Background : Breast cancer is the most common cancer of
women. When breast cancer is detected and treated early,
the chances for survival are better. Surgery is the most
important treatment for non-metastatic breast cancer.
Al-Kindy Col Med J 2008 Vol.5(1) 40 Original Article
Objectives : The aim of this study is to review different
clinical presentation and to evaluate types of surgical
procedures and complications in treatment of nonmetastatic breast cancer.
Method : During the period from Jun 1998 to May 2005,
93 patients with non-metastatic breast cancer were
diagnosed and treated surgically in 2 hospitals in Baghdad (
Hammad Shihab military hospital and Al-Kindy teaching
hospital).
Results : Women constituted ( 98.93% ), while men
constituted (1.07%), with male to female ratio of (0.01:1).
The peak incidence of non-metastatic breast cancer (25.8%)
was at age group 51-60 years, while (60.2 % ) of cases
happened in women over 50 years of age. The right breast
was the most common side affected, and the upper outer
quadrant of the breast was the most common location
affected by cancer. Painless lump (91.4%) was the most
common symptom, and the hard lump was the most
common sign (100%).
The highest frequency of cases was diagnosed in stage II
followed by stage III, and invasive ductal cancer was the
most common histopathologic type.
(87.1 %) of patients underwent modified radical
mastectomy, while (12.9%) underwent breast-conservation
surgery. Breast-conservation surgery carried higher
incidence of recurrent disease than modified radical
mastectomy (33.3% vs.13.6%).
Conclusion : The majority of patients with non-metastatic
breast cancer were over 50 years of age, and the
preponderance were diagnosed in stage II. Modified radical
mastectomy may be preferable method for treatment as it
carries a lower rate of local or distant recurrence than
conventional breast-conservation surgery procedures
And the necessity for the progress of modern societies Because the scientific and objective characteristics that characterize modern societies and distinguish them from traditional societies, Is represented by the extent of its innovative achievements in the theoretical, applied and material scientific and spiritual fields. It should be noted that quality and innovation in modern societies is based on two main pillars, Standard measures for measuring and evaluating innovations to achieve their high quality, And the dissemination of the culture of innovation to spread awareness of the importance and conditions of success, and this is done by the advanced industrial countries, However, despite the great disparity between developed industri
... Show MoreFinding a new source of resistance is important to reduce the use of synthetic pesticides, which can meet the global need of suppressing pollution. In this study, the resistance of eight eggplant cultivars to Aphis gossypii was evaluated. Results of the current study highlighted that the cultivar Long-Green has a very strong resistance after 14 days post infestation whereas Pearl-Round and White-Casper cultivars were susceptible. The rest of the tested cultivars (Green-oblong, Purple-panter, Paris, Ashbilia, and Barcelona) had mild resistance. Also, the study found significant differences between the infested and non-infested plants among the tested cultivars in the plant’s height, fresh-, and dry-weight. The susceptible cultivars
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreThe research discusses the issue of attribution to the verb, because the Arab scholars are unanimous in preventing attribution of the verb, because it is always informed of it, and does not inform about it, but this consensus violates the linguistic use. The research discusses this matter.
Abstract: The aim of the current research is to identify (the relationship between deep understanding skills and mathematical modeling among fifth grade students) the research sample consisted of (411) male and female students of the fifth grade of biology distributed over the General Directorates of Education in Baghdad / Al-Rusafa / 2 / and Al-Karkh / 1 /, and two research tools were built: 1- A test of deep understanding skills, consisting of (20) test items and a scale for two skills. 2- The second test consists of (24) test items distributed among (18) essay items and (6) objective items. The psychometric properties of validity, stability, discriminatory strength, and effectiveness of alternatives were verified for the two tests fo
... Show MoreConstruction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More