Abstract- Cancer is a disease in which cells become abnormal and form more cells in an uncomfortable way. With breast cancer, the cancer begins in the tissues that make up the breasts. The cancer cells may form a mass called a turnor. (Note: Not all turnors are cancer). They may also invade a nearby tissue and spread to lymph nodes and other parts of the body. The most common types of breast cancer are: Ductal carcinoma - Cancer that begins in the ducts and grows into surrounding tissues. About 8 in 10 breast cancer are this type . Lobular carcinoma (LAH-byuh-luhr KAR-sih-NOH-muh) - cancer that begins in lobules and grows into surrounding tissues. About 1 in 10 breast cancers are this type. Hence, this research inverstigates the most contributing/impactful factor of symptoms of breast cancer using Induced Fuzzy Cognitive Maps (IFCMs). IFCMs area fuzzy-graph modeling approach based on expert's opinion. This is the non-statistical approach tostu dyther problems with imprecise information. In the current study, section 1 introduction about cancer. Section 2 overviews the Fuzzy Cognitive Maps theory , andits, influence. Section 3 explains the Algorithms approach IFCM models. Section 4 discusses the components (attributes) symptoms of breast cancer and implementation of IFCM modeland Sections 5 reveals the conclusion of the problem.
Symptoms of Breast Cancer – An Analysis Using Induced Fuzzy Cognitive Maps (I...ijcoa
Cancer is a disease in which cells become abnormal and form more cells in an uncontrolled way. With breast cancer, the cancer begins in the tissues that make up the breasts. The cancer cells may form a mass called a tumor. (Note: Not all tumors are cancer.) They may also invade nearby tissue and spread to lymph nodes and other parts of the body. The most common types of breast cancer are: Ductal carcinoma – Cancer that begins in the ducts and grows into surrounding tissues. About 8 in 10 breast cancers are this type. Lobular carcinoma (LAH-byuh-luhr KAR-sih-NOH-muh) – Cancer that begins in lobules and grows into surrounding tissues. About 1 in 10 breast cancers are this type. Hence, this research investigates the most contributing / impactful factor of symptoms of breast cancer using Induced Fuzzy Cognitive Maps (IFCMs). IFCMs are a fuzzy-graph modeling approach based on expert’s opinion. This is the non-statistical approach to study the problems with imprecise information. In the current study, Section 1 introduction about cancer. Section 2 overviews the Fuzzy Cognitive Maps theory, and its influence. Section 3 explains the Algorithmic approach of IFCM models. Section 4 discusses the components (attributes) symptoms of breast cancer and implementation of IFCM model and Section5 reveals the conclusion of the problem.
Metastasis is the spread of cancer cells from the primary tumor to other parts of the body. Cancer cells can metastasize through direct extension, lymphatic spread, or hematogenous spread through the bloodstream. The process of metastasis involves local invasion of tissue, entry and survival in the circulatory or lymphatic system, arrest in capillaries, extravasation into new organs, and growth of microscopic tumor deposits into macroscopic secondary tumors. Common sites of metastasis include the lungs, liver, brain, and bones. The mechanisms of metastasis are complex and involve changes in cancer cell adhesion and signaling to encourage migration, invasion of surrounding tissues, angiogenesis, and survival at distant sites.
Metastasis is the spread of cancer cells from the primary tumor to other parts of the body. Cancer cells can metastasize through direct extension, lymphatic spread, or hematogenous spread through the bloodstream. The process of metastasis involves local invasion of tissue, entry and survival in the circulatory or lymphatic system, arrest in capillaries, extravasation into new organs, and growth of microscopic tumor deposits into macroscopic secondary tumors. Common sites of metastasis include the lungs, liver, brain, and bones depending on the location of the primary tumor. Once cancer has metastasized, treatment options aim to slow the growth and spread of tumors.
The document provides an introduction to cancer, including definitions, classifications, stages, etiology, signs and symptoms. It then discusses several diagnostic tests for cancer including biopsy and tomography. The main treatments for cancer are described as surgery, radiation therapy, hormonal therapy, immunotherapy, and bone marrow transplantation. Chemotherapy is discussed in further detail, outlining different classes of chemotherapeutic agents. The document also briefly mentions ayurvedic herbal treatments and cancer status in India.
This document summarizes key facts about cancer:
- Cancer is a leading cause of death worldwide, accounting for nearly 10 million deaths in 2020. The most common cancers are breast, lung, colon, rectum and prostate.
- Cancer occurs due to genetic and environmental factors like tobacco use, diet, physical activity levels, and some infections. Many cancers can be cured if detected early and treated.
- Cancers are classified as benign or malignant tumors. Benign tumors are not cancerous while malignant tumors are and can spread to other parts of the body through metastasis.
This document discusses a study to create tissue engineering models of breast cancer metastasis. The researchers will develop 3D scaffolds mimicking adipose and bone tissue with varying stiffness. They will seed metastatic breast cancer cells onto the scaffolds to study changes in gene expression, histology, and markers as the cells metastasize from softer adipose-like scaffolds to stiffer bone-like scaffolds. The goal is to better understand the mechanisms driving breast cancer metastasis in order to develop new prevention and treatment strategies.
An Analysis of Risk Factors of Breast Cancer Using Interval Weighted Fuzzy Co...ijcoa
Cancer begins when cells in a part of the body start to grow out of control. Cancer cell growth is different from normal cell growth. Instead of dying, cancer cells continue to grow and form new, abnormal cells. There are many types of cancer. Breast cancer is the second most commonly diagnosed cancer in the world. The risk factors of breast cancer as it are the second major cause of cancer death in among women. FCM have been applied in many fields successfully to show the relationship between the nodes. In this paper analyzing the risk factors of breast cancer by using the (IWFCMs) which is the combination of the Fuzzy Cognitive Maps (FCMs) and CETD matrix in which indeterminacy is included. It has also become very essential that the notion of logic plays a vital role in several of the real world problems like law, medicine, industry, finance, IT, stocks and share etc.
This document provides information on the assessment and management of cancer patients. It begins with learning objectives related to describing cancer incidence and mortality rates, the biology and stages of cancer development, and the nurse's role in cancer prevention, detection, diagnosis, and treatment. It then covers definitions of cancer, the origins and types of cancer cells, the biology of cancer development including defective cell proliferation and differentiation. The document discusses cancer staging and classification systems including TNM and the stages of cancer development. It also outlines common signs and symptoms of cancer, diagnostic tests, and the main goals and treatment modalities of cancer including surgery, radiation therapy, chemotherapy, targeted therapy, palliative care, nuclear medicine, and interventional radiology.
Symptoms of Breast Cancer – An Analysis Using Induced Fuzzy Cognitive Maps (I...ijcoa
Cancer is a disease in which cells become abnormal and form more cells in an uncontrolled way. With breast cancer, the cancer begins in the tissues that make up the breasts. The cancer cells may form a mass called a tumor. (Note: Not all tumors are cancer.) They may also invade nearby tissue and spread to lymph nodes and other parts of the body. The most common types of breast cancer are: Ductal carcinoma – Cancer that begins in the ducts and grows into surrounding tissues. About 8 in 10 breast cancers are this type. Lobular carcinoma (LAH-byuh-luhr KAR-sih-NOH-muh) – Cancer that begins in lobules and grows into surrounding tissues. About 1 in 10 breast cancers are this type. Hence, this research investigates the most contributing / impactful factor of symptoms of breast cancer using Induced Fuzzy Cognitive Maps (IFCMs). IFCMs are a fuzzy-graph modeling approach based on expert’s opinion. This is the non-statistical approach to study the problems with imprecise information. In the current study, Section 1 introduction about cancer. Section 2 overviews the Fuzzy Cognitive Maps theory, and its influence. Section 3 explains the Algorithmic approach of IFCM models. Section 4 discusses the components (attributes) symptoms of breast cancer and implementation of IFCM model and Section5 reveals the conclusion of the problem.
