BACKGROUND: Three-dimensional (3D) printing is an evolving technology that has been used recently in a wide spectrum of applications. AIM: The objective is to evaluate the application of 3D printing in various neurosurgical practice. PATIENTS AND METHODS: This pilot study was conducted in the neurosurgical hospital in Baghdad/Iraq between July 2018 and July 2019. An X, Y, and Z printer was used. The working team included neurosurgeons, biomedical engineers, and bio-technicians. The procedure starts with obtaining Magnetic resonance imaging (MRI) or computed tomography (CT) scan in particular protocols. The MRI, and CT or angiography images were imported into a 3D programmer for DICOM images called 3D slice where these files converted into a 3D pictures. Next, the neurosurgeon determines the cut section he needs to print. The final required object is exported to the X, Y, Z printing software where the technician starts to print it out. The final prototype delivered to the neurosurgeon. He uses it intraoperatively to have an apparent actual size 3D representation of the actual lesion with nearby healthy tissues to have a good idea about the case they manages. RESULTS: This pilot study was applied in three major projects: brain tumors (ten cases), cerebral aneurysms (nine cases), and spine surgery (14 cases). CONCLUSION: Three-dimensional printing has excellent advantages in neurosurgical practice. It can replace many other recent modalities. It enables the neurosurgeon works with more precision, less time-consuming, less cost, and less radiation exposure.
To describe changes in attitudes and expectations of labor over the previous six decades, comparing the Iraqi generation who labored at home without medical assistance with their descendants.
We used semi‐structured telephone interviews with 22 women across three generations of one extended family living and giving birth in Iraq between the 1950s and the 2010s. Qualitative data were analyzed thematically using open, axial, and selective coding.
Each generation experienced a paradigm shift in childbirth, from exclus
The current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw
... Show MoreSome research reports that cognitive grammar (CG) theory has good contributions to teaching English as a foreign language. In this research, the researchers seek to apply this theory and its principles when teaching the simple present tense to Iraqi students who face difficulties in differentiating between the multiple usages of this tense. To achieve this objective, the researchers have conducted an experimental study on a group of 60 Iraqi students in the University of Baghdad, College of Education for Women. Langacker’s (2003) theory has been adopted in the analysis of the cognitive relations to understand the common and different connections of these usages of the simple present. The study has concluded that the cognitive grammar t
... Show MoreIn this paper, the methods of weighted residuals: Collocation Method (CM), Least Squares Method (LSM) and Galerkin Method (GM) are used to solve the thin film flow (TFF) equation. The weighted residual methods were implemented to get an approximate solution to the TFF equation. The accuracy of the obtained results is checked by calculating the maximum error remainder functions (MER). Moreover, the outcomes were examined in comparison with the 4th-order Runge-Kutta method (RK4) and good agreements have been achieved. All the evaluations have been successfully implemented by using the computer system Mathematica®10.
A field experiment was carried out to find out the effect of some herbicides(Pallas, Crash, U46) on the companion weed to three cultivars of the oat crop (Shefa, Hamel, and Pimula) and the yield and its components of these cultivars. The results showed the superiority of the two treatments of spraying weed herbicides (T1 and T2 ) by giving the best results, as they recorded the lowest number of weed plants after 30 days of spraying reached 1.44 and 1.67 plant/m2 . Besides, the lowest weed dry weight was 0.11 and 0.00 g/m2, and the highest inhibition percentage in dry weight was 98.44% and 100.0% of the two treatments, respectively. The treatment T2 was also superior by giving the highest control percentage of 93.28% compared to the compari
... Show MoreThe aim of this study is to investigate the antibacterial capabilities of different coating durations of three nanoparticle (NP) coatings: molybdenum (Mo), tantalum (Ta), and zinc oxide (ZnO), and their effects on the surface characteristics of 316L stainless steel (SS). The coated substrates underwent characterization utilizing field emission scanning electron microscopy (FE-SEM), energy dispersive X-ray spectrometry (EDX), and X-ray diffractometer (XRD) techniques. The antibacterial efficacy of NPs was evaluated using the agar diffusion method. The FE-SEM and EDX images confirmed the presence of nano-sized particles of Mo, Ta, and ZnO on the surface of the substrates with perfectly symmetrical spheres and a uniform distribution of
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreAn optimization study was conducted to determine the optimal operating pressure for the oil and gas separation vessels in the West Qurna 1 oil field. The ASPEN HYSYS software was employed as an effective tool to analyze the optimal pressure for the second and third-stage separators while maintaining a constant operating pressure for the first stage. The analysis involved 10 cases for each separation stage, revealing that the operating pressure of 3.0 Kg/cm2 and 0.7 Kg/cm2 for the second and third stages, respectively, yielded the optimum oil recovery to the flow tank. These pressure set points were selected based on serval factors including API gravity, oil formation volume factor, and gas-oil ratio from the flow tank. To impro
... Show MoreThe contractual imbalance is perceived today by the majority of the doctrine as being one of the pitfalls to the execution of the contracts. As a result, most legislations grant judges the power to intervene to restore it. Granting the judge the power to complete the contract raises the question of the extent to which the judge can obtain such power. Is it an absolute authority that is not limited? If so, is it a broad discretion in which the judge operates in his conscience, or is it a power of limited scope by specific legal texts and conventions? This is what we will try to answer in this research.