Preferred Language
Articles
/
HYb4GYUBIXToZYALWFU0
Assessing the Period between Diagnosis of Breast Cancer and Surgical Treatment among Mastectomized Female Patients in Iraq
...Show More Authors

Introduction: Breast cancer is the most common cancer and the major cause of cancer related deaths among Iraqi women. Due to the relatively late detection of breast cancer, the majority of the patients are still treated by modified radicle mastectomy. Aim: To assess the time lag between diagnosis of breast cancer and mastectomy among Iraqi patients; correlating the findings with other clinicopathological characteristics of the disease. Patients and methods: This retrospective study enrolled 226 Iraqi female patients who were diagnosed with breast cancer. Data were registered on the exact time period between signing the histopathological report and the surgical treatment. Other recorded variables included the age of the patients, their level of education, number of parity, age at first child birth, family history and the stage at breast cancer presentation. Results: In general, 51% of the patients were under the age of 50 years, 93.8% were married, 10.6% were illiterate, only 1.8% were nulliparous while positive family history of cancer was noted in 25.6%. Overall 67.7%, 87.6%, and 92% underwent mastectomy during the first month, two months and three months after diagnosis respectively. Only 3.1% were operated upon after one year. With the exception of the age at first childbirth, there was no significant correlation between the waiting times to surgery and the patients’ age, education, number of parity, family history and the stage at breast cancer detection. Conclusions: The percentage of the patients who had surgical treatment during the first month following diagnosis seems rather satisfactory when compared to the corresponding findings reported in similar surveys from developing and some developed countries. Strengthening public education and adopting multimodality evidenced-based management protocols are crucial steps to control the waiting times among those who have delayed mastectomies.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Study and Analysis the Mathematical Operations of Fuzzy Logic
...Show More Authors

The last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.

View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
On The Convergence Speediness of K * and D-Iterations
...Show More Authors
Abstract<p>In this article, we introduced a new concept of mappings called δZA - Quasi contractive mapping and we study the K*- iteration process for approximation of fixed points, and we proved that this iteration process is faster than the existing leading iteration processes like Noor iteration process, CR -iteration process, SP and Karahan Two- step iteration process for 𝛿𝒵𝒜 − quasi contraction mappings. We supported our analytic proof by a numerical example.</p>
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Inheritance of Women: Stolen Money and Refunded Rights
...Show More Authors

Praise be to Allaah Mahmoud every tongue, the idol of all time, which is not without
his knowledge everywhere, not occupied like for like, most of all likes and peer, and picnic
for wife and children, and carried out his reign in all the subjects, neither representative by the
brains to think, nor fancy hearts photography, (is not nothing like Him, He is the All-Seer),
and prayer and peace be upon the Messengers Muhammad and his family and companions
and followed them in truth until the Day of Judgment.
After…..
Has spoken in this search for The inheritance of women before and after Islam
legislative provisions which, because of its importance to show the right of women's rights,
which began Msluba before Isl

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Asymmetry of accounting information - the reasons and proposed treatments
...Show More Authors

The research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So,  the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire   in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs ​​in the laws and regula

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
Fiscal federalism: a study of the concept and models
...Show More Authors

يمثل الأخذ بالنظام الفيدرالي أطاراً تنظيمياً لشكل الدولة و مرحلة تحول مهمة في بنية الدولة العامة في مختلف مجالاتها، فالانتقال من المركزية في أدارة الشؤون العامة للدولة الى النمط الفيدرالي يمثل تحولا بنيوياً وسيكولوجياً ،حيث يكون هنالك توزيع مكاني - عمودي للسلطة والثروة بين الوحدات المكونة للدولة بشكل يختلف كليا عن الحالة المركزية، ونجد صور تنظيمية عديدة تتأسس ضمن اطار الفيدرالية العام ،

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
The Impact of Educational Techniques in Developing Teaching Skills of Apprentice Students in the Faculty of Fine Arts - Diyala University: عمر قاسم علي - رجاء حميد رشيد
...Show More Authors

For the purpose of achieving the desired goal of the educational learning process, it was necessary to devote attention to educational means and employ them in this field because of their great role in overcoming the difficulties facing the learning process and providing an educational environment that keeps abreast of the scientific developments. This is the goal of the research in which the researchers wanted to know the effect of the educational techniques in the development of apprentice students' skills in teaching.
The research consisted of the problem of the research which is: what is the impact of educational techniques on developing the apprentice students' teaching skills in the Faculty of Fine Arts? In addition to its imp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2013
Journal Name
Journal Of Drugs In Dermatology (jdd)
The Therapeutic Role of Isotretinoin in the Management of Behçet&#039;s Disease: A Single-Blinded, Controlled Therapeutic Study - JDDonline - Journal of Drugs in Dermatology
...Show More Authors

AbstractOBJECTIVES: To evaluate the long-term remission efficacy and safety of isotretinoin in the treatment of Behcet's disease (BD). PATIENTS and METHODS: This single-blind, controlled therapeutic study was conducted in the Department of Dermatology and Venereology at Baghdad Teaching Hospital from February 2011 to January 2012. Thirty patients with BD were included in this work. Each patient received isotretinoin 20 mg orally once daily for 3 months. They were assessed at week 2 and then monthly depending on the Clinical Manifestation Index (CMI) and to record any side effects. At week 12, isotretinoin was stopped and patients were given placebo therapy in a form of glucose capsules for another 3 months. RESULTS: Thirty patients were tre

... Show More
View Publication
Publication Date
Tue Jul 01 2025
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte, Issn 1886-8576, Vol. 17, Nº. 4, 2022, Págs. 183-190
Psychological Empowerment and its Relationship to Organizational Citizenship Behavior for Workers in the Olympic Committee Sports Federations
...Show More Authors

Autorías: Suhair Meteab Munaf, Ali Abdulateef Ali, Mohannad Salman Dawood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 4, 2022. Artículo de Revista en Dialnet.

View Publication
Scopus
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF