Background : Breast cancer is the most common cancer of
women. When breast cancer is detected and treated early,
the chances for survival are better. Surgery is the most
important treatment for non-metastatic breast cancer.
Al-Kindy Col Med J 2008 Vol.5(1) 40 Original Article
Objectives : The aim of this study is to review different
clinical presentation and to evaluate types of surgical
procedures and complications in treatment of nonmetastatic breast cancer.
Method : During the period from Jun 1998 to May 2005,
93 patients with non-metastatic breast cancer were
diagnosed and treated surgically in 2 hospitals in Baghdad (
Hammad Shihab military hospital and Al-Kindy teaching
hospital).
Results : Women constituted ( 98.93% ), while men
constituted (1.07%), with male to female ratio of (0.01:1).
The peak incidence of non-metastatic breast cancer (25.8%)
was at age group 51-60 years, while (60.2 % ) of cases
happened in women over 50 years of age. The right breast
was the most common side affected, and the upper outer
quadrant of the breast was the most common location
affected by cancer. Painless lump (91.4%) was the most
common symptom, and the hard lump was the most
common sign (100%).
The highest frequency of cases was diagnosed in stage II
followed by stage III, and invasive ductal cancer was the
most common histopathologic type.
(87.1 %) of patients underwent modified radical
mastectomy, while (12.9%) underwent breast-conservation
surgery. Breast-conservation surgery carried higher
incidence of recurrent disease than modified radical
mastectomy (33.3% vs.13.6%).
Conclusion : The majority of patients with non-metastatic
breast cancer were over 50 years of age, and the
preponderance were diagnosed in stage II. Modified radical
mastectomy may be preferable method for treatment as it
carries a lower rate of local or distant recurrence than
conventional breast-conservation surgery procedures
Corruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
Precision is one of the main elements that control the quality of a geodetic network, which defines as the measure of the network efficiency in propagation of random errors. This research aims to solve ZOD and FOD problems for a geodetic network using Rosenbrock Method to optimize the geodetic networks by using MATLAB programming language, to find the optimal design of geodetic network with high precision. ZOD problem was applied to a case study network consists of 19 points and 58 designed distances with a priori deviation equal to 5mm, to determine the best points in the network to consider as control points. The results showed that P55 and P73 having the minimum ellipse of error and considered as control points. FOD problem was applie
... Show MoreEuphemism is an important linguistic phenomenon that tends to soften written or oral expressions. Thus, when translators or interpreters face expressions including euphemism, they need to know how to deal with them. The problem of the current paper lies in the effect of rendering euphemistic expressions inaccurately, as such expressions represent the cultural and terminological sense of the original language. Thus, rendering them improperly will affect the sense of the interpreted speech. For this, it is essential for translators in general and simultaneous interpreters in particular to know the importance of utilizing euphemism in the simultaneous interpreting field, which is the main aim of this paper. To this end, a systematic review
... Show MoreSince the appearance of COVID-19 disease as an epidemic and pandemic disease, many studies are performed to uncover the genetic nature of the newly discovered coronavirus with unique clinical features. The last three human coronavirus outbreaks, SARS-CoV, MERS-CoV and SARS-CoV-2 are caused by Beta-Coronaviruses. Horizontal genetic materials transfer was proven from one coronavirus to the other coronavirus of non-human origin like infectious bronchitis virus (IBV) of avian. Horizontal genetic materials transfer was also from non-corona viruses like astroviruses and equine rhinovirus (ERV-2) or from coronavirus-unrelated viruses, like influenza virus type C. However, SARS-CoV-2 is identical to SARS-CoV and MERS-CoV. Interestingly, Wuhan ci
... Show MoreThe present study investigated Haematological changes in Mesopotamichthys sharpeyi, as well as determination genotoxic effects of cadmium chloride on bunni fish by using 120 fingerlings, fish were distributed randomly into four treatments in addition to control group. Fish in first group treated (T1) with cadmium 0.093mg/L with changing water and added cadmium continuously, fish in the second group treated (T2) with cadmium 0.093mg/L with changing water without adding cadmium, third treatment (T3) with cadmium 0.046mg/L with changing water and adding cadmium continuously, and fourth treatment (T4) with cadmium 0.046mg/L with changing water without adding cadmium. Results of blood picture in T1 and T3 showed a significant reduction in red bl
... Show MoreI have studied the relationship between blood groups in humans and disease Cutaneous injury for the first time in Iraq study showed the presence of a significant statistical relationship between them leather Bmsoy in hospitals in Baghdad and its suburbs
Optical spectrum of SN1987A at days 4 from the explosion and its light curve through the first 1444 days after the explosion have been studied. The hydrogen lines present in the spectrum confirms the general characteristics of Type II SN that occur due to core collapse of massive star. Each of the total mass ejected from the explosion and the amount of the total mass of Nickel radioactive isotopes that produced during the explosion as well as the initial velocity of the ejecta and the explosion energy have been determined and compared with different observed and calculated models obtained by different researchers and it’s found that, about 8.8 Mʘ of the progenitor envelope mass had been ejected during the explosion and it’s mixed with
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show More