Letter to the Editor: Cadaver-Free Simulation Training in Microneurosurgery: An Experience From Iraq
...Show More Authors
Solid dispersion (SD) formulation has attracted much attention due to its potential in enhancing dissolution performances of poorly soluble active pharmaceutical ingredients (API). Recently, a review on dissolution performances of SDs classifies the improvement into 3 categories, where 82 % of the studies showed improved bioavailability, 8 % showed reduced bioavailability and 10 % revealed similar bioavailability as compared to pure APIs. This indicates the inconsistent degrees of dissolution improvement of poorly soluble APIs in SD. Although a few factors related to the choice of carriers have been suggested to contribute to the dissolution improvement, however, the underlying factor determining the discrepancy in the degree of dissolution
... Show MoreBackground: obesity is a major global health problem with more than 200 million obese men and almost 300 million obese women. Melatonin is a well-known molecule for its involvement in circadian rhythm regulation and has multiple pathological actions including control of appetite, sleep wake cycle and metabolic syndrome.
Aim: to estimate the effect of melatonin supplements on obese patients on a calorie restricted diet in comparison to patients on lifestyle measures only in the form of weight loss, waist circumference and sleep quality.
Subjects and Method: one hundred patients with body mass index > 24 were collected, fifty patients were starte
... Show MoreIn this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel
... Show MoreThe research aims Modifying the accuracy test for the diagonal and straight high smash skill from center (4) according to the body position of the Premier League volleyball players and extracting the grades and standard levels. To achieve the two objectives of the research: the descriptive approach with the survey method was adopted, because it agrees in solving the research problem. As for the research sample, it consisted Of the players in the Premier League for volleyball clubs for the 2023-2024 season, the researcher chose central players (4)(2) because their skill abilities are compatible with the skill of hitting the diagonal and straight smashes, and they numbered (90) players (6 players from each team), and then the researche
... Show MoreSingle Point Incremental Forming (SPIF) is a forming technique of sheet material based on layered manufacturing principles. The sheet part is locally deformed through horizontal slices. The moving locus of forming tool (called as toolpath) in these slices constructed to the finished part was performed by the CNC technology. The toolpath was created directly from CAD model of final product. The forming tool is a Ball-end forming tool, which was moved along the toolpath while the edges of sheet material were clamped rigidly on fixture.
This paper presented an investigation study of thinning distribution of a conical shapes carried out by incremental forming and the validation of finite element method to evaluate the limits of the p
... Show MoreBackground: It's believed that HBD-3 is involved in the tissue remodeling process of articular cartilage. Also, HBD-3 has anti-inflammatory properties. Objectives: The purpose of this study is to assay human beta-defensine-3 (HBD-3) in serum from rheumatoid arthritis (RA) patients and investigate its correlation with proinflammatory cytokines. Methods: In this case-control study, fifty-eight RA patients were aged 20–65 years, and 29 age-matched healthy subjects (HS) had no inflammatory rheumatic diseases. The disease activity score-28 joint erythrocyte sedimentation rate (DAS28-ESR) was used to measure RA activity. CRP, ACPA, HBD-3, TNF-α, and IL-1β were assessed using the enzyme-linked immunosorbent assay technique (ELISA). Res
... Show MoreBackground: The study aimed to investigate the effect of different techniques of en masse retraction on the vertical and sagittal position, axial inclination, rate of space closure, and type of movement of maxillary central incisor. Materials and methods: A typodont simulation system was used (CL II division 2 malocclusion). Three groups were used group 1(N=10, T-loop), group 2(N=10, Time-Saving loop), and group 3(N=10, Microimplant). Photographs were taken before and after retraction and measurements were made using Autodesk AutoCAD© software 2010. Kruskal-Wallis one-way analyses of variance and Mann-Whitney U test (p?0.05) were used. Results: The rate of space closure showed no significant difference among the three groups (p?0.05), whi
... Show MoreAnastatica Hierochuntica L. Used As an Alternative of Conjugated Estrogen (Premarin) in Rabbit Females
NA Nasir, SHM Ali, HQMA AL-Ess, WA Hussein, MKW Al-Janabi, KIA Mohammed, JM Mosa, Euromediterranean Biomedical Journal, 2020
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More