Preferred Language
Articles
/
bijps-1530
Adherence and Beliefs to Adjuvant Hormonal Therapy in Patients with Breast Cancer: A Cross-Sectional Study (Conference Paper) #
...Show More Authors

  Breast cancer is the most common cancer among women over the world. To reducing reoccurrence and mortality rates, adjuvant hormonal therapy (AHT) is used for a long period. The major barrier to the effectiveness of the treatment is adherence. Adherence to medicines among patients is challenging. Patient beliefs in medications can be positively or negatively correlated to adherence. Objectives: To investigate the extent of adherence and factors affecting adherence, as well as to investigate the association between beliefs and adherence in women with breast cancer taking AHT. Method: A cross-sectional study included 124 Iraqi women with breast cancer recruited from Middle Euphrates Cancer Center. Morisky medication adherence scale (MMAS) and beliefs about medication questionnaires (BMQ) are used to assess adherence and beliefs respectively. Result: 25% of women were fully adherent (MMAS = 8). 83.06% of all women developed side effects from medications received. Side effects and unemployed women were significantly associated with non-adherence. Additionally, there is no significant association between beliefs in medications and adherence. conclusion The enormous percent of poor adherence caused by side effects suggests the need for interventions by educating patients about the importance of their treatment and how to overcome side effects.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Structural Engineering
Standard Pushout Tests and Design Rules for a Bolted–Welded Hybrid Demountable Shear Connector
...Show More Authors

A bolted–welded hybrid demountable shear connector for use in deconstructable steel–concrete composite buildings and bridges was proposed. The hybrid connector consisted of a partially threaded stud, which was welded on the flange of a steel section, and a machined steel tube with compatible geometry, which was bolted on the stud. Four standard pushout tests according to Eurocode 4 were carried out to assess the shear performance of the hybrid connector. The experimental results show that the initial stiffness, shear resistance, and slip capacity of the proposed connector were higher than those of traditional welded studs. The hybrid connector was a ductile connector, according to Eurocode 4, with slip capacity higher than 6 mm. A nonli

... Show More
View Publication
Scopus (24)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Feb 21 2017
Journal Name
Biomechanics And Modeling In Mechanobiology
A novel method for non-invasively detecting the severity and location of aortic aneurysms
...Show More Authors

The influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr

... Show More
View Publication Preview PDF
Scopus (34)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A review on Activated Carbon Prepared from Agricultural Waste using Conventional and Microwave Activation
...Show More Authors

In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Isvs E-journal
Preserving the Past and Building the Future: A Sustainable Urban Plan for Mosul, Iraq
...Show More Authors

Preserving the Past and Building the Future: A Sustainable Urban Plan for Mosul, Iraq

Scopus (11)
Scopus
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Physics: Conference Series
A comparative Analytical Investigation of Different Geomagnetic Storms During Solar Cycles 23 and 24
...Show More Authors
Abstract<p>In this work, the geomagnetic storms that occurred during solar cycles 23 and 24 were classified based on the value of the Disturbance Storm Time index (Dst), which was considered an indicator of the strength of geomagnetic conditions. The special criterion of Dst >-50 nT was adopted in the classification process of the geomagnetic storms based on the minimum daily value of the Dst-index. The number of geomagnetic storms that occurred during the study period was counted according to the adopted criteria, including moderate storms with (Dst >-50 nT), strong storms with (Dst >-100 nT), severe storms with (Dst >-200 nT), and great storms with (Dst >-350 nT). The statistica</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
The most prominent challenges facing Muslim youth and addressing them from a Quranic perspective
...Show More Authors

The research talks about the most important challenges facing Muslim youth of their ideological, social and economic types, and the youth is facing several problems, the most important of which are the intellectual and social invasion to which the Islamic nation has been exposed and ways to address them from a Quranic perspective and find solutions to these problems and these challenges in accordance with Islamic Sharia and the texts of the Holy Quran. From three topics and several demands, during which the researcher tried to find solutions to each challenge through the verses of the Noble Qur’an.

 

View Publication Preview PDF