Objective : The study was carried out to construct an initial assessment documentation tool for nursing
recording system in Coronary Care Unit.
Methodology : A descriptive, purposive sample of (65) nurses was selected from CCU of main
teaching hospitals (Al Karama, Al Kindy, Al Kadimia, Al Yarmmok, Baghdad teaching hospital, Ibn
Al Naffis hospital) and Ibn-Al betar hospital in Baghdad city from the 15th of April 2004 to the 15th of
April 2006.
The instrument was constructed and comprised of two sections: section one included the
nurses' demographic characteristic; section two was the initial assessment documentation tool that
contained (2) parts including: General information form and the initial assessment form. Descriptive and
inferential statistical procedures were used to analyze the data. Reliability of the instrument was
determined for the tool parts and it was (0.85), besides that a panel of experts determined the validity
of the tool.
Results : The findings revealed that the most of the study sample were young male with nursing
institute graduate and the majority of them employed with limited experience ranging between (1-5)
years as general and experience in CCU. In spite of that no one of them got a training course in
documenting their activities.
The present study revealed that, the distribution of nurses' responses to the health pattern indicated that
the (health perception, exchanging, subjective awareness of information, nutrition-metabolic,
elimination, activity and exercise, rest and sleep, cognitive-sensing, and relationship) patterns were the
most appropriate, clear and comprehensive patterns for them.
Most of the international nursing diagnosis items of the tool were clear for nurses except few items.
The results also showed that there was a statistically significant influence between the nurses' responses
to the (11) health patterns with the age variable except in the cognitive - sensing pattern. Moreover, the
level of education patterns significantly influences the entire sample responses.
A novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theo
... Show MoreAbstract
Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The sim
... Show MoreIn this paper, a national grid-connected photovoltaic (PV) system is proposed. It extracts the maximum power point (MPP) using three-incremental-steps perturb and observe (TISP&O) maximum power point tracking (MPPT) method. It improves the classic P&O by using three incremental duty ratio (ΔD) instead of a single one in the conventional P and O MPPT method. Therefore, the system's performance is improved to a higher speed and less power fluctuation around the MPP. The Boost converter controls the MPPT and then is connected to a three-phase voltage source inverter (VSI). This type of inverter needs a high and constant input voltage. A second-order low pass (LC) filter is connected to the output of VSI to reduce t
... Show MoreDue to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The simulation shows the behavior of optical
... Show MoreThe internet has been a source of medical information, it has been used for online medical consultation (OMC). OMC is now offered by many providers internationally with diverse models and features. In OMC, consultations and treatments are available 24/7. The covid-19 pandemic across-the-board, many people unable to go to hospital or clinic because the spread of the virus. This paper tried to answer two research questions. The first one on how the OMC can help the patients during covid-19 pandemic. A literature review was conducted to answer the first research question. The second one on how to develop system in OMC related to covid-19 pandemic. The system was developed by Visual Studio 2019 using software object-oriented approach. O
... Show MoreThis research aims to choose the appropriate probability distribution to the reliability analysis for an item through collected data for operating and stoppage time of the case study.
Appropriate choice for .probability distribution is when the data look to be on or close the form fitting line for probability plot and test the data for goodness of fit .
Minitab’s 17 software was used for this purpose after arranging collected data and setting it in the the program.
&nb
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreIn this paper two axis sun tracking method is used to absorb maximum power from the sun's rays on the solar panel via calculating the sun’s altitude and azimuth angles, which describe the solar position on the Iraqi capital Baghdad for the hours 6:00, 7:00, 8:00, 9:00, 12:00, 15:00 and 17:00 per day. The angles were calculated in an average approach within one month, so certain values were determined for each month. The daily energy achieved was calculated for the solar tracking method compared with the fixed tracking method. Designed, modeled and simulated a control circuit consisting of reference position truth table, PI Controller and two servomotors that tracked the sun position to adjust the PV panel perpendicular
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More