Breast cancer is the most common cancer among women over the world. To reducing reoccurrence and mortality rates, adjuvant hormonal therapy (AHT) is used for a long period. The major barrier to the effectiveness of the treatment is adherence. Adherence to medicines among patients is challenging. Patient beliefs in medications can be positively or negatively correlated to adherence. Objectives: To investigate the extent of adherence and factors affecting adherence, as well as to investigate the association between beliefs and adherence in women with breast cancer taking AHT. Method: A cross-sectional study included 124 Iraqi women with breast cancer recruited from Middle Euphrates Cancer Center. Morisky medication adherence scale (MMAS) and beliefs about medication questionnaires (BMQ) are used to assess adherence and beliefs respectively. Result: 25% of women were fully adherent (MMAS = 8). 83.06% of all women developed side effects from medications received. Side effects and unemployed women were significantly associated with non-adherence. Additionally, there is no significant association between beliefs in medications and adherence. conclusion The enormous percent of poor adherence caused by side effects suggests the need for interventions by educating patients about the importance of their treatment and how to overcome side effects.
Protein arginine methyltransferases (PRMTs) play important roles in transcription, splicing, DNA damage repair, RNA biology, and cellular metabolism. Thus, PRMTs have been attractive targets for various diseases. In this study, we reported the design and synthesis of a potent pan-inhibitor for PRMTs that tethers a thioadenosine and various substituted guanidino groups through a propyl linker. Compound II757 exhibits a half-maximal inhibition concentration (IC50) value of 5 to 555 nM for eight tested PRMTs, with the highest inhibition for PRMT4 (IC50 = 5 nM). The kinetic study demonstrated that II757 competitively binds at the SAM binding site of PRMT1. Notably, II757 is selective for PRMTs over a panel of other methyltransferases, w
... Show MorePresentation of urinary calculus ranges from painful urination to acute retention. Diagnosed by x-ray pelvis and non-contrast CT and removal of stone by various methods is the management. Variety in symptoms, sometimes make clinical diagnosis difficult until radiological investigations confirm it. In this case presentation, initial diagnosis was made of Urethrocutaneous fistula may be due to distal stricture, but on investigating, he was diagnosed as urethral calculus in urethral diverticulum , as the reason for his symptoms
Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreIn this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
