Breast cancer is one of the most important malignant diseases all over the world. The incidence of breast cancer is increasing around the world and it is still the leading cause of cancer mortality An Approximately 1.3 million new cases were diagnosed worldwide last year. With areas rising increasing, risk factors for breast cancer including obesity, early menarche, alcohol and smoking, environmental contamination and reduced or late birth rates become more prevalent. In Iraq, breast cancer ranks first among types of cancers diagnosed in women. This study was conducted on one hundred twenty women with breast cancer that was evaluated and investigated for the possible role of the risk factors on the development of breast cancer in females. The work had been conducted in Baghdad Medical City Hospital. Information on data includes woman's age of breast cancer, marital status, number of complete births, time of lactation, feminine education, menarche age, social activity of women, such as smoking, hormone treatment, and breast cancer history was collected by self-administered questionnaires. Data were collected and analyzed statistically. Differences were significant at (p˂0.05). It is concluded that there is a strong correlation between breast cancer and the risk factors among most of the parameters used. Keywords: Breast cancer, Investigation, marital status, lactation period Correspondence: Natherah Mohammad Ali AL- Nuaimee 1Department of Clinical Laboratory Science, College of Pharmacy, University of Baghdad, Iraq *Corresponding author: Natherah Mohammad Ali AL- Nuaimee emailaddress: [email protected]
Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s
... Show MoreThis study discusses the Critical Discourse Analysis of 2012 American Presidential Election Debate’. The researcher adopts a model proposed by Van Dijk’s (2006 d). Six ideological categories have been selected within the overall strategies of the ideological square are used. The categories are of three levels of discourse structure : (the meaning, the argumentation, and the rhetoric) .They have shown effective criteria for detecting the most disguised systems of racism and manipulation.
Based on the analysis, it can be concluded that the elite discourses of candidates contribute to the reproduction of domination, Orientalism, and Islamophobia. This can be appl
... Show MoreAn ecological model consisting of prey-predator system involving the prey’s fear is proposed and studied. It is assumed that the predator species consumed the prey according to prey square root type of functional response. The existence, uniqueness and boundedness of the solution are examined. All the possible equilibrium points are determined. The stability analysis of these points is investigated along with the persistence of the system. The local bifurcation analysis is carried out. Finally, this paper is ended with a numerical simulation to understand the global dynamics of the system.
Abstract: This article is a comparative analysis of the concept and types of homonyms in Russian and Arabic. Homonyms are lexical units that have the same sound but different meanings. The study of homonymy in different languages can help reveal the features of the semantic structure and syntactic rules of each language. The article discusses the main aspects of homonymy in Russian and Arabic, as well as a comparative analysis of the types of homonyms that exist in both languages. The study includes an analysis of the semantic meanings of homonyms, their use in context, and possible differences in syntactic features that may affect their interpretation and perception by native speakers of these languages. The purpose of the article is to id
... Show MoreAbstract Purpose of research: The purpose of the article is to conduct a comparative analysis of the concept and types of puns in the Russian and Arabic languages. The main focus is on identifying similarities and differences in the definition of a pun, as well as analyzing its various types in both languages. The purpose of the study is to understand how puns are used to achieve comic or semantic effect in different cultural contexts. Methods: The study includes an analysis of literature providing information about puns in Russian and Arabic. For comparative analysis, methods were used to compare concepts, definitions and types of puns in both languages. The phonetic, semantic and syntactic aspects of the pun are considered, and cultural f
... Show MorePurpose of research: The purpose of the article is to conduct a comparative analysis of the concept and types of puns in the Russian and Arabic languages. The main focus is on identifying similarities and differences in the definition of a pun, as well as analyzing its various types in both languages. The purpose of the study is to understand how puns are used to achieve comic or semantic effect in different cultural contexts.
Methods: The study includes an analysis of literature providing information about puns in Russian and Arabic. For comparative analysis, methods were used to compare concepts, definitions and types of puns in both languages. The phonetic, semantic and syntactic aspects of the pun are considered,
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreIn this paper we introduce the notions of bi-ideal with respect to an element r
denoted by (r-bi- ideal ) of a near ring , and the notion fuzzy bi- ideal with respect
to an element of a near ring and the relation between F-r-bi-ideal and r-bi-ideal of
the near ring, we studied the image and inverse image of r-bi- ideal under
epimomorphism ,the intersection of r-bi- ideals and the relation between this ideal
and the quasi ideal of a near ring, also we studied the notion intuitionistic fuzzy biideal
with respect to an element r of the near ring N, and give some theorem about
this ideal .
Background. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More