Objective: To evaluate the effectiveness of educational program on female students’ knowledge toward premenstrual syndrome.
Methodology: A quasi-experimental design study conducing on (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criterias to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the knowledge , before the implementation of the program, the second step is implementing the program, following two steps post-test I and II between each test two weeks. Validity is determined through a panel of experts, and the reliability of the questionnaire is determined through pilot study of ten students. Data analyzed through descriptive inferential statistics.
Results: The current study indicates that the number of study sample that reported having premenstrual syndrome was (140). There were significant differences at (P- value≤ 0.01) between pretest, posttest I and posttest II. A significant difference results were found between the first test before implementation the program and the two tests after implementation the program regarding their knowledge about premenstrual syndrome, compared to the control group.
Recommendations: The study recommended that early education courses in primary school regarding menstruation, premenstrual syndrome, and self-care measures.
A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreThe research aimed at identifying the relationship between motivation and self–confidence on the performing routines in the parallel bar. The researchers used the descriptive method on (480) thirds year college of physical education and sport sciences/ university of Baghdad students. The data was collected and treated using proper statistical operations to conclude that there is a high correlation relationship between motivation and self-confidence with routine performance on parallel bars. In addition to that, the researchers concluded that third-year students have high motivation and self – confidence and there is a positive relationship between motivation, self-confidence, and routine performance on parallel bars.
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreMedication safety is an important part of the comprehensive patient safety term. Medication safety is gaining more attention as the World Health Organization set the goal of decreasing medication harm by (50%) for the next 5 years when launching the third global challenge. Studying medication safety in the risk groups such as young ages, children are crucial to learn more about the effect of medicines in this risk group since they are not included in the clinical trials. Adverse drug reaction is defined as any harm resulted from the drug itself during medical process journey, while medication errors are any harm resulted from the treatment process rather than the drug or it is the result of the failure in a step of the treatment process
... Show MoreBackground: Laparoscopic cholecystectomy has many difficulties which include port Insertion, Dissectionof the Calot’s Triangle , Grasping of the Gallbladder , Wall thickness, Adhesion and extraction of theGallbladder. Aim of the Study: To predict how difficult cholecystectomy will be from assessing the patientpreoperatively which, in turn, help in decreasing the risks on the patients and preventing post-operativecomplications. Patients and Methods: A prospective study conducted in the department of General Surgeryat Al-Ramadi Teaching Hospital for the period of nine months from 15th of May 2018 till the 15th of February2019. It included 60 patients, all of them were undergone laparoscopic cholecystectomy for Gallstone. Patientswit
... Show More