in the total blood suger and total cholesterol on the serum of both males and females and significant increase( p< 0,05) in the total serum protein of both males and females of the two types of injection and oral administr
... Show MoreIdentification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit
... Show More