Metastasis is the spread of cancer cells from the primary tumor to other parts of the body. Cancer cells can metastasize through direct extension, lymphatic spread, or hematogenous spread through the bloodstream. The process of metastasis involves local invasion of tissue, entry and survival in the circulatory or lymphatic system, arrest in capillaries, extravasation into new organs, and growth of microscopic tumor deposits into macroscopic secondary tumors. Common sites of metastasis include the lungs, liver, brain, and bones. The mechanisms of metastasis are complex and involve changes in cancer cell adhesion and signaling to encourage migration, invasion of surrounding tissues, angiogenesis, and survival at distant sites.
Metastasis is the spread of cancer cells from the primary tumor to other parts of the body. Cancer cells can metastasize through direct extension, lymphatic spread, or hematogenous spread through the bloodstream. The process of metastasis involves local invasion of tissue, entry and survival in the circulatory or lymphatic system, arrest in capillaries, extravasation into new organs, and growth of microscopic tumor deposits into macroscopic secondary tumors. Common sites of metastasis include the lungs, liver, brain, and bones depending on the location of the primary tumor. Once cancer has metastasized, treatment options aim to slow the growth and spread of tumors.
The document provides an introduction to cancer, including definitions, classifications, stages, etiology, signs and symptoms. It then discusses several diagnostic tests for cancer including biopsy and tomography. The main treatments for cancer are described as surgery, radiation therapy, hormonal therapy, immunotherapy, and bone marrow transplantation. Chemotherapy is discussed in further detail, outlining different classes of chemotherapeutic agents. The document also briefly mentions ayurvedic herbal treatments and cancer status in India.
This document summarizes key facts about cancer:
- Cancer is a leading cause of death worldwide, accounting for nearly 10 million deaths in 2020. The most common cancers are breast, lung, colon, rectum and prostate.
- Cancer occurs due to genetic and environmental factors like tobacco use, diet, physical activity levels, and some infections. Many cancers can be cured if detected early and treated.
- Cancers are classified as benign or malignant tumors. Benign tumors are not cancerous while malignant tumors are and can spread to other parts of the body through metastasis.
This document discusses a study to create tissue engineering models of breast cancer metastasis. The researchers will develop 3D scaffolds mimicking adipose and bone tissue with varying stiffness. They will seed metastatic breast cancer cells onto the scaffolds to study changes in gene expression, histology, and markers as the cells metastasize from softer adipose-like scaffolds to stiffer bone-like scaffolds. The goal is to better understand the mechanisms driving breast cancer metastasis in order to develop new prevention and treatment strategies.
An Analysis of Risk Factors of Breast Cancer Using Interval Weighted Fuzzy Co...ijcoa
Cancer begins when cells in a part of the body start to grow out of control. Cancer cell growth is different from normal cell growth. Instead of dying, cancer cells continue to grow and form new, abnormal cells. There are many types of cancer. Breast cancer is the second most commonly diagnosed cancer in the world. The risk factors of breast cancer as it are the second major cause of cancer death in among women. FCM have been applied in many fields successfully to show the relationship between the nodes. In this paper analyzing the risk factors of breast cancer by using the (IWFCMs) which is the combination of the Fuzzy Cognitive Maps (FCMs) and CETD matrix in which indeterminacy is included. It has also become very essential that the notion of logic plays a vital role in several of the real world problems like law, medicine, industry, finance, IT, stocks and share etc.
This document provides information on the assessment and management of cancer patients. It begins with learning objectives related to describing cancer incidence and mortality rates, the biology and stages of cancer development, and the nurse's role in cancer prevention, detection, diagnosis, and treatment. It then covers definitions of cancer, the origins and types of cancer cells, the biology of cancer development including defective cell proliferation and differentiation. The document discusses cancer staging and classification systems including TNM and the stages of cancer development. It also outlines common signs and symptoms of cancer, diagnostic tests, and the main goals and treatment modalities of cancer including surgery, radiation therapy, chemotherapy, targeted therapy, palliative care, nuclear medicine, and interventional radiology.
Comprehensive Notes on the Molecular Basis of Cancermeducationdotnet
This document summarizes key aspects of cancer growth and spread. It notes that most benign tumors grow slowly over months to years, while cancers generally grow faster and can metastasize. Cancer stem cells have been identified in some cancers and may sustain tumor growth. Cancers infiltrate and invade surrounding tissue, unlike benign tumors which develop capsules. Metastasis, the growth of secondary tumors in distant sites, is a hallmark of malignancy. Cancers can metastasize through seeding in body cavities, lymphatic spread, or hematogenous spread through the bloodstream.
This document discusses advanced (metastatic) breast cancer, including:
- Breast cancer is the most common cancer in women worldwide, with over 22 million new cases diagnosed in 2020.
- If breast cancer spreads to distant organs, the 5-year survival rate drops to 29%. Common sites of metastasis include bone, lung, liver and brain.
- Advanced breast cancer is typically treated through a combination of surgery, chemotherapy, hormone therapy, targeted therapy and radiation depending on the cancer type, location and stage.
- Staging uses the TNM system to classify tumors by size (T), lymph node involvement (N) and metastasis (M), along with other factors like hormone receptor status. This
Cancer arises from mutations in genes that control cell growth. The disease is characterized by uncontrolled cell division and spread to other parts of the body. Some key points:
- Cancer is one of the most common causes of death, with lung cancer being the top cause in men and breast cancer the top cause in women.
- It is caused by factors like radiation, chemicals from smoking, and virus infections that can damage DNA and cause mutations over time.
- Symptoms vary depending on the cancer type and stage but may include lumps, pain, fatigue, weight loss and more.
- Diagnosis involves medical tests and biopsy of suspicious tissue. Treatment options include surgery, chemotherapy, radiation and more.
Osteosarcoma is a type of bone cancer that usually develops in the osteoblast cells that form bone. It occurs most often in children, adolescents, and young adults. Symptoms may include pain in the affected bone, swelling, limping, and decreased movement. Diagnosis involves medical history, physical exam, blood tests, biopsy of the tumor, and imaging tests like X-rays, CT, MRI, and bone scans. Treatment may include surgery to remove the tumor, chemotherapy, radiation therapy, rehabilitation, and continued follow-up care. Osteosarcoma has a high rate of metastasis, usually to the lungs, so combination therapy is often used for higher-grade tumors.
Solid tumors are abnormal masses of tissue that do not contain cysts or liquid areas. Over 85% of cancers are solid tumors, including cancers of the brain, breast, colon and other tissues. The pathogenesis of solid tumors involves multiple genetic mutations that cause cells to proliferate uncontrollably over several stages, eventually allowing malignant tumors to form and metastasize. Some key mechanisms in tumor development include changes to oncogenes and tumor suppressor genes, alterations in cancer cells that influence growth and structure, and invasion enabling spread through the bloodstream.
Cancer is a disease caused by uncontrolled cell growth that can form tumors. Cancer cells may spread, or metastasize, to other parts of the body. Cancer Cell is a journal focused on cancer research from basic to clinical studies, with an emphasis on translational research. Cancer cells are formed through genetic mutations in normal cells over many years. Cancer cells have properties like unlimited growth, lack of apoptosis and telomere shortening, angiogenesis, and metastasis that make them different from normal cells. Research on cancer prevention and control focuses on altering risky behaviors, increasing cancer screening, and improving diagnosis and survivorship.
Cancer is characterized by uncontrolled growth and spread of abnormal cells. The document defines various cancer terms and risk factors. It describes the hallmarks of cancer cells, including self-sufficiency in growth signals, evading cell death, unlimited replication, angiogenesis, metastasis, avoiding immune destruction, gene mutations, and lack of contact inhibition. Cancer types are classified based on their structure and origin from epithelial, connective, or blood-related tissues. The most common sites and types of cancers in the US are provided.
