Objective: study aims to identify the diabetes type2 clients self management skills toward dietary pattern
, and find out the relationship between variables which are (Age, gender, educational level, duration of DM
diagnosis, and monthly income) with diabetes type 2 clients self management skills toward dietary pattern
Methodology: descriptive study was carried out through the present investigation from January 2nd
2011to September 2nd 2011 in order to achieve the objectives of the present study. A non probability
(purposive) sample, (200) cases which consists of clients who were attending Al-Nasiriyha diabetic center.
Including (118) males and (82) females. The data were collected by utilization of the study instruments and
employment of scheduled interview as means data collection. The data collection process was performed from
April /30/ 2011 to Jun / 3rd/ 2011. A questionnaire was designed constructed by the researcher to measure the
variable. Such a construction was employed through the review of literature and related studies. The
questionnaire consisted of 2 parts which are demographical, and diabetics self management skills indicator
dietary pattern .The reliability of the questionnaire was determined through a pilot study and the validity
through a panel of experts. The data were analyzed through the application of descriptive statistic frequency,
percentage, and the application of inferential statistical procedures, which include Pearson correlation
coefficient, and contingency coefficient.
Results: Highest percent of the study samples (37.5) were (50-59) years old. With the mean age (52) years,
(72.0) of them are without of diabetes type 2 self management skills toward dietary pattern, most of them
were male. With low educational level. Group's duration of type 2 DM diagnosis was (1-5) years. Insufficient
monthly income, unemployed, overweight. They had information from their physician, and diagnosed by
chance. There are significant association between diabetes type 2 clients’ self management skills toward
40
dietary pattern and (age, educational level, monthly income).And there were no significant association with
another variable.
Recommendations:
The researcher recommended that the new diabetic patients should be involve in educational program ,
supply with booklet which include self management skills toward dietary pattern and supported by videotapes
to enforce their practices , with the nurse supervision during visit them to the center , and instructed to
improve their life management skills for control their blood glucose and body weight to avoid long term
complications.
This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different
... Show MoreTo determine the relationship between herpes simplex virus 1, 2 and neurological disorders, sixty samples from patients with neurological diseases were collected (40 patients with Multiple sclerosis and 20 patients with Parkinson’s disease) all of whom attended both the Neurological science Hospital as well as the Neuropathology consultation Department in Baghdad Hospital In Iraq. The samples were collected in the time frame between November 2017 and April 2018. The ages of the patients that were investigated were between (17-76) years and compared to a control group consisting of 25 samples collected from apparently healthy individuals. All the studied groups were subjected to the measurement of anti-HSV 1, 2 IgG antibodies by the means
... Show MoreA simple, rapid and sensitive spectrophotometric method has been proposed for the determination of La (III) using 3-hydroxy -4-(2-hydroxy-phenyl azo) naphthalene -1- sulfonic acid as a chromogenic reagent. This method is based on the formation of a red-pink colored complex, upon the reaction of La(III) with the reagent in an alkaline medium (pH= 9.50), having a maximum absorbance at 459 nm. Beer's law is valid in the concentration range 0.512 µg.ml-1 with a Sandell's sensitivity value of 0.0188 µg.cm-2 and molar absorptivity of 7376.12 L.mol-1.cm-1. The stoichiometric composition of the chelate is 1:3. The effect of the presence of different cations as interferants in the determination of La(III) under the given optimum conditions wer
... Show MoreA specific, sensitive and new simple method was used for the determination of methyldopa in pure and pharmaceutical formulations by using continuous flow injection analysis. This method is based on formation of ion pair compound between methyldopa and potassium hexacyanoferrate in acidic medium to obtain a yellow precipitate complex using long distance chasing photometer (NAG-ADF-300-2). The linear range for calibration graph was 0.05-35 mmol/L for cell A and 0.05-25 mmol/L for cell B, and LOD 1.4292 µg /200 µL for both cells with correlation coefficient (r) 0.9981 for cell A and 0.9994 for cell B, RSD% was lower than 0.5 % for n=8 for. The results were compared with classical method UV-Spectrophotometric at λ max=280 nm and turbi
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show MoreThe aim of this research is to identify the effectiveness of thinking skills in developing the life skills of the students of the first Academic year, particularly the differences in life skills according to the variable of study specialization (human-scientific). To achieve the research objectives, the life skills scale was constructed on the classification of (WHO). The psychometric properties of the scale were examined. The validity of the scale, which is the final form of (60) items, was valid for measuring the life skills. The scale was then applied to the research sample of (112) students of the first year of the University of Bisha. The SPSS program processed statistical analysis. Resul
... Show MoreBackground: Diabetes mellitus is a chronic metabolic disorder of the carbohydrate, protein and fat metabolism, resulting in increased blood glucose levels. Various complications of diabetes have been described with periodontitis being added as the sixth complication of diabetes mellitus. Matrix metalloproteinase-8 (MMP-8) has been identified as major tissue-destructive enzyme in periodontal disease. MMP-8 is released from neutrophils in a latent, inactive pro form and becomes activated during periodontal inflammation by independent and/or combined actions of host-derived inflammatory mediators .C-reactive protein is a systemic marker released during the acute phase of an inflammatory response. Subjects, materials and methods: Total samples
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
Objective(s): To assess the eating habits of adolescent females with iron deficient anemia.
Methodology: This study employed a quantitative research, descriptive evaluation design.The study was carried out on adolescent girls attending Kirkuk secondary school, period from 11 April to 27 December 2022. A non- probability (Purposive) sample has been applied to obtain the study goals. The study sample was (62) student who participate in the study.
Results: Pre-test results from the study revealed that 54.8% of students had moderate IDA. While the students' iron levels returned to normal in the posttest (53.2%). The majority of students (59.7%) had poor eatin
... Show More