Preferred Language
Articles
/
injns-196
Promoting Clinical Breast Examination as A screening Tool for Breast Cancer in Iraq
...Show More Authors

Breast cancer constitutes about one fourth of the registered cancer cases among the Iraqi population (1)
and it is the leading cause of death among Iraqi women (2)
. Each year more women are exposed to the vicious
ramifications of this disease which include death if left unmanaged or the negative sequels that they would
experience, cosmetically and psychologically, after exposure to radical mastectomy.
The World Health Organization (WHO) documented that early detection and screening, when coped
with adequate therapy, could offer a reduction in breast cancer mortality; displaying that the low survival rates
in less developed countries, including Iraq, is mainly attributed to the lack of early detection programs coupled
with inadequate diagnostic and treatment facilities (3)
. Although mammography machines, as main screening
tools for breast cancer, are available in the major hospitals in each province in Iraq, yet those are mainly used
for diagnostic purposes in patients who present with palpable breast lumps. Obviously, due to cost effective
measures, lack of resources and the economical challenges that Iraq is facing, it is not expected that the
authorities could provide mammography devices across every health care centre in the country to be used for
screening of all Iraqi women.
Accordingly, promoting other feasible tools could support in solving that dilemma. Clinical Breast
Examination (CBE) for women, by highly trained health care providers in Primary Health Care Centers, along
with diagnostic mammography in the major hospitals for referred cases, could offer cost effective approaches
for early detection of breast cancer in Iraq. The resources required to provide these services are within the
reach of all countries with limited resources
(4)
.
The issue of raising awareness on breast cancer and its early detection measures needs to be addressed.
Observations reported in Iraqi studies obviously reflect the the limited knowledge of the general population
about the disease, its preventive measures and their ignorance regarding the significance of CBE and early
medical consultation (5, 6)
. Public health awareness campaigns should be endorsed by policy makers to encourage every Iraqi women to look for abnormal signs and symptoms in their breasts and to seek medical
advice promptly.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Sep 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Study the Characteristic Performance of Trickling Filter for Pharmaceutical Waste Treatment
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Purification and activation of the Iraqi bentonite for edible oil Production
...Show More Authors
Abstract<p>Samples of Iraqi bentonitic sediments, representing local montmorillonite brought from Traifawi region near the Syrian border. Mineralogical the samples were characterized as low grade of Ca-smectite, particle size, chemical analysis, XRD, and BET surface area analyses of the samples were carried out to examine the structure of bentonite before and after acid activation. The goal is to prepare a bleaching earth for edible oil production. Iraqi Bentonite was beneficiated and activated by series of physical and chemical steps, using 4N & 6N concentration of hydrochloric acid and at a temperature of 70-80 ° C. Surface area and pore volume of the samples were determined to assess the bleaching power</p> ... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Analytical solutions via coupled Elzaki adomian decomposition method for some applications
...Show More Authors

An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has

... Show More
Scopus (4)
Scopus
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
The study of thermal description for non-thermal plasma needle system
...Show More Authors

Cold plasma is a relatively low temperature gas, so this feature enables us to use cold plasma to treat thermally sensitive materials including polymers and biologic tissues. In this research, the non-thermal plasma system is designed with diameter (3 mm, 10 mm) Argon at atmospheric pressure as well as to be suitable for use in medical and biotechnological applications.
The thermal description of this system was studied and we observed the effect of the diameter of the plasma needle on the plasma, when the plasma needle slot is increased the plasma temperature decrease, as well as the effect of the voltages applied to the temperature of the plasma, where the temperature increasing with increasing the applied voltage . Results showed t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Thu Dec 01 2016
Journal Name
International Journal Of Vlsi Design & Communication Systems (vlsics)
SIMULTANEOUS OPTIMIZATION OF STANDBY AND ACTIVE ENERGY FOR SUB THRESHOLD CIRCUITS
...Show More Authors

Increased downscaling of CMOS circuits with respect to feature size and threshold voltage has a result of dramatically increasing in leakage current. So, leakage power reduction is an important design issue for active and standby modes as long as the technology scaling increased. In this paper, a simultaneous active and standby energy optimization methodology is proposed for 22 nm sub-threshold CMOS circuits. In the first phase, we investigate the dual threshold voltage design for active energy per cycle minimization. A slack based genetic algorithm is proposed to find the optimal reverse body bias assignment to set of noncritical paths gates to ensure low active energy per cycle with the maximum allowable frequency at the optimal supply vo

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
African Journal Of Hospitality, Tourism And Leisure
Social responsibility for tourism companies and its reflection on strategic reputation
...Show More Authors

Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study to modify the fat cow's milk for children and infants
...Show More Authors

This study Ajert to modify the chemical composition of milk fat cows and make it similar to the installation of milk fat mother through the addition of protein and soybean oil to be given Alkhltatnsp sensory protein that the best plan is the ratio of 1:1

View Publication Preview PDF