This document provides an overview of cancer and its genetic basis. It defines cancer as a genetic disorder where normal cell growth control is lost. Cancer arises due to mutations in genes regulating cell proliferation, development, and other functions. These mutated genes, called oncogenes, promote uncontrolled cell growth. The document discusses various cancer risk factors and causes, including genetic predisposition, carcinogens, viruses, and lifestyle factors. It also describes the roles of oncogenes and tumor suppressor genes in cancer development.
Overview of Pediatrics Malignancies Essay.docx4934bk
1) The document provides an overview of pediatric malignancies, discussing topics like leukemia, lymphomas, brain tumors, Wilms' tumor, soft tissue sarcomas, and germ cell tumors.
2) It describes the different types of leukemia seen in children, including acute lymphoblastic leukemia (ALL), which accounts for 80-90% of childhood leukemias.
3) The document also discusses lymphomas, brain tumors, Wilms' tumor, rhabdomyosarcoma, retinoblastoma, and germ cell tumors in children, and provides survival rates for some pediatric cancers.
Breast cancer is the second leading cause of cancer deaths in women. It occurs due to an interaction between environmental and genetic factors. There are two main types - in situ (non-invasive) and invasive (has spread). Diagnosis involves mammograms, ultrasounds, biopsies and other tests. Treatment depends on cancer stage but commonly includes surgery (mastectomy or lumpectomy), chemotherapy, hormone therapy, radiation therapy, and targeted monoclonal antibody therapy. Risk factors include obesity, family history, lifestyle factors. Early detection through screening and awareness is important for improved outcomes.
1. Neoplasia refers to abnormal and uncontrolled cell growth that can be benign or malignant. Benign tumors are slow-growing and localized, while malignant tumors proliferate rapidly and can spread throughout the body.
2. Tumors are classified based on their cell of origin - carcinomas arise from epithelial cells, sarcomas from mesenchymal cells. Special tumor categories include teratomas (derived from multiple germ layers), mixed tumors (containing two cell types), and blastomas (embryonic cell tumors more common in children).
3. Characteristics used to distinguish benign from malignant tumors include rate of growth, degree of differentiation, invasion of surrounding tissues, and metastasis. Malignant tumors
The document provides information about cancer presented by a group of five students. It defines cancer and tumor, discusses the classification, properties, causes and symptoms of cancer. It also covers cell death mechanisms, different types of cancer that can affect various organs, and common cancer treatments.
The document provides information about cancer presented by a group of five students. It defines cancer and tumor, discusses the classification, properties, causes and symptoms of cancer. It also covers cell death mechanisms, different types of cancer that can affect various organs, and common cancer treatments.
Tumors can be benign or malignant. Benign tumors are not cancerous, grow slowly, and rarely spread. Malignant tumors or cancers are life-threatening as they grow quickly, invade nearby tissue, and can spread through metastasis to other parts of the body. Cancers develop through multi-stage processes involving genetic mutations that disrupt normal cell growth and division over many years. Cancers are classified based on their tissue of origin, grade, stage, and other characteristics to determine prognosis and treatment. The major categories are carcinomas, sarcomas, leukemias, lymphomas, and mixed or unknown types.
Cancer is a disease caused by abnormal cell growth and can start anywhere in the body. Cancer cells differ from normal cells in that they grow uncontrollably, invade other tissues, and are often immortal. Cancer is a major cause of death worldwide, with over 10 million new cases and 9.5 million cancer deaths annually. The number of new cancer cases is projected to increase significantly in the coming decades. Some key causes of cancer include tobacco use, poor diet and lack of exercise, certain infections, and genetic factors. Prevention strategies focus on avoiding risk factors and promoting healthy behaviors.
A Presentation on Cancer (Animal Biotech) Sweety.pptxDarshanKaushik6
Cancer is a term used for diseases in which abnormal cells divide without control and are able to invade other tissues. There are over 100 types of cancer that can be categorized as carcinoma, sarcoma, leukemia, lymphoma, myeloma, or central nervous system cancers. Cancers are caused by factors like smoking, diet, viruses, and can have consequences such as high healthcare costs, lost work productivity, and psychosocial problems. Cancers are staged based on tumor size and spread to determine the appropriate treatment, which can include surgery, chemotherapy, radiation therapy, targeted therapy, immunotherapy, and palliative care.
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
This document summarizes a research paper on applying ancient Indian agricultural practices in a cloud computing environment. Some key points:
- The paper proposes an "Agri cloud" model to provide Indian farmers access to digital farming services through cloud computing, allowing improved productivity and livelihoods.
- It discusses establishing "Village Innovation Centers" to provide digital literacy training and resources to farmers to help them access the cloud services.
- The proposed cloud model would offer on-demand services like expert advice, weather data, soil information, training, and marketing assistance to empower farmers.
- The researchers believe this approach can help modernize Indian agriculture using a combination of ancient practices and new technologies.
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
This document summarizes research on sparse representation techniques and optimal algorithms for computer vision tasks. It discusses how sparse representation can provide efficient encoding of images and signals. Two key computer vision problems discussed are face recognition and human pose estimation. The document proposes a model that uses sparse representation and parallel processing algorithms to recognize faces, estimate poses, and convert that information into voice signals to assist visually impaired users in understanding images.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmMangaiK4
Abstract: The amount of information stored in the form of digital has a gigantic growth in this electronic era. Extraction of heterogeneous entities from biomedical documents is being a big challenge as achieving high f-score is still a problem. Text Mining plays a vital role for extracting different types of entities and finding relationship between the entities from huge collection of biomedical documents. We have proposed hybrid approach which includes a Dictionary based approach and a Rule based approach to reduce the number of false negatives and the Random Forest Algorithm to improve f-score measure.
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicMangaiK4
Abstract-Due to scaling in recent trends in modern semiconductor industries, critical instance such as voltage spikes, temperature, interlink between IC circuits has been improvised under the design. The saturation throughput and average message delay are used as performance metrics to evaluate the throughput. We introduced the fuzzy logic based asynchronous NoC to attain the high throughput and diminish the delay between the inter logic circuits aim to select the less congested paths to produce load balance in the network especially under realistic traffic loads. Our Fuzzy logic based routing algorithm is an adaptive, low cost, and scalable. It outperforms against different adaptive routing algorithms in the average delay and saturation throughput for various traffic patterns. STDR can achieve up to 12%–32% average message delay lower than that of other routing algorithms. Moreover, the proposed scheme yields improvements in saturation throughput by up to 11%–82% compared with other adaptive routing algorithms
Abstract - A password is a sequence of characters used to determine whether the user is authenticated or not. Nowadays most of the password is text-based. Since text based password is hard to remember people try to use simple memorable password such as pet names, phone number, etc. which are easy to break by intruders. The main idea behind the paper is to replace the text-based passwords by image based password and encrypt using RSA algorithm. Our experimental result shows that image passwords are easy to remember, better than the text.
More Related Content
Similar to Symptoms of Breast Cancer - An Analysis Using Induced Fuzzy Cognitive Maps (IFCMS)
Comprehensive Notes on the Molecular Basis of Cancermeducationdotnet
This document summarizes key aspects of cancer growth and spread. It notes that most benign tumors grow slowly over months to years, while cancers generally grow faster and can metastasize. Cancer stem cells have been identified in some cancers and may sustain tumor growth. Cancers infiltrate and invade surrounding tissue, unlike benign tumors which develop capsules. Metastasis, the growth of secondary tumors in distant sites, is a hallmark of malignancy. Cancers can metastasize through seeding in body cavities, lymphatic spread, or hematogenous spread through the bloodstream.
