Background: It is important to achieve good glycemic control to avoid long-term diabetic complications. It has been largely debated about the role of correct way of insulin administration to get the desired glycemic control.
Objective: To evaluate the effect of teaching diabetic patients who are on insulin therapy the correct way of injecting insulin and its effect on glycemic control.
Methods: A non randomized clinical trial with 820 diabetic patients on insulin therapy on whom A1 c estimation was performed before and after three months of teaching them the right injection technique.
Results : Sixty seven patients (8.17%) had A1 c 6.5% before they were enrolled in the study while the majority (753 patents, 91.82%) had A1 c 6.5% and the last group showed the best benefit of teaching them the correct way of injection when compared with first group (P= 0.0001). Also patient with age 20-40years showed the best results (P=0.0001), while the poorest results were observed in those aged 40 years and above.
Conclusion: Teaching patients the right injection technique is important to achieve good glycemic control in those who already had poor one.
In vivo study was made for the coumpounds 3-(ocetyl Salicyloyl)-5,6-O-isoprpy lideneL-ascorbicocid,2,3-(acetyl Salicyloyl )-5,6-o- isopropylidene-L-ascorbic acid and 2,3,5,6(acetyl Salicyloyl )-L- ascorbic acid .And a measurement was mod for the concentration of the liberated aspirin in blood samples a fter (2,3,4,6,8,10) hours of the initial dose for the animal .The results showed that the highest concentration of aspirin was after four hours of giving the dose to the animal which is in accordance with pharmacokinetics studies
New Schiff base ligand (E)-6-(2-(4-(dimethylamino)benzylideneamino)-2-(4-hydroxyphenyl)acetamido)-3,3- dimethyl-7-oxo-4-thia-1- azabicyclo[3.2.0]heptane-2-carboxylic acid = (HL) was synthesized via condensation of Amoxicillin and 4(dimethylamino)benzaldehyde in methanol. Figure -1 Polydentate mixed ligand complexes were obtained from 1:1:2 molar ratio reactions with metal ions and HL, 2NA on reaction with MCl2 .nH2O salt yields complexes corresponding to the formulas [M(L)(NA)2Cl],where M=Fe(II),Co(II),Ni(II),Cu(II),and Zn(II), A=nicotinamide .
Awsaj (Lycium barbarum) is a plant belong to family Solanaceae serves as a good source of bioactive compounds like phytosterols which have many important biological activity. Literature survey available so far revealed that there was no studies about Iraqi wild Awsaj phytosterols especially B-sitosterol, there for the objective of this study was to examine the efficiency of ultrasound assisted extraction (probe and bath) as compared to the conventional (Soxhlet) extraction method for extraction of phytosterols especially B-sitosterol from fruits, leaves, stems and roots of Iraqi wild Awsaj plant. This goal was achieved by comparing the extraction mass yield, also by a quick and easy approach for identification and quantification of bioac
... Show MoreThe effect of thickness variation on some physical properties of hematite α-Fe2O3 thin films was investigated. An Fe2O3 bulk in the form of pellet was prepared by cold pressing of Fe2O3 powder with subsequent sintering at 800 . Thin films with various thicknesses were obtained on glass substrates by pulsed laser deposition technique. The films properties were characterized by XRD, and FT-IR. The deposited iron oxide thin films showed a single hematite phase with polycrystalline rhombohedral crystal structure .The thickness of films were estimated by using spectrometer to be (185-232) nm. Using Debye Scherrerś formula, the average grain size for the samples was found to be (18-32) nm. Atomic force microscopy indicated that the films had
... Show MoreImpressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.
In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi
... Show MoreNever the less, banking compliance function became one of the most important functions in banking sector according to its characteristics that considered as an interior control tools to control (executive management, departments, subsidiaries…etc) in any bank; and their compliance towards applying rules, recommendations and legislations. In addition to, estimating the risks and limited them; and controlling the anti-money laundering. Thus, these functions that covered the main concept of (Banking Compliance) would avoid the bank to be under the control of any sanctions.
In this paper, we present a concept of nC- symmetric operator as follows: Let A be a bounded linear operator on separable complex Hilbert space , the operator A is said to be nC-symmetric if there exists a positive number n (n such that CAn = A*ⁿ C (An = C A*ⁿ C). We provide an example and study the basic properties of this class of operators. Finally, we attempt to describe the relation between nC-symmetric operator and some other operators such as Fredholm and self-adjoint operators.
Emails have proliferated in our ever-increasing communication, collaboration and
information sharing. Unfortunately, one of the main abuses lacking complete benefits of
this service is email spam (or shortly spam). Spam can easily bewilder system because
of its availability and duplication, deceiving solicitations to obtain private information.
The research community has shown an increasing interest to set up, adapt, maintain and
tune several spam filtering techniques for dealing with emails and identifying spam and
exclude it automatically without the interference of the email user. The contribution of
this paper is twofold. Firstly, to present how spam filtering methodology can be
constructed based on the concep