Premium Essay

Type 2 Db Research Paper

Submitted By
Words 397
Pages 2
Type 2 DB is a chronic condition that obscures the normal metabolization of sugar in our body. The normal process can be hindered by either insulin resistance or inadequate production of insulin. The pathophysiology of Type 2 DB resulted from Insulin resistance is discussed here. Normally, glucose enters in high quantity into the bloodstream following food ingestion. Major players in the regulation of blood glucose are the islets of Langerhans (special cells), specifically, beta cells located in the pancreas that sense the increased level of glucose in the blood. The pancreas is a hormone that produces insulin and glucagon that regulate blood glucose. Insulin regulates blood glucose by allowing body cells to absorb and use glucose. Normally, …show more content…
The binding allows body cells to take glucose (sugar) from the blood and use it for energy. In type 2 DM, the pancreas makes insulin but the body doesn’t use it correctly because it is insulin resistant. This happens due to insulin receptors that are unresponsive to the action of insulin. Interaction of genetics, obesity, hypertension and increased age contribute to the resistance or unresponsiveness of receptor cells to insulin. When insulin receptors are unresponsive, the beta cells in the pancreas become fatigued from the compensatory overproduction of insulin. Over a period of time, patients start to see the S/S of type 2 DM including but not limited to diabetic ketoacidosis (drowsiness, thirst, and abdominal pain), fatigue, hunger, weight loss, prolonged wound healing and blurry vision. The symptoms cause-effect relationship has to do with the glucose balance in patient’s body. For example, blurry vision occurs when fluid is leaking into the lens of the eyes. The leaking makes the lenses swell and changes shape. The changes in the shape of the lenses make it hard to focus and start to look fuzzy. Likewise, prolonged wound healing occurred when an elevated blood sugar level stiffens the arteries and causes narrowing of the blood

Similar Documents

Premium Essay

Paroll and It

...Sunghae Jun Department of Statistics, Cheongju University Chungbuk 360-764 Korea ABSTRACT In big data era, we need to manipulate and analyze the big data. For the first step of big data manipulation, we can consider traditional database management system. To discover novel knowledge from the big data environment, we should analyze the big data. Many statistical methods have been applied to big data analysis, and most works of statistical analysis are dependent on diverse statistical software such as SAS, SPSS, or R project. In addition, a considerable portion of big data is stored in diverse database systems. But, the data types of general statistical software are different from the database systems such as Oracle, or MySQL. So, many approaches to connect statistical software to database management system (DBMS) were introduced. In this paper, we study on an efficient connection between the statistical software and DBMS. To show our performance, we carry out a case study using real application. Keywords Statistical software, Database management system, Big data analysis, Database connection, MySQL, R project. 1. INTRODUCTION Every day, huge data are created from diverse fields, and stored in computer systems. These big data are extremely large and complex [1]. So, it is very difficult to manage and analyze them. But, big data analysis is important issue in many fields such as marketing, finance, technology, or medicine. Big data analysis is based on statistics...

Words: 2685 - Pages: 11

Premium Essay

Does Methadone Maintenance Help Clients or Simply Prolong Their Addiction

... Research Methods I Kaplan University Helen Farel The disease of addiction may never be fully understood, but further studies in methadone maintenance with opioid dependence will prove that methadone maintenance prevents cravings and withdrawal symptoms and helps an addict to maintain their sobriety while trying to overcome their addiction. In this paper the author will discuss the scientific method and several studies that have been conducted on the use of methadone in the treatment of substance abuse. The scientific method is a set of principles and procedures that researchers use to develop questions, collect data and reach conclusions. (Cherry, 2013). In Psychology the goals of the scientific method is to seek and describe behaviors and explain why the behaviors occur. (Cherry, 2013). Researchers also strive to create research that can be used to predict and change human behavior. (Cherry, 2013). The four steps of the scientific method are, (1) forming a testable hypothesis, (2) devising a study and collecting data, (3) examining the data and reaching conclusions and (4) reporting the findings of the study. (Cherry, 2013). All the research articles discussed in this paper used the empirical research method. This type of research is based on experimentation or actual observation;...

Words: 1164 - Pages: 5

Premium Essay

Re: Friday

...Resource Identification and APA Exercise Worksheet Part 1: Resource Identification Directions: Click on each link below and identify the resource type. In addition, answer the questions provided below each link about the particular source. *The template is able to manipulate if you require more room for your responses. Each resource type will correspond to one of the following choices: Website | Blog | Newspaper | Magazine | Book | Journal Article | Encyclopedia | Dictionary | | Resource Link & Questions | What is the resource type? | 1 | http://library.gcu.edu:2048/login?url=http://library.books24x7.com.library.gcu.edu:2048/library.asp?^B&bookid=50775&refid=C3VGQ | Book | a. What is the name of the resource?Make Your Brain Work: How to Maximize Your Efficiency, Productivity, and Effectiveness.b. Who is the author?Amy Brannc. Is this Peer Reviewed? (Yes or no, and please explain why.)No, because it does not contain a list of experts who reviewed the book. d. Would you use this resource for an academic paper? (Yes or no, and please explain why.)Yes, because it is found in the GCU library. Everything in the library is credible. | 2 | http://library.gcu.edu:2048/login?qurl=http%3A%2F%2Fwww.credoreference.com/entry/hmndcl/plagiarism | Dictionary | a. Provide a properly formatted APA reference page citation for this source:Plagiarism. (2002). In The new dictionary of cultural literacy, Houghton Mifflin. Retrieved from http://library.gcu.edu:2048/login...

Words: 1377 - Pages: 6

Premium Essay

Annotated Bbilography

...edu:2048/login?url=http://search.ebscohost.com.library.gcu.edu:2048/login.aspx?direct=true&db=a9h&AN=79301650&site=ehost-live&scope=site The authors of Fearless dominance and the U. S. presidency: Implications of psychopathic personality traits for successful and unsuccessful political leadership used an assessment of psychological personality traits that pertain to the ability of individuals to be the president of the United States and also be outstanding leaders. One hundred twenty-one experts from the field of psychology used standardized methods to assess all presidents using an observable control variable that could not be changed or modified and determine whether any presidents demonstrated sociopathic tendencies. The psychological personality assessments included outgoing personality, the level of mental stability, experience, the ability to be agreeable, and whether they have a conscience. The findings indicate many of the assessments were positive but the authors stress that they are not suggesting that all presidents need to be sociopathic and /or mentally unstable to be successful. The article was published in a credible source for psychology. van Eeden, Cilliers, and van Deventer, (2008). Leadership styles and associated personality traits: Support for the conceptualization of transactional and transformational leadership. South African Journal of Psychology, 38(2), 253-267....

Words: 1099 - Pages: 5

Premium Essay

Pensions

...WORKING PAPER SERIES DEFINED CONTRIBUTION PLANS, DEFINED BENEFIT PLANS, AND THE ACCUMULATION OF RETIREMENT WEALTH James Poterba Joshua Rauh Steven Venti David Wise Working Paper 12597 http://www.nber.org/papers/w12597 NATIONAL BUREAU OF ECONOMIC RESEARCH 1050 Massachusetts Avenue Cambridge, MA 02138 October 2006 We are extremely grateful to Tonja Bowen for extraordinary and tireless research assistance, to Gary Engelhardt and Anil Kumar for graciously providing us with tabulations from their HRS Defined Contribution Plan imputation algorithm, to Paul Bingley, Peter Diamond, Gary Engelhardt, Jon Gruber, Helena Stolyarova, and many seminar participants for helpful comments, and to the National Institute of Aging for research support under grant number P01 AG005842. The views expressed herein are those of the author(s) and do not necessarily reflect the views of the National Bureau of Economic Research. © 2006 by James Poterba, Joshua Rauh, Steven Venti, and David Wise. All rights reserved. Short sections of text, not to exceed two paragraphs, may be quoted without explicit permission provided that full credit, including © notice, is given to the source. Defined Contribution Plans, Defined Benefit Plans, and the Accumulation of Retirement Wealth James Poterba, Joshua Rauh, Steven Venti, and David Wise NBER Working Paper No. 12597 October 2006 JEL No. J14,J26,J32 ABSTRACT The private pension structure in the United States, once dominated by defined benefit (DB) plans,...

Words: 19390 - Pages: 78

Premium Essay

Research Unit 2 Lesson 8-11

...9th Grade Lit/Comp B Research Paper Outline Unit 2, Lesson 11 Complete this outline and submit it to the dropbox in place of your Research Paper Rough Draft. You will work on this outline throughout Unit 2 Lessons 8-11. You will submit your completed outline to the drop box at the end of Unit 2 Lesson 11. Intro Hook - What interesting fact or statement would make your reader WANT to read the rest of your essay? Your hook should NOT be in the form of a question. Innovations in technology relating to weaponry and machinery made great advancements during the period between World War I and World War II. These advancements in machinery contributed to increased fighting capability by land, air and sea. Background- introduce your topic and...

Words: 1265 - Pages: 6

Premium Essay

Two-Million-Dollar Procurement for the Purchase of Vehicles for the Fleet of Trucks

...has asked you to select the type of contract to be used for the vehicle purchase.  Choose to respond to this scenario from a government or a contractor perspective. If you select government, then you will complete the assignment as if you are a government employee (or military personnel) receiving the proposal from the contractor. If you select contractor, then you will complete the assignment as if you are a contractor employee submitting a proposal to the government. Write a four to six (4-6) page paper in which you: 1. Examine the types of contracts and performance-based acquisition. Select the type of contract you would like to use for the vehicle purchase. (Dr. Vic’s Tips: This assignment is very close to the Db for Week 3, so I will offer similar tips and hints: You will also want to review Feldman, Ch. 16 and Compton Ch. 6. You will need to list, define, discuss and provide examples of the main three offered within the article: Fixed-Price, Cost-Reimbursement, Time-and-Materials (T&M), AND the two offered within Compton p.p. 66-70: Letter Contracts and Indefinite Delivery Contracts – this is a graduate level class…I will be looking for you to discuss all five! Please do so! Please include research from both of our textbooks [interpret, cite and reference]). For Performance-based acquisition, [Compton Ch. 7] you can also use information from your Week 3 DB as well). Finally, as the question requires, select and explain, the best type of contracts for the trucks...

Words: 664 - Pages: 3

Premium Essay

Introduction

...Product Innovation & Creativity Assignment Mobile Phone Report Table of Contents Introduction 3 Product concept 3 Secondary research 3 Primary research 5 Conclusion 6 Appendix 7 Bibliography 7 Figures 8 Questionnaire 8 Introduction Nowadays, the way of information transfer is changing rapidly as the change of advanced technology. People could communicate with each other more conveniently and effectively by the use of mobile phone. As the technology change of mobile phones, people not only use mobile phone to make a phone call, but also do something else. People can use mobile phone to watch TV, surfing on the internet, and take photo. By the way, the consumer needs for mobile phone may be different by their occupation and lifestyle. Therefore, the decision maker of the organization needs to know more about the customer needs and wants in order to handle the market opportunity successfully. Product concept Our concept is innovation and be creative to build a unique product experience for customers. And provide close service and convenience to customer in the daily life and working. Secondary research Secondary data which means the information has already been collected or already existed for specific purpose (Crossman, 2013). Secondary research could help an organization to know the current situation of market and competitor. It’s very help for organization to evaluate current potential opportunity within the market. From the Euromonitor...

