In this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
The current research aims to highlight the role of human resource management with its practices (human resource planning, selection and placement, training and development, performance evaluation, compensation, and incentives) in raising the level of individuals' performance and its dimensions (task performance, contextual performance, unproductive work behavior, and adaptive performance) by explaining the research problem, which can be limited to the low level of performance of individuals, where the researchers use the descriptive analytical approach and the SPSS program in the practical aspect of the research community represented by the general manager and his assistant
Objective: Determination the effectiveness of educational program on female students’ practices toward premenstrual.
Methodology: A quasi-experimental design study was conducted involving (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criteria to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the practices, before the implementation of the program, the second step is implementing the program, following two steps post-test I and II betwe
... Show MoreObjectives: to determine the effectiveness of an Education Program on Nurses' Knowledge regarding management of extravasation vesicant intravenous chemotherapy
Methodology: quiz-experimental study (single-group pretest-posttest1 and posttest2) was directed in Amal oncology center and national oncology center in Baghdad city from 13th, December 2018 to the 7 of February 2019. The program and tool have been created by the researcher for the purpose of the study. A non- probability purposive sample of (40) nurses who employed in Baghdad oncology centers. Validity and reliability of the instrument were determined through a pilot study. Data were analyzed through the use of Statistical Pack
... Show MoreAbstract:
Objective: The study’s aim to evaluate the effectiveness of instructional program about healthy lifestyle on patients’ attitudes after undergoing percutaneous coronary intervention.
Methodology: Quasi-experimental design/ has been utilized for the current study starting from December 2018 to March 2020 to achieve the objectives of the study. Non-probability (purposive) sample of 60 patients was divided into intervention and control groups. Data were analyzed by the application of descriptive and inferential statistical methods.
Results: findings reported that before intervention both study and control groups demonstrated low total mean of score relat
... Show MoreBackground: Gotu Kola (Centella asiatica) has been used as a traditional medicine for many years to cure different kinds of diseases. Studies have been reported that Gotu Kola extracts might be used as a cure for oral diseases such as periodontal disease. In the present study, Gotu Kola leaves extracted with water will be used to evaluate its effect on some microorganisms living in the human saliva using minimum inhibitory concentration (MIC) method. Material and Method:Gotu Kola fresh leaves extract have been used with water as a solvent, a rotary evaporator was used to separate the solvent from the extract. The following microorganisms: Streptococci, Lactobacilli, and Staphylococcus aureus have been isolated fromthe Saliva of ten voluntee
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs