Background : Breast cancer is the most common cancer of
women. When breast cancer is detected and treated early,
the chances for survival are better. Surgery is the most
important treatment for non-metastatic breast cancer.
Al-Kindy Col Med J 2008 Vol.5(1) 40 Original Article
Objectives : The aim of this study is to review different
clinical presentation and to evaluate types of surgical
procedures and complications in treatment of nonmetastatic breast cancer.
Method : During the period from Jun 1998 to May 2005,
93 patients with non-metastatic breast cancer were
diagnosed and treated surgically in 2 hospitals in Baghdad (
Hammad Shihab military hospital and Al-Kindy teaching
hospital).
Results : Women constituted ( 98.93% ), while men
constituted (1.07%), with male to female ratio of (0.01:1).
The peak incidence of non-metastatic breast cancer (25.8%)
was at age group 51-60 years, while (60.2 % ) of cases
happened in women over 50 years of age. The right breast
was the most common side affected, and the upper outer
quadrant of the breast was the most common location
affected by cancer. Painless lump (91.4%) was the most
common symptom, and the hard lump was the most
common sign (100%).
The highest frequency of cases was diagnosed in stage II
followed by stage III, and invasive ductal cancer was the
most common histopathologic type.
(87.1 %) of patients underwent modified radical
mastectomy, while (12.9%) underwent breast-conservation
surgery. Breast-conservation surgery carried higher
incidence of recurrent disease than modified radical
mastectomy (33.3% vs.13.6%).
Conclusion : The majority of patients with non-metastatic
breast cancer were over 50 years of age, and the
preponderance were diagnosed in stage II. Modified radical
mastectomy may be preferable method for treatment as it
carries a lower rate of local or distant recurrence than
conventional breast-conservation surgery procedures
Experimental and numerical investigations of the centrifugal pump performance at non-cavitating and cavitating flow conditions were carried out in the present study. Experiments were performed by applying a vacuum to a closed-loop system to investigate the effects of the net positive suction head available (NPSHa), flow rate, water temperature and pump speed on the centrifugal pump performance. Accordingly, many of the important parameters concerning cavitation phenomenon were calculated. Also, the noise which is accompanied by cavitation was measured. Numerical analysis was implemented for two phase flow (the water and its vapor) using a 2-D simulation by ANSYS FLUENT software to investigate the internal flow of centrifugal pump under c
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreThe current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a number of
... Show MoreObjectives: In developing countries like Iraq, diarrhea was responsible for 70% of deaths among pediatrics. This study was designed to determine Iraqi mothers’ knowledge and malpractices associated with diarrhea management in pediatrics.Methods: A cross-sectional pilot study was done on a convenient sample of mothers in Baghdad – Iraq. Data collection was done using a validated questionnaire specifically designed for this study.Result: Most participants preferred to consult physicians or pharmacists about pediatrics diarrhea management. Breastfeeding was stopped by 19% of participants, whereas 35% of mothers who depend on formulated milk discontinued it. Only 30% of participants use oral rehydration solution therapy always as a
... Show MoreSchiff bases are versatile compounds synthesized from the condensation of primary amino compounds with aldehydes or ketones. The high thermal of many Schiff base and their complexes were useful attributes for their application as catalysts in reactions involving at high temperatures. This thermal behavior of Schiff bases and their complexes was evaluated by TGA/DTG and DTA curves with 10 mass losses related to dehydration and decomposition. This review summarizes the developments in the last decade for thermal analysis of Schiff bases. Therefore, synthesis of Schiff bases and their complexes are reviewe
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreTThe property of 134−140Neodymium nuclei have been studied in framework Interacting Boson Model (IBM) and a new method called New Empirical Formula (NEF). The energy positive parity bands of 134−140Nd have been calculated using (IBM) and (NEF) while the negative parity bands of 134−140Nd have been calculated using (NEF) only. The E-GOS curve as a function of the spin (I) has been drawn to determine the property of the positive parity yrast band. The parameters of the best fit to the measured data are determined. The reduced transition probabilities of these nuclei was calculated. The critical point has been determined for 140Nd isotope. The potential energy surfaces (PESs) to the IBM Hamiltonian have been obtained using the intrin
... Show MoreExcessive torque and drag can be critical limitation during drilling highly deviated oil wells. Using the modeling is regarded as an invaluable process to assist in well planning and to predict and prevent drilling problems. Identify which problems lead to excessive torque and drag to prevent cost losses and equipment damage. Proper modeling data is highly important for knowing and prediction hole problems may occur due to torque and drag and select the best method to avoid these problems related to well bore and drill string. In this study, Torque and drag well plan program from landmark worldwide programming group (Halliburton Company) used to identify hole problems.one deviated well in Zubair oil fields named, ZB-250 selected for
... Show More