Purpose: To identify the risk factors of urinary incontinency for menopausal women.
Methodology: A descriptive analytic study was conducted to identify the risk factor for urinary incontinency
and selected non-probability sample (purposive sample) from (200) menopausal women (45-65) who have
urinary incontinence as visitors and caregiver women who attend at Hila surgical teaching hospital during the
period 1/11/2010-30/3/2011. Questionnaire format used for data collection was designed and constructed
after reviewing related literatures and previous studies and consists of the following variables: Demographic
and reproductive characteristics of menopausal women who suffers from urinary incontinence
Results: The study found that the highest percentage was (33.5%, 32%) of study sample their age group (50-54,
45-49) years, (74%) they are married and (43.5%) was illiterate. Women in this study had (19%) urge
incontinence, (16.5%) stress incontinence with (38%) having mixed incontinence while (10.5%) mild
incontinence with 38.5% having sever incontinence. And the results show that there was statistical significant
correlation coefficient between type of urinary incontinence and Age at marriage (years), Age at first
pregnancy (years) and parity. There was statistical significant correlation coefficient between degree of urinary
incontinence and age (years), age at marriage, age at first pregnancy (years) and body mass index. There was
statistical significant correlation coefficient between duration of urinary incontinence with occupation and
economical status age (years), parity, and number of abortion. The other risk factors include smoking, parity,
types of deliveries, previous curettage, previous hysterectomy, Diabetic Mellitus, hypertension disorder,
urinary tract infection, coughing, constipation, genital prolapsed and obstructed delivery.
In this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreAbstract
Research title: The legal ruling of advice.
This research deals with the topic of advice, as the research included the following:
Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.
The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike
... Show MoreGhrelin and leptin are hunger hormones related to type 2 diabetes mellitus (T2DM), and the pathogenesis of T2DM is the abnormality in insulin secretion and insulin resistance (IR). The aim of this study is to evaluate ghrelin and leptin concentrations in blood and to specify the relationship of these hormones as dependent variables with some biochemical and clinical measurements in T2DM patients. In this study, forty one T2DM and forty three non-diabetes mellitus (non-DM) subjects, aged between 40-60 years and with normal weight, were enrolled. Fasting serum ghrelin and leptin were estimated by enzyme-linked immunosorbent assay (ELISA). In our results ghrelin was significantly increased, and leptin was significantly decreased, in T2DM pa
... Show MoreWater salinity assessment is fundamental to the management of water resources. The objective of this research is to calculate the water quality index of the Euphrates River by using mathematical methods. As well as to evaluate the water for various uses by estimating the inorganic pollution in the river water in two sites: Samawa and Nasiriya sites. Based on physiochemical characteristics such as pH, TDS, EC, and concentrations of the major ions of calcium (Ca2+), sodium (Na+), magnesium (Mg2+), potassium (K+), sulphate (SO42-) and Chloride (Cl-), bicarbonate ions (HCO3-), and minor elements of nitrate (NO32-
... Show MoreProsthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR)
... Show MoreCleft / palate is one of the common congenital deformities in craniofacial region, associated with different types of dental anomalies like (Tooth agenesis, impaction, and supernumerary teeth) with marked changes in palatal dimensions. This study aimed to determine the prevalence of teeth agenesis and dental anomalies in cleft lip/palate patients using CBCT, and to compare the palatal dimension of cleft group with control subjects. Twenty-eight cleft cases collected during the period from 2015 to 2022, CBCT images evaluated, the study sample classified into two groups (14 bilateral and 14 unilateral cleft lip/palate) and the non-cleft control group (14 CBCT images). The presence of dental anomalies was assessed in relation to clef
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.
Type of the study: cross –sectional study.
Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThis paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.