Objectives: The study aims at finding the effectiveness of dietary habits on urolithiatic patients at Urinary Units
in Baghdad Teaching Hospitals.
Methodology: A quantitative descriptive study was conducted to identify the effectiveness of dietary habits on
(100) of urolithiatic patients in Urinary Units at Baghdad Teaching Hospitals starting from May 2011 to Sep.
2012.Data were collected through the use of constructed check list of the questionnaire format, which
consists of two parts: - The first part: is related to the patient's demographic variables ; the second part: is
constructed to serve the purpose of the study (effectiveness of the dietary habits). The total number of items
of the questionnaire is (69) items. Validity of the questionnaire format was determined through a panel of (23)
experts and the reliability is determined through a pilot study. Descriptive statistical analysis procedures (the
frequency, and the percentage) is used for the data analysis of this study.
Results: The data of this study shows that the urinary tract system (UTS) stone formation (SF) is: {Activated
(increased) by fried foods, soft drinks (Pepsi cola and Coca cola), tea, red meat, eggs, ice cream, tomato,
potato, pepper, urinary tract infection (UTI), obesity, hot areas, low education; and, Inhibited (decreased) by
water, coffee, cacao, natural raisin and apricot ( fresh, syrup, dry), Artificial beverage (Seven up, Miranda),
herbs, milk, cheese and butter, white meat (chicken, fish), vitamins}. So, it would be concluded that there is a
clear effect of ''dietary habit'' on urinary stone formation.
Recommendations: The study recommended that the patients should be given booklets or manual guides
including the following (Type of his/her urinary stone. Accordingly should be advised to: Reduction of his/her
dietary habit by preventing certain materials and increasing others to avoid stone recurrence; Advised to drink
liquids especially water 3-4 l/day, Never delay urine voiding, and add the Milk to tea to decrease tea's
promotion to stone formation because the tea is high content of oxalate).
The research talks about the interest and its impact on polygamy as a legitimate social psychological issue, where she talked about the concept of polygamy, and evidence of the legitimacy of polygamy, and clarify the conditions, and then touched on the great interests for which the law allowed polygamy, and mentioned some practical models in polygamy, including What is in the interest of men in pluralism, including in the interest of women in pluralism, including in the interests of both sexes in pluralism .
In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.
A disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach
This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show More