Preferred Language
Articles
/
Rhe4lpABVTCNdQwC045G
The effects of progesterone on mice offspring testis development and anogenital distance postnatally
...Show More Authors

Background: Analysis of human reports and comparison with results of experimental animals indicate that the effects of progesterone on human not analogous to experimental animals fetus, many studies showed that exposure to progesterone during developing of genital tract of human fetus was not teratogenic. Other studies which performed on laboratory animals found association between progesterone administration during gestation and genital malformation. Objectives: to explore the effect of progesterone in 10.2 mg/kg intraperitoneal injection in mice on testis development and anogenital distance. Materials and Methods: ten pregnant mice divided into five mouse control group that injected10. 2mg/kg sesame oil and treated group that injected progesterone at dose 10.2 mg/kg/day allover gestation to the seventh day postnatally, mice offspring sacrificed, the anogenital distance, weight and diameter of testis were measured, histological slides were prepared and examined for histopathological change and measurement of seminiferous tubules diameter, germinal epithelium thickness and interstitial space were done. Results: the current study found anogenital distance decrement and histopathological changes in mice offspring testis as hemorrhage or congestion of blood vessels, irregular shapes of seminiferous tubules with atrophy, detachment of spermatogenic cells from basement membrane, death of spermatogenic cells and destruction of Sertoli and leydig cells, it is also showed wider interstitial tissue and thinner germinal epithelium.

Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Load Effect on Wall Attachment Fluidics Amplifier Performance
...Show More Authors

An experimental work has been conducted on wall attachment fluidics amplifiers, one of them to study the effect of output pressure or load on the amplifier performance. The output load has been simulated as a piston connected to the device output and the piston can be loaded accordingly. The results shows that the output volume flow rate increases as the supply pressure increases under different load and the output pressure remains constant as the supply pressure increases under constant load.

View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control & Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Adsorption Study for Chromium (VI) on Iraqi Bentonite
...Show More Authors

The subject of this research involves studying adsorption to remove hexavalent chromium Cr(VI) from aqueous solutions. Adsorption process on bentonite clay as adsorbent was used in the Cr(VI) concentration range (10-100) ppm at different temperatures (298, 303, 308 and 313)K, for different periods of time. The adsorption isotherms were obtained by obeying Langmuir and Freundlich adsorption isotherm with R2 (0.9921-0.9060) and (0.994-0.9998), respectively. The thermodynamic parameters were calculated by using the adsorption process at four different temperatures the values of ?H, ?G and ?S was [(+6.582 ? +6.547) kJ.mol-1, (-284.560 ? -343.070) kJ.mol-1 and (+0.977 ? +1.117) kJ.K-1.mol-1] respectively. This data indicates the spontaneous sorp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 31 2021
Journal Name
Research Journal Of Pharmacy And Technology
A Review on Film Forming Drug Delivery Systems
...Show More Authors

Conventional dosage forms for topical and transdermal drug delivery have several disadvantages related mainly to its poor skin permeation and patient compliance. Many approaches have been developed to improve these dosage forms. Film forming drug delivery systems represents a recent advancement in this field. It provides improved patient compliance with enhanced skin permeation of drugs. In its simplest form, these consist of a polymeric solution, usually in a supersaturated state, in a suitable solvent. A plasticizer is usually added to improve the flexibility and enhance the tensile strength to the film. It is also possible to control and sustain the drug release from the films by controlling the polymeric content, concentration o

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Reducing water stress on apricot saplings cv. Zanjelly
...Show More Authors

Scopus (2)
Scopus
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
SOME RESULTS ON T_PURE SUBMODULES RELATED TO SUBMODULE
...Show More Authors
Abstract<p>The aim of this work is studying many concepts of a pure submodule related to sub-module L and introducing the two concepts, T_pure submodule related to submodule and the crossing property of T_pure related to submodule. Another characterizations and study some properties of this concept.</p>
View Publication
Scopus Crossref