Docetaxel is an effective treatment approved for many types of cancers, but its effectiveness in clinical practice can be compromised by significant occurrence of adverse drug reactions. The aim of the current study was to measure the distribution of adverse drug reactions of docetaxel reported in Iraq and to assess the causality, severity, seriousness, preventability, expectedness and outcome of these adverse reactions. A retrospective study conducted on individual case safety reports from the Iraqi Pharmacovigilance Center / Ministry of Health. The study included 118 individual case safety report containing 236 adverse drug reactions.Most of the adverse drug reactions were related to skin and subcutaneous tissue disorders(26.7%), followed by respiratory, thoracic and mediastinal disorders (20.8%), gastrointestinal disorders (17.4%) and general disorders and administration site conditions (10.6%). The majority of these reactions with possible causality (68.6%), moderate severity (75.4%), expected (80.5%), possibly preventable (93.2%), and serious (80.5%). In addition the most common outcome of adverse drug reactions was recovered / resolved (46.19%).
Background: Knowledge about the prevalence and distribution of pathologies in a particular location is important when a differential diagnosis is being formulated. The aim of this study was to describe the prevalence and the clinicopathological features of odontogenic cysts and tumors affecting the maxilla and to discuss the unusual presentation of those lesions within maxillary sinus.
Materials and Methods: A multicenter retrospective analysis was performed on pathology archives of patients who were diagnosed with maxillary odontogenic cysts and tumors from 2010 to 2020. Data were collected with respect to age, gender and location.
Result: A total of 384 cases was identified, 320 (83.3%) cases were diagnosed as odontogenic
... Show MoreSentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreThe provided research paper offers a thorough analysis of the semiotic analysis present in tobacco-free initiative advertisements from the year 2021. The study delves into the intricate process of decoding the diverse signs, symbols, and visual components integrated into these anti-smoking campaigns. The core aim of this investigation is to comprehend and explore the semiotic tactics that underlie these advertisements, with a particular emphasis on visual communication as a pivotal tool in shaping the public's attitudes and behaviors towards tobacco usage. The research introduces a significant theoretical framework, the "Taxonomy of Image-Text Relations and Functions" theory, as proposed by Emily E. Marsh and Marilyn Dom
... Show MoreLanguage plays a major role in all aspects of life. Communication is regarded as the most important of these aspects, as language is used on a daily basis by humanity either in written or spoken forms. Language is also regarded as the main factor of exchanging peoples’ cultures and traditions and in handing down these attributes from generation to generation. Thus, language is a fundamental element in identifying peoples’ ideologies and traditions in the past and the present. Despite these facts, the feminist linguists have objections to some of the language structures, demonstrating that language is gender biased to men. That is, language promotes patriarchal values. This pushed towards developing extensive studies to substantiate s
... Show MoreThe researchers wanted to make a new azo imidazole as a follow-up to their previous work. The ligand 4-[(2-Amino-4-phenylazo)-methyl]-cyclohexane carboxylic acid as a derivative of trans-4-(aminomethyl) cyclohexane carboxylic acid diazonium salt, and synthesis a series of its chelate complexes with metalions, characterized these compounds using a variety technique, including elemental analysis, FTIR, LC-Mass, 1H-NMRand UV-Vis spectral process as well TGA, conductivity and magnetic quantifications. Analytical data showed that the Co (II) complex out to 1:1 metal-ligand ratio with square planner and tetrahedral geometry, respectively while 1:2 metal-ligand ratio in the Cu(II), Cr(III), Mn(II), Zn(II), Ru(III)and Rh(III)complexes
... Show MoreThe present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More