This document discusses advanced (metastatic) breast cancer, including:
- Breast cancer is the most common cancer in women worldwide, with over 22 million new cases diagnosed in 2020.
- If breast cancer spreads to distant organs, the 5-year survival rate drops to 29%. Common sites of metastasis include bone, lung, liver and brain.
- Advanced breast cancer is typically treated through a combination of surgery, chemotherapy, hormone therapy, targeted therapy and radiation depending on the cancer type, location and stage.
- Staging uses the TNM system to classify tumors by size (T), lymph node involvement (N) and metastasis (M), along with other factors like hormone receptor status. This
Cancer arises from mutations in genes that control cell growth. The disease is characterized by uncontrolled cell division and spread to other parts of the body. Some key points:
- Cancer is one of the most common causes of death, with lung cancer being the top cause in men and breast cancer the top cause in women.
- It is caused by factors like radiation, chemicals from smoking, and virus infections that can damage DNA and cause mutations over time.
- Symptoms vary depending on the cancer type and stage but may include lumps, pain, fatigue, weight loss and more.
- Diagnosis involves medical tests and biopsy of suspicious tissue. Treatment options include surgery, chemotherapy, radiation and more.
Osteosarcoma is a type of bone cancer that usually develops in the osteoblast cells that form bone. It occurs most often in children, adolescents, and young adults. Symptoms may include pain in the affected bone, swelling, limping, and decreased movement. Diagnosis involves medical history, physical exam, blood tests, biopsy of the tumor, and imaging tests like X-rays, CT, MRI, and bone scans. Treatment may include surgery to remove the tumor, chemotherapy, radiation therapy, rehabilitation, and continued follow-up care. Osteosarcoma has a high rate of metastasis, usually to the lungs, so combination therapy is often used for higher-grade tumors.
Solid tumors are abnormal masses of tissue that do not contain cysts or liquid areas. Over 85% of cancers are solid tumors, including cancers of the brain, breast, colon and other tissues. The pathogenesis of solid tumors involves multiple genetic mutations that cause cells to proliferate uncontrollably over several stages, eventually allowing malignant tumors to form and metastasize. Some key mechanisms in tumor development include changes to oncogenes and tumor suppressor genes, alterations in cancer cells that influence growth and structure, and invasion enabling spread through the bloodstream.
Cancer is a disease caused by uncontrolled cell growth that can form tumors. Cancer cells may spread, or metastasize, to other parts of the body. Cancer Cell is a journal focused on cancer research from basic to clinical studies, with an emphasis on translational research. Cancer cells are formed through genetic mutations in normal cells over many years. Cancer cells have properties like unlimited growth, lack of apoptosis and telomere shortening, angiogenesis, and metastasis that make them different from normal cells. Research on cancer prevention and control focuses on altering risky behaviors, increasing cancer screening, and improving diagnosis and survivorship.
Cancer is characterized by uncontrolled growth and spread of abnormal cells. The document defines various cancer terms and risk factors. It describes the hallmarks of cancer cells, including self-sufficiency in growth signals, evading cell death, unlimited replication, angiogenesis, metastasis, avoiding immune destruction, gene mutations, and lack of contact inhibition. Cancer types are classified based on their structure and origin from epithelial, connective, or blood-related tissues. The most common sites and types of cancers in the US are provided.
This document provides an overview of cancer and its genetic basis. It defines cancer as a genetic disorder where normal cell growth control is lost. Cancer arises due to mutations in genes regulating cell proliferation, development, and other functions. These mutated genes, called oncogenes, promote uncontrolled cell growth. The document discusses various cancer risk factors and causes, including genetic predisposition, carcinogens, viruses, and lifestyle factors. It also describes the roles of oncogenes and tumor suppressor genes in cancer development.
Overview of Pediatrics Malignancies Essay.docx4934bk
1) The document provides an overview of pediatric malignancies, discussing topics like leukemia, lymphomas, brain tumors, Wilms' tumor, soft tissue sarcomas, and germ cell tumors.
2) It describes the different types of leukemia seen in children, including acute lymphoblastic leukemia (ALL), which accounts for 80-90% of childhood leukemias.
3) The document also discusses lymphomas, brain tumors, Wilms' tumor, rhabdomyosarcoma, retinoblastoma, and germ cell tumors in children, and provides survival rates for some pediatric cancers.
Breast cancer is the second leading cause of cancer deaths in women. It occurs due to an interaction between environmental and genetic factors. There are two main types - in situ (non-invasive) and invasive (has spread). Diagnosis involves mammograms, ultrasounds, biopsies and other tests. Treatment depends on cancer stage but commonly includes surgery (mastectomy or lumpectomy), chemotherapy, hormone therapy, radiation therapy, and targeted monoclonal antibody therapy. Risk factors include obesity, family history, lifestyle factors. Early detection through screening and awareness is important for improved outcomes.
1. Neoplasia refers to abnormal and uncontrolled cell growth that can be benign or malignant. Benign tumors are slow-growing and localized, while malignant tumors proliferate rapidly and can spread throughout the body.
2. Tumors are classified based on their cell of origin - carcinomas arise from epithelial cells, sarcomas from mesenchymal cells. Special tumor categories include teratomas (derived from multiple germ layers), mixed tumors (containing two cell types), and blastomas (embryonic cell tumors more common in children).
3. Characteristics used to distinguish benign from malignant tumors include rate of growth, degree of differentiation, invasion of surrounding tissues, and metastasis. Malignant tumors
The document provides information about cancer presented by a group of five students. It defines cancer and tumor, discusses the classification, properties, causes and symptoms of cancer. It also covers cell death mechanisms, different types of cancer that can affect various organs, and common cancer treatments.
The document provides information about cancer presented by a group of five students. It defines cancer and tumor, discusses the classification, properties, causes and symptoms of cancer. It also covers cell death mechanisms, different types of cancer that can affect various organs, and common cancer treatments.
Tumors can be benign or malignant. Benign tumors are not cancerous, grow slowly, and rarely spread. Malignant tumors or cancers are life-threatening as they grow quickly, invade nearby tissue, and can spread through metastasis to other parts of the body. Cancers develop through multi-stage processes involving genetic mutations that disrupt normal cell growth and division over many years. Cancers are classified based on their tissue of origin, grade, stage, and other characteristics to determine prognosis and treatment. The major categories are carcinomas, sarcomas, leukemias, lymphomas, and mixed or unknown types.
Cancer is a disease caused by abnormal cell growth and can start anywhere in the body. Cancer cells differ from normal cells in that they grow uncontrollably, invade other tissues, and are often immortal. Cancer is a major cause of death worldwide, with over 10 million new cases and 9.5 million cancer deaths annually. The number of new cancer cases is projected to increase significantly in the coming decades. Some key causes of cancer include tobacco use, poor diet and lack of exercise, certain infections, and genetic factors. Prevention strategies focus on avoiding risk factors and promoting healthy behaviors.
A Presentation on Cancer (Animal Biotech) Sweety.pptxDarshanKaushik6
Cancer is a term used for diseases in which abnormal cells divide without control and are able to invade other tissues. There are over 100 types of cancer that can be categorized as carcinoma, sarcoma, leukemia, lymphoma, myeloma, or central nervous system cancers. Cancers are caused by factors like smoking, diet, viruses, and can have consequences such as high healthcare costs, lost work productivity, and psychosocial problems. Cancers are staged based on tumor size and spread to determine the appropriate treatment, which can include surgery, chemotherapy, radiation therapy, targeted therapy, immunotherapy, and palliative care.
Similar to Symptoms of Breast Cancer - An Analysis Using Induced Fuzzy Cognitive Maps (IFCMS) (16)
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
This document summarizes a research paper on applying ancient Indian agricultural practices in a cloud computing environment. Some key points:
- The paper proposes an "Agri cloud" model to provide Indian farmers access to digital farming services through cloud computing, allowing improved productivity and livelihoods.
