Background : Breast cancer is the most common cancer of
women. When breast cancer is detected and treated early,
the chances for survival are better. Surgery is the most
important treatment for non-metastatic breast cancer.
Al-Kindy Col Med J 2008 Vol.5(1) 40 Original Article
Objectives : The aim of this study is to review different
clinical presentation and to evaluate types of surgical
procedures and complications in treatment of nonmetastatic breast cancer.
Method : During the period from Jun 1998 to May 2005,
93 patients with non-metastatic breast cancer were
diagnosed and treated surgically in 2 hospitals in Baghdad (
Hammad Shihab military hospital and Al-Kindy teaching
hospital).
Results : Women constituted ( 98.93% ), while men
constituted (1.07%), with male to female ratio of (0.01:1).
The peak incidence of non-metastatic breast cancer (25.8%)
was at age group 51-60 years, while (60.2 % ) of cases
happened in women over 50 years of age. The right breast
was the most common side affected, and the upper outer
quadrant of the breast was the most common location
affected by cancer. Painless lump (91.4%) was the most
common symptom, and the hard lump was the most
common sign (100%).
The highest frequency of cases was diagnosed in stage II
followed by stage III, and invasive ductal cancer was the
most common histopathologic type.
(87.1 %) of patients underwent modified radical
mastectomy, while (12.9%) underwent breast-conservation
surgery. Breast-conservation surgery carried higher
incidence of recurrent disease than modified radical
mastectomy (33.3% vs.13.6%).
Conclusion : The majority of patients with non-metastatic
breast cancer were over 50 years of age, and the
preponderance were diagnosed in stage II. Modified radical
mastectomy may be preferable method for treatment as it
carries a lower rate of local or distant recurrence than
conventional breast-conservation surgery procedures
The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a numbe
... Show MoreAW Tarik, AW Ali T, A Salah, Journal of faculity of medicine Baghdad university, 2014 - Cited by 3
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThe basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.
The aim of the current study was to evaluate the knowledge and perception of the fifth stage pharmacy students (college of pharmacy/ University of Baghdad /Iraq) regarding generic medicines. This study is a cross-sectional study carried in a college of pharmacy /University of Baghdad during the period from (November 2018- March 2019). The number of students included in the current study was 168 undergraduate stager pharmacists. A questionnaire was used to collect data of the study. Nearly 86% of the students said that they had heard of generic and brand medicines, and pharmacy was the main source of knowledge regarding generic medicines (66.7%). About (33.3%) of the respondents agreed that generic medicines are bioequivalent to br
... Show MoreThis research aims at identifying the Iraqi EFL students' academic buoyancy in reading and listening skills and then finding out the difference between the two skills; Furthermore, finding out the five predictors differences of each of the two scales. Two academic buoyancy scales used to collect data. After achieving the scales' psychometric characteristics, they are submitted to the study sample. The sample of (100) female students selected according to the stratified random method from the second class at the Department of English\ College of Education for Women\ University of Baghdad. The results show that the students have academic reading buoyancy and have not academic listening buoyancy; the difference between the two abilities shows
... Show More