Abstract Background: The prevalence of heart failure (HF) continues to increase with an increase in the aging population. Palliative care should be integrated into routine disease management for all patients with serious illness, regardless of settings or prognosis. Objectives: The purposes of this study were to determine the level of knowledge of nurses concerning palliative care for patients with heart failure after implementation of instructional program. Design: The study was a quasi-experimental study and consists of 60 nurses. Setting: The study was conducted between17th November 2021, to 10th February 2022, at three teaching hospitals in Baghdad city, Iraq. Method: A non-probability (purposive) sample was utilized, nurses who agreed to participate in the study, were working in medical wards in the hospitals mentioned above. They divided in to two groups (study group) and (control group). Nurses are educated on the definition, history, and philosophy of palliative care, the responsibilities of palliative care nurses, symptom management, and end of life care. The education was applied in three sessions. Data were collected before and after the education via nurse identification form developed by the research team and the palliative care knowledge test. Results: There was a statistically significant difference between the mean scores of nurses before and after training (p < 0.001). It was found that instructional programs have a large effect on nurses’ knowledge about palliative care. Conclusion: It was found that the instructional program was an effective way to improve nurses’ knowledge about palliative care.
Were collected three types of medicinal plants from their natural habitat after Astkhalasalziot volatile manner steam distillation and determine the quality and quantity of vehicles chemical for each of the oils obtained using a technique JC discouraged when you merge oily thyme and lemon grass against bacteria either when using oils in three did not have a different effect
In this paper, a theoretical study to the effect of journal misalignment on the static characteristics of oil filled porous journal bearing when lubricated with couple stress fluid has been carried out.
The analytical model used through this work is for a bearing with isotropic permeability. Considering isotropic permeability the Reynolds' equation for the oil film is modified to include a so – called filter term and the effect of fluid coupled stress. The pressure equation for the porous medium is obtained from Darcy's law and continuity equation. The equation which was used to evaluate the oil film thickness was modified to include the effect of possible misalignment in longitudinal and transverse directions. The governing eq
... Show MoreIn this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show More