This study was investigated the role of garlic extracts on the reproductive functions, via the development of immature male mice (25 days old) un l puberty. Immature male mice were divided into 3 groups (n=25). Group 1 "control" was daily administrated with tap water. Group 2 was daily administrated with cold aqueous garlic extract. Group 3 was daily administrated with hot aqueous garlic extract. Each group was randomly consisted of 5 subgroups (n=5/ subgroup) and administrated for different periods i.e, 1, 2, 3, 4 and 5 weeks respectively. Animals were scarified after 24 h from last treatment. Our findings elucidated that, cold and hot aqueous garlic extracts, when administrated at 25 days old (Immature period) have different impact depending on the dura on of its administration as follows: The treatment for 1 and 2 weeks have no capability to precocious of the testicular tissue at these of immature periods. The treatment for 3 and 4 weeks (premature periods) has detrimental effect on the testicular structural and function. "i.e. a significant (P<0.05, P<0.01, P<0.001) reduction in testis weights and (P<0.01, P<0.001) in seminiferous tubule diameters and it caused a highly significant increment (P<0.001) in the percentage of damaged seminiferous tubules in comparison with controls and the degenerative traits in the I.T as atrophy, vastness in interstitial space, congestion blood vessels, hemorrhage, edema, also a significant (P<0.01, P<0.005, P<0.001) decrease in the Leydig cells numbers as well as a significant (P<0.05, P<0.01) decline in the serum T levels in comparison with controls". The treatment for 5 weeks (puberty period) leads to sever defect and disruption of steroidogenesis and spermetogenesis. So the administration of garlic extracts caused a significant (P<0.05, P<0.01) decrement in the serum FSH levels while led to a significant ( P<0.05) increment in the serum LH levels.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreDiagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad
... Show MoreIn The Name of Allah Most Gracious Most Merciful
The reason for choosing this topic was:
First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.
Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).
Third: The study of the jurisprudence of the companions
Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIraq within the ranks of the fledgling communities characterized by a broad base of the population pyramid, because they pose the age group (under 15 years) of a large proportion of the community, as it exceeded the proportion (40%) during the years of research extended (1986-2010) Despite the relative decline in the rates fertility during that period, but the proportion of young people remained high, especially for groups of at least five years, amounting to about 14% in 2012, a little more than the proportion of what constitutes age group (5-9 above) years, where it was (13%) and this naturally predicts continuing population increases in coming decades, due to the entry of those numbers of individuals in the reproductive stage,
... Show More