This study was investigated the role of garlic extracts on the reproductive functions, via the development of immature male mice (25 days old) un l puberty. Immature male mice were divided into 3 groups (n=25). Group 1 "control" was daily administrated with tap water. Group 2 was daily administrated with cold aqueous garlic extract. Group 3 was daily administrated with hot aqueous garlic extract. Each group was randomly consisted of 5 subgroups (n=5/ subgroup) and administrated for different periods i.e, 1, 2, 3, 4 and 5 weeks respectively. Animals were scarified after 24 h from last treatment. Our findings elucidated that, cold and hot aqueous garlic extracts, when administrated at 25 days old (Immature period) have different impact depending on the dura on of its administration as follows: The treatment for 1 and 2 weeks have no capability to precocious of the testicular tissue at these of immature periods. The treatment for 3 and 4 weeks (premature periods) has detrimental effect on the testicular structural and function. "i.e. a significant (P<0.05, P<0.01, P<0.001) reduction in testis weights and (P<0.01, P<0.001) in seminiferous tubule diameters and it caused a highly significant increment (P<0.001) in the percentage of damaged seminiferous tubules in comparison with controls and the degenerative traits in the I.T as atrophy, vastness in interstitial space, congestion blood vessels, hemorrhage, edema, also a significant (P<0.01, P<0.005, P<0.001) decrease in the Leydig cells numbers as well as a significant (P<0.05, P<0.01) decline in the serum T levels in comparison with controls". The treatment for 5 weeks (puberty period) leads to sever defect and disruption of steroidogenesis and spermetogenesis. So the administration of garlic extracts caused a significant (P<0.05, P<0.01) decrement in the serum FSH levels while led to a significant ( P<0.05) increment in the serum LH levels.
The preparation of some new coordination compounds for nikel (II), manganese (II), copper (II), cobalt (II)and mercury (II), with ligand obtained from Benzoinand2-amino pyridine.The ligand[6-(2-hydroxy-1,2-diphenylethylideneamino)pyridin-3-ylium)](L) was made from reactin ethanol with metal salts in (1:1)(metal : ligand)ratio.[MLCl] was the inclusive formula of the complexes where M= Mn(II),Co(II),Ni(II),Cu(II) and Hg(II). Metal analysis by electronic spectra, atomic absorption ,infrared spectra, 1H&13C-NMR(only ligand)spectral studies, magnetic moment and molar conductance measurements used to describe the compounds.The determinations indicated that the ligand coordinates with the metal (II) ion in neutral tridentate manner th
... Show MoreA bolted–welded hybrid demountable shear connector for use in deconstructable steel–concrete composite buildings and bridges was proposed. The hybrid connector consisted of a partially threaded stud, which was welded on the flange of a steel section, and a machined steel tube with compatible geometry, which was bolted on the stud. Four standard pushout tests according to Eurocode 4 were carried out to assess the shear performance of the hybrid connector. The experimental results show that the initial stiffness, shear resistance, and slip capacity of the proposed connector were higher than those of traditional welded studs. The hybrid connector was a ductile connector, according to Eurocode 4, with slip capacity higher than 6 mm. A nonli
... Show MoreAbstract
The present search addressed the "strategic Vigilance and their impact in Organizational success "Where has the objective of strategic Vigilance and Organizational success of increasing importance at the present time, for being fairly modern topics, which have a tremendous impact on the success of organizations. &
... Show MoreThe aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreThe Bangestan reservoir, which occurs in the Ahwaz oilfield, consists of the middle Cretaceous limestone Ilam and Sarvak Formations that were deposited in the Zagros Basin. The reservoir is divided into ten Zones (A to J) formed in the upper Albian-Santonian and contains considerable hydrocarbon accumulations. The limestones were deposited on an extensive shallow carbonate platform on a passive margin and are dominated by rudist biostrome and grainstone facies. Paleogeographical changes mean that identification of the facies is complex. Seismic stratigraphy and isotopic data are used to better understand the structural and geological setting and develop an understanding of the sedimentary environment. The results show that the rudist biostr
... Show MoreThe media of all kinds have the task of introducing, expressing and objectively representing the cultures of different societies in various types and forms of press and media. The precept of media pluralism is the basis for freedom of expression & the cornerstone of its realization. Therefore, it is linked to the establishment of several conditions and elements in order to establish it as a principle and practice. Issues of cultural diversity in media and cultural pluralism are one of the most important elements and indicators. So, this paper aims to shed light on the concept of media pluralism and related concepts within the framework of cultural diversity and multicultural indicators. Thus, highlighting the feature
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show More