Breast cancer is the most common malignancy in female and the most registered cause of women’s mortality worldwide. BI-RADS 4 breast lesions are associated with an exceptionally high rate of benign breast pathology and breast cancer, so BI-RADS 4 is subdivided into 4A, 4B and 4C to standardize the risk estimation of breast lesions. The aim of the study: to evaluate the correlation between BI-RADS 4 subdivisions 4A, 4B & 4C and the categories of reporting FNA cytology results. A case series study was conducted in the Oncology Teaching Hospital in Baghdad from September 2018 to September 2019. Included patients had suspicious breast findings and given BI-RADS 4 (4A, 4B, or 4C) in the radiological report accordingly. Fine needle aspiration was performed under the ultrasound guide and the results were classified into five categories. The biopsy was performed for suspicious, malignant or equivocal FNA findings. This study included 158 women with BI-RADS 4 breast lesions with the mean age of (44.6 years); There was a highly significant association between BI-RADS 4 breast lesion and FNA results (p<0.001); 51.9% of BI-RADS IV-C had C5 FNA results. There was a highly significant association between BI-RADS 4 lesion and the final diagnosis (p<0.001); 41.2% of BI-RADS 4 B had a malignant breast lesion, while 37.3% of BI-RADS 4 C had a malignant lesion. A clear relationship was observed between BI-RADS 4 subcategories and the fine needle aspiration cytology subgroups. BI-RADS 4-B is helpful in the discrimination between benign and malignant breast lesions; furthermore BI-RADS 4C has more acceptable validity in the diagnosis of breast malignancy. Therefore, BI-RADS subcategories are encouraged to be included and mentioned in the ultrasound report for more accurate estimation of the lesion nature.
With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show More3 BaTiO was prepared by mixing the components of 3 BaCO and 2 TiO by ratio [1:1] ، This paper is devoted to study the effect of radition on the electrical properties of 3 BaTiO . Some of prepared samples were exposed to fast neutrons   SMeV and   MeV14 . In addition ، Some samples were exposed to gamma – ray with dosage   Rad81.5 10  . The results showed that the exposition of some samples to fast neutrons   SMeV and   MeV14 lead to increase the electrical resistivity with the study of the effect of the addition of impurity on electrical resistivity . The addition of two compounds   2 3Yb O and   2 3Sm
... Show MoreIn this paper we proposed a new method for selecting a smoothing parameter in kernel estimator to estimate a nonparametric regression function in the presence of missing values. The proposed method is based on work on the golden ratio and Surah AL-E-Imran in the Qur'an. Simulation experiments were conducted to study a small sample behavior. The results proved the superiority the proposed on the competition method for selecting smoothing parameter.
Recently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical.
... Show MorePsychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the
... Show MoreObjective: To review and identify the major drivers for COVID-19 vaccine acceptance. Methods: A scoping review of studies of COVID-19 vaccine perceptions and barriers to using the COVID-19 vaccines. Two search engines, including PubMed and Google Scholar, were purposefully searched. Results: Eight studies from different countries were reviewed to categorize factors influencing people's acceptance of COVID-19 according to the Health Belief Model (HBM). Perceived susceptibility, and severity of the disease (COVID-19), in addition to perceived benefits of COVID-19 vaccination and "cues to action", can enhance vaccination acceptance. In contrast, perceived barriers to the COVID-19 vaccine can increase people's hesitancy to be vaccinated
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More