Preferred Language
Articles
/
injns-577
Effectiveness of Self-Regulation Fluid Program on Patients with Hemodialysis Self-Efficacy for Fluid Adherence in Al-Diwaniyah Teaching Hospital
...Show More Authors

Objectives: to evaluate patient knowledge with hemodialysis and to determine the effectiveness of Self-regulation Fluid Program on Patients with hemodialysis self-efficacy for fluid adherence in Al-Diwaniyah Teaching Hospital.

Methodology: A quasi-experimental design (two group design: pre-test and post-test) was used. This study was conducted in Al-Diwaniya Teaching Hospital for the period from (15th of October 2018 to 20th of May 2019) on a non-probability (purposive) sample consisting of (60 patients) treatment in hemodialysis units. A questionnaire was built as a data collection tool and consisted of four parts:

First part: Demographic characteristics of the patient that consisted of (7) items, second part: Clinical information of the patient that consisted of (8) items, third part:  the self-efficacy scale of fluid control in hemodialysis patients that consisted of (22) items and fourth part: patients’ knowledge in two axis that consisted of (20) items.

The validity of the questionnaire and the educational program were verified by presenting it to (18) experts. The sample has received a pre-test, educational program, and post-test. Descriptive and inferential statistics were used to analyze the results of the study using the Statistical Package of Social Sciences (SPSS) version 22 and Microsoft Excel (2010).

 Results: The study finding shows, that all the study sample responses at the pre-test were fair knowledge with a statistical mean of scores (1.35). Other than the post-test, shows (100%) of the study sample have high knowledge at the mean of scores (2.66). Also, the maturity of the patients in both groups (control and study) is female and age group (more than 48) years, most of them not read and write, the maturity of the sample of study marred, regarding to the monthly income is not sufficient and urban residency. The study also confirms that the effectiveness of an instructional program on patients with hemodialysis to enhance self-efficacy fluid control is positive.

Conclusion: Program helps patients in increasing self-confidence, knowledge of Chronic Kidney Disease patient care including controlling fluid overload.

Recommendations: The study recommended the necessity of activating the role of instructional program correctly in order to give about end stage renal disease, and conduct future research programs to improve the patient's knowledge about end stage renal disease, fluid adherence and provide small booklist for caring.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router
...Show More Authors

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Body parts idioms; across-cultural significance
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Educational And Psychological Researches
العولمة وانعكاسها على التذوق الفني لطلبة المرحلة الاعدادية
...Show More Authors

 

مشكلة البحث

              وتعد مرحلة المراهقة من اصعب المراحل التي يمر بها الفرد واخطرها اذ يطلق عليها بمرحلة التفكير المجرد ، وهي مرحلة حاسمة في حياته اذ تتكون لديه معالم الشخصية .أنهم خزين الامة الحقيقي من الطاقات الحيوية التي لا تنضب لذا يجب الاهتمام بهذه الشريحة من المجتمع وتطويرهم وتوجيههم لاسلم الطرق للحفاظ على مستقبلهم ومستقبل الا

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أنعكاسات عمليات التجارة الالكترونية على هيكل الرقابة الداخلية
...Show More Authors

With the growing use of electronic commerce has worked many companies, especially public shareholding to take advantage of them treated in the trade, so that the e-commerce part of the corporate environment, and this has made a career of accounting and auditing facing new challenges to the sophistication of the information and the rapid growth in the market for electronic commerce. And raised many questions about the ability of the audit profession to facing these challenges and how to audit operations of e-commerce and how to give confidence on websites, this sense it has become necessary keep the internal control systems of this technology and what has caused changes to the accounting system, and evolve to fit the developments that hav

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2008
Journal Name
Al-khwarizmi Engineering Journal
New Adaptive Data Transmission Scheme Over HF Radio
...Show More Authors

Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.

An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2007
Journal Name
Political Sciences Journal
عرض كتاب على خط النار مذكرات الرئيس الباكستاني
...Show More Authors

عرض كتاب على خط النار مذكرات الرئيس الباكستاني

View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Kindergarten Children Addiction to Tablet Devices and Its Negative Effects
...Show More Authors

The characteristic of our time is the tremendous technological progress and the wide use of the Internet. Children have had a large share of this progress.as they are becoming fond of having the technological equipment of tablets and mobile phones which become indispensable for these children cannot do without them .
Recently, the phenomenon of using mobile phones and tablets by children has become more widespread, and the society in general and parents, in particular, have ignored the reasons for their health .Despite the many advantages and benefits for children who are well trained to use these devices properly that have enhanced their cognitive and social abilities, there are many disadvantages that could harm children's growth if

... Show More
View Publication Preview PDF