Preferred Language
Articles
/
injns-637
Instruction Program for Patient with Peptic Ulcer about Nutritional Habits: case-control study
...Show More Authors

Objectives: The purpose of the study is to ascertain the relationship between the training program and the socio-demographic features of patients with peptic ulcers in order to assess the efficiency of the program on patients' nutritional habits.

Methodology: Between January 17 and October 30 of 2022, The Center of Gastrointestinal Medicine and Surgery at Al-Diwanyiah Teaching Hospital conducted "a quasi-experimental study". A non-probability sample of 30 patients for the case group and 30 patients for the control group was selected based on the study's criteria. The study instrument was divided into 4 sections: the first portion contained 7 questions about demographic information, the second section 6 questions about the patient's medical history, the third section 2 questions concerning harmful behaviors, and the fourth section 9 questions about eating habits. The data were analyzed using Statistical Package for Social Sciences Version 26. Statistical analysis methods for both descriptive and inferential analysis were used to examine the study's findings.

Results: The study's finding showed that the training program had a favorable impact on patients' understanding of good nutritional practices (the case group), as evidenced by a shift in the total mean from 1.40 at the pre-test to 2.39 at the post-test, while there was no difference for the control group. 

Conclusion: The instruction program have positive effect on the knowledge of patients with peptic ulcer then change their nutritional habits among case group.

Recommendations: The study recommends to increasing the patient’s health awareness regarding nutritional habits and explained dietary , advice, guidelines by dietitian should be undertaken for peptic ulcer  patients.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
الدراسات اللغوية والترجمية
Lexico ӓsemantic groupings of words in lexical language subsystem
...Show More Authors

Words in a language do not exist in isolation but in close connection with each other ,teaming up in one way or another known to the Russian semasiology M. M. Pokrovsky , one of the first to realize the systematic nature of the lexicon, wrote about the second half of the nineteenth century : „the Words and their meanings do not live separate from each other life, but are joined together in our minds), regardless of our consciousness to different groups , and the basis for grouping is the similarity or direct contrast in the main value.

Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Tue Sep 14 2021
Journal Name
International Journal Of Advanced Biological And Biomedical Research
Candida Berkh. (1923) Species and Their Important Secreted Aspartyl Proteinases (SAP) Genes Isolated from Diabetic Patients
...Show More Authors

Candida Berkh. (1923) occurs naturally in the body. But it becomes opportunistic fungi, meaning that it infects humans when there is any weakening of the immune system, such as exposure to chemotherapy, diabetes, or organ transplantation. Most species of Candida grow at a temperature between 20-40 °C and have a pH of 3-8. Human pathogens of Candida species include C. albicans, C. glabrata, C. lusitaniae, C. parapsilosis, C. tropicalis and C. utili. C. albicans has many virulence factors that facilitate injury process. Virulence factors are considered as a measure of pathogenicity, and it is in the form of fungal toxins, enzymes, or cell structures that facilitate infection, as well as pathogen resistance in different conditions. This study

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
Biochemical And Cellular Archives
PARTIAL PURIFICATION AND CHARACTERIZATION OF ACID PHOSPHATASE FROM SERA OF OBESE DIABETES MELLITUS PATIENTS
...Show More Authors

The study aimed to purification of acid phosphatase (ACP) from sera of obesetype 2 diabetes mellitus patients, this study included from thirty T2DM patients and thirty control, purification process was done with several steps included precipitation with inorganic salt (NH4 ) 2SO4 30%-80%, dialysis, ion exchange chromatography by DEAE sepharose anion column and size exclusion chromatography by Sepharose 6B.ACP, BMI, FBS, HbA1c, Lipid profile, Urea, Creatinie, Insuline, Homa-IR were determined. Results showed the precipitate and concentrated protein appeared four peaks in ion exchange column. ACP located in the first and second peak with purification fold (21.1), (37.2) yield of enzyme and specific activity (173.3) IU/ml, which obtained a si

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
The strategy of spreading extremism and its impact on Egypt regional role
...Show More Authors

ABSTRACT The importance and objectives of the study were an attempt to understand the methodology of disseminating radical thought and the reasons of social acceptability that make young people embrace this thought. It also sheds light on the impact of this phenomenon on the regional role of Egypt and examines the strategic means and standards that the Egyptian state focuses on in immunization and prevention of extremism.

View Publication Preview PDF
Crossref
Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
The good and bad words in Surah Ibrahim, peace be upon him
...Show More Authors

In the name of God, the Most Gracious, the Most Merciful

Praise be to God who revived Balu. And the good word brought hard hearts after removing from them what had almost killed them of ignorance, injustice, hatred, hostility, estrangement, and irritation... So God replaced for them what was best with what was best in terms of knowledge and fairness, and what was corrupt, love, and altruism. So the example of a believer and a good word is like a tree with good roots and branches. Then I pray and greet the one who watered it from the pure and inexhaustible spring of Islam, our Master Muhammad, so that the valleys flowed in their capacity, and the crops grew, then they became thicker and became even, and their good fruits in behavi

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref
Publication Date
Mon Feb 10 2025
Journal Name
Journal Of Optics
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-nahrain Journal Of Science
Image Classification Using Bag of Visual Words (BoVW)
...Show More Authors

In this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for features descriptor. Supervised bag of visual words gives good result that are present clearly in the experimental part where unlabeled images are classified although small number of images are used in the training process.

View Publication Preview PDF
Crossref (23)
Crossref