Words: 2478 - Pages: 10

Premium Essay

Role Model Review

...to support your essay. Complete the following table below the example table provided. * Use the Role Model you selected as your “keyword” to search the GCU database located in the GCU Library at http://library.gcu.edu Example Table Topic | Resource Name | Resource Type | Explain how you accessed your resource. | How is the resource relevant to your essay topic? | Martin Luther King, Jr. | Journal of Religious Thought | Academic Journal | Clicked on the link above to the library home page. Selected “Find Journal Articles.” Clicked on “Christian Studies” under “Find Databases by Subject.” Selected “ATLA Religion Database with ATLASerials.” Also selected “Religion and Philosophy Collection.” Used keywords “Martin Luther King AND (worldview OR religion* OR belief*).” | Describes how Martin Luther King, Jr. viewed racism, a just society, and the means for creating a just society. | Permalink | http://library.gcu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=rlh&AN=4975124&site=ehost-live&scope=site | Student Summary | This article covers the views of Benjamin Mays, Malcolm X, and Martin Luther King, Jr. on three key questions: 1) What is the nature of racism? 2) What is a vision of a just society? and 3) What are the means to enact the vision? Benjamin Mays addresses the pervasiveness of racism and calls for realizing the ideals of the American dream. Malcolm X addresses the role of White people in racism and calls for separation...

Words: 1168 - Pages: 5

Free Essay

Miss

...nz/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=96090677&site=ehost-live * Wasik, B. (2013, 06). Welcome to the programmable world. Wired, 21, 140.http://helicon.vuw.ac.nz/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=89374642&site=ehost-live | Week 2 – 21 July | Social Media StrategyBefore class read: * Wilson, H. J., Guinan, P. J., Parise, S., & Weinberg, B. D. (2011). What’s your social media strategy? Harvard Business Review, 89(7/8), 23-25. http://helicon.vuw.ac.nz/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=61870888&site=ehost-live * Social Media Marketing Report 2015 Available: http://www.socialmediaexaminer.com/report/ | Week 3 – 28 July | Cyber Security | PrivacyBefore class read: * Ferguson, A. (2014). Future tech. Acuity, 1(4), 36-38.http://helicon.vuw.ac.nz/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=101950726&site=ehost-live | Week 4 – 4 August | Online Infrastructure | The Social, Business and Government Cloud (Jay Gattuso)Before class read: * Durkee, D. (2010). Why cloud computing will never be free. Queue, 8(4), 20.http://helicon.vuw.ac.nz/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=50281775&site=ehost-live * Katz, R. H. (2009). Tech titans building boom. Spectrum, IEEE, 46(2), 40-54.http://helicon.vuw.ac.nz/login?auth=vuwbb&url=http://dx...

Words: 998 - Pages: 4

Premium Essay

Annotated Bibliography

...Social Psychology, 103(3), 489-505.http://library.gcu.edu:2048/login?url=http://search.ebscohost.com.library.gcu.edu:2048/login.aspx?direct=true&db=a9h&AN=79301650&site=ehost-live&scope=site This article emphasizes on few elements of psychopathic personality which have strong influence on job performance and leadership. For this research a standardized psychological assessment methods was used by 121 experts. These experts rated the personalities and measured Psychopathy, and Covariates of all presidents from George Washington to George W. Bush. Further analysis was conducted by evaluating these ratings with job performance information collected in two surveys that include 2009 C-Span poll of 62 presidential historians and a 2010 Siena College survey of 238 historians. A paragraph should begin here as the topic shifts to major findings. Major findings from this research state that American president’s shows higher degree of psychopathic behavior in comparison to general population. Major finding from the paper shows that Teddy Roosevelt and John F. Kennedy were the most fearless dominant presidents in US. It also highlights on importance of luck, circumstances and outcome of presidential decisions which might be regarded as courageous or psychopathic depending on the scenario. Major learning derived from this paper states that fearless dominance has both positive and negative impact depending on the way it is being implemented; boldness should not become recklessness...

