Preferred Language
Articles
/
ShfUO44BVTCNdQwCEj57
Three-dimensional printing applications in the neurosurgery: A pilot study
...Show More Authors

BACKGROUND: Three-dimensional (3D) printing is an evolving technology that has been used recently in a wide spectrum of applications. AIM: The objective is to evaluate the application of 3D printing in various neurosurgical practice. PATIENTS AND METHODS: This pilot study was conducted in the neurosurgical hospital in Baghdad/Iraq between July 2018 and July 2019. An X, Y, and Z printer was used. The working team included neurosurgeons, biomedical engineers, and bio-technicians. The procedure starts with obtaining Magnetic resonance imaging (MRI) or computed tomography (CT) scan in particular protocols. The MRI, and CT or angiography images were imported into a 3D programmer for DICOM images called 3D slice where these files converted into a 3D pictures. Next, the neurosurgeon determines the cut section he needs to print. The final required object is exported to the X, Y, Z printing software where the technician starts to print it out. The final prototype delivered to the neurosurgeon. He uses it intraoperatively to have an apparent actual size 3D representation of the actual lesion with nearby healthy tissues to have a good idea about the case they manages. RESULTS: This pilot study was applied in three major projects: brain tumors (ten cases), cerebral aneurysms (nine cases), and spine surgery (14 cases). CONCLUSION: Three-dimensional printing has excellent advantages in neurosurgical practice. It can replace many other recent modalities. It enables the neurosurgeon works with more precision, less time-consuming, less cost, and less radiation exposure.

Scopus Crossref
View Publication
Publication Date
Tue Mar 19 2024
Journal Name
Birth
Changes in attitudes to childbirth in modern times illustrated over three generations in Iraq
...Show More Authors
Abstract<sec><title>Objective

To describe changes in attitudes and expectations of labor over the previous six decades, comparing the Iraqi generation who labored at home without medical assistance with their descendants.

Study Design

We used semi‐structured telephone interviews with 22 women across three generations of one extended family living and giving birth in Iraq between the 1950s and the 2010s. Qualitative data were analyzed thematically using open, axial, and selective coding.

Results

Each generation experienced a paradigm shift in childbirth, from exclus

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 29 2024
Journal Name
مجلة العلوم التربوية والنفسية
Needs in the stories of the Brothers Grimm (a study in content analysis)
...Show More Authors

The current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw

... Show More
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of the Present Simple: An Experimental Study in the University of Baghdad
...Show More Authors

Some research reports that cognitive grammar (CG) theory has good contributions to teaching English as a foreign language. In this research, the researchers seek to apply this theory and its principles when teaching the simple present tense to Iraqi students who face difficulties in differentiating between the multiple usages of this tense. To achieve this objective, the researchers have conducted an experimental study on a group of 60 Iraqi students in the University of Baghdad, College of Education for Women. Langacker’s (2003) theory has been adopted in the analysis of the cognitive relations to understand the common and different connections of these usages of the simple present. The study has concluded that the cognitive grammar t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Three Weighted Residuals Methods for Solving the Nonlinear Thin Film Flow Problem
...Show More Authors
Abstract<p>In this paper, the methods of weighted residuals: Collocation Method (CM), Least Squares Method (LSM) and Galerkin Method (GM) are used to solve the thin film flow (TFF) equation. The weighted residual methods were implemented to get an approximate solution to the TFF equation. The accuracy of the obtained results is checked by calculating the maximum error remainder functions (MER). Moreover, the outcomes were examined in comparison with the 4<sup>th</sup>-order Runge-Kutta method (RK4) and good agreements have been achieved. All the evaluations have been successfully implemented by using the computer system Mathematica®10.</p>
View Publication
Crossref (1)
Crossref
Publication Date
Mon Mar 09 2015
Journal Name
Monthly Notices Of The Royal Astronomical Society
A reliable iterative method for solving Volterra integro-differential equations and some applications for the Lane–Emden equations of the first kind
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
International Journal Of Agricultural And Statistical Sciences
The effect of some herbicides on the companion weed to three cultivars of oats
...Show More Authors

A field experiment was carried out to find out the effect of some herbicides(Pallas, Crash, U46) on the companion weed to three cultivars of the oat crop (Shefa, Hamel, and Pimula) and the yield and its components of these cultivars. The results showed the superiority of the two treatments of spraying weed herbicides (T1 and T2 ) by giving the best results, as they recorded the lowest number of weed plants after 30 days of spraying reached 1.44 and 1.67 plant/m2 . Besides, the lowest weed dry weight was 0.11 and 0.00 g/m2, and the highest inhibition percentage in dry weight was 98.44% and 100.0% of the two treatments, respectively. The treatment T2 was also superior by giving the highest control percentage of 93.28% compared to the compari

... Show More
Scopus (7)
Scopus
Publication Date
Thu Jul 25 2024
Journal Name
Metals
The Effects of Three Antibacterial Nanoparticle Coatings on the Surface Characteristics of Stainless Steel
...Show More Authors

The aim of this study is to investigate the antibacterial capabilities of different coating durations of three nanoparticle (NP) coatings: molybdenum (Mo), tantalum (Ta), and zinc oxide (ZnO), and their effects on the surface characteristics of 316L stainless steel (SS). The coated substrates underwent characterization utilizing field emission scanning electron microscopy (FE-SEM), energy dispersive X-ray spectrometry (EDX), and X-ray diffractometer (XRD) techniques. The antibacterial efficacy of NPs was evaluated using the agar diffusion method. The FE-SEM and EDX images confirmed the presence of nano-sized particles of Mo, Ta, and ZnO on the surface of the substrates with perfectly symmetrical spheres and a uniform distribution of

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sat Mar 30 2024
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimization of Separator Size and Operating Pressure for Three-phase Separators in the West Qurna1 Oil Field
...Show More Authors

An optimization study was conducted to determine the optimal operating pressure for the oil and gas separation vessels in the West Qurna 1 oil field. The ASPEN HYSYS software was employed as an effective tool to analyze the optimal pressure for the second and third-stage separators while maintaining a constant operating pressure for the first stage. The analysis involved 10 cases for each separation stage, revealing that the operating pressure of 3.0 Kg/cm2 and 0.7 Kg/cm2 for the second and third stages, respectively, yielded the optimum oil recovery to the flow tank. These pressure set points were selected based on serval factors including API gravity, oil formation volume factor, and gas-oil ratio from the flow tank.    To impro

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 27 2018
Journal Name
Revue Académique De La Recherche Juridique
The Scope of the Judge’s Authority in Completing a Contract and the Limitations Thereon – A Comparative Study
...Show More Authors

The contractual imbalance is perceived today by the majority of the doctrine as being one of the pitfalls to the execution of the contracts. As a result, most legislations grant judges the power to intervene to restore it. Granting the judge the power to complete the contract raises the question of the extent to which the judge can obtain such power. Is it an absolute authority that is not limited? If so, is it a broad discretion in which the judge operates in his conscience, or is it a power of limited scope by specific legal texts and conventions? This is what we will try to answer in this research.

View Publication