Preferred Language
Articles
/
injns-41
Inducing the Health Promotion Model for Nursing Practice: Qualitative Study
...Show More Authors

Objective: To generate a model that conceptualizes the phenomenon of health promotion and its related factors.
Methodology: A grounded theory methodology is used as qualitative method to explore the health promotion as
phenomenon of interest and its other related factors from the perspectives of specialists in this field. The study is
carried out from January 2002 through September 2004. A sample of (20) specialists in health sciences are
selected and interviewed as experts in the area of health promotion. The investigators conducted intensive and
structured interviews with the specialists to collect the data. These interviews were transcribed verbatim,
analyzed and interpreted.
Results: Findings of the study indicated that health promotion is affected by multiple factors including human
ones (i.e., health balance, attitudes, health potentials, environmental or ecological factors, social and cultural
factors). From the model, numerous nursing interventions can be drawn for assessment, implementation and
evaluation that may assist to maintain and improve health, as well as achieve optimum level of health.
Recommendations: The study recommends that further research can be conducted to examine this model for its
compatibility and applicability for nursing practice in the area of health promotion.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Trends of poetic purposes towards praise: Dabal al-Khuzai's poetry is a model
...Show More Authors

Poetic objects may go towards a specific purpose and dissolve and interact with them to produce
A purpose characterized by the title but belongs to the U from afar.
The yarn goes towards praise with a purely horizontal relationship that mentions virtues but crowns them towards women.
In lamentation remember the virtues but crown them towards the dead.
In wisdom remember the virtues but crown them towards time.
In the description remember the virtues but crown them towards nature. All objects are inline
Horizontal We will prove this in the axes of research has required the plan to be a blind, five
The preamble, a brief overview of the life of Dabal All Khuzaie and the works and poets of the first axis
The direction

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solution of Population Growth Rate Linear Differential Model via Two Parametric SEE Transformation
...Show More Authors

The integral transformations is a complicated function from a function space into a simple function in transformed space. Where the function being characterized easily and manipulated through integration in transformed function space. The two parametric form of SEE transformation and its basic characteristics have been demonstrated in this study. The transformed function of a few fundamental functions along with its time derivative rule is shown. It has been demonstrated how two parametric SEE transformations can be used to solve linear differential equations. This research provides a solution to population growth rate equation. One can contrast these outcomes with different Laplace type transformations

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (93)
Crossref (83)
Scopus Clarivate Crossref
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Deep Oxidative Desulfurization of Model fuels by Prepared Nano TiO2 with Phosphotungstic acid
...Show More Authors

In this study, nano TiO2 was prepared with titanium isopropoxide (TTIP) as a resource to titanium oxide. The catalyst was synthesized using phosphotungstic acid (PTA) and, stearyl trimethyl ammonium bromide (STAB) was used as the structure-directing material. Characterization of the product was done by the X-ray diffraction (XRD), X-ray fluorescent spectroscopy (XRF), nitrogen adsorption/desorption measurements, Atomic Force Microscope (AFM) and Fourier transform infrared (FTIR) spectra, were used to characterize the calcined TiO2 nanoparticles by STAB and PWA. The TiO2 nanomaterials were prepared in three crystalline forms (amorphous, anatase, anatase-rutile). The results showed that the

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Tue Jan 23 2024
Journal Name
Journal Of Applied Mathematics
Dynamics Analysis of a Delayed Crimean-Congo Hemorrhagic Fever Virus Model in Humans
...Show More Authors

Given that the Crimean and Congo hemorrhagic fever is one of the deadly viral diseases that occur seasonally due to the activity of the carrier “tick,” studying and developing a mathematical model simulating this illness are crucial. Due to the delay in the disease’s incubation time in the sick individual, the paper involved the development of a mathematical model modeling the transmission of the disease from the carrier to humans and its spread among them. The major objective is to comprehend the dynamics of illness transmission so that it may be controlled, as well as how time delay affects this. The discussion of every one of the solution’s qualitative attributes is included. According to the established basic reproductio

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jul 04 2018
Journal Name
Civil Engineering Journal
Finite Element Analysis of Concrete Beam under Flexural Stresses Using Meso-Scale Model
...Show More Authors

Two dimensional meso-scale concrete modeling was used in finite element analysis of plain concrete beam subjected to bending. The plane stress 4-noded quadrilateral elements were utilized to model coarse aggregate, cement mortar. The effect of aggregate fraction distribution, and pores percent of the total area – resulting from air voids entrapped in concrete during placement on the behavior of plain concrete beam in flexural was detected. Aggregate size fractions were randomly distributed across the profile area of the beam. Extended Finite Element Method (XFEM) was employed to treat the discontinuities problems result from double phases of concrete and cracking that faced during the finite element analysis of concrete beam. Crac

... Show More
Crossref (6)
Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Applied Acoustics
Theoretical model of absorption coefficient of an inhomogeneous MPP absorber with multi-cavity depths
...Show More Authors

View Publication
Scopus (78)
Crossref (67)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2023
Journal Name
College Of Physical Education And Sports Science
Electronic shorts for the disabled
...Show More Authors