SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Purpose: To identify the risk factors of urinary incontinency for menopausal women.
Methodology: A descriptive analytic study was conducted to identify the risk factor for urinary incontinency
and selected non-probability sample (purposive sample) from (200) menopausal women (45-65) who have
urinary incontinence as visitors and caregiver women who attend at Hila surgical teaching hospital during the
period 1/11/2010-30/3/2011. Questionnaire format used for data collection was designed and constructed
after reviewing related literatures and previous studies and consists of the following variables: Demographic
and reproductive characteristics of menopausal women who suffers from urinary incontinence
Results: The study
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreAmongst the literary writers who used their art to direct the attention towards the issue of woman and her rights in a proper life is the English poet and novelist Thomas Hardy (1840-1928), who has been praised for his “openness to the feminine principle” 1 as Irving Howe put it. Hardy’s wide readings have changed his way of dealing with and thinking about so many critical issues which started to float on the surface of the English society during the mid and late of the 19th century. His readings for a number of writers, who seem of huge impact on his writings as he later admits that – “[his] pages show harmony of view with
... Show MoreThe present study was set to investigate the potential association between the level of Interleukin-6 (IL-6), as a key component of the pro-inflammatory response, with different thalassemia’s biological and clinical features. For this purpose, one hundred fifty blood samples were collected from 100 beta-thalassemia patients, who attended the Genetic Hematology Centre at Ibn Al- Baladi Hospital in Baghdad, Iraq, and 50 healthy subjects who were employed as a control group. IL-6 levels were estimated using an ELISA Kit, whereas other thalassemia-related clinical features (such as HbA, HbF, ferritin, blood transfusions, splenectomy status, and the history of frequent infection) were additionally assessed. The results of the present s
... Show MoreAbstract: Background: Drug toxicity and chemotherapeutic side effects negatively impact the quality of life of breast cancer patients. Objectives: to evaluate the efficacy of pharmaceutical Interventions (PI) on quality of life (QOL)Among chemotherapy intake breast cancer women. Method: A pre-post interventional study was carried out at the chemotherapy ward of Alhabobi Hospital in Alnasiriyah City. Eligible patients received comprehensive pharmaceutical care and a self-compiled Breast Cancer Patients Medication Knowledge Guide pamphlet. Each patient received two sessions, the first at baseline and the second after 7, 14, or 21 days depending on the next taking dose of chemotherapy. Each session lasted for approximately 15-30 minutes. Par
... Show MoreBackground: Undergraduate dental students are more susceptible to situations of stress that affected quality of sleep, such profiles of stress may result in sleep bruxism and/or awake bruxism, parafunctions that can affect oral and general health. The aim of the study was to evaluate the association of sleep bruxism, awake bruxism and sleep quality among dental students. Materials and methods: A cross-sectional study was performed including 260 Iraqi dental students from university of Baghdad aged from 20to25years old. Students enrolled in the third and fifth class participated in the study. The Pittsburgh Sleep Questionnaire Index (PSQI) was used for data collection. The PSQI was distributed during lecture classes. Sleep bruxism and awake
... Show MoreMedia studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i
Background: Patients requiring renal biopsies have various glomerular diseases according to their demographic characteristics.
Objective: To study types of glomerular disease among adult Iraqi patients in a single center in Baghdad/Iraq
Material and Methods: A total of 120 native kidney biopsies were studied. All biopsies were adequate and were processed for Light Microscopy.
The age range of the study patients was 17-67 years, with a mean of 38.5 years. The mean follow up period was 28 weeks (4-52 weeks)
Indication for biopsy included: Nephrotic syndrome (N=72; 60%), Asymptomatic proteinuria (N=21; 17.5%), acute nephritic presentation (N=17; 14.16%), asymptomatic haematuria (N=10; 8.33%).
Results: Primary glomerulonephrit
In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show More