Breast cancer is the most diagnosed form of malignant tumour in Iraqi women. Tamoxifen and trastuzumab are highly effective adjuvant therapy for breast cancer. This study's objectives were to define the patient's belief in tamoxifen or trastuzumab when used as adjuvant therapy and to determine the variation in belief between the two medications in a sample of Iraqi breast cancer patients. The cross-section survey was conducted using the BMQ-Specific questionnaire. Ninety-seven participants (sixty-seven tamoxifen, thirty trastuzumab) participated in this study. The mean of specific-necessity scale for tamoxifen was (3.7) and for trastuzumab (4). The findings showed a high necessity for both medicines, and there were no significant differences in the scale of necessity between the two treatments. Regarding the scale of concern, the trastuzumab group's values are higher (3.35) than tamoxifen (3). Most participants who use tamoxifen or trastuzumab strongly agree with or agree with all the questions on the necessity scale with higher percentages for trastuzumab. Besides, the concern scale results showed the percentage of patients who agree / strongly agree is higher in the trastuzumab group. For the correlation between the need or concern score, the result showed only one significant negative correlation (R=-0.366, P-value=0.011) between the necessity score and the age of the participants for tamoxifen users. In Conclusion, this survey clearly showed a high level of necessity and a high level of concern regarding the use of two effective adjuvant therapy for women with breast cancer, tamoxifen and trastuzumab. Furthermore, this study shows that while the level of need for tamoxifen is higher than for trastuzumab, there were no significant variations between them.
This work deals with preparation of Sulfated Zirconia catalyst (SZ) for isomerization of n-hexane model and refinery light naphtha, as well as enhanced the role of promoters to get the target with the mild condition, stability, and to prevent formation of coke precursors on strong acidic sites of the catalyst. The prepared SZ catalysts were characterization by fourier transform infrared spectroscopy (FTIR), X-ray diffraction (XRD), Brunauer –Emmett-Teller (BET) surface area analysis, Thermogravimetric Analysis (TGA), Scanning Electron Microscope (SEM) and atomic force microscopy (AFM) Analyzer. The results illustrate that the maximum conversion and selectivity for n-hexane isomerization with Ni-WSZ and operating temperature of 150 °C
... Show MoreThe objectives of this study revolve around identifying the extent of funding impact on the future of the printed Iraqi press, and whether it threatens their chances of survival, stating the extent of technological development on the income of the printed newspaper, and identifying the causes of the financial crisis on the newspaper.
This research is classified as descriptive research, and the researcher used the survey method, and adopted the questionnaire of the views of the contactors, in five Iraqi newspapers (morning - extent - time - the way of the people - the call).
The research community included (68) respondents, whereby the comprehensive inventory method was used to define the research community, and the researcher used
In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type: , and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.