Background: Breast cancer is the most common cancer in Iraq and the United Kingdom. While the disease is frequently diagnosed among middleaged Iraqi women at advanced stages accounting for the second cause of cancer-related deaths, breast cancer often affects elderly British women yielding the highest survival of all registered malignancies in the UK. Objective: To compare the clinical and pathological profiles of breast cancer among Iraqi and British women; correlating age at diagnosis with the tumor characteristics, receptor-defined biomarkers and phenotype patterns. Methods: This comparative retrospective study included the clinical and pathological characteristics of (1,940) consecutive female patients who were diagnosed with invasive breast cancer from 2014 to 2016 in Iraq (Medical City Teaching Hospital, Baghdad: 635 cases) and UK (John Radcliffe, Oxford and Queen's, BHR University Hospitals: 1,305 cases). The studied parameters in both groups comprised the age of the patient at the time of diagnosis, breast cancer histologic type, grade, tumor size, lymph node status, clinical stage at presentation, Estrogen Receptor (ER), Progesterone Receptor (PR) and HER2 positive tumor contents and the receptor defined breast cancer surrogate subtypes. Results: The Iraqi patients were significantly younger than their British counterparts and exhibited higher trend to present at advanced stages; reflected by larger size tumors and frequent lymph node involvement compared to the British (p<0.00001). They also had worse receptor-defined breast cancer subtypes manifested by higher rates of hormone receptor (ER/PR) negative, HER2 positive tumor contents, Triple Positive and Triple Negative phenotypes (p<0.00001). Excluding HER2 status, the significant differences in the clinical and tumor characteristics between the two populations persisted after adjusting for age among patients younger than 50 years. Conclusion: The remarkable differences in the clinical and tumor characteristics of breast cancer between the Iraqi and British patients suggest heterogeneity in the underlying biology of the tumor which is exacerbated in Iraq by the dilemma of delayed diagnosis. The significant ethnic disparities in breast cancer profiles recommend the prompt strengthening of the national cancer control plan in Iraq as a principal approach to the management of the disease.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreIn this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show More