Objective: To determine the effectiveness of the educational program on nursing staffs' knowledge about uses of steroids and their side effects.
Methodology: A pre-experimental study design (one group design: pre-test and post-test) was used. This study was conducted in Al-Diwaniya Teaching Hospital for the period from ( 28th May to 10 th June, 2020) on a non-probability (purposive) sample consisting of (30 nurses) working in Oncology unit. A questionnaire was built as a data collection tool and consisted of two parts:
First part: The demographic characteristics of the nursing staff (gender, age, level of education, years of experience in hospital, participation in training courses related to nursing care for a patients undergoing to steroid therapy).
Second part: It consists of two domains. The first domain contains (27) multiple-choice questions about assessment of the nursing staffs` knowledge regarding steroids and their uses, while the second domain contains (15) multiple-choice questions about assessment of the nursing staffs` knowledge regarding side effects of steroids. The validity of the questionnaire and the educational program were verified by presenting it to (14) experts. The sample has received a pre-test, educational program, and post-test. Descriptive and inferential statistics were used to analyze the results of the study using the Statistical Package of Social Sciences (SPSS) version 25 and Microsoft Excel (2010).
Results: The study indicates that all the study sample responses at the pre-test were poor knowledge with a statistical mean of scores (1.20), other than the post-test, shows (100%) of the study sample have high knowledge at the mean of scores (1.91). Also, the results revealed a highly significant difference between the pre-test and post-test of the study sample after participated in the educational program at the p-value (0.0001). The conclusion of the study that the educational program was effective in the enhancement of nursing staffs` knowledge about uses of steroids and their side effects in Oncology Unit.
Recommendations: The study recommended the necessity of developing continuous educational programs to educate and train nurses and all health care workers regarding steroids.
Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreMobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreThere are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.
Many researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc
... Show MoreMany cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show More