Preferred Language
Articles
/
injns-637
Instruction Program for Patient with Peptic Ulcer about Nutritional Habits: case-control study
...Show More Authors

Objectives: The purpose of the study is to ascertain the relationship between the training program and the socio-demographic features of patients with peptic ulcers in order to assess the efficiency of the program on patients' nutritional habits.

Methodology: Between January 17 and October 30 of 2022, The Center of Gastrointestinal Medicine and Surgery at Al-Diwanyiah Teaching Hospital conducted "a quasi-experimental study". A non-probability sample of 30 patients for the case group and 30 patients for the control group was selected based on the study's criteria. The study instrument was divided into 4 sections: the first portion contained 7 questions about demographic information, the second section 6 questions about the patient's medical history, the third section 2 questions concerning harmful behaviors, and the fourth section 9 questions about eating habits. The data were analyzed using Statistical Package for Social Sciences Version 26. Statistical analysis methods for both descriptive and inferential analysis were used to examine the study's findings.

Results: The study's finding showed that the training program had a favorable impact on patients' understanding of good nutritional practices (the case group), as evidenced by a shift in the total mean from 1.40 at the pre-test to 2.39 at the post-test, while there was no difference for the control group. 

Conclusion: The instruction program have positive effect on the knowledge of patients with peptic ulcer then change their nutritional habits among case group.

Recommendations: The study recommends to increasing the patient’s health awareness regarding nutritional habits and explained dietary , advice, guidelines by dietitian should be undertaken for peptic ulcer  patients.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
Kinetic diversity of the camera in the structure of the cinematographic scene: وفاء سعدي صالح
...Show More Authors

  Highlighting the role of the movement and its dramatic dimensions, as an artistic product, whether at the level of cinema or television in general, and the stages of its influence within the structure of the cinematographic scene in particular, had an effective role in the continuation of the structure of the event according to its dramatic and aesthetic process, and from this the research problem crystallized in the following question: What is How the kinetic diversity of the camera in the structure of the cinematographic scene is achieved to achieve the maximum possible benefit by extrapolating all opinions in line with the objectives of the research, the research presented and two topics and the introduction were divided, which

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
Human Leukocyte Antigens class II influence the expression of Glutamic Acid Decarboxylase auto antibodies in Type Diabetic children and their Siblings
...Show More Authors

Background: The immunogenetic predisposition
may be considered as an important factor for the
development of Type 1 Diabetes Mellitus (T1DM)
in association with the HLA antigens.
Objective:This study was designed to investigate
the role of HLA-class II antigens in the etiology of
type T1DM and in prediction of this disease in
siblings, and its effect on expression of glutamic
acid decarboxylase autoantibodies (GADA).
methods:Sixty children who were newly diagnosed
type 1 diabetes (diagnosed less than five months)
were selected. Their age ranged from 3-17 years.
Another 50 healthy siblings were available for this
study, their ages range from 3-16 years. Eighty
apparently healthy control subjects,

... Show More
View Publication Preview PDF
Publication Date
Sun May 07 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Determination of Serum Zinc, Manganese, Copper and Cobalt Traces In Type Two Diabetic Patients in Sulaimaniyah City Using ICP Technique
...Show More Authors

Direct determination of trace metals Zn, Mn, Cu and Co were performed in serum
blood samples of two groups diabetic patient type 2 and non diabetes by ICP spectrometric
method. Results show the low levels of these elements Zn, Mn and Co while high level of Cu
detected compared with non diabetes according to these results good evidence can be made to
control these levels through a special diet containing these metals.

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
الدراسات اللغوية والترجمية
Lexico ӓsemantic groupings of words in lexical language subsystem
...Show More Authors

Words in a language do not exist in isolation but in close connection with each other ,teaming up in one way or another known to the Russian semasiology M. M. Pokrovsky , one of the first to realize the systematic nature of the lexicon, wrote about the second half of the nineteenth century : „the Words and their meanings do not live separate from each other life, but are joined together in our minds), regardless of our consciousness to different groups , and the basis for grouping is the similarity or direct contrast in the main value.

Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
College Of Islamic Sciences
Moderate discourse and civil peace
...Show More Authors

Abstract

  Currently, the “moderate discourse and civil peace” represents a rich and important topic for scholars, due the rise of waves of extremism and Islamophobia campaigns, and what that leads to in term of imbalance in relations between nations and peoples.

Based on that, the research approach was to tackle the culture of hatred and calls for the clash of civilizations.

In order to contribute to solving these problems caused by cultural and religious prejudices, I decided to address the topic of “moderate discourse and civil peace” through two essential axes:

  • Features of moderate religious discourse
  • The role of moderate discourse in establishing communit

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Towards Generating Robust Key Based on Neural Networks and Chaos Theory
...Show More Authors

There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map
...Show More Authors

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref