Objective(s): To assess nurses' practices for neurological unconscious patients in intensive care units.
Methodology: A descriptive study was conducted that included (50) nurse who are working in intensive care
units in hospitals and departments of the nervous system in (4) hospitals (neuroscience hospital, teaching
neurosurgical hospital, surgical specialist hospital, and sheck zaied hospital) in Baghdad city from March, 30th
,
2009 to July, 30th 2009 for the purpose of assessing their skills towards unconscious patients. A purposive "nonprobability
sample" was selected that consisted of (50) nurse who are working in intensive care units. A
questionnaire format and observational checklist were used which consist of (2) parts, the first part includes
demographic information of the sample and the second part includes tools which consists of the observation
(7) parts distributed to (64) items. Reliability and validity of questionnaire and observational checklist was
estimated through a pilot study and a panel of expert. The data were analyzed by using descriptive statistical
measures which included frequencies, percentages, and standard deviation, as well as the use of inferential
statistical measures which include the correlation coefficient and coefficient of probability.
Results: The results revealed the inadequacy of skills of nurses towards unconscious patients' care in the field
of airway care, observation and record level of consciousness, hygiene, stimulate the senses and care of urinary
and digestive tract and the adequacy of skills of nurses in the field of measuring and recording vital signs,
nutrition, and the environment.
Recommendations: Based on the results of research, the study recommends initiating training courses in the
field of intensive care and care of for unconscious patients as well as to design a special mini-booklet for the
purpose of care for unconscious patients.
إن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة بين المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ
... Show MoreFortieth book is IbnAssaker mechanisms of modern books authored attention appeared amenable to the Messenger of Allah's will (Fife da upon h-d) in his emotional tempting scientists say despite his weakness and preached it save forty Hadith of year necessitated intercession and entering heaven eh Fife FA scientists 1940s h.g. Gae updated combines forty Hadith on a particular topic, authored destinations differed and collected and compiled, the first item in the 1940s that Abdul Rahman Abdullah ibn al-mubaarakmarvzishaikAssaker promised more than thirty workbook in this kind of composition topics varied between consolidation and conversations prove the Almighty Barry qualities, conversations provisions, worship, preaching, and of them only
... Show MoreVariable selection in Poisson regression with high dimensional data has been widely used in recent years. we proposed in this paper using a penalty function that depends on a function named a penalty. An Atan estimator was compared with Lasso and adaptive lasso. A simulation and application show that an Atan estimator has the advantage in the estimation of coefficient and variables selection.
Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreDue to the easily access to the satellite images, Google Earth (GE) images have become more popular than other online virtual globes. However, the popularity of GE is not an indication of its accuracy. A considerable amount of literature has been published on evaluating the positional accuracy of GE data; however there are few studies which have investigated the subject of improving the GE accuracy. In this paper, a practical method for enhancing the horizontal positional accuracy of GE is suggested by establishing ten reference points, in University of Baghdad main campus, using different Global Navigation Satellite System (GNSS) observation techniques: Rapid Static, Post-Processing Kinematic, and Network. Then, the GE image for the study
... Show More