This study aimed to investigate the impacts of the Trigonella foenum-graecum (T. foenum-graecum) seeds on the female gonad. A total of twenty local rabbits were used in this study; were divided into four groups (5 each): first group (G1) was considered as the control group. The second group (G2), third group (G3) and fourth group (G4) were fed daily1.5%, 3%, and 4.5% of T. foenum-graecum seeds respectively for 60 days (twice daily). At the end of the experiment, the animals were euthanized by diethyl ether (C2H52O). Then the abdomen was incised, and the samples of ovaries were collected and fixed by 10% neutral buffered formalin. The histological assessment was done with a paraffin embedding technique and the histological sections were stained with Hematoxylin and Eosin stain. The result showed that the numbers of primary and secondary follicles were significantly (P<0.05) decreased in G3and G4 compared with the control (G1) and G2. The numbers of Graafian follicles were significantly P<0.05 decreased G4 compared with other groups. The diameters of the primary, secondary, and Graafian follicles were significantly smaller than the other groups. The thickness of the granulosa cell layer in G3and G4 were significantly thinner than the other groups. The histological figures declared that the ovary of G2 was similar to that in G1. The histological sections of G3 and G4 were revealed marked cortical and medullary vascular congestion and focal hemorrhage; there were also marked follicular degeneration and cystic necrosis. The study concluded that the low concentration of T. foenum-graecum (fenugreek) seeds do not have any positive effect in terms of ovarian stimulation.
The COVID-19 pandemic has profoundly affected the healthcare sector and the productivity of medical staff and doctors. This study employs machine learning to analyze the post-COVID-19 impact on the productivity of medical staff and doctors across various specialties. A cross-sectional study was conducted on 960 participants from different specialties between June 1, 2022, and April 5, 2023. The study collected demographic data, including age, gender, and socioeconomic status, as well as information on participants' sleeping habits and any COVID-19 complications they experienced. The findings indicate a significant decline in the productivity of medical staff and doctors, with an average reduction of 23% during the post-COVID-19 period. T
... Show More
A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreWe study in this paper the composition operator of induced by the function ?(z)=sz+t where , and We characterize the normal composition operator C? on Hardy space H2 and other related classes of operators. In addition to that we study the essential normality of C? and give some other partial results which are new to the best of our knowledge.
Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show More