BACKGROUND: Three-dimensional (3D) printing is an evolving technology that has been used recently in a wide spectrum of applications. AIM: The objective is to evaluate the application of 3D printing in various neurosurgical practice. PATIENTS AND METHODS: This pilot study was conducted in the neurosurgical hospital in Baghdad/Iraq between July 2018 and July 2019. An X, Y, and Z printer was used. The working team included neurosurgeons, biomedical engineers, and bio-technicians. The procedure starts with obtaining Magnetic resonance imaging (MRI) or computed tomography (CT) scan in particular protocols. The MRI, and CT or angiography images were imported into a 3D programmer for DICOM images called 3D slice where these files converted into a 3D pictures. Next, the neurosurgeon determines the cut section he needs to print. The final required object is exported to the X, Y, Z printing software where the technician starts to print it out. The final prototype delivered to the neurosurgeon. He uses it intraoperatively to have an apparent actual size 3D representation of the actual lesion with nearby healthy tissues to have a good idea about the case they manages. RESULTS: This pilot study was applied in three major projects: brain tumors (ten cases), cerebral aneurysms (nine cases), and spine surgery (14 cases). CONCLUSION: Three-dimensional printing has excellent advantages in neurosurgical practice. It can replace many other recent modalities. It enables the neurosurgeon works with more precision, less time-consuming, less cost, and less radiation exposure.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreDell Hymesin 1964coined The Ethnography of Communication in an attempt to explain the ways in which people use the language to interact. It hypothesizes that ethnography is less applicable among participants who have the same sociocultural background. It was proven that all the basic speech components occur whenever there is an interactional situation. The elements of (SPEAKING) schema are closely connected. However, the findings establish the fact that these elements take place effectively among participants who have the same sociocultural background.One of the most outstanding conclusions is the capability of the (SPEAKING) model to analyze not only an interaction between two or more participants, but also any event which consists of a mo
... Show MoreDBNRAHA Hameed, IJRSSH PUBLICATION, 2018
A land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu
... Show MoreIn this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate
... Show MoreThe sacred totem is one of the social phenomena that occupied the ideas of researchers, and took up a wide area of their research, and it is one of those phenomena that emerged from one of the translations of the Tabu; Who took a psychological and anthropological analysis Because it is one of the social practices, and the main focus of it is the human group and its source is religion. Therefore, this research came with demands, the first of which is to give a semantic concept of the Tommy sanctuary, and then the analytical aspect by standing on the sacred things in the Qur’anic text that God Almighty sanctified, and the third requirement is to examine what people have sanctified, as an analysis of the verses that have
... Show MoreAt the local level in the early 1990s first established an Islamic bank 1993 is called Iraqi Islamic bank and was established by Dr. abdullatef hmim and with capital of 200 Million Iraqi dinars .
After 2003 began the attention of Iraqis tend to create Islamic banks until now up to 30 banks in the present , He confirmed Mr. Governor of the Iraqi Central Bank recently that there is more than 40 iintroduction licence to establish an Islamic bank in Iraq , That banking activity which is compatible with Sharia law widely welcomed by savers and those in need for more development and modernization in order to gain a greater share within the Iraqi market , and allowed the Iraqi Central Bank in recent years
... Show MoreSome new heterocyclic compounds containing, cyclohexenone, indazole, isoxazoline, pyrmidine and pyrazoline ring system were prepared from chalcones (1a,b). The starting chalcones (1a,b) were obtained by a base catalyzed condensation of appropriately substituted benzaldehydes and 2-acetylbenzofuran. The reaction of the prepared chalcones with ethylacetoacetate/hydrazine hydrate, hydroxylamine hydrochloride, urea, thiourea, hydrazine hydrate, phenyl hydrazine or hydrazide derivatives gave the mentioned heterocycles. All synthesized compounds have been characterized by physical and spectral methods.
Generally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, co
... Show More