Breast cancer is the most common cancer among women over the world. To reducing reoccurrence and mortality rates, adjuvant hormonal therapy (AHT) is used for a long period. The major barrier to the effectiveness of the treatment is adherence. Adherence to medicines among patients is challenging. Patient beliefs in medications can be positively or negatively correlated to adherence. Objectives: To investigate the extent of adherence and factors affecting adherence, as well as to investigate the association between beliefs and adherence in women with breast cancer taking AHT. Method: A cross-sectional study included 124 Iraqi women with breast cancer recruited from Middle Euphrates Cancer Center. Morisky medication adherence scale (MMAS) and beliefs about medication questionnaires (BMQ) are used to assess adherence and beliefs respectively. Result: 25% of women were fully adherent (MMAS = 8). 83.06% of all women developed side effects from medications received. Side effects and unemployed women were significantly associated with non-adherence. Additionally, there is no significant association between beliefs in medications and adherence. conclusion The enormous percent of poor adherence caused by side effects suggests the need for interventions by educating patients about the importance of their treatment and how to overcome side effects.
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThe research aims to identify the psychological and health risks that a child might be exposed to by playing with hazardous toys such as pellet guns. To this end, the researcher has visited Ibn Al-Haytham Eye Hospital in Baghdad, the emergency department to figure out the rate of injuries in Children for the consecutive years (2017-2018) and the first Month of (2019). The psychological risks as a result of disability are represented by the inability to accommodate the surrounding environment well. Additionally, the child experiences a kind of tension, conflict, and going in psychological crises through introversion, isolation, withdrawal tendencies, and poor conformity with himself and the Society.
The influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe ongoing COVID‐19 pandemic caused by SARS‐CoV‐2 is associated with high morbidity and mortality. This zoonotic virus has emerged in Wuhan of China in December 2019 from bats and pangolins probably and continuing the human‐to‐human transmission globally since last two years. As there is no efficient approved treatment, a number of vaccines were developed at an unprecedented speed to counter the pandemic. Moreover, vaccine hesitancy is observed that may be another possible reason for this never ending pandemic. In the meantime, several variants and mutations were identified and causing multiple waves globally. Now the safety and efficacy of these vaccines are debatable and recommended to d
A bolted–welded hybrid demountable shear connector for use in deconstructable steel–concrete composite buildings and bridges was proposed. The hybrid connector consisted of a partially threaded stud, which was welded on the flange of a steel section, and a machined steel tube with compatible geometry, which was bolted on the stud. Four standard pushout tests according to Eurocode 4 were carried out to assess the shear performance of the hybrid connector. The experimental results show that the initial stiffness, shear resistance, and slip capacity of the proposed connector were higher than those of traditional welded studs. The hybrid connector was a ductile connector, according to Eurocode 4, with slip capacity higher than 6 mm. A nonli
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreA novel welded demountable shear connector for sustainable steel-concrete composite structures is proposed. The proposed connector consists of a grout-filled steel tube bolted to a compatible partially threaded stud, which is welded on a steel section. This connector allows for an easy deconstruction at the end of the service life of a building, promoting the reuse of both the concrete slabs and the steel sections. This paper presents the experimental evaluation of the structural behavior of the proposed connector using a horizontal pushout test arrangement. The effects of various parameters, including the tube thickness, the presence of grout infill, and the concrete slab compressive strength, were assessed. A nonlinear finite element mode
... Show More Thsst researcher problem of delays faced by researchers are all waiting to evaluate their standards by the experts who must take their views to extract the truth Virtual important step first step in building standards whatsoever, then the difference of opinion among experts about the paragraphs Whatever the scope of their functions, leading to confusion in maintaining these paragraphs or delete? Or ignore the views and opinion of the researcher to maintain the same? Or as agreed upon with the supervisor if he was a student? Especially if the concepts of a modern new building.
Therefore, the researcher sought to try to find a solution to her problem to conduct an experiment to test building steps
ABSTRACT
This research deals with the two item namely, the monetary policy central Bank of Iraqi and money supply . that contribute in up the problem of the paper that is concerned with the fact that to what extent the effectiveness of monetary policy conducted by the central Bank of Iraqi is valid in controlling money supply as well as the possibility of applying it in practical environment restricted to the scope of financial in stitiutions particularly in research population represented by central Bank of Iraqi .
For the purpose of a practical contribution for monetary and financial institutions . To achieve this , A hypothesis has been carried out and it suggested that the mon
... Show More