Background : Breast cancer is the most common cancer of
women. When breast cancer is detected and treated early,
the chances for survival are better. Surgery is the most
important treatment for non-metastatic breast cancer.
Al-Kindy Col Med J 2008 Vol.5(1) 40 Original Article
Objectives : The aim of this study is to review different
clinical presentation and to evaluate types of surgical
procedures and complications in treatment of nonmetastatic breast cancer.
Method : During the period from Jun 1998 to May 2005,
93 patients with non-metastatic breast cancer were
diagnosed and treated surgically in 2 hospitals in Baghdad (
Hammad Shihab military hospital and Al-Kindy teaching
hospital).
Results : Women constituted ( 98.93% ), while men
constituted (1.07%), with male to female ratio of (0.01:1).
The peak incidence of non-metastatic breast cancer (25.8%)
was at age group 51-60 years, while (60.2 % ) of cases
happened in women over 50 years of age. The right breast
was the most common side affected, and the upper outer
quadrant of the breast was the most common location
affected by cancer. Painless lump (91.4%) was the most
common symptom, and the hard lump was the most
common sign (100%).
The highest frequency of cases was diagnosed in stage II
followed by stage III, and invasive ductal cancer was the
most common histopathologic type.
(87.1 %) of patients underwent modified radical
mastectomy, while (12.9%) underwent breast-conservation
surgery. Breast-conservation surgery carried higher
incidence of recurrent disease than modified radical
mastectomy (33.3% vs.13.6%).
Conclusion : The majority of patients with non-metastatic
breast cancer were over 50 years of age, and the
preponderance were diagnosed in stage II. Modified radical
mastectomy may be preferable method for treatment as it
carries a lower rate of local or distant recurrence than
conventional breast-conservation surgery procedures
T.V photo in modern shows has emerged with special characteristics and signs that have developed in cope with the development of medium and technique. This leads to adding a variety of aesthetic dimensions which are capable of attracting audience because of its communicative elements that have an important role in increasing of T.V show Watching. As a result, the research is limited to methodological Framework as the problem. The problem of the research deals with emerging the aesthetic dimensions of T.V photo. The major question is (what are the aesthetic and communicative dimension of T.V Photo?). The research aims at finding out the aesthetic dimensions of T.V photo in modern artworks. The significance of the research on the presented
... Show MoreNon-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for
... Show MoreBackground: Tumor-like overgrowth lesions of the oral mucosa are pathological growths that project above the normal contour of the oral surface. A practical classification can be made according to the site of origin, the etiology and the histological appearance. The aim of this article is to evaluate and analyze patients with gingival and alveolar ridge tumor-like overgrowth lesions in terms of surgical treatment, diagnosis and outcome. Materials and Methods: Patients complaining of these lesions were treated by surgical excision under local or general anesthesia; the excised lesions were submitted for histopathological examination, during the follow up period the patients were examined for complications and recurrence. Results: Pyogenic gr
... Show MoreThere are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called grap
... Show MoreSolid waste is a major issue in today's world. Which can be a contributing factor to pollution and the spread of vector-borne diseases. Because of its complicated nonlinear processes, this problem is difficult to model and optimize using traditional methods. In this study, a mathematical model was developed to optimize the cost of solid waste recycling and management. In the optimization phase, the salp swarm algorithm (SSA) is utilized to determine the level of discarded solid waste and reclaimed solid waste. An optimization technique SSA is a new method of finding the ideal solution for a mathematical relationship based on leaders and followers. It takes a lot of random solutions, as well as their outward or inward fluctuations, t
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MorePatch in transdermal drug delivery(TDDS) used to overcome the hypodermic drawback, but these patch also have absorption limitation for hydrophilic and macromolecule like peptide and DNA. So that micronized projection have the ability for skin penetration developed named as microneedle. Microneedle drug delivery system is a novel drug delivery to overcome the limitation of TDDS like skin barrier restriction for large molecule. Microneedle patch can penetrate through skin subcutaneous into epidermis, avoiding nerve fiber and blood vessel contact. There are many type of microneedle patch like solid, polymer, hallow, hydrogel forming microneedle and dissolving microneedle with different method of microfabrication
In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise near compact and fibrewise locally near compact spaces, which are generalizations of well-known concepts near compact and locally near compact topological spaces. Moreover, we study relationships between fibrewise near compact (resp., fibrewise locally near compact) spaces and some fibrewise near separation axioms.