Preferred Language
Articles
/
injns-278
A New Measurement Scale for Evaluating Health-Related Quality of Life in Men with Prostate Cancer
...Show More Authors

Objectives: This study aimed to identify and study most properties of the specific and general health-related
quality-of-life (HRQoL) in prostate cancer patients, as well as creating a new measurement scale for assessing QoL
among prostate cancer patients.
Methodology: A cross sectional (descriptive) study was conducted to evaluate General Quality of life in patients
with prostate cancer. A sample of 100 prostate cancer patients from Al-Amal National hospital for cancer
management and Oncology Center in Baghdad Medical City. This study applied format of General World Health
Organization Quality of Life-BERF questionnaire. The methods used descriptive statistics to evaluate the General
QoL-Improvements, as well as inferential statistical methods were used such that (Wilcoxon Signed Rank,
McNemar).
Results: Patients with prostate cancer have different assessment concerning general QoL, and have instability of
their daily life cycle, within a moderate level. Regarding Specific QoL, overall result showed moderate assessment
of quality of life,nbut some domains showed worse assessment than others specially (sexual confidence, sexual
intimacy and prostate specific antigen (PSA) concern domains). Other domains accounted moderate responses and
those were (urinary control, masculine and self-esteem, heath worry, cancer control, informed decision and outlook),
while (marital affection, sexual intimacy and regret) accounted high responding, therefore, prostate cancer patients
have instability of their daily life cycle, within a moderate level. A new measurement scale was created using factor
analysis technique on WHO HRQoL BREF and specific HRQoL of prostate cancer patients

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Thu Jun 03 2021
Journal Name
021 8th International Conference On Computing For Sustainable Global Development (indiacom)
Tilting-rotors Quadcopters: A New Dynamics Modelling and Simulation based on the Newton-Euler Method with Lead Compensator Control
...Show More Authors

Publication Date
Thu Dec 09 2021
Journal Name
Revista Latinoamericana De Hipertension
Synthesis, chemical hydrolysis and biological evaluation of doxorubicin carbamate derivatives for targeting cancer cell
...Show More Authors

Scopus
Publication Date
Thu Sep 01 2022
Journal Name
Journal Of Medicine And Life
Arrhythmia related to hypertensive left ventricular hypertrophy in Iraqi patients: frequency and outcome
...Show More Authors

Left ventricular hypertrophy (LVH) caused by high blood pressure is linked to increased mortality and arrhythmia risk. This study aimed to evaluate arrhythmia in hypertensive patients due to left ventricular hypertrophy (LVH). A cross-sectional study was performed, assessing participants' blood pressure, echocardiography and electrocardiography, and Holter monitoring in certain cases. There were 300 hypertensive patients >18 years attending the cardiology unit of Baghdad medical city. The study was conducted between January–June 2022. The electrocardiograms at rest for 300 adults with hypertension were investigated. 130 (43.5%) were females, and 170 (56.5%) were males. The mean age of participants was 58 years. Forty-nine (16.3

... Show More
View Publication
Scopus (13)
Crossref (11)
Scopus Crossref
Publication Date
Fri Jan 29 2021
Journal Name
Research Journal Of Pharmacy And Technologythis Link Is Disabled.
Exploration of a new fluoride resistance gene (Fram gene) in oral streptococcus mutans maw
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Mechanical Engineering Research And Developments
Development of natural convection heat transfer in heat sink using a new fin design
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
A New Two Derivative FSAL Runge-Kutta Method of Order Five in Four Stages
...Show More Authors

A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (20)
Crossref
Publication Date
Wed Sep 25 2024
Journal Name
Dentistry 3000
Maximum mouth opening measurement in relation to maximum bite force among children
...Show More Authors

Objective: This research aimed to study the relation between maximal bite force (MBF) and maximum mouth opening among 12-year-old school children. Methods: In this cross-sectional study, a total of 400 children aged 12 years (194 boys and 206 girls) were examined. The MBF for the right and left side, as well as the anterior region, were evaluated for all children. The MMO was measured using an electronic digital caliper. To analyze the data path analysis method was used. Results: Boys showed a higher MMO of 48.797 ± 6.500 than girls (46.710 ± 5.926 mm). The MMO increased with increasing MBF, with significant differences between females and males. Conclusion: The MMO was higher in boys than in girls. Gender plays a significant ro

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Total Quality Management Practices and it's reflection on Innovation Empirical research in Middle East Bank for Investment
...Show More Authors

This research aims to assess the adoption of TQM in the Middle East Bank for Investment, and diagnosis means and techniques of technological innovation that applied in, as well as to determine the nature of the relationship between total quality management practices (operations management, employment relations, customer relations) and technological innovation (the incremental innovation  of the service, incremental innovation process, a radical innovation of the service, a radical innovation of the operation), through use  the checklists, derived from a study (Kim et al, 2012) the many styles of mathematical and statistical tools was adopted like the percentage, mean, duplicates, as well as the adoption of the Z test th

... Show More
View Publication Preview PDF
Crossref