Preferred Language
Articles
/
TRdCx40BVTCNdQwC2xsD
Single Session Facial Lipostructure by Using Autologous Fat Mixed With Platelet-Rich Fibrin Injected by Using Facial Autologous Muscular Injection Technique
...Show More Authors
Aim:

This study was designed to evaluate the role of single session autologous facial fat grafting in correcting facial asymmetries after mixing it with platelet-rich fibrin (PRF) and injecting them into rich vascular facial muscular plane.

Materials and Methods:

Fifteen patients (12 females and 3 males) with age ranging from 18 years to 40 years were included in this study and followed up during 6 months, all the patients were treated in the Al-Shaheed Ghazi Al-Hariri for specialized surgeries hospital (Medical City, Baghdad, Iraq).

Autologous fat with PRF injected in facial muscular plane was the standardized method in the treatment of acquired and congenital facial defects.

Results were evaluated by 2 plastic surgeons using visual analogue scale.

Interexaminer and intraexaminer calibration of the visual analogue scale were carried out by using paired t test.

Results:

This prospective study showed that the majority of patients (73.3%) needed only a single session for creating a noticeable improvement in facial volumes and contours.

Conclusions:

Mixing fat with PRF and injecting them by using facial autologous muscular injection technique offers better graft survival by utilizing the growth factors and cytokines in PRF clot together with rich vascular plexus in the muscular layer consequently.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Enhanced efficiency of CdTe Photovoltaic by thermal evaporation Vacuum
...Show More Authors

View Publication
Scopus (26)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Enhanced efficiency of CdTe Photovoltaic by thermal evaporation Vacuum
...Show More Authors

Crossref (22)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Pyrolysis of scrap tire by utilizing zeolite as catalyst
...Show More Authors

View Publication
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
Rehabilitation of Reinforced Concrete Deep Beam by Epoxy Resin
...Show More Authors

This investigation presents an experimental and analytical study on the behavior of reinforced concrete deep beams before and after repair. The original beams were first loaded under two points load up to failure, then, repaired by epoxy resin and tested again. Three of the test beams contains shear reinforcement and the other two beams have no shear reinforcement. The main variable in these beams was the percentage of longitudinal steel reinforcement (0, 0.707, 1.061, and 1.414%). The main objective of this research is to investigate the possibility of restoring the full load carrying capacity of the reinforced concrete deep beam with and without shear reinforcement by using epoxy resin as the material of repair. All be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Biodegradation of Perfluorooctanoic Acid by Pseudomonas Plecoglossicida Strain DD4
...Show More Authors

Organofluorines, as a pollutant, belongs to a group of substances which are very difficult to neutralize. They are part of many products of everyday use and for this reason they pollute the environment in large quantities. Perfluorinated carboxylic acids are entered into the list of the “Stockholm Convention on Persistent Organic Pollutants” in order to minimize the load on the environment by significantly reducing their use, up to their complete rejection. The DD4 strain was isolated from the soil by the enrichment method and identified using 16S rRNA method as Pseudomonas plecoglossicida. It is able to metabolize perfluorooctanoic acid (PFOA) as the only carbon source in Raymond nutrient medium with a concentration of 1000

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 27 2022
Journal Name
2022 3rd Information Technology To Enhance E-learning And Other Application (it-ela)
Diabetes Prediction Using Machine Learning
...Show More Authors

Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Eye Detection using Helmholtz Principle
...Show More Authors

            Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF