BREAST CARCINOMA TUMOR ICTS2005 The Proceeding
2. BREAST CARCINOMA TUMOR
Molecular Biology explains that cancer is caused by genetics mutation of BRCa1 and BRCa2. Around 2 of the cases show that this spontaneous mutation happens because of environmental effect. Based on epidemiology, breast carcinoma tumor caused by some factors called risk factors like age, hormone, diet, virus, radiation, others tumor sufferers and the wrong life pattern. Breast carcinoma develops mostly in dictums then goes through the parenchyma. The spread of this disease goes through the axial lymph local metastasis , then systemic. Further Metastasis can attack to the bone, lungs, and liver. Patient Prognosis is determined based on the spread and potency metastasis. But, without therapy, the ability to survive for the sufferers during 5 years is 16-22 and for 10 years is 1-5 . The survival ability of these sufferers is determined by the stage of the disease, treatment, histopathology description, estrogen and progesterone receptor and other bimolecular signals. Seen from oncology, immunity factor hold an important role towards the occurrence of this disease especially the violation to the immune system which affects the vicious cell formation. Tunor cell is a foreign material in the body with specific antigen arrangement. This material can trigger the immune response so that it is called as tumor associated antigen TAA. TAA is a surface antigen which rise the specific immune e response if injected to the same hospes. The individual response toward the tumor cell development is different because: 1. Body rejection because of incompatibilty 2. Body reception toward the foreign material. 3. the grow of that foreign material in the Genetically T cell is the host in controlling the tumor grows. That cell has the death ability directly the tumor cell through immune system activation. There are 2 kinds of T cell, CD 4 and CD 8; CD 4 will stimulate the emition of any mediator and induct any inflamation respon and CD 8, beside it has the ability to produce limfokin, themani thing is that its ability to kill the tumor cell directly. T cell has the memory to face the tumor cell through the change of T cell surface.one form of the change antigen is CD 44 on the surface of T cell membrane. The recent study expresses that CD 44 gene as the main indicator in diagnosing cancer, mestatasis diagnostic, and control the cure. CD 44 is molecule in leucocyt cell which take part in cell mediated community, limphocyt recirculation, T cell activation, adhetion to the other cells, intercellular matrix, hyaluronida metabolism, signals transduction through membrane cell and secretion. Through the complex mechanism, gens regulate the cell funtion and there is an expression change of the savage of the tumor. Based on this funtion, CD 44 expression is related to the metastasis in cancer Azamris dkk,2003.3. WATERSHED ALGORITHM
Parts
» INTRODUCTION ICTS2005 The Proceeding
» Opening Fundamental Operations of Mathematical Morphology
» Morphological filter Filter theorem
» Granulometry and size distribution
» PGPC texture model and estimation of the optimal structuring element: The PGPC
» CONCLUSIONS ICTS2005 The Proceeding
» Non-ergodicity parameters RESULTS AND DISCUSSIONS 1 Partial structure factors and
» SIMULATIONS CONCLUSION ICTS2005 The Proceeding
» IMAGE RECONSTRUCTION SYSTEM DESIGN
» RESULT CONCLUSION ICTS2005 The Proceeding
» MULTI-RESOLUTION HISTOGRAM TECHNIQUE DATA
» VALIDATION STRATEGY RESULTS AND DISCUSSION
» CONCLUSION ICTS2005 The Proceeding
» INTRODUCTION DISTILATION COLUMN AND ARTIFICIAL NEURAL NETWORK
» Using Temperature Correlation Using Flow Rate Correlation
» INTRODUCTION DETECTION OF SINGLE TREE FELLING WITH SOFT
» Supervised Fuzzy c-means Method
» Neural Network classification METHOD 1. Datasets
» Neural Network Classification Results
» Comparison of Classification Results
» DISCUSSIONS ICTS2005 The Proceeding
» CONCLUSION ACKNOWLEDGEMENT ICTS2005 The Proceeding
» Caching Access List BANDWIDTH MANAGEMENT IMPLEMENTATION
» Rate Limiting BANDWIDTH MANAGEMENT IMPLEMENTATION
» BANDWIDTH MANAGEMENT CONCEPTS RESULT
» The Architecture of UML Elements Model Element
» Diagram Element Editing SYSTEM ARCHITECTURE
» Server Application Architecture Undo
» INTRODUCTION IMPLEMENTATION TESTING ICTS2005 The Proceeding
» INTRODUCTION E-PURSE ICTS2005 The Proceeding
» Interfaces Verification Tool POS – Smart Card
» MULTI AGENT SYSTEM MAS A WEIGHTED-TREE SIMILARITY ALGORITHMS
» RESULTS ICTS2005 The Proceeding
» Facial Animation Morphing and Deformation Cross Dissolve
» Feature Morphing Mesh Morphing Text-to-Speech TTS Basic Block
» Text-to-Video Algorithm Text-To-Video Stake And Desain
» Suggestion CONCLUSION AND SUGGESTION 1 Conclusion
» The Concept SHARE-IT SYSTEM ARCHITECTURE
» SHARING SCENARIO CONCLUSION ICTS2005 The Proceeding
» The Bayesian Network Model and Modified Bayesian Optimization
» Designs and Implementation SCHEDULING MODEL AND IMPLEMENTATION
» Comparison Proposed Schedule with Real Schedule
» Face-to-Face Technique Long Distance Technique
» Scenario to motivate. Context_Selection Applikasi.
