Preferred Language
Articles
/
jkmc-855
Incorporation of Nurse Practitioners and Physician Assistants into patient care teams - Focus on infectious Diseases: Nurse practitioners and physician assistants in Infectious Diseases
...Show More Authors

There is a global shortage of health care providers needed to address all levels of primary and specialty care.  The recent COVID-19 pandemic also highlights the importance and added value of health professionals with specialty training in infectious diseases.  In the United States, advanced practice providers (APPs) are being engaged to meet the expanding demand for generalist and specialist patient care.  The history and development of advanced practice registered nurses (APRNs) and physician assistants (PAs), are discussed as collaborative healthcare providers to promote better understanding of the ways they can be incorporated into a healthcare system.  An example of how APPs are utilized to provide both inpatient and outpatient care of persons with infectious diseases is illustrated at our midwestern United States regional medical center.  Especially relevant for regions of the world where both nurses and physicians are in short supply, this paper identifies ways that healthcare leaders can support, develop and strategically utilize APPs to provide critically necessary functions and achieve excellent outcomes.  Challenges to future healthcare administration are articulated and compared with World Health Organization roadmap objectives for nursing that can be expanded to better utilize all APPS as valuable healthcare professionals.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Ruling on questioning children by the security authorities: (Comparative Study between Sharia and Law)
...Show More Authors

Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law

View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Zinc Element Traces to Inhibit Scale Formation on Cooling Tower and Air Cooler Systems
...Show More Authors

Calcium carbonate is predominantly present in aqueous systems, which is
commonly used in industrial processes. It has inverse solubility characteristics
resulting in the deposition of scale on heat transfer surface. This paper focuses on
developing methods for inhibition of calcium carbonate scale formation in cooling
tower and air cooler system where scaling can cause serious problems, ZnCl 2 and ZnI
2 has been investigated as scale inhibitor on AISI 316 and 304. ZnCl 2 were more
effective than ZnI 2 in both systems, and AISI 316 show more receptivity to the
chlorides salt compared to AISI 304. The inhibitors were more effective in cooling
tower than air cooler system. AISI 316 show more constant inhibition effic

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
Post COVID-19 Effect on Medical Staff and Doctors' Productivity Analysed by Machine Learning
...Show More Authors

The COVID-19 pandemic has profoundly affected the healthcare sector and the productivity of medical staff and doctors. This study employs machine learning to analyze the post-COVID-19 impact on the productivity of medical staff and doctors across various specialties. A cross-sectional study was conducted on 960 participants from different specialties between June 1, 2022, and April 5, 2023. The study collected demographic data, including age, gender, and socioeconomic status, as well as information on participants' sleeping habits and any COVID-19 complications they experienced. The findings indicate a significant decline in the productivity of medical staff and doctors, with an average reduction of 23% during the post-COVID-19 period. T

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (13)
Scopus Crossref
Publication Date
Tue Jan 10 2017
Journal Name
International Journal Of Dynamics And Control
On local approximation-based adaptive control with applications to robotic manipulators and biped robots
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
An Extensive Literature Review on Risk Assessment Models (Techniques and Methodology) for Construction Industry
...Show More Authors

This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction
...Show More Authors

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A review on Activated Carbon Prepared from Agricultural Waste using Conventional and Microwave Activation
...Show More Authors

In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.

View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
On Finitely Null-additive and Finitely Weakly Null-additive Relative to the σ–ring
...Show More Authors

     This article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.

View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref