Purpose: To identify the risk factors of urinary incontinency for menopausal women.
Methodology: A descriptive analytic study was conducted to identify the risk factor for urinary incontinency
and selected non-probability sample (purposive sample) from (200) menopausal women (45-65) who have
urinary incontinence as visitors and caregiver women who attend at Hila surgical teaching hospital during the
period 1/11/2010-30/3/2011. Questionnaire format used for data collection was designed and constructed
after reviewing related literatures and previous studies and consists of the following variables: Demographic
and reproductive characteristics of menopausal women who suffers from urinary incontinence
Results: The study found that the highest percentage was (33.5%, 32%) of study sample their age group (50-54,
45-49) years, (74%) they are married and (43.5%) was illiterate. Women in this study had (19%) urge
incontinence, (16.5%) stress incontinence with (38%) having mixed incontinence while (10.5%) mild
incontinence with 38.5% having sever incontinence. And the results show that there was statistical significant
correlation coefficient between type of urinary incontinence and Age at marriage (years), Age at first
pregnancy (years) and parity. There was statistical significant correlation coefficient between degree of urinary
incontinence and age (years), age at marriage, age at first pregnancy (years) and body mass index. There was
statistical significant correlation coefficient between duration of urinary incontinence with occupation and
economical status age (years), parity, and number of abortion. The other risk factors include smoking, parity,
types of deliveries, previous curettage, previous hysterectomy, Diabetic Mellitus, hypertension disorder,
urinary tract infection, coughing, constipation, genital prolapsed and obstructed delivery.
New ligand of N-(pyrimidin-2-yl carbamothioyl)acetamide was synthesized and its complexes with (VO(II), Mn (II), Cu (II), Zn (II), Cd (II) and Hg (II) are formed with confirmation of their structures on the bases of spectroscopic analyses. Antimicrobial activity of new complexes are studied against Gram positive S. aureus and Gram negative E. coli, Proteus, Pseudomonas. The octahedral geometrical structures are proved depending on the outcomes from the preceding procedures
The research seeks to clarify the problems related to the aspects of the financial and accounting process resulting from entering into contractual arrangements with a period of more than 20 years, among which is the research problem represented by the lack of clarity of the foundations and procedures for the recognition of oil costs and additional costs borne by foreign invested companies, which led to a weakening of their credibility and reflection. Negatively "on the measurement and accounting disclosure of financial reports prepared by oil companies, and the research aims to lay down sound procedures for measuring and classifying oil costs and additional costs paid to foreign companies, and recognizing and recording them in th
... Show Moresynthesis and characterization of New Bidentate schiff base Ligand Type(NO)Donor Atoms Derived from isatin and 3-Amino benzoic acid and Its complexes with Co(||),Cu(||),Cd(||)and Hg(||)Ions
The present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show More