This study was investigated the role of garlic extracts on the reproductive functions, via the development of immature male mice (25 days old) un l puberty. Immature male mice were divided into 3 groups (n=25). Group 1 "control" was daily administrated with tap water. Group 2 was daily administrated with cold aqueous garlic extract. Group 3 was daily administrated with hot aqueous garlic extract. Each group was randomly consisted of 5 subgroups (n=5/ subgroup) and administrated for different periods i.e, 1, 2, 3, 4 and 5 weeks respectively. Animals were scarified after 24 h from last treatment. Our findings elucidated that, cold and hot aqueous garlic extracts, when administrated at 25 days old (Immature period) have different impact depending on the dura on of its administration as follows: The treatment for 1 and 2 weeks have no capability to precocious of the testicular tissue at these of immature periods. The treatment for 3 and 4 weeks (premature periods) has detrimental effect on the testicular structural and function. "i.e. a significant (P<0.05, P<0.01, P<0.001) reduction in testis weights and (P<0.01, P<0.001) in seminiferous tubule diameters and it caused a highly significant increment (P<0.001) in the percentage of damaged seminiferous tubules in comparison with controls and the degenerative traits in the I.T as atrophy, vastness in interstitial space, congestion blood vessels, hemorrhage, edema, also a significant (P<0.01, P<0.005, P<0.001) decrease in the Leydig cells numbers as well as a significant (P<0.05, P<0.01) decline in the serum T levels in comparison with controls". The treatment for 5 weeks (puberty period) leads to sever defect and disruption of steroidogenesis and spermetogenesis. So the administration of garlic extracts caused a significant (P<0.05, P<0.01) decrement in the serum FSH levels while led to a significant ( P<0.05) increment in the serum LH levels.
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThe research tackles the potential challenged faced the translator when dealing with the literal translation of nowadays political terms in media. Despite the universal complexity of translating political jargon, adopting literal translation introduces an added layer of intricacy. The primary aim of literal translation is to maintain faithfulness to the original text, irrespective of whether it is in English or Arabic. However, this method presents several challenges within the linguistic and cultural dimensions. Drawing upon scholarly sources, this article expounds upon the multifaceted issues that emerge from the verbatim translation of political terms from English into Arabic. These problems include political culture, language differenc
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreRecent population studies have shown that placenta accreta spectrum (PAS) disorders remain undiagnosed before delivery in half to two-thirds of cases. In a series from specialist diagnostic units in the USA, around one-third of cases of PAS disorders were not diagnosed during pregnancy. Maternal
This review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil
... Show MoreThe aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
This work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it
... Show More