Preferred Language
Articles
/
iqjmc-717
Recurrent Breast Cancer Following Modified Radical Mastectomy and Risk Factors
...Show More Authors

Background: - Recurrent breast cancer is cancer that comes back following initial treatment. Risk factors of recurrence are lymph node involvement, larger tumor size, positive or close tumor margins, and lack of radiation treatment following lumpectomy, younger age and inflammatory breast cancer.
Objective: Asses the rate of recurrence for early breast cancer in Iraqi female patients, in relation to certain risk factors.
Patients and methods: A prospective study was conducted on 100 consecutive female patients, with stage I and stage II breast cancer treated by mastectomy and axillary dissection by the same team. Patients were assessed postoperatively every three months and recurrences were detected by physical examination and ultrasound of the bed of mastectomy and axilla. Statistical correlation using univariant analysis between recurrence rate and certain associated variables was done.
Results: Recurrence rate was found to be 13%. It was more common among both young (20-29) years &the (40 – 49 ) years age groups which was 16.7%. Most of recurrences (61.6%) occurred (within 12_19 months) after surgical treatment. Statistically significant associations were found between recurrence and the latency period between first complaint and surgical management, the grade of the tumor, the size of primary tumor, and the number of lymph nodes involved. There was no statistically significant association between the type of adjuvant therapy and the incidence of local recurrence.
Conclusions: the rate of recurrence after modified radical mastectomy is relatively high in our study. The same known risk factors related to the stage, grade and delay of treatment were detected, and close follow up especially at the first 20 months after surgery is recommended.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Collection, Storage and Protein Extraction Method of Gingival Crevicular Fluid for Proteomic Analysis
...Show More Authors

Gingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Sep 26 2013
Journal Name
Astronomy & Astrophysics
High-resolution observations of SDSS J080800.99+483807.7 in the optical and radio domains
...Show More Authors

View Publication
Scopus (13)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Conference Of Numerical Analysis And Applied Mathematics Icnaam 2019
Investigate of TiO2 and SnO2 as electron transport layer for perovskite solar cells
...Show More Authors

View Publication
Scopus (15)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Explainable Artificial Intelligence In The Digital Sustainability Administration
Harnessing Technological Innovation and Artificial Intelligence in Iraqi Commercial Banks to Achieve Sustainability
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Jun 09 2021
Journal Name
Design Engineering
The Impact of Transforming the Educational System in Iraq from 6-3-3 to 4-4-4 on Educational Planning Standards and the Deficiency of School Buildings (Primary and Secondary Education)
...Show More Authors

        Educational services in Iraq face many problems that have reduced the efficiency of the educational process, as a result of the difficult conditions experienced by educational services in Iraq. This led to the accumulation of these problems and their exacerbation significantly over the years, as there was no fundamental solution to these problems. The study proposes a planning method for managing the educational system in Iraq, especially for the primary and secondary levels, where these negative phenomena are very prominent, especially the deficit in school buildings and the phenomenon of overcrowding in classrooms.      &am

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 11 2025
Journal Name
Sciences Journal Of Physical Education
Using two types of electronic questions by applying the Quiz Creator program in the method of guided discovery and its effect on learning and maintaining a motor chain on the throat
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Oct 02 2024
Journal Name
International Development Planning Review
A COMPARATIVE STUDY OF THE AMOUNT OF FORCE EXERTED ON THE GROUND AND THE TIME OF PROPULSION IN THE VERTICAL AND HORIZONTAL JUMPING TESTS FROM STABILITY USING A FOOT SCAN DEVICE
...Show More Authors

Publication Date
Fri Jan 15 2021
Journal Name
Plant Archives
STUDY OF THE EFFECT OF SPEED, DEPTH OF THE CULTIVATION AND THE NUMBER OF TIMES THE SPRING – LOADED CULTIVATOR PASSES ON SOME TECHNICAL PARAMETERS OF THE CULTIVATOR AND ON WEED CONTRO
...Show More Authors

View Publication
Crossref (1)
Crossref