Background: Breast cancer is the most common cancer in Iraq and the United Kingdom. While the disease is frequently diagnosed among middleaged Iraqi women at advanced stages accounting for the second cause of cancer-related deaths, breast cancer often affects elderly British women yielding the highest survival of all registered malignancies in the UK. Objective: To compare the clinical and pathological profiles of breast cancer among Iraqi and British women; correlating age at diagnosis with the tumor characteristics, receptor-defined biomarkers and phenotype patterns. Methods: This comparative retrospective study included the clinical and pathological characteristics of (1,940) consecutive female patients who were diagnosed with invasive breast cancer from 2014 to 2016 in Iraq (Medical City Teaching Hospital, Baghdad: 635 cases) and UK (John Radcliffe, Oxford and Queen's, BHR University Hospitals: 1,305 cases). The studied parameters in both groups comprised the age of the patient at the time of diagnosis, breast cancer histologic type, grade, tumor size, lymph node status, clinical stage at presentation, Estrogen Receptor (ER), Progesterone Receptor (PR) and HER2 positive tumor contents and the receptor defined breast cancer surrogate subtypes. Results: The Iraqi patients were significantly younger than their British counterparts and exhibited higher trend to present at advanced stages; reflected by larger size tumors and frequent lymph node involvement compared to the British (p<0.00001). They also had worse receptor-defined breast cancer subtypes manifested by higher rates of hormone receptor (ER/PR) negative, HER2 positive tumor contents, Triple Positive and Triple Negative phenotypes (p<0.00001). Excluding HER2 status, the significant differences in the clinical and tumor characteristics between the two populations persisted after adjusting for age among patients younger than 50 years. Conclusion: The remarkable differences in the clinical and tumor characteristics of breast cancer between the Iraqi and British patients suggest heterogeneity in the underlying biology of the tumor which is exacerbated in Iraq by the dilemma of delayed diagnosis. The significant ethnic disparities in breast cancer profiles recommend the prompt strengthening of the national cancer control plan in Iraq as a principal approach to the management of the disease.
In this study, simply supported reinforced concrete (RC) beams were analyzed using the Extended Finite Element Method (XFEM). This is a powerful method that is used for the treatment of discontinuities resulting from the fracture process and crack propagation in concrete. The mesoscale is used in modeling concrete as a two-phasic material of coarse aggregate and cement mortar. Air voids in the cement paste will also be modeled. The coarse aggregate used in the casting of these beams is a rounded aggregate consisting of different maximum sizes. The maximum size is 25 mm in the first model, and in the second model, the maximum size is 20 mm. The compressive strength used in these beams is equal to 26 MPa.
The subje
... Show MoreBackground: Red clover oil (Trifolium pratense) has isoflavones bunches which have estrogen-like exercises and may establish an option in contrast to hormone substitution treatment. The present study investigated the impact of Red clover oil on bone healing in rats by histomorphometric study. Materials and Methods: Intra bony defect was performed in right femur of thirty six healthy male albino rats. Then these rats were randomly divided into three groups (12 rats each): one control and 2 experimental groups. For control, the bony defect was left for normal healing; for the experimental (S) group, the defect was treated with hemostatic absorbable gelatin sponge; and for experimental (RS) group, the bony defect was treated with 0.2 ml red
... Show Moreالمستودع الرقمي العراقي. مركز المعلومات الرقمية التابع لمكتبة العتبة العباسية المقدسة
This study includes the preparation of the ferrite nanoparticles CuxCe0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) using the sol-gel (auto combustion) method, and citric acid was used as a fuel for combustion. The results of the tests conducted by X-ray diffraction (XRD), emitting-field scanning electron microscopy (FE-SEM), energy-dispersive X-ray analyzer (EDX), and Vibration Sample Magnetic Device (VSM) showed that the compound has a face-centered cubic structure, and the lattice constant is increased with increasing Cu ion. On the other hand, the compound has apparent porosity and spherical particles, and t
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAbstract
All central air conditioning systems contain piping system with various components, sizes, material, and layouts. If such systems in operating mode, the flow in piping system and its component such as valves can produce severe vibration due to some flow phenomenon’s. In this research, experimental measurements and numerical simulation are used to study the flow-induced vibration in valves. Computational fluid dynamics (CFD) concepts are included with one-way and two-way fluid-structure interaction concepts by using finite element software Package (ANSYS 14.57). Detection analysis is performed on flow characteristics under operation conditions and relations with structural vibration. Most of
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called