Background : Breast cancer is the most common cancer of
women. When breast cancer is detected and treated early,
the chances for survival are better. Surgery is the most
important treatment for non-metastatic breast cancer.
Al-Kindy Col Med J 2008 Vol.5(1) 40 Original Article
Objectives : The aim of this study is to review different
clinical presentation and to evaluate types of surgical
procedures and complications in treatment of nonmetastatic breast cancer.
Method : During the period from Jun 1998 to May 2005,
93 patients with non-metastatic breast cancer were
diagnosed and treated surgically in 2 hospitals in Baghdad (
Hammad Shihab military hospital and Al-Kindy teaching
hospital).
Results : Women constituted ( 98.93% ), while men
constituted (1.07%), with male to female ratio of (0.01:1).
The peak incidence of non-metastatic breast cancer (25.8%)
was at age group 51-60 years, while (60.2 % ) of cases
happened in women over 50 years of age. The right breast
was the most common side affected, and the upper outer
quadrant of the breast was the most common location
affected by cancer. Painless lump (91.4%) was the most
common symptom, and the hard lump was the most
common sign (100%).
The highest frequency of cases was diagnosed in stage II
followed by stage III, and invasive ductal cancer was the
most common histopathologic type.
(87.1 %) of patients underwent modified radical
mastectomy, while (12.9%) underwent breast-conservation
surgery. Breast-conservation surgery carried higher
incidence of recurrent disease than modified radical
mastectomy (33.3% vs.13.6%).
Conclusion : The majority of patients with non-metastatic
breast cancer were over 50 years of age, and the
preponderance were diagnosed in stage II. Modified radical
mastectomy may be preferable method for treatment as it
carries a lower rate of local or distant recurrence than
conventional breast-conservation surgery procedures
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreIn this search, a new pyrophosphate technique was proved. The technique was employed to single- nucleotide polymorphisms (SNPs), which diagnosis using a one-base extension reaction. Three Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad.; also one specimen was used as a negative control. The steps of this technique were by used a specific primer within each aliquot that has a short 3-OH end of the base of the target gene that was hybridized to the single-stranded DNA template. Then, the Taq polymerase enzyme and one of either α-thio-dATP, dTTP, dGTP, or dCTP
... Show MoreABSTRACT Background: One of the challenges to use chlorhexidine is its effect on the amount of microleakage after restoration; however, use of the materials with antibacterial properties after tooth preparation and before restoration has been widespread. The objective of this, in-vitro, study was to evaluate the influence of consepsis (chlorhexidine gloconate disinfectant) application on microleakage in class II cavities restored with light cured composite using universal adhesive system; etch and rinse technique –self etch technique. Materials and Methods: Forty class II cavities were prepared on mesial and distal surfaces of 20 non-carious mandibular third molars. The cavities were divided into four groups; (n =10 for each group).
... Show MoreThis research includes the synthesis of some new N-Aroyl-N \ -Aryl thiourea derivatives namely: N-benzoyl-N \ -(p-aminophenyl) thiourea (STU1), N-benzoyl-N \ -(thiazole) thiourea (STU2), N-acetyl-N ` -(dibenzyl) thiourea (STU3). The series substituted thiourea derivatives were prepared from reaction of acids with thionyl chloride then treating the resulted with potassium thiocyanate to affored the corresponding N-Aroyl isothiocyanates which direct reaction with primary and secondary aryl amines, The purity of the synthesized compounds were checked by measuring the melting point and Thin Layer Chromatography (TLC) and their structure, were identified by spectral methods [FTIR,1H-NMR and 13C-NMR].These compounds were investigated as a
... Show MoreThis paper discusses the study of computer Russian language neologisms. Problems of studying computer terminology are constantly aggravated by the processes of computer technology that is introduced to all walks of life. The study identifies ways of word formation: the origin of the computer terms and the possibility of their usage in Russian language. The Internet is considered a worldwide tool of communication used extensively by students, housewives and professionals as well The Internet is a heterogeneous environment consisting of various hardware and software configurations that need to be configured to support the languages used. The development of Internet content and services is essential for expanding Internet usage. Some of the
... Show MoreThe problem for the search to identify the role of loyal workers through (emotional loyalty, moral loyalty, continued loyalty) in enhancing the market share of the corporate center the human resource management strategies, namely (selection, training and development, and performance evaluation, and returns the system) for the parent company of cellular Allotsalat in Baghdad ,, and show the importance of research through the benefit to the company, through the importance of the search results, it draws the attention of decision-makers and those in charge of managing these human resources on the importance of those resources and work to develop them and keep them in order to increase their loyalty towards their organization and the
... Show MoreBackground: In capturing a negative image, the digital impression secures a digital record for the purposeof designing and creating restorations. The introduction of scanning system presents a paradigm shift in the way of the dental impression procedure and encourages the accuracy of obtained restoration especially in the marginal area as a result of producing accurate final impression The digital system offers many advantages over the Conventional method.. The objective of this present in vitro study was to evaluate the marginal fitness of all ceramic crowns fabricated by direct digital scanning of the prepared tooth using two types of intra-oral cameras (Bluecam camera with strip light projection technique and Omnicam camera with video sa
... Show MoreThe research aimed to shed light on the impact of international Accounting Standard No (21) on tax obstacles represented by (tax evasion, double taxation) The financial statements of a group of banks operating in the private sector were relied upon to know the impact of the standard on tax obstacles, as well as knowing the amount of amounts, The researcher relied on the method of financial analysis of that data, which was obtained from the website of the Securities Commission, and conducted personal interviews with a number of university professors, chartered accountants, financial experts, banks, and the General Authority for Taxes to benefit from their
... Show MoreObjectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.
... Show More