Preferred Language
Articles
/
injns-637
Instruction Program for Patient with Peptic Ulcer about Nutritional Habits: case-control study
...Show More Authors

Objectives: The purpose of the study is to ascertain the relationship between the training program and the socio-demographic features of patients with peptic ulcers in order to assess the efficiency of the program on patients' nutritional habits.

Methodology: Between January 17 and October 30 of 2022, The Center of Gastrointestinal Medicine and Surgery at Al-Diwanyiah Teaching Hospital conducted "a quasi-experimental study". A non-probability sample of 30 patients for the case group and 30 patients for the control group was selected based on the study's criteria. The study instrument was divided into 4 sections: the first portion contained 7 questions about demographic information, the second section 6 questions about the patient's medical history, the third section 2 questions concerning harmful behaviors, and the fourth section 9 questions about eating habits. The data were analyzed using Statistical Package for Social Sciences Version 26. Statistical analysis methods for both descriptive and inferential analysis were used to examine the study's findings.

Results: The study's finding showed that the training program had a favorable impact on patients' understanding of good nutritional practices (the case group), as evidenced by a shift in the total mean from 1.40 at the pre-test to 2.39 at the post-test, while there was no difference for the control group. 

Conclusion: The instruction program have positive effect on the knowledge of patients with peptic ulcer then change their nutritional habits among case group.

Recommendations: The study recommends to increasing the patient’s health awareness regarding nutritional habits and explained dietary , advice, guidelines by dietitian should be undertaken for peptic ulcer  patients.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Detection of Nutrients and Major Ions at Al Muthanna Storage Site Soil
...Show More Authors

In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Flexural Behavior of Reinforced Rubberized Reactive Powder Concrete Beams under Repeated Loads
...Show More Authors

Non-biodegradability of rubber tires contributes to pollution and fire hazards in the natural environment. In this study, the flexural behavior of the Rubberized Reactive Powder Concrete (RRPC) beams that contained various proportions and sizes of scrap tire rubber was investigated and compared to the flexural behavior of the regular RPC. Fresh properties, hardened properties, load-deflection relation, first crack load, ultimate load, and crack width are studied and analyzed. Mixes were made using micro steel fiber of the straight type, and they had an aspect ratio of 65. Thirteen beams were tested under two loading points (Repeated loading) with small-scale beams (1100 mm, 150 mm, 100 mm) size.

The fine aggregate

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Apr 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Design of Electrostatic Lens Accelerating and Decelerating Operated Under Different Magnification Conditions
...Show More Authors

  In this paper,  design computationl investigation in the field of charged-particle optics with the aid of numerical analysis methods  under the absence of space charge effects. The work has been concentrated on the design of three-electrode  einzel electrostatic  lens accelerating and decelerating operated under different magnification conditions.     The potential field distribution of  lens has been represented by exponential function.  The paraxial-ray equation has been solved for the proposed field to determine the trajectory of charged-particles traversing in the lens.  From The axial  potential distribution and its first and second derivatives, the optical propertie

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of Engineering
Numerical Prediction of Bond-Slip Behavior in Simple Pull-out Concrete Specimen
...Show More Authors

In this study the simple pullout concrete cylinder specimen reinforced by a single steel bar was analyzed for bond-slip behavior. Three-dimension nonlinear finite element model using ANSYS program was employed to study the behavior of bond between concrete and plain steel reinforcement. The ANSYS model includes eight-noded isoperimetric brick element (SOLID65) to model the concrete cylinder while the steel reinforcing bar was modeled as a truss member (LINK8). Interface element (CONTAC52) was used in this analysis to model the bond between concrete and steel bar. Material nonlinearity due to cracking and/or crushing of concrete, and yielding of the steel reinforcing bar were taken into consideration during the analysis. The accuracy of this

... Show More
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Numerical Prediction of Bond-Slip Behavior in Simple Pull-Out Concrete Specimens
...Show More Authors

In this study the simple pullout concrete cylinder specimen reinforced by a single steel bar was analyzed for bond-slip behavior. Three-dimension nonlinear finite element model using ANSYS program was employed to study the behavior of bond between concrete and plain steel reinforcement. The ANSYS model includes eight-noded isoperimetric brick element (SOLID65) to model the concrete cylinder while the steel reinforcing bar was modeled as a truss member (LINK8). Interface element (CONTAC52) was used in this analysis to model the bond between concrete and steel bar. Material nonlinearity due to cracking and/or crushing of concrete, and yielding of the steel reinforcing bar were taken into consideration during the analysis. The accuracy of t

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Correlation Between Gene Expression of Interferon Regulatory Factor-5 and Disease Activity Index in Systemic Lupus Erythematosus Iraqi Patients
...Show More Authors

      Systemic lupus erythematosus (SLE) is a heterogeneous autoimmune disease characterized by elevated levels of circulating anti-nuclear autoantibodies and interferon-alpha (INFs-α). Interferon regulatory factor-5 (IRF5) plays an important role in the induction of type I interferon and pro-inflammatory cytokines, and participates in the SLE pathogenesis. This study aimed to investigate the role of IRF5 gene expression levels in a sample of SLE Iraqi patients and its correlation with disease activity, and to identify its diagnostic ability as a biomarker reflecting disease activity. Blood samples were taken from 45 participants diagnosed with SLE cases classified according to the American College of Rheumatology (ACR) criteria. T

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Modeling and Simulation of Thermal Performance of Solar-Assisted Air Conditioning System under Iraq Climate
...Show More Authors

In Iraq most of the small buildings deployed a conventional air conditioning technology which typically uses electrically driven compressor systems which exhibits several clear disadvantages such as high energy consumption, high electricity at peak loads. In this work a thermal performance of air conditioning system combined with a solar collector is investigated theoretically. The hybrid air conditioner consists of a semi hermetic compressor, water cooled shell and tube condenser, thermal expansion valve and coil with tank evaporator. The theoretical analysis included a simulation for the solar assisted air-conditioning system using EES software to analyze the effect of different parameters on the power consumption of c

... Show More
View Publication Preview PDF