Objective:
This study aims to asses the patients' compliance with essential hypertension in respect to antihypertensive
medications, follow-up, dietary pattern and health habits, to identify the associated long-term complications, and
to find out the relationship between patient's compliance, and demographic characteristics such as age, gender,
level of education, and duration of disease.
Methodology:
A descriptive study was carried out in Nasiriyah Teaching Hospital to achieve presented objectives .
Results:
The results of the study revealed that there were a significant association between educational level and total
patient's compliance, a significant association was found between the duration of disease and complications, the
majority (63%) of the sample was non-complaint, most of them was males with low level of education and
(70%) of them had complications. A greater number (21%) suffering from (Cerebrovascular accident).
Recommendation:
The research recommends that establishing well-equipped specialized hypertension clinics, educational program
should be designed, antihypertensive drugs should be supported by government, antihypertensive medications
must be obtained from the out patient clinic to avoid buying them from private pharmacies to maintain patients
compliance, and further study can be conducted in Iraq to determine the impact of non-compliance of patients
with essential hypertension.
In this paper, we will discuss the performance of Bayesian computational approaches for estimating the parameters of a Logistic Regression model. Markov Chain Monte Carlo (MCMC) algorithms was the base estimation procedure. We present two algorithms: Random Walk Metropolis (RWM) and Hamiltonian Monte Carlo (HMC). We also applied these approaches to a real data set.
in this paper, we give a concept of
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreObjective(s): Evaluation of late adulthood knowledge about social frailty, measure the level of knowledge about social frailty, and to find out the relationship between knowledge and socio-demographic characteristics.
Methodology: A descriptive study design was carried out to measure the late adults' level of knowledge at Technical Institute-Suwaira in Middle Technical University and to find out the association between late adults' knowledge and their socio-demographic characteristic. The study was started from 28th April 2022 to 15th August 2022. The sample was Non-probability (convenience) sample of (100) late adults were selected according to the study that are working i
... Show MoreThis study examined the effects of water scarcity on rural household economy in El Fashir Rural Council / North Darfur State- western Sudan. Both quantitative and qualitative methods were used as to get a deeper understanding of the impact of water scarcity on the rural house economy in the study area. 174 households out of 2017 were selected from 45 villages which were distributed in eight village councils forming the study area. Statistical methods were used to manipulate the data of the study. The obtained results revealed that water scarcity negatively affected the rural household economy in the study area in many features. These include the followings: much family efforts and time were directed to fetch for water consequentl
... Show MoreThe research aims to extrapolate the repercussions of the use of expert systems in the work of the external auditor on the quality of audit, as the research problem was that despite the use of these techniques in audit work, there is a problem related to the efficiency and effectiveness of these technological systems used in audit work, the feasibility of their use and the extent of their impact: The quality of the audit process.
The researchers adopted the questionnaire as a tool for collecting study data from a community composed of auditors in auditing offices and companies in Iraq, and the auditors of the Iraqi Federal Financial Supervision Bureau. The number of recovered and valid qu
... Show MoreWithin connected speech, RP speakers tend to shorten stressed long vowels end diphthongs in pre. Forties consonants in the same syllable on the basis of complementary Distribution, i.e., the phonological environment decides the influence of the forties plosives and fricatives, as far as they are in find position preceded by stressed long vowels and diphthongs, or particular voiced consonants plus vowels. The Iraqi learners, then, face.