The current study was designated to investigate the effect ofAllium sativumon some physiological and immunological parameters in rats. thirty adult rats were divided into three groups (10 rat for each). G1: served as healthy control, G2 :rats were treated with 150 mg\kg of Allium sativum, G3: treated with 300 mg\kg of Allium sativum. All treated animals were givenorally for 30 days. The aspartate , ) ALT ( alanine transaminase on some parameters were investigated such as garlic effects of total and differential counts of white blood , ) LDH ( lactate dehydrogenase ), AST ( transaminase cells(WBC) like Lymphocyte, Monocyte, Neutrophil, Basophil, Eosinophil,as
... Show MoreThe article emphasizes that 3D stochastic positive linear system with delays is asymptotically stable and depends on the sum of the system matrices and at the same time independent on the values and numbers of the delays. Moreover, the asymptotic stability test of this system with delays can be abridged to the check of its corresponding 2D stochastic positive linear systems without delays. Many theorems were applied to prove that asymptotic stability for 3D stochastic positive linear systems with delays are equivalent to 2D stochastic positive linear systems without delays. The efficiency of the given methods is illustrated on some numerical examples. HIGHLIGHTS Various theorems were applied to prove the asymptoti
... Show MoreIn this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show MoreThe Disi water samples were collected from different Disi aquifer wells in Jordan using a clean polyethylene container of 10-liter size. A hyper-pure germanium (HPGe) detector with high- resolution gamma-ray spectroscopy and a low background counting system was used for the identification of unknown gamma-rays emitting from radionuclides in the environmental samples. The ranges of specific activity concentrations of 226Ra and 228Ra in the Disi aquifer water were found to be from 0.302 ± 0.085 to 0.723 ± 0.207 and from 0.047 ± 0.010 to 0.525 ± 0.138 Bq L−1, with average values of 0.516 ± 0.090 and 0.287 ± 0.091 Bq L−1, respectively. The average combined radium (226Ra + 228Ra) activity and radium activity ratio (228Ra/226Ra) in Disi
... Show MoreA sensitive, accurate, and affordable colorimetric method was developed for assaying prednisolone (PRZ) in various medicinal forms. The procedure involves the oxidation of PRZ by ferric ions, followed by complexation of the resulting ferrous ions with ferricyanide to produce a greenish-blue product. Common complexation conditions were thoroughly investigated. The mole ratio of FeCl₃·6H₂O to K₃Fe(CN)₆ was 8:1. The proposed mechanism of complexation was suggested and considered. Various parameters were optimized, including the reduction of the colorimetric reaction temperature to 50°C and the duration of heating and analysis to 20-30 minutes. The calibration curve was linear over the range of 1-60 µg/mL. The limit of detection (LOD
... Show MoreIn the analysis of multiple linear regression, the problem of multicollinearity and auto-correlation drew the attention of many researchers, and given the appearance of these two problems together and their bad effect on the estimation, some of the researchers found new methods to address these two problems together at the same time. In this research a comparison for the performance of the Principal Components Two Parameter estimator (PCTP) and The (r-k) class estimator and the r-(k,d) class estimator by conducting a simulation study and through the results and under the mean square error (MSE) criterion to find the best way to address the two problems together. The results showed that the r-(k,d) class estimator is the best esti
... Show MoreThis paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreAn experiment was carried out to study the effect of soil organic carbon (SOC) and soil texture on the distance of the wetting front, cumulative water infiltration (I), infiltration rate (IR), saturated water conductivity (Ks), and water holding capacity (WHC). Three levels ( 0, 10, 20, and 30 g OC kg-1 ) from organic carbon (OC) were mixed with different soil materials sandy, loam, and clay texture soils. Field capacity (FC) and permanent wilting point (PWP) were estimated. Soil materials were placed in transparent plastic columns(12 cm soil column ), and water infiltration(I) was measured as a function of time, the distance of the wetting front and Ks. Results showed that advance we
An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show More