Samples of the ovary and uterus of local breed cats used to investigate the histological, histometrical and hormonal features. The paraffin embedding technique was used for processing of tissue that stained by hematoxyline and eosin stain, and massons trichrom stain. Ovary of at proestrus or oestrus phases composed of outer cortex that covered by cuboidal germinal epithelium and inner medulla. Tunica albuginea composed of a thin layer of characterized by fusiform stromal cells. The cortex content groups of Oogonial cells, numerous primordial follicles, little primary, secondary and tertiary follicles in addition for 1-2 follicular cysts and mature corpus letium. In pregnant cat the thickness of ovarian cortex was significantly increased (P.< 0.05) at the 2nd and 3rd term of pregnancy, the cortex containing all types of the follicles which revealed marked regression with lysis of oocytes, in addition for 2-3 corpus letium, thickness of all types of follicles was significantly increased (P.<0.05) at 3rd term of pregnancy. Endometrium of non-pregnant cat was covered by simple columnar to cuboidal epithelial cells. Lamina propria revealed marked hyperplasia of fibroblasts in addition for fibrocytes and active tubular uterine glands. During pregnancy, the uterus displayed 2-3 fetues with their zonary placenta of hemochoriodal type. The maternal part was formed by the basalis decidua and the fetal part composed by chorionic villi that composed of central blood vessels followed by a layer of stromal areolar connective tissue then a multinucleated syncytial cells. Basalis decidua had numerous veins and arteries that emerged within inter villous space forming wide blood channels. The statistical analysis showed significant increased (P<0.05) thickness of endometrium during period of pregnancy, meanwhile the thickness of endometrium, myometrium and epithelial height significantly increased during period of non-pregnancy.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAbstract:
The internal audit is considered the safety valve for senior management in all institutions. It aims to protect property, and raise the efficiency and effectiveness of the administrative performance, by following up on compliance with laws and instructions and the application of regulations in a way that increases the administrative performance of the department. The internal audit is possible to determine Weaknesses or imbalances in the administrative performance. To achieve this goal, an analytical descriptive methodology was adopted. The Baghdad Health Department / Al-Rosana was considered as society for this s
... Show MoreThe study of the " Speech act " in grammatical codes reveals great efforts in the study of the elements of linguistic communication contained in their efforts, and is part of the study of the linguistics of heritage, and the research has been designed to identify the verbal act in the blog of Ibn al-Khabaz (guiding the shine) by studying its sections comprehensively; To the spirit of grammatical discourse as well as the combination of the concept of the semantic act already verbal according to Searle, and its response in the form of indirect verbal acts more than direct acts, as well as the pure formulas of the opinions of the violators in the speech of Ibn al-Khabaz other than the proven verbal formulas Approval and approval, the class
... Show MoreThe subject of youth care of important issues in view of what constitutes the importance
to the development of societies in general and as much as enjoy young people in any society
are good psychological health and agree psychosocial be healthy to be effective to invest their
energies and their potential for the progress of that society and development of the social
aspects and economic. The universities of the most important educational institutions that
provide care for young people, they are as well as providing information and expertise
necessary to prepare young people for life and the development of mental abilities, they are
different activities that will satisfy their needs physical, psychological, social and
this study aimed to study the effect of Cordia myxa extract on the growth and activities of the following types of bacteria : Escherichia coli , Pseudomonas aeruginosa, Proteus Spp., Klebsiella pneumoniae , Staphylococcus aureus, Streptococcus pyogenes , Bacillus subtilus, and the yeast Candida albicans .the results showed an inhibitory effect of the methanol extract on both the growth and activity of the tested microbes .this was reflected by the minimum inhibitory concentration ( MIC ) of different type of bacteria and the yeast.
The use of destructive weapons in wars without restrictions and controls, which eat green and dry land, pollute the environment and cause genocide, has become the problem of the times.
International conventions for the protection of the environment during armed conflicts are characterized by generality, ambiguity, and open to interpretation by the participating states in the agreement, and each state interprets these texts to serve its interests, but the Islamic Sharia stipulates the prohibition of the use of these comprehensive destructive weapons in an unambiguous manner, As stated in the Holy Quran:
... Show More