Preferred Language
Articles
/
2xelt40BVTCNdQwChxmd
Effect of cold and hot aqueous extract of garlic on the reproductive performance of immature male mice until puberty
...Show More Authors

This study was investigated the role of garlic extracts on the reproductive functions, via the development of immature male mice (25 days old) un l puberty. Immature male mice were divided into 3 groups (n=25). Group 1 "control" was daily administrated with tap water. Group 2 was daily administrated with cold aqueous garlic extract. Group 3 was daily administrated with hot aqueous garlic extract. Each group was randomly consisted of 5 subgroups (n=5/ subgroup) and administrated for different periods i.e, 1, 2, 3, 4 and 5 weeks respectively. Animals were scarified after 24 h from last treatment. Our findings elucidated that, cold and hot aqueous garlic extracts, when administrated at 25 days old (Immature period) have different impact depending on the dura on of its administration as follows: The treatment for 1 and 2 weeks have no capability to precocious of the testicular tissue at these of immature periods. The treatment for 3 and 4 weeks (premature periods) has detrimental effect on the testicular structural and function. "i.e. a significant (P<0.05, P<0.01, P<0.001) reduction in testis weights and (P<0.01, P<0.001) in seminiferous tubule diameters and it caused a highly significant increment (P<0.001) in the percentage of damaged seminiferous tubules in comparison with controls and the degenerative traits in the I.T as atrophy, vastness in interstitial space, congestion blood vessels, hemorrhage, edema, also a significant (P<0.01, P<0.005, P<0.001) decrease in the Leydig cells numbers as well as a significant (P<0.05, P<0.01) decline in the serum T levels in comparison with controls". The treatment for 5 weeks (puberty period) leads to sever defect and disruption of steroidogenesis and spermetogenesis. So the administration of garlic extracts caused a significant (P<0.05, P<0.01) decrement in the serum FSH levels while led to a significant ( P<0.05) increment in the serum LH levels.

Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
A study of some of the of the Verbs’ Arabic Roots in the stories of Osman Ceviksoy Like a Voice in The Dark.: Osman Çeviksoy'un "Karanlıkta Ses Gibi" Başlıklı Öykü Kitabında Arapça Kökenli Türkçe Fillerin İncelenmesi
...Show More Authors

Due to the Geographical links, language is one of the multiple affects among Arabs and Turks. As the different studies demonstrate, Turkish contains many words derived from other languages, yet Arabic remains the language that has great affects on Turkish. Unlike Turkish language, Arabic is a derivative language that requires no suffixes. Thus, Arabic verbs are tuned into Turkish verbs by adding auxiliary verbs. The present study traces some of the Turkish compound words of Arabic roots with an explanation that shows the Auxiliary added to form the Turkish verb as found in the stories of Otman Chevek Sawy’s Like A voice in the Dark. The conclusion sums up the findings of the study illustrated by numbers.

Özet<

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Constant and the Variable in the Kurdish Singing between the Past and Present: كونا قادر محمد
...Show More Authors

  This research is interested in studying the constant and the variable within the signing reality in Iraqi Kurdistan region, and the researcher tries to tackle the importance of this topic within a search that serves the Kurdish culture, and contribute to its intellectual settlement, and introducing it to centers concerned with studying singing and music science in any civilized environment, whether inside or outside the territory of Kurdistan region. We see that this research which dealt with the topic (the constant and the variable in the Kurdish signing between the past and the present) deserves research and investigation for all its causes, being one of the academic necessities that contribute in identifying the historic artist

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ECONOMIC LOSSES CAUSED BY ROSE BEETLE MALADERA INSANABILIS (BRENSKE) ON FRUIT AND ORNAMENTAL PLANTS AND ITS CONTROL BY PATHOGENIC FUNGI: ECONOMIC LOSSES CAUSED BY ROSE BEETLE MALADERA INSANABILIS (BRENSKE) ON FRUIT AND ORNAMENTAL PLANTS AND ITS CONTROL BY PATHOGENIC FUNGI
...Show More Authors

The study aimed to evaluate injuries and economic losses which caused by rose beetle Maladerainsanabilis (Brenske) on ornamental and fruit plants as introduced insect in Iraq during 2015 and determine infested host plants in addition to evaluate efficacy of pathogenic fungi Metarhiziumanisopiliae (1x10⁹ spore/ ml) and Beauvariabassiana (1x10⁸spore/ ml) in mortality of insect larvae in laboratory and field.The results showed that the insect was polyphagous infested many host plants (20 host plant)Which caused degradation and dead the plants through adult feeding on leaves and flower but large injury caused by larvae feeding on root plants which caused obligate dead to infested plant, the percentage mortality of rose plants 68.6%, pear

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
The Biofilm Inhibitory Potential of Compound Produced from Chlamydomonas reinhardtii Against Pathogenic Microorganisms
...Show More Authors

Microalgae present much usefulness for antimicrobial research because of its enormous biodiversity and rapid growth rate. From this study results it is reaveled that Chlamydomonas reinhardtii were isolated from a pond of water in the province of Diwaniyah. The culture supernatants were obtained when extracted with methanol solvent. Antimicrobial activity of extracts was tested for pathogens, and the best inhibition zone obtained was against Candida albicans (32mm), S.aureus (15mm), and to E.coli (9mm). While it showed no effect against both S.epidermidis and Klebsiella spp. Biofilm was formed by all tested isolates with differences in its strength formation. The C. reinhardtii

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Condition assessment and rehabilitation for trunk sewer deterioration based on Semi-Markov model
...Show More Authors

An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi

... Show More
Publication Date
Fri May 04 2018
Journal Name
Wireless Personal Communications
IFRS: An Indexed Face Recognition System Based on Face Recognition and RFID Technologies
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi Journal Of Science
Paper based glucose biosensor depending on SPCE modified with hemoglobin and silver nanoparticles
...Show More Authors

The direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li

... Show More
Scopus
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (7)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref