Preferred Language
Articles
/
injns-462
Evaluation of Post-operative Nursing Care of Psychological Support and Discharge Plan for Women Undergone Hysterectomy at Maternity Wards in Baghdad City's Teaching Hospitals
...Show More Authors

Objective: The study aims at evaluating the psychological support and discharge plan from the hospital provided by nurses for woman undergone hysterectomy.
Methodology: The study uses descriptive design and non-probability (convenient) sample which is consisted of (40) nurses from (8) teaching hospitals in the City of Baghdad within the maternity wards. The study is carried out from 11 November 2020 to 27 June 2021. A observational tool is developed to evaluate the psychological support and the discharge plan after surgery. Content validity and internal consistency reliability are determined through pilot study. Data are collected through the use of the questionnaire and data are analyzed through the use of descriptive and inferential statistical data analysis approaches.
Results: Findings of the study show that all of the nurses have delivered inadequate postoperative nursing care.
Recommendations: The study recommends that there is necessity of implementing training programs for nursing care after hysterectomy. And increase the number of nurses in this area to treat weakness in the wards. In addition, hospital management needs to play a strong role in monitoring patient care.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Research - Granthaalayah
MULTIPLE MIXING RATIOS OF GAMMA RAY TRANSITIONS FROM 𝟔𝟎𝐍𝐝 𝟏𝟒𝟐− 𝟏𝟓𝟎 (𝐧, 𝐧 ˊ𝛄) 𝟔𝟎𝐍𝐝 𝟏𝟒𝟐− 𝟏𝟓𝟎 REACTION USING 𝒂𝟐- RATIO METHOD
...Show More Authors

In the current work, the mixing ratios ( 𝛿 ) of gamma transitions were calculated from energy levels in the isotopes neodymium 60𝑁𝑎 142−150 populated in the 60Nd 142− 150 (n, n ˊγ) 60Nd 142− 150 using the 𝑎2 ratio method. We used the experimental coefficient (𝑎2 ) for two γ-transitions from the initial state itself, the statistical tensor 𝜌2(𝐽𝑖), associated with factor 𝑎2 , would be the same for the two transitions. The results obtained are in good agreement or within the experimental error with -those previously published. And existing contradictions resulting from inaccuracies in the empirical results of previous work. The current results confirm that the , 𝑎2 − method is used to calculate th

... Show More
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Theoretical Investigation on Chemical Bonding of the Bridged Hydride Triruthenium Cluster: [Ru3 (μ-H)( μ3-κ2-Hamphox-N,N)(CO)9]
...Show More Authors

Ruthenium-Ruthenium and Ruthenium–ligand interactions in the triruthenium "[Ru3(μ-H)(μ3-κ2-Hamphox-N,N)(CO)9]" cluster are studied at DFT level of theory. The topological indices are evaluated in term of QTAIM (quantum theory of atoms in molecule). The computed topological parameters are in agreement with related transition metal complexes documented in the research papers. The QTAIM analysis of the bridged core part, i.e., Ru3H, analysis shows that there is no bond path and bond critical point (chemical bonding) between Ru(2) and Ru(3). Nevertheless, a non-negligible delocalization index for this non-bonding interaction is calculated

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
MOLECULAR CHARACTERIZATION OF ANISAKID NEMATODES HYSTEROTHYLACIUM SPECIES FROM JAPANESE THREADFIN BREAM NEMIPTERUS JAPONICUS (BLOCH, 1791) (PERCIFORMES, NEMIPERIDAE) FROM IRAQI MARINE WATER FISH
...Show More Authors

The present study provides a new insight into valuable information on the diverse structure of the Anisakid population and discusses the limited species richness in the Nemipterus japonicus (Bloch,1791) (Perciformes, Nemiperidae). The fishing area consists of various locations in the Arabian Gulf (29°58 0 33 00 N48°28 0 20 E). A total of 315 marine fish were examined, (n=287) were infected. Larval stages (n= 763) encysted within the mesenteries peritoneum and viscera of fish organs were isolated, with a prevalence of 91.11% of infection and, the intensity was 2.65. Molecular analysis was carried out on thirty individuals who have examined the morphology and showed some appearance differences, by amplifying internal transcribed spacers

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by p

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 06 2025
Journal Name
Al–bahith Al–a'alami
Tweets of Iraqi Political Leaders Regarding The Movement to Form The Governmet Through Twitter (From 3rd Septemper 2018 To 3rd Septemper 2019)
...Show More Authors

This research analyses the tweets of Iraqi politicians (leaders) that took place simultaneously with the formation of the Iraqi government after the elections in 2018. The formation of the Iraqi government was considered one of the most critical issues that emerged in the political process to which the Iraqi media as well as social networking sites paid considerable attention. In this regard, Iraqi political leaders have published many tweets concerning the formation of the government, some of them have caused great controversy in the political climate. As Twitter is one of the most digital platforms that have been widely used on the global scale in recent years, politicians have employed it to publish their opinions, ideas, and to excha

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 01 2023
Journal Name
3 Biotech
Detection of orthodontically induced inflammatory root resorption-associated biomarkers from the gingival crevicular fluid by proteomics analysis: a randomized-controlled clinical trial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of The College Of Languages (jcl)
Die Dimensionen der Kurzgeschichte”Steh auf, steh doch auf“ The Dimension of short story (wake, Wake) 1958 by the German writer, Heinrich Böll.
...Show More Authors

In dieser Kurzgeschichte werden die Züge der Trümmerliteratur präzis dargestellt. Die wurde von Heinrich Böll im Jahr 1958 geschrieben. In der vorliegenden Arbeit konzentriere ich mich auf vielfältige Stoffe in Bezug auf die Lage nach dem Zweiten Weltkrieg. So gab ich dieser Arbeit einen besonderen Titel, der die Dimensionen dieser Kurzgeschichte heißt. Ich meine hier, die profunde Interpretation dieses Werkes, denn ich fand zwar hinter einigen Wörtern eine ganze Geschichte, die uns der Erzähler dadurch zeigen wollte.

So teilte ich diese Wörter (Grab, Schatten, Last, Schrei) als Dimensionen, von denen diese Arbeit umgekreist wird.

Diese Arbeit besteht aus vier Kapiteln, die aufeinander aufgebaut sind. Im ersten K

... Show More
View Publication Preview PDF
Publication Date
Thu May 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Multipole Mixing Ratios of Gamma Rays From Fe(n,nγ) Fe 56 56 26 26  Reaction Using Constant Statistical Tensor Method (CST).
...Show More Authors

The - Multiple mixing ratios of -transitions from levels of 56Fe populated in 56 56 ( , ) Fe n n Fe  ï‚¢ reactions are calculated by using const. S.T.M.  This method has been used in other works [3,7] but with pure transition or with  transitions that can be considered as pure transitionsØŒ in our work we used   This method for mixed  - transitions in addition to pure  - transitions. The experimental angular distribution coefficients a2 was used from previous works [1] in order to calculet - values. It is clear from the results that the - values are in good agreement or consistent, within associated errors, with those reported previously [1]. The discrepancies that occur

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref