Preferred Language
Articles
/
injns-577
Effectiveness of Self-Regulation Fluid Program on Patients with Hemodialysis Self-Efficacy for Fluid Adherence in Al-Diwaniyah Teaching Hospital
...Show More Authors

Objectives: to evaluate patient knowledge with hemodialysis and to determine the effectiveness of Self-regulation Fluid Program on Patients with hemodialysis self-efficacy for fluid adherence in Al-Diwaniyah Teaching Hospital.

Methodology: A quasi-experimental design (two group design: pre-test and post-test) was used. This study was conducted in Al-Diwaniya Teaching Hospital for the period from (15th of October 2018 to 20th of May 2019) on a non-probability (purposive) sample consisting of (60 patients) treatment in hemodialysis units. A questionnaire was built as a data collection tool and consisted of four parts:

First part: Demographic characteristics of the patient that consisted of (7) items, second part: Clinical information of the patient that consisted of (8) items, third part:  the self-efficacy scale of fluid control in hemodialysis patients that consisted of (22) items and fourth part: patients’ knowledge in two axis that consisted of (20) items.

The validity of the questionnaire and the educational program were verified by presenting it to (18) experts. The sample has received a pre-test, educational program, and post-test. Descriptive and inferential statistics were used to analyze the results of the study using the Statistical Package of Social Sciences (SPSS) version 22 and Microsoft Excel (2010).

 Results: The study finding shows, that all the study sample responses at the pre-test were fair knowledge with a statistical mean of scores (1.35). Other than the post-test, shows (100%) of the study sample have high knowledge at the mean of scores (2.66). Also, the maturity of the patients in both groups (control and study) is female and age group (more than 48) years, most of them not read and write, the maturity of the sample of study marred, regarding to the monthly income is not sufficient and urban residency. The study also confirms that the effectiveness of an instructional program on patients with hemodialysis to enhance self-efficacy fluid control is positive.

Conclusion: Program helps patients in increasing self-confidence, knowledge of Chronic Kidney Disease patient care including controlling fluid overload.

Recommendations: The study recommended the necessity of activating the role of instructional program correctly in order to give about end stage renal disease, and conduct future research programs to improve the patient's knowledge about end stage renal disease, fluid adherence and provide small booklist for caring.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 01 2025
Journal Name
Journal Of Environmental Management
Induced electro-fenton process with a new electrochemical reactor design for tetracycline degradation
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Oct 09 2024
Journal Name
Engineering, Technology & Applied Science Research
Improving Pre-trained CNN-LSTM Models for Image Captioning with Hyper-Parameter Optimization
...Show More Authors

The issue of image captioning, which comprises automatic text generation to understand an image’s visual information, has become feasible with the developments in object recognition and image classification. Deep learning has received much interest from the scientific community and can be very useful in real-world applications. The proposed image captioning approach involves the use of Convolution Neural Network (CNN) pre-trained models combined with Long Short Term Memory (LSTM) to generate image captions. The process includes two stages. The first stage entails training the CNN-LSTM models using baseline hyper-parameters and the second stage encompasses training CNN-LSTM models by optimizing and adjusting the hyper-parameters of

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Controlled Release
Surface engineering tumor cells with adjuvant-loaded particles for use as cancer vaccines
...Show More Authors

View Publication
Scopus (34)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Mon Dec 21 2020
Journal Name
2020 Emerging Technology In Computing, Communication And Electronics (etcce)
An Integrated Grey Wolf Optimizer with Nelder-Mead Method for Workflow Scheduling Problem
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors