Drug consultation is an important part of pharmaceutical care. mobile phone call or text message can serve as an easy, effective, and implementable alternative to improving medication adherence and clinical outcomes by providing the information needed significantly for people with chronic illnesses like diabetes and hypertension particularly during pandemics like COVID-19 pandemic.
Persons with spinal cord injury are at high risk of developing pressure injuries, and their caregivers are in a critical position to help prevent them. The objective of this study was to evaluate the effectiveness of an educational program for caregivers of persons with spinal cord injuries to prevent pressure injuries in Iraq. A pre- and post-test design was used and involved 25 caregivers of persons with spinal cord injury during the acute care phase in an SCI-specific unit of a hospital. A scale and questionnaire were used to gather the participants’ demographic information, pre- and post-educational program knowledge, and observations of their pre- and post-program performance of pressure injury preventive tasks. Descriptive s
... Show MoreBackground: Any child with Down's syndrome does not develop in the same manner as normal child. Therefore, the child should not be viewed as being like everyone else. Developmental enamel defects in primary teeth have been found at least twice as frequently in disabled children as in control children. Down's syndrome consumed protein more than the recommended daily allowance compared to other disabled groups. Therefore, the aim of this study was to investigate developmental defects of enamel and their relations to nutrient intake among Down's syndrome children in comparison to normal children. Materials and Methods: A sample consisted of fifty institutionalized Down's syndrome children (study group) and 50 normal children (control group)
... Show MoreAbstract:
In the name of God , most Gracious , most merciful
The Holy Quran conciders the celestial book which consults
languages with its accents , and consults the people with their circumstances
and it takes care of all worships.
We find that Holy Quran consults atheist human and afaithless one ,
therefore , it aspect the orabion of God to human “s heart as a results , it is
one of an incapacitation of Holly Quran in This research.
WE try to taik about special vocables which relate to hearts of
unfaithful hummance , so we mentio these vocables in a guidance hierarchy
table in the end of this research.
The research aims to measure the effect of sensory marketing (visual marketing, audio marketing, olfactory marketing, taste marketing, tactile marketing) in enhancing customer loyalty (behavioral loyalty, situational loyalty, perceptual loyalty) and the mediating role of marketing knowledge (product knowledge, price knowledge, promotion knowledge knowledge of distribution, knowledge of employees, knowledge of physical evidence, knowledge of the process) in a group of large single market markets in Baghdad and the researcher chose it because of the challenges faced by large single market in satisfying the customer and maintaining it as a permanent visitor and enhancing his loyalty, and the research problem was identified with a main
... Show More
Abstract
The resources-based introduction in the study of business organizations is increasingly dealing in the study of the human capacities and the best ways to develop them and changing the resources of the organization to be essential and competent to face the business challenges. Today’s organizations need crucial practices to face those challenges and the influences of those practices which take into consideration the importance of developing the entrepreneurship inside the organization. Those practices are called “High Performance Work Systems” which is denoted by “HPWS” and defined as the practices of human resources management which help in acquiring func
... Show MoreSteganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThis study aims to evaluate the influence of the air abrasion of dentin on the shear bond strength of lithium disilicate using three different types of luting cements. Sixty cylindrical specimens were milled from lithium disilicate CAD/CAM blocks (IPSe.max CAD). Sixty sound human maxillary premolar teeth were decoronated to the level of peripheral dentin, then randomly divided into three groups according to the type of luting cement used for the cementation of the lithium disilicate specimens (n = 20); Group A: Glass ionomer cement (Riva Self- Cure); Group B: Adhesive resin cement (Rely X Ultimate); Group C: Self-adhesive resin cement (Rely X U200). Each group was then further subdivided into two subgroups (n=10); Subgroups AI, BI, and CI,
... Show MoreIt is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.