Background: - Recurrent breast cancer is cancer that comes back following initial treatment. Risk factors of recurrence are lymph node involvement, larger tumor size, positive or close tumor margins, and lack of radiation treatment following lumpectomy, younger age and inflammatory breast cancer.
Objective: Asses the rate of recurrence for early breast cancer in Iraqi female patients, in relation to certain risk factors.
Patients and methods: A prospective study was conducted on 100 consecutive female patients, with stage I and stage II breast cancer treated by mastectomy and axillary dissection by the same team. Patients were assessed postoperatively every three months and recurrences were detected by physical examination and ultrasound of the bed of mastectomy and axilla. Statistical correlation using univariant analysis between recurrence rate and certain associated variables was done.
Results: Recurrence rate was found to be 13%. It was more common among both young (20-29) years &the (40 – 49 ) years age groups which was 16.7%. Most of recurrences (61.6%) occurred (within 12_19 months) after surgical treatment. Statistically significant associations were found between recurrence and the latency period between first complaint and surgical management, the grade of the tumor, the size of primary tumor, and the number of lymph nodes involved. There was no statistically significant association between the type of adjuvant therapy and the incidence of local recurrence.
Conclusions: the rate of recurrence after modified radical mastectomy is relatively high in our study. The same known risk factors related to the stage, grade and delay of treatment were detected, and close follow up especially at the first 20 months after surgery is recommended.
The influence of bias current on the bandwidth of chaotic signals in semiconductor lasers by optical feedback has been studied experimentally and numerically. The measured data reveal that the bandwidth increase when the system becomes chaotic and this chaotic signal has a broadband spectrum so it can be used as a carrier for the quantum key. Mixing chaotic signal and quantum key make a very small change in chaotic bandwidth that does not affect the security of data transmitted.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this work, copper substituted cobalt ferrite nanoparticles with
chemical formula Co1-xCuxFe2O4 (x=0, 0.3, and 0.7), has been
synthesized via hydrothermal preparation method. The structure of
the prepared materials was characterized by X-ray diffraction (XRD).
The (XRD) patterns showed single phase spinel ferrite structure.
Average crystallite size (D), lattice constant (a), and crystal density
(dx) have been calculated from the most intense peak (311).
Comparative standardization also performed using smaller average
particle size (D) on the XRD patterns of as-prepared ferrite samples
in order to select most convenient hydrothermal synthesis conditions
to get ferrite materials with smallest average particl
In this work, the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt
... Show MoreThis work involved the successful synthesis of three new Schiff base complexes, including Ni(II), Mn(II), and Cu(II) complexes. The Schiff base ligand was created by reacting the malonyldihydrazide molecule with naphthaldehyde, and the final step involved reacting the ligand with the corresponding metallic chloride yielding pure target complexes. FTIR, 1 H NMR, 13 C NMR, mass, and UV/Vis spectroscopies were used to comprehensively characterize the produced complexes. These substances have been employed in this study to photo-stabilize polystyrene (PS) and lessen the photo-degradation of its polymeric chains. Several methods, including FTIR, weight loss, viscosity average molecular weight, light and atomic force microscopy, and energy disper
... Show MoreIt is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi
... Show More