Background: Breast cancer is the most common cancer in Iraq and the United Kingdom. While the disease is frequently diagnosed among middleaged Iraqi women at advanced stages accounting for the second cause of cancer-related deaths, breast cancer often affects elderly British women yielding the highest survival of all registered malignancies in the UK. Objective: To compare the clinical and pathological profiles of breast cancer among Iraqi and British women; correlating age at diagnosis with the tumor characteristics, receptor-defined biomarkers and phenotype patterns. Methods: This comparative retrospective study included the clinical and pathological characteristics of (1,940) consecutive female patients who were diagnosed with invasive breast cancer from 2014 to 2016 in Iraq (Medical City Teaching Hospital, Baghdad: 635 cases) and UK (John Radcliffe, Oxford and Queen's, BHR University Hospitals: 1,305 cases). The studied parameters in both groups comprised the age of the patient at the time of diagnosis, breast cancer histologic type, grade, tumor size, lymph node status, clinical stage at presentation, Estrogen Receptor (ER), Progesterone Receptor (PR) and HER2 positive tumor contents and the receptor defined breast cancer surrogate subtypes. Results: The Iraqi patients were significantly younger than their British counterparts and exhibited higher trend to present at advanced stages; reflected by larger size tumors and frequent lymph node involvement compared to the British (p<0.00001). They also had worse receptor-defined breast cancer subtypes manifested by higher rates of hormone receptor (ER/PR) negative, HER2 positive tumor contents, Triple Positive and Triple Negative phenotypes (p<0.00001). Excluding HER2 status, the significant differences in the clinical and tumor characteristics between the two populations persisted after adjusting for age among patients younger than 50 years. Conclusion: The remarkable differences in the clinical and tumor characteristics of breast cancer between the Iraqi and British patients suggest heterogeneity in the underlying biology of the tumor which is exacerbated in Iraq by the dilemma of delayed diagnosis. The significant ethnic disparities in breast cancer profiles recommend the prompt strengthening of the national cancer control plan in Iraq as a principal approach to the management of the disease.
Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreThe objective of this in vivo study is to investigate the effects of 337.1 nm pulsed N2 laser on cellular immune response represented by lymphocyte transformation capacity and phagocytosis activity in laboratory animals. The samples include 60 adult male BALB/c mice, were divided into control group and experimental groups. The experimental groups were divided into two main groups according to the time period after N2 laser irradiation. Each group was divided into 9 subgroups which exposed to N2 laser radiation at different values of pulse repetition rates and exposure times. The results of immunological tests demonstrated that the exposure to 180 J/cm2 of N2 laser radiation induce adverse effect to cellular immune response. The results o
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThis thesis was aimed to study gas hydrates in terms of their equilibrium conditions in bulk and their effects on sedimentary rocks. The hydrate equilibrium measurements for different gas mixtures containing CH4, CO2 and N2 were determined experimentally using the PVT sapphire cell equipment. We imaged CO2 hydrate distribution in sandstone, and investigated the hydrate morphology and cluster characteristics via μCT. Moreover, the effect of hydrate formation on the P-wave velocities of sandstone was investigated experimentally.
This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MoreIn recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigate
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreSustainable vegetative management plays a significant role in improving soil quality in degraded agricultural landscapes by enhancing soil microbial biomass. This study investigated the effects of grass buffers (GBs), biomass crops (BCs), grass waterways (GWWs), and agroforestry buffers (ABs) on soil microbial biomass and soil organic C (SOC) compared with continuous corn (
Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show More