Objectives: Determine the age and gender distribution of children who experience diabetes mellitus (DM) under
the age of 15 years and the presence of some associated factors that might be a predisposing factor for the
disease including obesity.
Methodology: A cross-sectional study was conducted at diabetic clinic in Children Welfare Teaching Hospital
in Baghdad City during 2006. The study sample included diabetic children less than 15 years of age. Data were
taken from the patients' record and by direct interview with the patients' parents. Information included
demographic data, as well as past history of the patient and his/her family relative to diabetes and other immune
diseases.
Results: Data analysis showed that there was an equal distribution of patients among the three age groups (I-5,
6-10-, and 11-15 years) in a rate of 33% for each. Females had higher incidence rate (660/o) than males. Onset of
the disease was mostly at age group I-3 years (32%) followed by age group 4-6 years (30%). IIistory of viral
illness was present in 24% of patients and a positive family history of DM was found in 23% of them, and a
family history of autoimmune disease was positive in 13% of cases. Body weight at the first visit to the clinic
was mainly below the 50th percentile (42% within the 25th percentile) and only 4% of patients had a body
weight within the 75th percentile.
Recommendations: Health education about the disease and provision of health centers those are easily
accessible for early diagnosis and treatment and uninerrupted insulin supply.
The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreObjective(s): To assess the level of depression and anxiety among school age children with acute lymphoblastic leukemia under chemotherapy treatment and to find out the relationship between the level of depression and anxiety among the affected children and their demographic characteristics.
Methodology: A cross-sectional study was conducted on school age children both gender having acute lymphoblastic leukemia under chemotherapy treated and their age between 6 years to 12 years. The study started from the period of September, 19th 2020 to March,1st 2021. Non-probability (Purposive) sample of (114) children with acute lymphoblastic leukemia under chemotherapy was selected in attending hospital wards, outpatient and counseling clinics
Cerium (III), Neodymium (III) and Samarium (III) Complexes existent a wide range of implementation that stretch from their play in the medicinal and pharmaceutical area because of their major significant pharmacological characteristic such as antifungal, anti-cancer, anti-bacterial ,anti-human immunodeficiency virus ,antineoplastic, anti-inflammation,inhibition corrosion,in some industrial (polymers, Azo dye).It is likely to open avenuesto research among various disciplines such as physics, electronics, chemistry and materials science by these complexes that contain exquisitely designed organic molecules.This paper reviews the definition, importance and various applications of Cerium (III), Neodymium (III) and Samarium (III) Complexes anddi
... Show MoreDigital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-
... Show MoreThis study attempts to provide an approach analysis for the news, depending on the bases and principles which conceptuality semiotic researchers of this field first of them «A. J. Gremas» for the theory of «narrative discourse analysis», to more clarify we tried to apply it on a published press- news, to concludes the most important steps and methods that are necessary to follows gain more understanding of the press- news.
The Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two mai
... Show MoreIn this paper, the first integrals of Darboux type of the generalized Sprott ET9 chaotic system will be studied. This study showed that the system has no polynomial, rational, analytic and Darboux first integrals for any value of . All the Darboux polynomials for this system were derived together with its exponential factors. Using the weight homogenous polynomials helped us prove the process.
In this paper, we characterize normal composition operators induced by holomorphic self-map , when and .Moreover, we study other related classes of operators, and then we generalize these results to polynomials of degree n.