BACKGROUND: Three-dimensional (3D) printing is an evolving technology that has been used recently in a wide spectrum of applications. AIM: The objective is to evaluate the application of 3D printing in various neurosurgical practice. PATIENTS AND METHODS: This pilot study was conducted in the neurosurgical hospital in Baghdad/Iraq between July 2018 and July 2019. An X, Y, and Z printer was used. The working team included neurosurgeons, biomedical engineers, and bio-technicians. The procedure starts with obtaining Magnetic resonance imaging (MRI) or computed tomography (CT) scan in particular protocols. The MRI, and CT or angiography images were imported into a 3D programmer for DICOM images called 3D slice where these files converted into a 3D pictures. Next, the neurosurgeon determines the cut section he needs to print. The final required object is exported to the X, Y, Z printing software where the technician starts to print it out. The final prototype delivered to the neurosurgeon. He uses it intraoperatively to have an apparent actual size 3D representation of the actual lesion with nearby healthy tissues to have a good idea about the case they manages. RESULTS: This pilot study was applied in three major projects: brain tumors (ten cases), cerebral aneurysms (nine cases), and spine surgery (14 cases). CONCLUSION: Three-dimensional printing has excellent advantages in neurosurgical practice. It can replace many other recent modalities. It enables the neurosurgeon works with more precision, less time-consuming, less cost, and less radiation exposure.
Data scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for
Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis
Nowadays, the worldwide issue of the environment occupies the minds not only of ecological experts and politicians but also is addressed in cultural fields and literature in particular. The conceptualization of ecocriticism, whether in the ecological field or cultural studies, has come as a response to the increasing public awareness of numerous environmental crises. Most ecocritics regard John Clare (1793-1864) as a 'proto-ecological' British poet since his poetry incorporates ecological issues which were not then categorized as they are now. The study offers a precise illustration of ecocriticism coupled with a number of the most significant ecological concepts proven in selected poems by John Clare. The ecocritical reading of Clare's po
... Show MoreThe aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.
In this paper, the methods of weighted residuals: Collocation Method (CM), Least Squares Method (LSM) and Galerkin Method (GM) are used to solve the thin film flow (TFF) equation. The weighted residual methods were implemented to get an approximate solution to the TFF equation. The accuracy of the obtained results is checked by calculating the maximum error remainder functions (MER). Moreover, the outcomes were examined in comparison with the 4th-order Runge-Kutta method (RK4) and good agreements have been achieved. All the evaluations have been successfully implemented by using the computer system Mathematica®10.
Summary of the research in English:
the research seeks to define the provisions of voluntary charity and some of its contemporary applications, so the research is after the definition of charity and voluntary charity, define the provisions of the Most important thing charity, where the one who is given charity, in the introduction, he talked about the importance of charity in social solidarity,As for the first topic ,it deait with a statement and definition of charity in the Quran,sunnah and comparative juris prudence,whil the second topic was conducted with clarifying the provisions of the ratified, the ratified,while the third topic was concerned with clarifying the application of voluntary charity contemporary investing the Mo
... Show MoreThe new events in every era are endless, and it is not required of the legal texts to pursue each event by itself and attach to it its ruling.
At the same time, every event or action must have a Shari’a ruling according to the wise Lawgiver, and our scholars have noted this in every event presented to them. ...etc.
It is well known that reaching the legal ruling on a matter, by examining the detailed evidence, is subject to following the path of the rules and regulations specific to the overall evidence, which we organize on the basis of the principles of jurisprudence.
Therefore, any disagreement about the manner or content of these rules will have an impact on the difference of jurists in partial issues, when examining the d
In this paper, we introduce a new complex integral transform namely ”Complex Sadik Transform”. The
properties of this transformation are investigated. This complex integral transformation is used to reduce
the core problem to a simple algebraic equation. The answer to this primary problem can than be obtained
by solving this algebraic equation and applying the inverse of complex Sadik transformation. Finally,
the complex Sadik integral transformation is applied and used to find the solution of linear higher order
ordinary differential equations. As well as, we present and discuss, some important real life problems
such as: pharmacokinetics problem ,nuclear physics problem and Beams Probem
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More