Preferred Language
Articles
/
iqjmc-281
Initiating opportunistic breast cancer screening program for asymptomatic self-referring women in Iraq
...Show More Authors

Background: Breast cancer is the most frequently diagnosed cancer in women worldwide and organized national mammographic screening has been adopted as gold standard for breast cancer early detection in most developed countries in the world.
Objectives: to evaluate and emphasize the performance of the initiative opportunistic breast cancer screening program in Iraq and to determine the incident malignancy rate of breast cancer among asymptomatic self-referring women aged 40 years or older via digital mammography by mean of the breast imaging reporting and data system (BI-RADS©).
Patients and methods: this retrospective study included a total of 809 asymptomatic self-referring women over age 40 years, mostly consisted of employees of the different Iraqi ministries who attended the national center of early detection of cancer in Medical City Complex at Baghdad for screening purpose during the period from September 2012- October 2013 by using digital mammography. Ultrasound examination performed as complementary study in particular cases and all cases are graded according BIRADS lexicon. BIRADS category 4 and 5 were followed by cytopathological analysis.
Results: 809 asymptomatic self-referring women were included in this initiative screening program for early detection of breast cancer at the main breast care referral center in Baghdad. The mean age at presentation was 49 years (range 40–76 years). The current study found that overall incident malignancy rate among total sample of the study was 1.11% whilst individual malignancy rate per BI-RADS category was 11.1% for BI-RADS 4 lesions and 80% for BI-RADS 5 lesions.
Conclusion: introduction of individual opportunistic screening program of breast cancer has led to a significant increase in early detection rate of breast cancer and enhance the health awareness for breast cancer screening among asymptomatic women.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Competitiveness of an enterprise under a flexible manufacturing system. Manufacturing strategy and flexibility - Case study
...Show More Authors

The research has designed for studying the relationship between manufacturing strategy and its flexibility under the flexible manufacturing system with their reflection on the competitive environmental performance of the firm. To interpret and tackle the problem, a hypothesis has formulated stating that “ the competitive performance of a firm is interpreted by the manufacturing strategy and flexibility which are derived from the firm and its business  strategies under the flexible manufacturing system”. Related literatures with their theoretical dissertations, which enhanced the thoughtful content, have analyzed. An illustrative case study on the flexible manufacturing system at Toyota Motors Corporation working at the g

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 06 2013
Journal Name
Journal Of Educational And Psychological Researches
رؤية وانموذج- مقترح للارشاد النفسي والتوجيه التربوي في ظل نظام ادارة الجودة الشاملة
...Show More Authors

The global challenges of contemporary facing societies urge to seek and move to adopt the style conscious in the face of these challenges and work on the investment of human resources and energies humanitarian efficient and effective for the development of the institutional and Management and make it more efficient and effective and meets the requirements and keep pace with global developments , and more aspects of managerial aim is Total Quality Management , as it has become thanks to the sheer amount and large accelerated technical developments and information and communication technologies , which feature of this era , and in the field of education , the charge of it are seeking through the application of total quality management to b

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 17 2024
Journal Name
Warith Scientific Journal
قياس وتحليل متطلبا (التخطيط والدعم) على وفق المواصفةIATF 16949: 2016 / دراسة حالة في الشركة العامة لصناعة السيارات والمعدات
...Show More Authors

The article is final after making all the modifications. 2,259 / 5,000 يهدف البحث إلى قياس وتحليل الفجوة بين الواقع الفعلي لبنود التخطيط والدعم وفق المواصفة (IATF16949:2016) في مصنع البطاريات أحد مصانع الشركة العامة لصناعة وتجهيز السيارات، وكذلك التعرف على نقاط القوة والضعف لبنود التخطيط والدعم وفق المواصفة محل البحث. ينطلق البحث من حاجة الشركة العامة لصناعة وتجهيز السيارات إلى إتباع المعايير العالمية في صناعة السيارات والمنتجات المرتبطة بها،

... Show More
Publication Date
Sat Nov 10 2018
Journal Name
Oriental Journal Of Chemistry
New Series of Substituted Heterocyclics Derived from α , β – Unsaturated Ketone and Their Cytotoxic Activity Tumor Cell Lines
...Show More Authors

The aldol condensation of 2-acetylnaphthalene with 9-anthracene carboxaldehyde afforded α, β-unsaturated keton (1) . New heterocyclic compounds containing: cyclohexenone[2], indazole[3], pyrimidinethion [4], thiazolo fused pyrimidine[5], isoxazoline[6], substituted pyrazoline[7]a-d and pyrimidinone[8] rings system were synthesized from α, β-unsaturated keton[1]. Cyclization of [1] with ethylacetoacetate gave the mentioned heterocycle cyclohexanone [2]. The cyclo condensation of [2] with hydrazine gave the new indazole derivative [3]. furthermore, the reation of [1]with thiourea gives thiopyrmidine derivative [4]. The cyclo condensation of [4] with chloroacetic acid gave the fused rings [5]. Then reacted compound[1] with hydroxy

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Oct 29 2007
Journal Name
رسالة ماجستير
دور نظام معلومات الموارد البشرية في تحقيق متطلبات تقويم اداء اعضاء الهيئة التدريسية : دراسة تطبيقية في كلية الادارة والاقتصاد - جامعة بغداد
...Show More Authors

هدفت هذه الدراسة إلى التعرف على دور نظام معلومات الموارد البشرية في تحقيق متطلبات عملية تقويم أداء أعضاء الهيئة التدريسية في كلية الإدارة والاقتصاد/جامعة بغداد. وقد تحددت مشكلة الدراسة في عدد من التساؤلات، أهمها: ما تأثير كل متغير من متغيرات نظام معلومات الموارد البشرية في عملية تقويم أداء أعضاء الهيئة التدريسية في الكلية المبحوثة؟ وما تأثير متغيرات نظام معلومات الموارد البشرية مجتمعة في عملية تقويم الأداء

... Show More
Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Analysing Iraqi Railways Network by Applying Specific Criteria Using the GIS Techniques
...Show More Authors

The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
تصميم نظام مقترح لتخصيص مهام العمل لمحطات العمل وباعتماد الطرق الاجتهادية دراسة حال في الشركة العامة للصناعات الكهربائية
...Show More Authors

This research work dealt with the problem of layout the production line of engine of fan roof at the General Company for Electrical Industries (GCEI). It was observed that the assembly line of engine was unstable and subject to severe fluctuations. In addition the execution of tasks at some stations was observed to be very fast while at other stations was slow. This phenomenon resulted into bottlenecks between workstations, idle time, and work in process. The system design was used to assign tasks to work stations according to different heuristics (Ranked Positional weight techniques, longest Task Time, Most following tasks, Shortest tasks time, Least number of following task).

The study revealed that th

... Show More
View Publication Preview PDF
Crossref