» INTRODUCTION ARCHITECTURE. CONCLUSION. ICTS2005 The Proceeding
» SUGGESTION ICTS2005 The Proceeding
» Data Flow Database Structure
» EXPERIMENTAL RESULT ICTS2005 The Proceeding
» Investment Stock Prototyping System Design
» Database Model Stock Valuation
» INTRODUCTION METHODOLOGY ICTS2005 The Proceeding
» Buffer Overrun Cryptography Random Numbers
» Anti-Tampering Error Handling Injection Flaws
» Encapsulate Field Restructuring Arrays
» Generating Secure Random Number Storing Deleting Passwords
» Smart Serialization Message Digest
» Convert Message with Private Key to Public Key
» INTRODUCTION CURRENT STATUS ICTS2005 The Proceeding
» INTRODUCTION PROPOSED SIMULATION MODEL
» PARALLELIZATION STRATEGY ICTS2005 The Proceeding
» EXPERIMENTS AND DISCUSSION CONCLUSION
» INTRODUCTION RESULTS AND DISCUSSION
» EXPERIMENTAL ICTS2005 The Proceeding
» RESULT AND DISCUSSION ICTS2005 The Proceeding
» Color segmentation SYSTEM CONFIGURATION
» FEATURE CHARACTERISTICS AND GENERAL RULE
» EXPERIMENTAL RESULT CONCLUSION ICTS2005 The Proceeding
» INTRODUCTION REVIEW OF LITERATURE
» Social Economics Impact. Restructuring Impact
» Manager Application Mobile Agent Generator MAG Mobile Agents MAs
» SNMP Table Polling SNMP Table Filtering
» BREAST CARCINOMA TUMOR ICTS2005 The Proceeding
» WATERSHED ALGORITHM METHODS ICTS2005 The Proceeding
» RESULT AND DISCUSION ICTS2005 The Proceeding
» FADED INFORMATION FIELD ARCHITECTURE
» ALGORITHMS TO CHOOSE NODES TO CREATE THE FADED
» SYSTEM SIMULATIONS ICTS2005 The Proceeding
» Model and Teory MODEL, TEORY, DESIGN, IMPLEMENTATION AND
» INTRODUCTION ANALYSIS AND RESULT
» INTRODUCTION A SIMPLE MODEL OF THE QUEUING SYSTEM
» SIMULATION RESULTS DISCUSSION ICTS2005 The Proceeding
» CONCLUSION INTRODUCTION ICTS2005 The Proceeding
» Dialog Processing ADDING NONVERBAL BEHAVIOUR
» Emotion Expression Experiment ADDING NONVERBAL BEHAVIOUR
» NATURAL LANGUAGE PROCESSING EMOTION REASONING
» Fuzzy Logic Control FLC System Planning
» Digital To Analog Converter DAC Motor Driver Position Sensor Display Unit
» INTRODUCTION CONCLUSION ICTS2005 The Proceeding
» Variable-Centered Rule Structure VARIABLE-CENTERED INTELLIGENT RULE SYSTEM
» Knowledge Refinement VARIABLE-CENTERED INTELLIGENT RULE SYSTEM
» Knowledge Building VARIABLE-CENTERED INTELLIGENT RULE SYSTEM
» Knowledge Inferencing VARIABLE-CENTERED INTELLIGENT RULE SYSTEM
» INTRODUCTION BASIC CONCEPTS OF FUZZY SETS
» Calculation of the Fitness Degree
» ESTIMATING MULTIPLE NULL VALUES IN RELATIONAL
» Chen’s [6] Result This Improving Method’s Result
» The Fuzzy Set HISTOGRAM THRESHOLDING
» Fuzzy Set Similarity HISTOGRAM THRESHOLDING
» EXPERIMENTAL RESULTS ICTS2005 The Proceeding
Show more