- It discusses establishing "Village Innovation Centers" to provide digital literacy training and resources to farmers to help them access the cloud services.
- The proposed cloud model would offer on-demand services like expert advice, weather data, soil information, training, and marketing assistance to empower farmers.
- The researchers believe this approach can help modernize Indian agriculture using a combination of ancient practices and new technologies.
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
This document summarizes research on sparse representation techniques and optimal algorithms for computer vision tasks. It discusses how sparse representation can provide efficient encoding of images and signals. Two key computer vision problems discussed are face recognition and human pose estimation. The document proposes a model that uses sparse representation and parallel processing algorithms to recognize faces, estimate poses, and convert that information into voice signals to assist visually impaired users in understanding images.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmMangaiK4
Abstract: The amount of information stored in the form of digital has a gigantic growth in this electronic era. Extraction of heterogeneous entities from biomedical documents is being a big challenge as achieving high f-score is still a problem. Text Mining plays a vital role for extracting different types of entities and finding relationship between the entities from huge collection of biomedical documents. We have proposed hybrid approach which includes a Dictionary based approach and a Rule based approach to reduce the number of false negatives and the Random Forest Algorithm to improve f-score measure.
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicMangaiK4
Abstract-Due to scaling in recent trends in modern semiconductor industries, critical instance such as voltage spikes, temperature, interlink between IC circuits has been improvised under the design. The saturation throughput and average message delay are used as performance metrics to evaluate the throughput. We introduced the fuzzy logic based asynchronous NoC to attain the high throughput and diminish the delay between the inter logic circuits aim to select the less congested paths to produce load balance in the network especially under realistic traffic loads. Our Fuzzy logic based routing algorithm is an adaptive, low cost, and scalable. It outperforms against different adaptive routing algorithms in the average delay and saturation throughput for various traffic patterns. STDR can achieve up to 12%–32% average message delay lower than that of other routing algorithms. Moreover, the proposed scheme yields improvements in saturation throughput by up to 11%–82% compared with other adaptive routing algorithms
Abstract - A password is a sequence of characters used to determine whether the user is authenticated or not. Nowadays most of the password is text-based. Since text based password is hard to remember people try to use simple memorable password such as pet names, phone number, etc. which are easy to break by intruders. The main idea behind the paper is to replace the text-based passwords by image based password and encrypt using RSA algorithm. Our experimental result shows that image passwords are easy to remember, better than the text.
A Framework for Desktop Virtual Reality Application for EducationMangaiK4
This document discusses the development of a virtual reality (VR) application for educational purposes. It begins by outlining the benefits of field visits for students but also notes the limitations of physical access. To address this, the document proposes a desktop VR application that can integrate different sources of information about the real world. It reviews literature on educational VR applications and design principles. The proposed application aims to link various types of information within a single screen to promote better learning compared to conventional materials. The document discusses evaluating the application for usability and learning effectiveness. Overall, the VR application is intended to provide students with an interactive virtual field visit experience while integrating multiple information sources for enhanced learning.
Smart Security For Data Sharing In Cloud ComputingMangaiK4
Abstract-- In these computational world security is the major Problem. Because the hackers are growing day by day. Here majorly attacker’s attacks mostly while sharing or sending the data. So here we are using PAAS i.e. windows azure as the storage which is one of the service in cloud. So to provide the security for the data here we come up with an RSA (encryption and decryption) algorithm. This is one of the security mechanism to protect the private data over the cloud.
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachMangaiK4
This document summarizes a research paper that proposes a new algorithm called BugLoc for detecting bugs in multi-threaded software applications via graph mining. The algorithm uses an object template to store graph data from a sample dataset in order to reduce complexity. It then calculates threshold values and identifies frequent subgraphs to detect the exact location of software bugs. The experimental results showed that the BugLoc algorithm is efficient, accurate and scalable for large graph datasets in bug localization.
Motion Object Detection Using BGS TechniqueMangaiK4
Abstract--- The detection of moving object is an important in many applications such as a vehicle identification in a traffic monitoring system,human detection in a crime branch.In this paper we identify a vehicle in a video sequence.This paper briefly explain the detection of moving vehicle in a video.We introduce a new algorithm BGS for idntifying vehicle in a video sequence.First, we differentiate the foreground from background in frames by learning the background.Then, the image is divided into many small nonoverlapped frames. The candidates of the vehicle part can be found from the frames if there is some change in gray level between the current image and the background.The extracted background subtraction method is used in subsequent analysis to detect a vehicle and classify moving vehicle
Encroachment in Data Processing using Big Data TechnologyMangaiK4
Abstract—The nature of big data is now growing and information is present all around us in different kind of forms. The big data information plays crucial role and it provides business value for the firms and its benefits sectors by accumulating knowledge. This growth of big data around all the concerns is high and challenge in data processing technique because it contains variety of data in enormous volume. The tools which are built on the data mining algorithm provides efficient data processing mechanisms, but not fulfill the pattern of heterogeneous, so the emerging tools such like Hadoop MapReduce, Pig, SPARK, Cloudera, Impala and Enterprise RTQ, IBM Netezza and Apache Giraphe as computing tools and HBase, Hive, Neo4j and Apache Cassendra as storage tools useful in classifying, clustering and discovering the knowledge. This study will focused on the comparative study of different data processing tools, in big data analytics and their benefits will be tabulated.
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesMangaiK4
Abstract—Security is a most important field of research work for sending and receiving of data in secret way over the network.Cryptographyis a method for securing transformation like image, audio, video, text without any hacking problem.Encryption and Decryption are two methods used to secure the data. Image compression technique used to reducing the size of an image for effective data communication. There are variety of algorithms has been proposed in the literature for securing images using encryption/decryption techniques and reduce the size of images using image compression techniques. These techniques still need improvement to overcome issues, challenges and its limitations. Hence in this research work a hybrid method which combines securing image using RSA, hill cipher and 2bit rotation and compressing of images using lossless compression algorithm has been proposed. This method compared to execution time of existing method. This method secures the image and reduces the size of the image for data communication over the internet. This method is suitable for various applications uses images like remote sensing, medical and Spatio-temporal.
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
Abstract - Security and privacy for a data transmission become a major concern due to rise of internet usage. Many developers are working continuously to make an internet safe environment, but the intruders are very smart to hack the information. For that, two entities communicating need to communicate in a way which is not susceptible to listen in or interception. So every organization uses many data encryption techniques to secure their communication. There are two security mechanisms called, Cryptography and Steganography are being applied. By merging these techniques, two level of information security is achieved. This paper discuss about the way of working Cryptography and Steganography and their different approaches.
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmMangaiK4
Abstract - Multiple-instance learning (MIL) is a speculation of supervised learning which tends to the order of bags. Like customary administered adapting, the greater part of the current MIL work is proposed in light of the suspicion that a delegate preparing set is accessible for a legitimate learning of the classifier. To manage this issue, we propose a novel Sphere-Description-Based approach for Multiple-Instance Learning (SDB-MIL). SDB-MIL takes in an ideal circle by deciding a substantial edge among the examples, and in the meantime guaranteeing that every positive sack has no less than one occasion inside the circle and every negative bags are outside the circle. In genuine MIL applications, the negative information in the preparation set may not adequately speak to the dispersion of negative information in the testing set. Thus, how to take in a proper MIL classifier when a delegate preparing set isn't accessible turns into a key test for genuine MIL applications. From the viewpoint of human examiners and approach producers, determining calculations must influence precise expectations as well as give to sup porting proof, e.g., the causal components identified with the occasion of intrigue. We build up a novel different example learning based approach that mutually handles the issue of recognizing proof based originators and conjectures occasions into what's to come. In particular, given a gathering of spilling news articles from different sources we build up a settled various occurrence learning way to deal with figure noteworthy societal occasions, for example, protests. Substantial investigates the benchmark and true MIL datasets demonstrate that SDB-MIL gets measurably preferable arrangement execution over the MIL strategies thought about.