Words: 1942 - Pages: 8

Premium Essay

Electronics

...* Skip to Navigation * Skip to Content TermPaperWarehouse.com - Free Term Papers, Essays and Research Documents The Research Paper Factory * Join * Search * Browse * Saved Papers ------------------------------------------------- Top of Form Search Bottom of Form * Home Page » * Computers and Technology Unit 4 Research Paper In: Computers and Technology Unit 4 Research Paper A port expander is a device that allows one port on a computer system to connect to multiple devices. There are two forms of port expanders: internal and external. An internal expander has a connection inside the computer, typically on the motherboard and the only part the user sees is the expansion plate that contains multiple ports. As for an external device, it plugs into the existing port and then has multiple places to connect. The most common versions are used for USB and Ethernet ports. There are numerous types of ports that have available port expanders for them. Here is a list that I have compiled: * Ethernet port expander * Firewire port expander * DB-25 port expander * Serial port expander * USB port expander * VGA port expander * DVI port expander * SCSI port expander * Audio port expander * Video port expander * Microphone port expander * RS-422 port expander * Modbus serial port expander * SATA port expander * SAS port expander * SSD port expander Port expanders are generic devices that can be used with any computer as long as the computer...

Words: 581 - Pages: 3

Premium Essay

Literature Review- Business Intelligence (Bi)

... Abstract Business intelligence (BI) is a popular and growing field that helps managers and decision-makers in deciding important decisions. Over the past two decades advancements in technology have elevated the importance of BI systems and software to an organized corporate strategy and overall success. Reliable and accurate BI systems are used by many large corporations; they can be custom-built by a service provider or by people working for the corporation. This is because they are very expensive, cutting edge software systems. Past research has shown that BI is one of the fastest-growing methods of intelligence gathering in the field. With all of the attention of advances in information technology (IT) and how helpful they are it is easy to overlook some of their repercussions. This paper highlights the importance of BI in decision-making areas and the techniques used to make them. Advantages and benefits are then discussed and one major problem is described in detail. Computer hacking is becoming more popular as the future comes closer and it is a larger problem than most think outside of the business world. The conclusion offers an insight into the future of BI and identifies the problem of hacking as its major threat. 1. Introduction Business intelligence (BI) has become one of the most successful and popular ways that an organization uses to answer specific...

Words: 6858 - Pages: 28

Premium Essay

Outline

...addresses performance management, which is defined as an ongoing communication process that involves both the performance manager and employee. Key aspects of this process are examined. Topics include: identifying and describing essential job functions and relating them to the mission and goals of the organization; developing performance standards; giving and receiving feedback about performance; writing and communicating constructive performance evaluations, and planning education and development activities to maintain and improve employee work performance. 2 LEARNING OUTCOMES On successful completion of this subject students will be able to : 1. Describe the key concepts and techniques of performance management. 2. Explain the development of performance management as an area of growing importance for managers and employees. 3. Critically assess the significance of rewards in managing performance. Subject Outline Template F-ACD-DB-01.04.03 V11 12 Aug 2012 (Add Subject Code and Name) 4. Analyse and wherever relevant, propose justified solutions to performance management problems. 5. Examine and evaluate contemporary issues in performance management. 6. Actively participate in team based learning situations and class...

Words: 3025 - Pages: 13

Free Essay

Epistemology

...The current issue and full text archive of this journal is available at www.emeraldinsight.com/1472-5967.htm Evaluation of environmental noise based upon the percentage of dissatisfied Paul Roelofsen Grontmij Nederland BV, Amersfoort, The Netherlands Abstract Purpose – This article is a proposal and aims to be a first step to develop a method to evaluate and classify environmental noise, according to EN-15251 and CR-1752, in the built environment based on the percentage of dissatisfied related to the equivalent background noise level. Design/methodology/approach – In the European guideline CR-1752 and the standard EN-15251 three categories of the indoor environment in buildings are prescribed (category A, B and C). In the recommendations, the limit whereby the percentage of dissatisfied should remain under varies in each category for both the thermal indoor environment and the air quality. The categories for noise and illumination criteria are not yet explicitly related to a percentage of dissatisfied. Findings – Using the percentage of dissatisfied as the evaluation criterion, when related to the equivalent background noise, produces a more refined evaluation of comfort than an evaluation based on the percentage of seriously disturbed or the effects of sleep deprivation in relation to external noise. Furthermore, this corresponds to the European standards and recommendations concerning quality classification of the indoor environment, based on the percentage of dissatisfied. Originality/value...

Words: 2388 - Pages: 10