Clinicians and investigators consider the normal range of bowel habit and frequency as between 3 to 21 motions per week. Stool frequency outside the normal range may be unusual but may not be abnormal in the sense of a disease, and according to the consistency, the normal stool ranges from porridge like to hard and pellety.
Objectives: To establish a basic data about the bowel habits (consistency and frequency) in a sample of healthy Iraqi population; in addition to learn about their definition of constipation and diarrhea.
Methods: Prospective study from Jan 2000- Jun 2000 at Al-Yarmouk teaching hospital, Baghdad. Questionnaires were distributed to 950 healthy persons of different age group .The questionnaire included: Detailed history of bowel habit with definitions of constipation and diarrhea
Results: Five hundred and eighty eight (588) person responded to the questionnaire: Five hundred and twenty three (523) (94.6.6%) of the respondents had a normal frequency 3-21/week. Four hundred and sixty nine (469) (84.4%) have a doughy (normal) consistency. Most of the respondents who have less frequent stool were females (5.9%), comparable to the predominant male gender in the frequent loose stool group (2%). More than seven percent (7.7%) of the respondents had bleeding per
rectum once or more in their life, less than half of them sought the advice of the doctor. Increased “liquidity” was the main definition of diarrhea while “straining” was the main definition of constipation.
Conclusions: This study showed that, most of the studied populations have a rather normal frequency and consistency of stool. Those subjects with less frequent and pellet stool were mainly female compared to more frequent motion number in male gender and frequent increase in the liquidity. Blood was not always an alarming feature to seek medical advice.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreObjectives: To assess the qualifications and performance of newly graduated pharmacists and explore factors that affect their performance in public hospitals. Methods: This qualitative study included face-to-face, semi-structured interviews with hospital practitioner pharmacists. It was conducted between March and May 2023 in Kerbala province, Iraq. The participating pharmacists were selected purposefully because they had three or more years of work experience at governmental hospitals. The audio-recording interviews were transcribed. Thematic analyses were used to generate themes and subthemes from the interviews. Results: Twenty-seven hospital pharmacists participated in this study. The study found that there are several factors t
... Show MoreWith the increasing rates of cancer worldwide, a great deal of scientific discourse is devoted to arguments and statements about cancer and its causes. Scientists from different fields try to seize any available chance to warn people of the risk of consuming and exposing to carcinogens that have, unfortunately, become essential parts of modern life. The present paper attempts to investigate the proximization strategy through which scientists construct carcinogen risk to enhance people’s preventive actions against these carcinogens. The paper targets the construction which depends on producing the conflict between the values of the people themselves and the contrasting values assigned to carcinogens. To achieve this aim, Cap’s (2
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreWhen exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreMonitoring lotic ecosystems is vital for addressing sustainability issues. The Al-Shamiyah River is the primary source of water for various daily activities in the Al-Shamiyah district. This study assessed the pollution levels of the river by measuring the concentration and distribution of heavy metals—specifically chromium, cadmium, manganese, copper, zinc, and lead—in both the river's water and sediments. The concentrations of heavy metals in the water ranged from 0.05 to 1.44µg/ L for copper (Cu), 1.57 to 7.25µg/ L for manganese (Mn), 0 to 1.7µg/ L for cadmium (Cd), 0.02 to 1.33µg/ L for lead (Pb), 0.08 to 2.74µg/ L for zinc (Zn), and 0.44 to 1.84µg/ L for chromium (Cr). In the particulate phase, the concentrations ranged from
... Show MoreThis study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of ph
Canonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.
In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe
... Show More