Background: Diabetes mellitus is a well
known metabolic and vascular illness associated
with high incidence of bacterial urinary tract
infections especially in diabetic complications
including both micro and macro-vascular types.
Objective: To study the incidence of bacterial
urinary tract infections in type 2 diabetic
patients, the type of micro-organism responsible
in relation to age, sex of patients, duration of the
disease & related micro & macrovascular
diabetic complications.
Methods: A prospective study of the diabetic
patients including 40 males with mean age of
54(±9) years and 50 females, mean age of 51(±7)
years and duration of the and sex matched
controls (27 males and 33 females).
Symptoms of urinary tract infections, general
urine examination, urine culture & ultrasound of
abdomen were studied & reported for both
groups.
Results: This study showed significant
increase in urinary tract infections among
diabetic patients with four fold rise in bacteriuria
especially among diabetic women & Escherechia
Coli was the predominant micro-organism in
85% of cases.
Conclusion: Urinary tract infection has
significant increase incidence in type 2 diabetic
patients with fourfold rise among diabetic
women.
This paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The n
The aim of this paper is to shed the light on the concepts of agency theory by measuring one of the problems that arise from it, which is represented by earnings management (EM) practices. The research problem is demonstrated by the failure of some Iraqi banks and their subsequent placement under the supervision of the Central Bank of Iraq, which was attributed, in part, to the inadequacy of the agency model in protecting stakeholders in shareholding institutions, as well as EM, pushed professional institutions to adopt the corporate governance model as a method to regulate the problem of accounting information asymmetry between the parties to the agency. We are using the Beneish M-score model and the financial analysis equations in
... Show MoreWith a descriptive and analytical approach, it discusses the concept of phenomenology as an approach to seeing the aesthetics of ugliness as one of the concepts associated with the aesthetic experience in contemporary art designs, as it is the result of communication between artistic production and the recipient, which leads to creating a state of aesthetic pleasure. A phenomenological method is used to uncover the aesthetics of ugly and to connect ugliness and beauty since ugliness in aesthetics incorporates beauty as a modern aesthetic vision from the phenomenological perspective. The study investigated aesthetics as a phenomenon of perception, sensory knowledge, and the aesthetic response to the production of designs in contemporary a
... Show MoreThe aim of the research is to identify the suitability of a patrol model in evaluating the financial performance of Iraqi banks. The financial reports of five Iraqi commercial banks were approved as a sample for research for the period from 2015 to 2020. The most common financial ratios were adopted for the purpose of measuring the five elements of the model, which are capital adequacy, profitability, credit risk, bankal efficiency and liquidity. The results showed the possibility of using the PATROL model in evaluating the performance of Iraqi banks, as it gave a realistic image of the reality of Iraqi banks in terms of high capital adequacy index and high liquidity, as well as fluctuation in profitability index, not to mention the prob
... Show MoreThe present study aimed to investigate the acetamiprid effects on biochemical aspects in albino mice. Thirty albino mice at the age of 6-8 weeks and average weight 25±5 g were divided into three groups each having ten (10) healthy mice. The first group was orally administrated with distilled water while the second and third groups were orally administrated with 50 mg/mL and 100 mg/mL respectively of acetamprid (0.1 mL) daily for one week. LD50 of acetamiprid was measured and found to be 200 mg/kg. The parameters of evaluations included liver function using Aspartate Aminotransferase (AST), Alanine Aminotransferase (ALT) and Alkaline Phosphatase (ALP). Lipid profile was anal
... Show MorePurpose: The study aims to investigate the extent to which material and non-material requirements are available in applying budgeting programs and performance in Iraqi governmental companies that are not aimed at achieving profits. whose activities are limited to providing services of public interest. This is done by studying the extent to which the requirements of each stage of preparing the programs and performance budget can be met. Theoretical framework: The process of evaluating financial performance is the main objective of all economic units, whether they are governmental or private economic units. Budgets contribute to the evaluation process by analyzing deviations in the application. The study includes an analytical pres
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.