Abstract: The common challenge for machine learning and data mining tasks is the curse of High Dimensionality. Feature selection reduces the dimensionality by selecting the relevant and optimal features from the huge dataset. In this research work, a clustering and genetic algorithm based feature selection (CLUST-GA-FS) is proposed that has three stages namely irrelevant feature removal, redundant feature removal, and optimal feature generation. The performance of the feature selection algorithms are analyzed using the parameters like classification accuracy, precision, recall and error rate. Recently, an increasing attention is given to the stability of feature selection algorithms which is an indicator that requires that similar subsets of features are selected every time the algorithm is executed on the same dataset. This work analyzes the stability of the algorithm on four publicly available dataset using stability measurements Average normal hamming distance(ANHD), Dices coefficient, Tanimoto distance, Jaccards index and Kuncheva index.
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...MangaiK4
Abstract—This correlational study investigates whether Mathematics has a role in the performance of the students in their programming courses. Students’ grade points from their basic mathematics and programming courses were collected and correlated, specifically the grade points of the exiting Advanced-Diploma students from Semester 1 of Academic year 2016-2017 of Shinas College of Technology in Oman. Determining the relationship was analyzed through the use of Pearson r. Hypothesis is tested and the results of the correlation were established.
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...MangaiK4
Abstract — Nowadays healthcare field has additional data mining process became a crucial role to use for disease prediction. Data mining is that the process of investigate up info from the huge information sets. The medical information is extremely voluminous. Therefore the investigator is extremely difficult to predict the disease is challenging. To overcome this issue the researchers use data mining processing technique like classification, clustering, association rules so on. The most objective of this analysis work is to predict disease supported common attributes intake of alcohol, smoking, obesity, diabetes, consumption of contaminated food, case history of liver disease using classification algorithm. The algorithms employed in this analysis work are J48, Naive Bayes. These classification algorithms are compared base on the performance factors accuracy and execution time. The investigational results could be a improved classifier for predict the liver disease.
Marine Object Recognition using Blob AnalysisMangaiK4
Abstract: In this paper, a new method of marine object recognition using blob analysis has been proposed, which is suitable to general objects recognition. A powerful foreground blob analysis is proposed to classify frontal areas. Conventionally, the main focus of the objects is recognized by prepared researchers through towed nets and human perception, which make much cost and hazard administrators and animals. Specific marine objects, box jellyfish and ocean snake, are effectively recognized in this work. Experiments conducted on picture datasets gathered by the Australian Institute of Marine Science (AIMS) demonstrate the adequacy of the proposed strategy.
Implementation of High Speed OFDM Transceiver using FPGAMangaiK4
Abstract - Proficient, multi mode and re-configurable architecture of interleaver/de-interleaver for multiple standards, like DVB, OFDM and WLAN is presented. Interleaver plays vital role in 4G technologies to recover symbols from burst errors. The aim of our work is to design a reconfigurable modulation technique called Adaptive modulation scheme uses QAM, QPSK and BPSK modulation that adapt themselves based on channel Signal to Noise ratio. Subcarrier allocation algorithm specifically used to focus on utilizing channels with high gains. Our proposed model can achieves a data rate of min 2.5 Gbps as per 3GPP standard by adaptive modulation technique using QAM, BPSK and QPSK.
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...MangaiK4
Abstract - Renewable energy is used in the current fed switched inverter for high power production. High voltage support, wide yield ranges of operation, shoot-through resistance are a portion of the desired properties of an inverter for a reliable, versatile and less ripple AC inversion. This paper proposes a single stage, high boost inverter with buck-boost capacity which has a few particular advantages over traditional voltage source inverters (VSI) like better EMI noise, wide input and output voltage range of operation, and so on. The proposed inverter is named as Current-Fed Switched Inverter (CFSI). A renewable energy based converter structure of CFSI has been created which supplies both AC and DC loads, at the same time, from a single DC supply which makes it reasonable for DC smart grid application. This paper proposes the operation and control of a CFSI based converter which directs the AC and DC conversion voltages at their reference. The advancement of the proposed converter from essential current fed DC/DC topology is explained. The closed loop controller is verified by using the MATLAB/ Simulink environment.
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Symptoms of Breast Cancer - An Analysis Using Induced Fuzzy Cognitive Maps (IFCMS)
1. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03 Issue: 02 June 2014 Pages: 138-141
ISSN: 2278-2397
138
Symptoms of Breast Cancer – An Analysis Using
Induced Fuzzy Cognitive Maps (IFCMS)
M. Albert William, A. Victor Devadoss, T. Pathinathan, J. Janet Sheeba
Department of Mathematics, Loyola College, Tamilnadu, India
Abstract - Cancer is a disease in which cells become abnormal
and form more cells in an uncontrolled way. With breast
cancer, the cancer begins in the tissues that make up the
breasts. The cancer cells may form a mass called a tumor.
(Note: Not all tumors are cancer.) They may also invade
nearby tissue and spread to lymph nodes and other parts of the
body. The most common types of breast cancer are: Ductal
carcinoma – Cancer that begins in the ducts and grows into
surrounding tissues. About 8 in 10 breast cancers are this type.
Lobular carcinoma (LAH-byuh-luhr KAR-sih-NOH-muh) –
Cancer that begins in lobules and grows into surrounding
tissues. About 1 in 10 breast cancers are this type. Hence, this
research investigatesthemostcontributing /impactful factor of
s y m p t o m s o f b r e a s t c a n c e r using Induced Fuzzy
Cognitive Maps (IFCMs). IFCMs area fuzzy-graph modeling
approach based on expert’s opinion. This is the non-statistical
approachtostudytheproblemswithimpreciseinformation. In
thecurrent study, Section 1 introduction about cancer.
Section 2 overviews the Fuzzy CognitiveMapstheory,andits
influence.Section 3explainsthe Algorithmic approachofIFCM
models.Section 4discussesthe components (attributes)
symptoms of breast cancer and implementationof
IFCMmodeland Section5revealsthe conclusion of the
problem.
Keywords- Breast cancer, IFCM, Symptoms.
I. INTRODUCTION
Cancer is the general name for a group of more than 100
diseases. Although there are many kinds of cancer, all cancers
start because abnormal cells grow out of control. The body is
made up of trillions of living cells. Normal body cells grow,
divide, and die in an orderly fashion. During the early years of
a person’s life, normal cells divide faster to allow the person to
grow. After the person becomes an adult, most cells divide
only to replace worn-out or dying cells or to repair injuries[1].
By Dr Ananya Mandal, MD says that “Cancer possess the
same common properties of:
abnormal cell growth
capacity to invade other tissues
capacity to spread to distant organs via blood vessels or
lymphatic channels (metastasis)
Untreated cancers can cause serious illness by invading healthy
tissues and lead to death”[2].FuzzyCognitive Maps (FCMs) isa
well established techniqueforpredictionand
decisionmakingespeciallyfor situations wherefuzzinessand
uncertainty exists. To deal imprecise information, Lofti
A.Zadeh,1965,introduced the notionof fuzziness.In
1986,Kosko[3],theguruof fuzzylogic introduced
theFuzzyCognitiveMaps.Itwasafuzzyextension oftheCognitive
Map pioneered in1976 byPoliticalScientist
RobertAxelrod,whousedit to representknowledgeasan
interconnected, directed, bi-level-logic graph. Thus the FCM
plays a vital role in modeling system. This paper describes the
method of analyzing the most contributingfactor symptoms
of breast cancerusingInducedFuzzy Cognitive
Maps(IFCMs) which was introduced by T. Pathinathan[13] and
which isthe advanced studyof FCM[4,5]. It is worth
mentioning here, thebookentitled ‘FCMs and Neutrosophic
Cognitive Maps’ byVasantha and Smarandache, 2003[6].
