Background: Breast cancer is the most common cancer in Iraq and the United Kingdom. While the disease is frequently diagnosed among middleaged Iraqi women at advanced stages accounting for the second cause of cancer-related deaths, breast cancer often affects elderly British women yielding the highest survival of all registered malignancies in the UK. Objective: To compare the clinical and pathological profiles of breast cancer among Iraqi and British women; correlating age at diagnosis with the tumor characteristics, receptor-defined biomarkers and phenotype patterns. Methods: This comparative retrospective study included the clinical and pathological characteristics of (1,940) consecutive female patients who were diagnosed with invasive breast cancer from 2014 to 2016 in Iraq (Medical City Teaching Hospital, Baghdad: 635 cases) and UK (John Radcliffe, Oxford and Queen's, BHR University Hospitals: 1,305 cases). The studied parameters in both groups comprised the age of the patient at the time of diagnosis, breast cancer histologic type, grade, tumor size, lymph node status, clinical stage at presentation, Estrogen Receptor (ER), Progesterone Receptor (PR) and HER2 positive tumor contents and the receptor defined breast cancer surrogate subtypes. Results: The Iraqi patients were significantly younger than their British counterparts and exhibited higher trend to present at advanced stages; reflected by larger size tumors and frequent lymph node involvement compared to the British (p<0.00001). They also had worse receptor-defined breast cancer subtypes manifested by higher rates of hormone receptor (ER/PR) negative, HER2 positive tumor contents, Triple Positive and Triple Negative phenotypes (p<0.00001). Excluding HER2 status, the significant differences in the clinical and tumor characteristics between the two populations persisted after adjusting for age among patients younger than 50 years. Conclusion: The remarkable differences in the clinical and tumor characteristics of breast cancer between the Iraqi and British patients suggest heterogeneity in the underlying biology of the tumor which is exacerbated in Iraq by the dilemma of delayed diagnosis. The significant ethnic disparities in breast cancer profiles recommend the prompt strengthening of the national cancer control plan in Iraq as a principal approach to the management of the disease.
The notion of a Tˉ-pure sub-act and so Tˉ-pure sub-act relative to sub-act are introduced. Some properties of these concepts have been studied.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreVol. 6, Issue 1 (2025)