Background: Health professionals have a crucial role in promotion, support and management of breastfeeding. To be effective in this effort, the clinician should focus on the issue from the preconception stage through pregnancy and delivery, and continue in subsequent infant care. Aim of the study: to assess the effectiveness of the UNICEF/WHO 40-hour of breast feeding training through the assess breastfeeding knowledge and attitudes of the health profession staff before and after training course.
المستخلص
يعد تقييم اداء العاملين احد اهم الركائز الاساسية التي يتوقف عليها نجاح أي منظمة تسعى بأن تتطور وتتميز بأنشطتها واداءها وبالأخص المنظمات التي لها خصوصية في عملها كالأجهزة الرقابية التي تعتمد في اداء انشطتها ومسؤولياتها على كفاءة مواردها البشرية, ومن هذا المنطلق يهدف هذا البحث الى تصميم انموذج ثلاثي المحاور (المؤهلات والقدرات، الاداء والانجاز، التعاون والالتزام الوظيفي) ثُماني المستويات
... Show MoreThe research investigates the term innovation and its role in elaborating architectural practice based on diffusion. The complexity of the architectural field compared with other fields shows a problem in explaining how innovations in architecture diffuse as a thought and act in a certain context of practice. Therefore, the research aims to build an intellectual model that explains the way personal thoughts resembled by unique models introduced by creative and innovator designers diffuse in a certain pattern elaborate these models into a state of prevailing thought resembled by the movement in architecture. The research will apply its model to the more comprehensive movement in architecture, which is the modern movement,
... Show MoreBackground: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti
Abstract
Praise be to Allah, The Lord of the worlds, and peace be upon
Muhammad the master of former and latter people, and peace be upon His
relatives, companions and those who followed Him to Judgment day.
After recognizing the prescription which is called (Al- Fadhaly's Thesis in
parsing of "There is no god but God") as it is related with the word of the
investigation of this issue attracted me, as being related with the idea of the
only one God that is mentioned in the prophetic speech, which is said by
Anas- God satisfies him- Who said, Said the Messenger Muhammad peace
be upon him " Goes out of the Hell who said: there is no god but God, and in
his heart a hair weight of charity, and goes out of the He
Many tools and techniques have been recently adopted to develop construction materials that are less harmful and friendlier to the environment. New products can be achieved through the recycling of waste material. Thus, this study aims to use recycled glass bottles as sustainable materials.
Our challenge is to use nano glass powder by the addition or replacement of the weight of the cement for producing concrete with enhanced strength.
A nano recycled glass p
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreThis paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreThe expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show More