Preferred Language
Articles
/
injns-418
Effectiveness of an Educational Program on Nursing Staffs' Knowledge about Uses of Steroids and Their Side Effects in Al-Diwaniya Teaching hospital
...Show More Authors

Objective: To determine the effectiveness of the educational program on nursing staffs' knowledge about uses of steroids and their side effects.
Methodology: A pre-experimental study design (one group design: pre-test and post-test) was used. This study was conducted in Al-Diwaniya Teaching Hospital for the period from ( 28th May to 10 th June, 2020) on a non-probability (purposive) sample consisting of (30 nurses) working in Oncology unit. A questionnaire was built as a data collection tool and consisted of two parts:
First part: The demographic characteristics of the nursing staff (gender, age, level of education, years of experience in hospital, participation in training courses related to nursing care for a patients undergoing to steroid therapy).
Second part: It consists of two domains. The first domain contains (27) multiple-choice questions about assessment of the nursing staffs` knowledge regarding steroids and their uses, while the second domain contains (15) multiple-choice questions about assessment of the nursing staffs` knowledge regarding side effects of steroids. The validity of the questionnaire and the educational program were verified by presenting it to (14) experts. The sample has received a pre-test, educational program, and post-test. Descriptive and inferential statistics were used to analyze the results of the study using the Statistical Package of Social Sciences (SPSS) version 25 and Microsoft Excel (2010).
Results: The study indicates that all the study sample responses at the pre-test were poor knowledge with a statistical mean of scores (1.20), other than the post-test, shows (100%) of the study sample have high knowledge at the mean of scores (1.91). Also, the results revealed a highly significant difference between the pre-test and post-test of the study sample after participated in the educational program at the p-value (0.0001). The conclusion of the study that the educational program was effective in the enhancement of nursing staffs` knowledge about uses of steroids and their side effects in Oncology Unit.
Recommendations: The study recommended the necessity of developing continuous educational programs to educate and train nurses and all health care workers regarding steroids.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Palarch's Journal Of Archaeology Of Egypt/egyptology
EMIRATI-ISRAELI NORMALIZATION AND ITS IMPACT ON THE PALESTINIAN-ISRAELI CONFLICT
...Show More Authors

The Arab-Israeli conflict passed through several stages before reaching the final stage of normalization, namely conflict, conflict and public normalization. Thus, the UAE became the third country to establish official relations with Israel after Egypt in 1979 and Jordan in 1994. With the announcement of the normalization agreement, opinions varied between supporters and opponents of the idea of normalization with Israel, and some countries expressed their acceptance of establishing official relations between the Emirates and Israel, while others warned of the consequences of normalization, which they described as treachery. Although the UAE confirmed that the normalization agreement between the two sides was credited with stopping Israel's

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Fast encoding algorithm based on Weber's law and Triangular Inequality Theorem
...Show More Authors

In the present work, an image compression method have been modified by combining The Absolute Moment Block Truncation Coding algorithm (AMBTC) with a VQ-based image coding. At the beginning, the AMBTC algorithm based on Weber's law condition have been used to distinguish low and high detail blocks in the original image. The coder will transmit only mean of low detailed block (i.e. uniform blocks like background) on the channel instate of transmit the two reconstruction mean values and bit map for this block. While the high detail block is coded by the proposed fast encoding algorithm for vector quantized method based on the Triangular Inequality Theorem (TIE), then the coder will transmit the two reconstruction mean values (i.e. H&L)

... Show More
View Publication Preview PDF
Publication Date
Sun May 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Color Image Steganography Based on Discrete Wavelet and Discrete Cosine Transforms
...Show More Authors

        The secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or  Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in

... Show More
View Publication Preview PDF
Publication Date
Wed May 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Biochemical Study on Splenectomy and Non Splenectomy Iraqi Major Thalassemic Patients
...Show More Authors

In this study the activities of alanine transaminase (ALT) and aspartate transaminase (AST) were evaluated, in addition to total protein and albumins in sera of sixty one subjects whose ages were ranged between(4-16) years. These subjects were, twenty eight major thalassemic patient (12 with splenectomy and 16 non splenectomy ) and fifteen with minor thalassemia. eighteen healty subjecte as control. The result revealed a significant elevation in the activities of both aminotransferases enzymes (AST and ALT) in the sera of all the alassmic patient groups compared with control. Also a significant increase in the activity of ALT in sera of non-splenectomy compared to splenectomy major thalassemic patient , which could be an indicative of th

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Entry cost based on activity-based cost specifications and comparative study
...Show More Authors

Several recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Some Results on the Average Inverse Shadowing Property and Strong Ergodicity
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Stances on the damage to manuscripts and ways to address them
...Show More Authors

Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (16)
Crossref (8)
Scopus Crossref