The aim of the study is to identify the barriers to dietary compliance among diabetic patients.
Methodology: The sample of the study consist of 100 patients who were divided into two groups according to
the type of diabetes mellitus; type 1 (Insulin-dependent diabetic mellitus), and type n (Non-Insulin dependent
diabetes mellitus). Each group consists of 50 patient selected randomly at each visit to Al-Waffa center in Mosul
city during the period from (1-12-2005) to (1-2-2006).
The steps of the study include recording the different barriers for diabetic patients. The questionnaire
was used and special list was utilized for such purpose.
Results: The results shows that there were some barriers most common such as bothering of diet, not believe in
diet therapy, dependent of the drugs of diabetic, and lack of knowledge about diabetic diet and shows the lest
common barriers such as social barriers, unable to control himself from «»ting and another barriers.
Recommendations: The suggestion to undertake teaching about the complications of diabetes or other diabetesrelated health problems health education by means of pamphlets, booklets new paper and television what can
help in minimizing the barriers of diet and compliance of diabetes mellitus.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreA winglet is devices attached at the wing tips, used to improve aircraft wing efficiency by reduction influence wing tips vortices and induct drag, increasing lift force at the wing tips and effective aspect ratio without adding greatly to the structural stress and weight in the wing structure. This paper is presented three-dimensional numerical analysis to proposed modification swept back wing by adding Raked winglets devices at the main wing tips belong the two seat trainer aircraft type Aermacchi Siai S211 by using Fluent ANSYS 13 software. CFD numerical analysis process was performed at the same flight boundary conditions indifferent wing angle of attacks with constant air flow velocity V∞ =50 (m/sec), ambient pressure Po=101325 (P
... Show MoreThis paper aims to review the intellectual to the most important thought leaders administrative and strategic They both (Henry Fayol and Michelle Porter), who forward a lot of ideas that have helped countries in the advancement and progress their economies , has been drawing literature theoretical common border in Contributions ( Fayol ) philosophical and between applications ( Porter ), which reversed strategies of the three ( the leadership of the cost, differentiation, and focus ), so browse search how to apply and use the principles of Fayol in the implementation of strategies competitiveness of Porter, and stems from a problem ( ( to what extent a reflection of the principles ( Fayol) fourteen strategies (Porter ) competitiv
... Show MoreThe aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreAs is known that the consumer price index (CPI) is one of the most important price indices because of its direct effect on the welfare of the individual and his living.
We have been address the problem of Strongly seasonal commodities in calculating (CPI) and identifying some of the solution.
We have used an actual data for a set of commodities (including strongly seasonal commodities) to calculate the index price by using (Annual Basket With Carry Forward Prices method) . Although this method can be successfully used in the context of seasonal&nbs
... Show MoreMany cities suffer from the large spread of slums, especially the cities of the Middle East. The purpose of the paper is to study the reality of informal housing in Al-Barrakia and the most important problems that it suffers from. The paper also seeks to study the presence or absence of a correlation between urban safety indicators and urban containment indicators as one of the methods of developing and planning cities. This can be achieved through sustainable urban management. The slums are a source of many urban problems that threaten the security and safety of the residents and represent a focus for the concentration of crimes and drugs. The paper seeks to answer the following question: How can urban safety be improved through urban cont
... Show MoreTo ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More