Objective: The aim of the study is to assess the personal hygiene of adult patients with
diabetic foot.
Methodology: A descriptive study was carried out in Baghdad teaching hospital, Al-Karama teaching hospital
and Al-Kindey teaching hospital for the period of 10/1/2006 to 1/9/2006. A purposive "non probability" sample
of (100) patient.
Questionnaire was constructed for achieving the purpose of the study. Data were collected through the
application of the questionnaire and interview technique. Data were analyzed through descriptive statistical
approach (frequency & percentage) and inferential statistical approach (chi-square & correlation) by using of
SPSS.
Results: The study results indicated that the
Objective: The aim of the study is to assess the personal hygiene of adult patients with
diabetic foot.
Methodology: ٨ descriptive study was carried out in Baghdad teaching hospital, Al-Karama teaching hospital
and Al-Kindey teaching hospital for the period of 10/1/2006 to 1/9/2006. A purposive "non probability" sample
of (100) patient.
Questionnaire was constructed for achieving the purpose of the study. Data were collected through the
application of the questionnaire and interview technique. Data were analyzed through descriptive statistical
approach (frequency & percentage) and inferential statistical approach (chi-square ع correlation) by using of
SPSS.
Results: The study results indicated that the ra
Absence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associa
Urban agriculture is one of the important urban uses of land in cities since the inception of cities and civilizations, but the great expansion of cities in the world during the twentieth century and the beginning of the twentieth century and the increase in the number of urban residents compared to the rural population has led to a decline in this use in favor of other uses.
This decline in agricultural and green land areas in cities has negatively affected the environment, natural life and biological diversity in cities in addition to the great impact on the climate and the increase in temperatures and the negative impact on the economic side, since urban agriculture is an important pillar of the economy, especially
... Show MoreThe research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of th
... Show MoreResearchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped
Polyacrylonitrile nanofiber (PANFS), a well-known polymers, has been extensively employed in the manufacturing of carbon nanofibers (CNFS), which have recently gained substantial attention due to their excellent features, such as spinnability, environmental friendliness, and commercial feasibility. Because of their high carbon yield and versatility in tailoring the final CNFS structure, In addition to the simple formation of ladder structures through nitrile polymerization to yield stable products, CNFS and PAN have been the focus of extensive research as potential production precursors. For instance, the development of biomedical and high-performance composites has now become achievable. PAN homopolymer or PAN-based precursor copolymer can
... Show MoreChromene is considered a fused pyran ring with a benzene ring, which is found in many plants and is part of many important compounds such as anthocyanidins, anthocyanins, catechins, and flavanones. These compounds are included under the headings "flavonoids" and "isoflavonoids." These compounds are well known as bioactive molecules with wide medicinal uses. According to these pharmacokinetic characteristics, many researchers are giving more attention to this type of compound and its derivatives. Many chromene derivatives have been synthesized to study their biological effects for the treatment of many diseases. Furthermore, the researcher displayed wide interest in finding new methods for synthesizing chromene derivatives. These met
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More