Objective(s): To Evaluate Diabetes self –management among patients in Baghdad City and to compare
between these patients self-management relative to the type of the disease.
Methodology: A descriptive design was conducted in Baghdad city, started from November 16th 2017 to the
end of May 17 th 2018 in order to evaluate Diabetes self-management. Purposive (non-probability) sample,
which was consisted of (120) patients who were diagnosed with D.M. The sample is comprised of (60) patient
with diabetes type I and (60) patient with diabetes type II. It is consisted of (60) male and (60) female. A
questionnaire is constructed for the purpose of the study. It is composed of (42) items. Reliability and validity of
the questionnaire is determined through pilot study. Data are collected through the use of the questionnaire and
the structured interview as means of data collection. Data are analyzed through the application of descriptive
statistical data analysis approach of frequency, percentage, mean, range and total scores and inferential
statistical data analysis approach of t-test.
Results: The results show that more than a half have a poor level of diabetes self-management (n = 64; 53.3%)
and a lesser proportion who have a good level of such management.
Recommendations: Further study can be conducted on subjects with a large sample size. An education
program can be done to improve patient knowledge about the diabetes self-management. Better attention can be
directed for patients who were students, married and low income ones
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreNowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreThis study aimed to assess the possible association of oxytocin (OXT) gene with reproductive traits in two groups of Awassi ewes that differ in their reproductive potentials. Sheep were genotyped using PCR—single-stranded conformation polymorphism approach. Three genotypes were detected in exon 2, CC, CA, and AA, and a novel SNP was identified with a missense effect on oxytocin (c.188C > A → p.Arg55Leu). A significant (p < 0.01) association of p.Arg55Leu with the twinning rate was found as ewes with AA and CA genotypes exhibited, respectively a lower twinning ratio than those with the wild-type CC genotype. The deleterious impact of p.Arg55Leu was demonstrated by all in silico tools that were utilized to assess the effect of this varian
... Show MoreIn order to reduce the environmental pollution associated with the conventional energy sources and to achieve the increased global energy demand, alterative and renewable sustainable energy sources need to be developed. Microbial fuel cells (MFCs) represent a bio-electrochemical innovative technology for pollution control and a simultaneous sustainable energy production from biodegradable, reduced compounds. This study mainly considers the performance of continuous up flow dual-chambers MFC
fueled with actual domestic wastewater and bio-catalyzed with anaerobic aged sludge obtained from an aged septic tank. The performance of MFCs was mainly evaluated in terms of COD reductions and electrical power output. Results revealed that the C
Drawing upon the recent theoretical framework of Burkean concept of identification (ID), the current study aims at probing the interaction of content and form in two letters penned by Iran’s Supreme Leader and addressed to the Youth on Jan. and Nov. 2015. To this end, the study seeks (i) to determine a role ID takes in the conveyance of intended assumptions to the targeted readers; and (ii) to observe if the writer’s objectives, i.e. to identify himself with the readers and to realize his politically-religiously-infused creeds, result in success or failure; moreover, (iii) it seeks to determine how he achieved his end to attenuate the impacts of blazing inferno of Islamophobia and anti-Islam sentiments in his addressees. The who
... Show More