ThisbookinfersthatFCMsstronglyresemble neural networks
andpowerful forreaching consequencesasa
mathematicaltoolformodelingcomplexsystems Implicationsfor
interdisciplinaryreading:National Implicationby
Calais[7],FCMbasedtoolforpredictionof
infectiousdiseasesbyElpiniki etal.,[7],Benefitsofliteracyin
BhutanbyDevadoss etal.[8], Problemfaced by bonded
labourersnearKodaikanal forests discussed andsolution given
byVasantha[9]arenotablestudiesinthisareaofresearch.In all
theabovestudies,thevariousreallifewithimprecise information
takenandtheprecisesolutions givenbyFCMand
itsadvancedstudies.
II. FUZZYCOGNITIVEMAPS
FuzzyCognitiveMaps(FCMs) are digraphs that capture the
cause/effect relationship inasystem. Nodesofthegraphstand
fortheconceptsrepresentingthekey factorsandattributesof the
modeling system, such asinputs, variable states, components
factors,events,actionsof anysystem.Signedweightedarcs
describe thecausal relationships, whichexists amongconcepts
and interconnect them, with adegreeof causality. The
constructed graph clearly shows how concepts influence each
otherandhowmuchthedegree of influenceis. Cognitive
Maps(CMs) wereproposed fordecision making by Axelrod[10]
for the firsttime. Using two basic types of elements; concepts
and causal relationship, the cognitive map canbeviewed
asasimplified mathematical model of a belief
system.FCMswereproposedwiththe extensionof the fuzzified
causal relationships. Kosko[3],introducedFCMsasfuzzygraph
structuresforrepresenting causalreasoning.Whenthenodesof
theFCMarefuzzysetsthentheyarecalledfuzzynodes.FCMs
withedgeweightsorcausalitiesfromtheset{-1,0, 1} arecalled
simpleFCMs. Consider thenodes/concepts P1,P2,
P3,…,PnoftheFCM.
Supposethedirectedgraphisdrawnusingedgeweighteijfrom {-
1,0,1}. Thematrix Mbedefined byM= (eij) whereeijisthe
weightof thedirectededgePiPj.Mis calledthe adjacency
matrixoftheFCM,also known as connection matrix.Thedirected
2. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03 Issue: 02 June 2014 Pages: 138-141
ISSN: 2278-2397
139
edgeeijfromthecausalconcept Pito concept
PjmeasureshowmuchPicausesPj.Theedgeeijtakesvaluesintherea
linterval[−1,1].
eij=0indicatesnocausality.
eij>0indicatescausalincrease/Positivecausality.
eij<0indicatescausaldecrease/Negativecausality.
Simple FCMs provide quick first-hand information to an
expert’s stated causal knowledge. Let P1,P2, P3,…,Pnbe the
nodesof FCM. Let A=(a1,a2, …,an) iscalledastate vector
whereeitherai=0or1.Ifai=0,theconceptaiintheOFFstate
andifai=1, theconceptaiintheONstate,fori=1,2, …,n. LetP1P2,
P2P3, …,PiPj.betheedgesoftheFCM(i ≠ j). Then the edges
formadirected cycle.
III. ANFCMISSAID TO BE CYCLIC IF IT POSSESSES
A DIRECTED CYCLE
AnFCMwithcyclesis saidtohaveafeedback,whenthereisa
feedbackinanFCM,i.e.,whenthecausalrelationsflowthrough
acycleinarevolutionary way,theFCMiscalledadynamical
system.Theequilibriumstateforthedynamicalsystemiscalled
thehiddenpattern.Iftheequilibrium stateofadynamical state isa
uniquestatevector,itiscalledafixedpointorlimitcycle.
Inferencefromthehiddenpatternsummarizesthejointeffectsof
allinteractingfuzzyknowledge.
A. Algorithmic approach in IFCM
EventhoughIFCM isanadvancement ofFCMitfollows
thefoundationof FCM,ithasa slightmodificationonlyin
Algorithmic approaches. Toderiveanoptimistic solutiontothe
problem with anunsupervised data,the following steps tobe
followed:
Step 1:For the given model( problem),collect the
unsupervised data that is indeterminant factors called
nodes.
Step 2: According to the expert opinion, draw the directed
graph.
Step 3: Obtain theconnectionmatrix, M1,from the directed
graph (FCM). Herethenumber ofrowsinthegivenmatrix
= numberofstepstobeperformed.
Step 4: Consider thestatevector S(X1).by setting
1
c inONposition thatisassigningthefirst
componentofthevectortobe1andthe rest of
thecomponents as 0.Find S(X1) × M1.The state vector
isupdated and threshold at eachstage.
Step 5: Threshold value is calculated by assigning 1 for the
values>0and0forthevalues<1.Thesymbol‘↪’represents
thethresholdvaluefortheproductoftheresult.
Step 6:Now eachcomponent in theC1vectoris taken
separatelyand productof the givenmatrix is calculated.
The vector which has maximum number of one’sis
found. The vector with maximum number of one’s
which occursfirst is consideredas C2.
Step7:Whenthesamethresholdvalueoccurstwice.Thevalue
isconsideredasthefixedpoint.Theiterationgetsterminated.
Step8:ConsiderthestatevectorC1bysettingC2inONstatethatisassi
gningthesecondcomponentofthevectortobe1andthe rest
of thecomponents as 0.Proceedthe calculations
discussedinSteps4to6.
Step9:Continue Step9 for all the state vectors and find hidden
pattern.
IV. ABOUT BREAST CANCER
Breast cancer is a disease in which certain cells in the breast
become abnormal and multiply without control or order to
form a tumor. The most common form of breast cancer begins
in cells lining the ducts that carry milk to the nipple (ductal
cancer). Other forms of breast cancer begin in the glands that
produce milk (lobular cancer) or in other parts of the breast.
Early breast cancer usually does not cause pain and may
exhibit no noticeable symptoms. As the cancer progresses,
signs and symptoms can include a lump or thickening in or
near the breast; a change in the size or shape of the breast;
nipple discharge, tenderness, or retraction (turning inward);
and skin irritation, dimpling, or scaliness. These changes can
occur as part of many different conditions, however. Having
one or more of these symptoms does not mean that a person
definitely has breast cancer. In some cases, cancerous tumors
can invade surrounding tissue and spread to other parts of the
body. If breast cancer spreads, cancerous cells most often
appear in the bones, liver, lungs, or brain. Tumors that begin at
one site and then spread to other areas of the body are called
metastatic cancers. A small percentage of all breast cancers
cluster in families. Hereditary cancers are those associated with
inherited gene mutations. Hereditary breast cancers tend to
occur earlier in life than non inherited (sporadic) cases and are
more likely to involve both breasts.
Researchers estimate that more than 178,000 new cases of
invasive breast cancer will be diagnosed in U.S. women in
2007. Most breast cancers occur in women, but they can also
develop in men. Scientists estimate that more than 2,000 new
cases of breast cancer will be diagnosed in men in 2007.An
estimated 5 percent to 10 percent of all breast cancers are
hereditary. Particular mutations in genes associated with breast
cancer are more common among certain geographic or ethnic
groups, such as people of Ashkenazi (central or eastern
European) Jewish heritage and people of Norwegian, Icelandic,
or Dutch ancestry. Particular genetic changes occur more
frequently in these groups because they have a shared ancestry
over many generations[11] The crude breast cancer cases in
urban Indian women is 25-30 and the age adjusted rate is 30-35
new cases per 1,00,000 women per year. Breast cancer is
increasing – the average increase over a 30 year period in
Mumbai was 11 per cent per decade Breast cancer is increasing
both in young (11per cent per decade) and old women (16per
cent per decade) There are an estimated 1,00,000-1,25,000 new
breast cancer cases in India every year. The number of
breastcancercases in India is estimated to double by 2025[12].
