<p>Currently, breast cancer is one of the most common cancers and a main reason of women death worldwide particularly in<strong> </strong>developing countries such as Iraq. our work aims to predict the type of tumor whether benign or malignant through models that were built using logistic regression and neural networks and we hope it will help doctors in detecting the type of breast tumor. Four models were set using binary logistic regression and two different types of artificial neural networks namely multilayer perceptron MLP and radial basis function RBF. Evaluation of validated and trained models was done using several performance metrics like accuracy, sensitivity, specificity, and AUC (area under receiver operating characteristic ROC). Dataset was downloaded from UCI ml repository; it is composed of 9 attributes and 699 samples. The findings are clearly showing that the RBF NN classifier is the best in prediction of the type of breast tumors since it had recorded the highest performance in terms of correct classification rate (accuracy), sensitivity, specificity, and AUC (area under Receiver Operating Characteristic ROC) among all other models.</p>
Background: In young adults, multiple sclerosis is a prevalent chronic inflammatory demyelinating condition. It is characterized by white matter affection, but many individuals also have significant gray matter involvement. A double-inversion recovery pulse (DIR) pattern was recently proposed to improve the visibility of multiple sclerosis lesions. Objective: To find out how well a DIR sequence, FLAIR, and T2-weighted pulse sequences can find MS lesions in the supratentorial and infratentorial regions. Methods: A total of 37 patients with established diagnoses of multiple sclerosis were included in this cross-sectional study. Brain MRI was done using double inversion recovery, T2, and FLAIR sequences. The number of lesions was count
... Show MoreColorectal cancer (CRC) remains a leading cause of cancer-related deaths worldwide, with tumor angiogenesis playing a pivotal role in its progression and metastasis. CD144 (VE-cadherin), a calcium-dependent adhesion molecule, is critical for endothelial cell integrity and has been linked to tumor angiogenesis and cancer stem cell phenotypes. This study aimed to evaluate the immunohistochemical expression of CD144 in benign colorectal lesions, normal adjacent tumor tissue (NRAT), and tumor tissues to elucidate its role in colorectal cancer progression. Multiple techniques, including immunohistochemistry, flow cytometry, Western blot, and qPCR, were used to assess CD144 expression and its association with the VEGF/VEGFR2 signaling pat
... Show MoreIn this study, we set up and analyze a cancer growth model that integrates a chemotherapy drug with the impact of vitamins in boosting and strengthening the immune system. The aim of this study is to determine the minimal amount of treatment required to eliminate cancer, which will help to reduce harm to patients. It is assumed that vitamins come from organic foods and beverages. The chemotherapy drug is added to delay and eliminate tumor cell growth and division. To that end, we suggest the tumor-immune model, composed of the interaction of tumor and immune cells, which is composed of two ordinary differential equations. The model’s fundamental mathematical properties, such as positivity, boundedness, and equilibrium existence, are exami
... Show MoreObjective: To evaluate knowledge towards smoking and its relationship with lung cancer among members of
Baghdad Nursing College.
Methodology: The study comprised 100 affiliates from the College of Nursing/ University of Baghdad that
included students, teaching staff and employees. All data was collected through a structured questionnaire
prepared by the National Cancer Research Center which were answered during a scientific symposium
organized by the center on lung Cancer Awareness in March 2016.The data were analyzed by using the SPSS,
version 22
Results: The age of the respondents ranged from (19-64 years); 76% were females and only 4% were smokers.
The results showed that the mean score for the level of knowled
This paper presents a comparison study on thermal performance conic cut twist tape inserts in laminar flow of nanofluids through a constant heat fluxed tube. Three tape configurations, namely, quadrant cut twisted tape (QCT), parabolic half cut twisted tape (PCT), and triangular cut twisted (VCT) of twist ratio= 2.93 and cut depth= 0.5 cm were used with 1% and 2% volume concentration of SiO2/water and TiO
... Show MoreAbstract A descriptive study to assess the quality of life (QOL) for patients with colorectal cancer. The study was conducted from Baghdad Teaching Hospital, Al-Yarmouk Teaching Hospital and Radiation Hospital and Nuclear medicine for the period from 1st July/2004 to 1st September/2004. The sample selected by purposive random of (50) patients diagnosed with colorectal cancer and all of them who were under chemotherapy treatment. A questionnaire was prepared for the purpose of the study and comprised of three parts including: 1- Socio-demographical characteristics. 2- Clinical characteristics. 3- and QOL
<span lang="EN-GB">Transmitting the highest capacity throughput over the longest possible distance without any regeneration stage is an important goal of any long-haul optical network system. Accordingly, Polarization-Multiplexed Quadrature Phase-Shift-Keying (PM-QPSK) was introduced lately to achieve high bit-rate with relatively high spectral efficiency. Unfortunately, the required broad bandwidth of PM-QPSK increases the linear and nonlinear impairments in the physical layer of the optical fiber network. Increased attention has been spent to compensate for these impairments in the last years. In this paper, Single Mode Fiber (SMF), single channel, PM-QPSK transceiver was simulated, with a mix of optical and electrical (Digi
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More