Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common abnormalities that may indicate breast cancer are masses and calcifications. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram images. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. The incidence of breast cancer in women has increased significantly in recent years.
This paper proposes a computer aided diagnostic system for the extraction of features like mass lesions in mammograms for early detection of breast cancer. The proposed technique is based on a four-step procedure: (a) the preprocessing of the image is done, (b) regions of interest (ROI) specification, (c) supervised segmentation method includes two stages performed using the minimum distance (MD) criterion, and (d) feature extraction based on Gray level Co-occurrence matrices GLCM for the identification of mass lesions. The method suggested for the detection of mass lesions from mammogram image segmentation and analysis was tested over several images taken from Al-Ilwiya Hospital in Baghdad, Iraq. The proposed technique shows better results
Objective: Detection the level of YKL-40 biochemical marker and vitamin D level in sera of Iraqi uterine cancer
females' patients.
Methodology: This study included 90 female volunteers, 30 of them were healthy volunteers who were
considered as a control group, while sixty serum samples were collected from women patients suffering from
uterine tumors (30 malignant and 30 fibroid benign tumors), benign cases were considered as a disease
control group for malignant tumors. The average age of those females was 30-75 years, which matched the
control group. All the samples were collected from Azady hospital in Kirkuk and the gynecologic department at
Medical City in Baghdad during October /2012 to May /2013. All the serum
Objective(s): Biocompatibility, non-toxicity, minimal allergenicity, and biodegradability are all characteristics of chitosan. Other biological properties of chitosan have been reported, including antitumor, antimicrobial and antioxidant activities. This research aim is the synthesis of drug compounds by preparation and characterization of polymer chitosan Schiff base and chitosan Schiff base / Poly vinyl alcohol / poly vinyl pyrrolidone Nanocomposite and study applications (anticancer cell line, antimicrobial agents). Methods: Chitosan Schiff base was prepared from the reaction of chitosan with carbonyl group of 4-nitro benzaldehyde. Polymer blend have been prepared by solution casting method. Chitosan Schiff base mixing with PVA and PVP
... Show MoreBackground: Coping skills play a vital role in managing the physical and psychological effects of breast cancer (BC). Despite improvements in early detection and treatment, Breast cancer survivors continue to face long-term challenges after diagnosis. Therefore, this study aims to evaluate the coping skills employed by breast cancer women in Iraq and to identify the sociodemographic, clinical, and psychological factors associated with these coping skills. Methods: A cross-sectional study was conducted among 244 breast cancer women in The Medical City Teaching Oncology Hospital, Baghdad, Iraq, from August 2023 to October 2023, coping skills and psychological factors were assessed using the BRIEF COPE-28, and Hospital Anxiety Depression scale
... Show MoreThis study was conducted for evaluating the cytotoxic effect of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli on the proliferation of primary cancer cell cultures, obtained from tumor samples that were collected from (13) cancer patients and as follows: (five colon cancer patients, two bladder cancer patients, two breast cancer patients, two stomach cancer patients and two lung cancer patients), and on normal cell line (rat embryonic fibroblast / REF) (in vitro) with the use of different concentrations starting from (1) mg/ml and ending with (0.0002) mg/ml by making two fold serial dilutions by using the 96- well microtiter plate, and in comparison with negative (PBS) and positive (MMC, at concentration
... Show MoreBackground: White spot lesions (WSLs) are subsurface enamel demineralization manifested as white opacities which had an esthetic problem. The purpose of this in-vitro study was to evaluate the lesion depth improvement of WSLs following application of fluoride varnish, tooth mousse and resin infiltration (ICON). Materials and methods: Artificial WSLs were created on 120 premolar teeth using demineralization solution with pH (4-4.5). Samples randomly allocated into four groups; fluoride varnish, tooth mousse, ICON and untreated group. Groups were discolored in Cola and orange juice for 24 hours. Teeth were ground sectioned by longitudinal cutting then these sections examined and photographed under stereomicroscope at 12X magnification then an
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023