International Journal on Technical and Physical Problems of Engineering
The present study was carried out on forty eight epididymis of sexually mature dogs to elucidate light microscope features and the presence of testosterone receptors inside epididymis in different seasons. Twenty four dogs aged 3 years were used during the periods from 1/2/2015-1/2/2016. The epididymis were carefully dissected from the testis after orchidectomy operations and fixed, dehydrated, clarified and embedded in paraffin. Sections were stained with hematoxylin and eosin and periodic acid schiff. As well as, paraffin embedded cytoimmunochemistry technique was used for detection of testosterone receptors. Muscular coats showed no significant differences during different seasons or among segments. Epithelial heigh
... Show More
The Ash'aris and their position on faith, An Ideological Study
Omed AbdulQader rasool
College of Islamic Sciences/Salahaddin University-Erbil
Abstract
The concept of faith is very complex, and there are a lot of talk about it among the major Islamic groups such as the Kharijites, the Mu'tazila, the Jahmiyya and others, because of its great importance, and the worldly and eschatological effects it entails according to the elements of faith such as recognition, ratification and action.
The researcher chose one sect, which is the
... Show MoreThis study aims to studying of Person and organization’s environment fit in a sample of Private bank’s reflection in its basic dimensions (Person-organization fit ,Person-Job fit, Person-group fit and Person- Person-fit )in the Work Outcomes (job satisfaction, the intention to leave the job, Job Engagement, and organizational citizenship behavior ).
The questionnair’e has been used as a basic instrument to gather data , As well as personal interviews with some of the staff of the research sample of private banks which were represented by (5) and included banks (Bank of Assyria for investment, the North Bank for Finance and Investment , Bank of the Tigris
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreMany researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc
... Show MoreMost cultivars of sorghum have low field emergence as common problem. Three experiments were carried out at Agriculture College, Baghdad University. First experiment was conducted in laboratory according to Complete Randomized Design (CRD) with four replicates. Second and third experiments were conducted at field according to Randomized Complete Block Design (RCBD) during the spring and the fall seasons of 2015, respectively, with four replicates for each one. Same two factors were studied at each experiment. First factor was seed priming by seed soaking for 10 hours in distilled water, solvents of GA3, KCl and thiamine (300, 40 and 30 mg*L-1, respectively) and non-primed seed. Second factor was three cultivars of sorghum (Inqath, Kafier an
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreDue to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More