Objective: To evaluate the effectiveness of educational program on female students’ knowledge toward premenstrual syndrome.
Methodology: A quasi-experimental design study conducing on (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criterias to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the knowledge , before the implementation of the program, the second step is implementing the program, following two steps post-test I and II between each test two weeks. Validity is determined through a panel of experts, and the reliability of the questionnaire is determined through pilot study of ten students. Data analyzed through descriptive inferential statistics.
Results: The current study indicates that the number of study sample that reported having premenstrual syndrome was (140). There were significant differences at (P- value≤ 0.01) between pretest, posttest I and posttest II. A significant difference results were found between the first test before implementation the program and the two tests after implementation the program regarding their knowledge about premenstrual syndrome, compared to the control group.
Recommendations: The study recommended that early education courses in primary school regarding menstruation, premenstrual syndrome, and self-care measures.
Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreAbstract Background: Crown lengthening is a surgical procedure that apically positions the gingival edge and/or removes supporting bone in order to increase the amount of supra gingival tooth structure for restorative or cosmetic purposes.
The objective of the study: The purpose of this study was to evaluate the efficacy of the 940nm diode laser in esthetic crown lengthening surgery through clinical observations, patient questionnaires, clinical photographs, and gingival healing following gingival operations. Material and methods: In this randomized clinical trial, 16 patients (11 females and 5 males) had their crowns surgically lengthened using a diode laser (940 nm) in continuou
... Show MoreDoppler broadening of the 511 keV positron annihilation ??? ? was used to estimate the concentration of defects ?? different deformation levels of pure alnminum samples. These samples were compressed at room temperature to 15, 22, 28, 38,40, and 75 % thickness reduction. The two-state ^sitron-trapping model has been employed. 'I he s and w lineshape parameters were measured using high-resolution gamma spectrometer with high pure germanium detector of 2.1 keV resolution at 1.33 MeV of 60Co. The change of defects concentration (Co) with the deformation level (e) is found to obey an empirical formula of the form Cd - A £ B where A and ? are positive constants that depend mainly on the deformation procedure and the temperature at which the def
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreThe topological indices of the "[(µ3-2, 5-dioxyocyclohexylidene)-bis ((2-hydrido)-nonacarbonyltriruthenium]” were studied within the quantum theory of atoms in the molecule (QTAIM), clusters are
analyzed using the density functional theory (DFT). The estimated topological variables accord with prior
descriptions of comparable transition metal complexes. The Quantum Theory of Atom, in molecules
investigation of the bridging core component, Ru3H2, revealed critical binding points (chemical bonding)
between Ru (1) and Ru (2) and Ru (3). Consequently, delocalization index for this non-bonding interaction
was calculated in the core of Ru3H2, the interaction is of the (5centre–5electron) class.
A simple, rapid, accurate and sensitive spectrophotometric method has been developed for the determing carbamate pesticides in both pure and water samples. The method is appropriate for the determination of carbofuran in the presence of other ingredients that are usually available in dosage forms. The effect of organic solvents on the spectrophotometric properties of the azo dye and the structure of the resulting product have also been worked out and it is found to be 1:1 benzidine :carbofuran. The method can be successfully applied to determination of carbofuran in water samples. The method is based on diazotization of Benzidine (4, 4 – diamino biphenyl) with sodium nitrite and hydrochloric acid followed by coupling with carbofuran
... Show More