A. Symptoms of Breast Cancer
In its early stages, breast cancer usually has no symptoms. As a
tumor develops, you may note the following signs:A lump in
the breast or underarm that persists after your menstrual cycle.
This is often the first apparent symptom of breast cancer.
Lumps associated with breast cancer are usually painless,
3. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03 Issue: 02 June 2014 Pages: 138-141
ISSN: 2278-2397
140
although some may cause a prickly sensation. Lumps are
usually visible on a mammogram long before they can be seen
or felt.
Swelling in the armpit.
Pain or tenderness in the breast. Although lumps are
usually painless, pain or tenderness can be a sign of breast
cancer.
A noticeable flattening or indentation on the breast, which
may indicate a tumor that cannot be seen or felt.
A marble-like area under the skin.
Any change in the size, contour, texture, or temperature of
the breast. A reddish, pitted surface like the skin of an
orange could be a sign of advanced breast cancer.
A change in the nipple, such as a nipple retraction,
dimpling, itching, a burning sensation, or ulceration. A
scaly rash of the nipple is symptomatic of Paget's disease,
which may be associated with an underlying breast cancer.
Unusual discharge from the nipple that may be clear,
bloody, or another color. It's usually caused by benign
conditions but could be due to cancer in some cases.
An area that is distinctly different from any other area on
either breast.
B. Adaptation of IFCM to the problem
To analyze the symptoms of breast cancer, we have interviewed
and discussed with 100 women in different ages from 26 to 65 in
adyar cancer institute and with the experts opinion we have taken
the following attributes.
1
c - swelling of all or part of the breast
2
c - skin irritation or dimpling
3
c - breast pain
4
c - nipple pain or the nipple turning inward
5
c - redness, scaliness, or thickening of the nipple or breast
skin
6
c - a nipple discharge other than breast milk
7
c - a lump in the underarm area
Figure-1
Figure-1 gives the directed graph with 1
c , 2
c , …, 7
c as nodes
The connection matrix 1
M related to the graph in Figure-1. is
given below.
1
0 0 1 1 0 1 1
0 0 1 0 1 0 0
0 0 0 1 0 1 0
0 0 0 0 1 1 0
0 0 1 1 0 0 0
0 0 0 1 0 0 0
0 0 1 0 1 0 0
M
Step 1-Let us consider S(X1) in the step1, by setting the concept
1
c to ON state i.e., the first component of the vector is set to be
1 and the rest are assigned to 0.
S(X1) = ( 1 0 0 0 0 0 0 )
S(X1)M1= ( 0 0 1 1 0 1 1 )
↪( 0 0 1 1 0 1 1 )= C0
’
C0
’
M1 ≈
( 0 0 1 0 0 0 0 )M1 = ( 0 0 0 1 0 1 0 )
=C1.
( 0 0 0 1 0 0 0 )M1 = ( 0 0 0 0 1 1 0 )
( 0 0 0 0 0 1 0 )M1 = ( 0 0 0 1 0 0 0 )
( 0 0 0 0 0 0 1 )M1 = ( 0 0 1 0 1 0 0 )
C1M1=( 0 0 0 1 1 1 0)↪(0 0 0 1 1 1 0 )
( 0 0 0 1 0 0 0 )M1 = ( 0 0 0 0 1 1 0 )
=C2
( 0 0 0 0 1 0 0 )M1 = ( 0 0 1 1 0 0 0 )
( 0 0 0 0 0 1 0 )M1 = ( 0 0 0 1 0 0 0 )
C2M1 = ( 0 0 1 2 0 0 0 )↪
( 0 0 1 1 0 0 0 )
( 0 0 1 0 0 0 0 )M1 = ( 0 0 0 1 0 1 0 )
= C3 = C1.
( 0 0 0 1 0 0 0 )M1 = ( 0 0 0 0 1 1 0 )
The fixed point is ( 0 0 0 1 0 1 0 ) When the same threshold
value occurs twice, the value is considered as the fixed point.
The iteration gets terminated and the calculation gets
terminated. When the first attribute is kept in ON state, we get
the triggering pattern asC1⇒C3⇒C4⇒C3Similarly, we get the
following table, which gives the triggering pattern for each
step.
Table:1
Stepno AttributeON Triggering pattern
Step 1
1
c 1
c ⇒ 3
c ⇒ 4
c ⇒ 3
c
Step 2
2
c 2
c ⇒ 3
c ⇒ 4
c ⇒ 3
c
Step 3
3
c 3
c ⇒ 4
c ⇒ 3
c
Step 4
4
c 4
c ⇒ 5
c ⇒ 4
c
Step 5
5
c 5
c ⇒ 3
c ⇒ 4
c ⇒ 3
c
Step 6
6
c 6
c ⇒ 4
c ⇒ 3
c ⇒ 4
c
Step 7
7
c 7
c ⇒ 3
c ⇒ 4
c ⇒ 3
c
Merging all these induced paths on a singlegraph we obtainthe
following Graph.
4. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03 Issue: 02 June 2014 Pages: 138-141
ISSN: 2278-2397
141
Figure-2
V.CONCLUSION
From the above calculation, breast painand nipple pain or the
nipple turning inwardis the main symptom to alert one to the
medical verification of breast cancer. We have observed that
when any one of the symptoms of breast cancer (attributes) is
switched onto ON state, 3
c and 4
c goes to ON state.The
Induced FCM method clearly highlights the interrelationship
with all the other attributes to the symptom of breast pain and
nipple pain or the nipple turning inward pain in breast.
REFERENCES
[1] http://www.cancer.org/cancer/cancerbasics/ what-is-cancer.
[2] [http://www.newsmedical.net/health/What- is-Cancer.aspx.
[3] Kosko, B., January, “Fuzzy Cognitive Maps”, International journal of
man-machine studies, pp.62-75, (1986).
[4] Stephen. S., Vivin Arokia Raj.T., and Clement King. A., Analysis of
the Real world Problems using Induced Fuzzy Cognitive Maps
(IFCM), (2008).
[5] Ritha.W., Mary Mejrullo Merlin. M., Predictors of interest in cosmetic
surgery-An analysis using induced fuzzy cognitivemaps (IFCMs).
Annals of FuzzyMathematics and Informatics, (2), pp.161-169,
(2011).
[6] VasanthaKandasamy. W.B., and FlorentinSmarandache, Fuzzy
Cognitive Maps and Neutrosophic Cognitive Maps, Copyright, 510E,
Townley Ave, USA, (2003).
[7] Gerald J. Calais, Fuzzy Cognitive Maps Theory: Implications for
Interdisciplinary Reading, National Publications FOCUS on Colleges
2 ,pp.1–15, (2008).
[8] Victor Devadoss. A., Vijayakumar. G., and SingyeNamgyel,
Sustainable development of Teacher Education in Bhutan, (2007).
[9] VasanthaKandasamy. W.B., Narayanamoorthy. S., and Mary John,
Study of problems faced by bonded labourers near Kodaikanal forests
using FCMs, (2008).
[10] Axelrod. R., Structure of Decision, the cognitive maps of Political
Elites, Princeton, NJ: Princeton University Press,(1976).
[11] http://ghr.nlm.nih.gov/condition/breast- cancer.
[12] “The Times Of India” – news paper in Chennai, Oct 20, (2012).
[13] Vasantha,W.B., and Pathinathan,T., “LinkedFuzzy Relational maps to
study the relation between migration and school dropouts in
TamilNadu”. Ultra.Sci.17, 3(M), pp. 441- 465,(2005)