ABSTRACT: BACKGROUND: The main goal of facelift surgery is to reduce the effect of aging by reposition of face soft tissue in to more youthful orientation. There are many methods for SMAS plication which had different design and vector of pull. AIM OF STUDY: To evaluate the effectiveness and longitivity of 7 shaped SMAS plication in facelift. PATIENT AND METHODS: From January 2020 to march 2021, 10 female patients with age (45-60) years were presented with facial sagging, those patients were subjected to subcutaneous facelift with 7 shaped SMAS plication with fat greft in Al-Shaheed Ghazi Al-Harri Hospital and Baghdad burn medical center at Baghdad medical complex. RESULTS: The average follow up period was 6 to 12 months. The mean operative time was 1 hour and 30 minutes. Additional facial procedures were later done which including: fat injection (all patients), brow lift (one patient), facial scar subcision with fat grafting (one patient) and sub mental liposuction with platysma plication (2 patient). All of our patients demonstrate high level of subjective satisfaction with quick recovery with no major or minor complications CONCLUSION: The subcutaneous facelift with 7 shaped SMAS plication is simple to learn with high patients satisfaction and long lasting result.
CO2 laser (10.6 μm) is the most often used laser in the oral surgery due to its high absorption by water of the oral tissues. Several benefits of the use of CO2 laser have been reported for oral surgical procedures. This study aims to evaluate the effect of CO2 laser on soft and hard oral tissues (in vitro study). This study was done on fresh tissues from sheep’s head. CO2Surgical Laser with different operation modes was used; 0.2 mm spot size using different laser parameters on the tongue, and bone making holes, incisions and cutting. The depths and widths of holes and incisions were measured using endodontic file under magnification. The speed of incisions was calculated and the required time for cutting was measured using sport clo
... Show MoreIn this research, the water quality of the potable water network in
Al-Shuala Baghdad city were evaluated and compare them with the
Iraqi standards (IQS) for drinking water and World Health
Organization standards (WHO), then water quality index (WQI) were
calculator: pH, heavy metals (lead, cadmium and iron), chlorides,
total hardness, turbidity, dissolved oxygen, total dissolved solid and
electrical conductivity. Water samples are collected weekly during
the period from February 2015 to April 2015 from ten sites. Results
show that the chlorides, total dissolved solid and electrical
conductivity less than acceptable limit of standards, but total
hardness and heavy metals in some samples higher than acceptabl
Objectives: To evaluate levels of nurses' knowledge about substance abuse at psychiatric teaching hospitals in Baghdad city. Methodology: A descriptive analytical study conducts to meet study objectives during the period from 1-11-2014 To 10-5-2015 The study conduct at 4 teaching hospitals in three department (Baghdad Al Rusafa ,Al Karkh, Medical city) they includ Baghdad teaching hospital, Al Rashad teaching hospital, Ibn Rshud teaching hospital , and Al Kadhumeeain teaching hospital which select according to the study. A random sample of 100 nurses are working in teaching psychiatric hospitals , Al Rashad (6
The study was conducted at the fields of the Department of Horticulture and Landscape Gardening, College of Agriculture, University of Baghdad " Abu Ghraib" during the growing seasons 2013-2014 to Evaluate the Vegetative growth , yield traits and genetic parameter of some tomato mutants. Results showed significantly increased of plant height in M6-2 mutant 245cm in Comparison with M6- 3 130 cm . M6-4 mutant significantly increasing of floral clusters 13 . Mutant M6-3 showed significantly increasing the average of, fruit weight 125.9g and plant yield 7.17 kg.plant-1 as comparison with M6-2 which showed decreasing of average of fruit weight and plant yield 79.40g and 4.38 kg.plant-1 respectively. Also results showed the highest Genetic variat
... Show MoreDetermination and evaluation of principal minerals in Negella sativa by atomic absorption technical methods were showed, using wet ashing method. This work was done on Negella sativa because of wide using of this plant in many formulations ( in food or medicine ).two types of atomic absorptions were used : first, flame atomic absorption spectroscopy, for minerals of high concentrations such as, Na, Mg, K, Fe, Ca, Li, Ni, Zn, Mn, Cu. Second, flameless atomic absorption spectroscopy, for minerals of low concentrations such as, Al, Si, V, B, Pb, Co, Cd, Cr ,Si, Hg, Sn .The results showed the existence of many minerals in Negella sativa useful to human sanity with acceptable dietary allowance. On other side, the presence of harmful m
... Show MoreTraining and retraining of teachers have become a central issue in Iraq recently especially in-service training of English teachers on the new curricula (Iraq opportunities). English teachers should be objectively evaluated and assessed.
A sample of (40) trained teachers of English is included in the study and a questionnaire is used as the main instrument of the study.
The main findings of the study were the following:
1. The trainees were serious in training on the new course (item 6) the programme helped increase their information (item 4) and motivate them towards better teaching (item 3). The aims of the programme were clear (item1). The programme helped develop their teaching skills (item 2) and was comprehensive (item 5).
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More