KE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19
Breast cancer is the most common cancer among women over the world. To reducing reoccurrence and mortality rates, adjuvant hormonal therapy (AHT) is used for a long period. The major barrier to the effectiveness of the treatment is adherence. Adherence to medicines among patients is challenging. Patient beliefs in medications can be positively or negatively correlated to adherence. Objectives: To investigate the extent of adherence and factors affecting adherence, as well as to investigate the association between beliefs and adherence in women with breast cancer taking AHT. Method: A cross-sectional study included 124 Iraqi women with breast cancer recruited from Middle Euphrates
... Show MoreThis systematic review aimed to analyse available evidence to answer two focused questions about the efficacy of erythritol powder air‐polishing (EPAP) (i) as an adjunctive during active periodontal therapy (APT) and (ii) as an alternative to hand/ultrasonic instrumentation during supportive periodontal therapy (SPT). Additionally, microbiological outcomes and patient's comfort/perceptions were assessed as secondary outcomes.
PubMed, Cochrane and Medline were searched for relevant articles published before February 2021 following PRISMA guidelines. The search was conducted by three indep
A spectrophotometric method has been proposed for the determination of two drugs containing phenol group [phenylephrine hydrochloride (PHP) and salbutamol sulphate (SLB)] in pharmaceutical dosage forms. The method is based on the diazotization reaction of metoclopramide hydrochloride (MCP) and coupling of the diazotized reagent with drugs in alkaline medium to give intense orange colored product (?max at 470 nm for each of PHP and SLB). Variable parameters such as temperature, reaction time and concentration of the reactants have been analyzed and optimized. Under the proposed optimum condition, Beer’s law was obeyed in the concentration range of 1-32 and 1-14 ?g mL-1 for PHP and SLB, respectively. The limit of detection (LOD) and l
... Show MoreThe aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, WB Al-Zoubaidi, Our Dermatology Online/Nasza Dermatologia Online, 2015 - Cited by 10
There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
TI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show More