The current study was conducted to find out the effect of zinc (Zn) on the liver tissue of adult male white mouse, Mus musculus at concentrations (50 and 100 mg/kg/day) and for (30) days.(30) mice were used, divided into three groups of (10) mice, represented by control group, group of (50) mg/kg/day and (100) mg/kg/day. Histopathological changes appeared in the liver of male mice treated with zinc in concentration (50 and 100 mg/kg/day) for 30 days, including deformation and damage to Glisson's capsule, epithelial separation of capsule, in addition to cellular changes represented by hypertrophy of hepatocytes, as seen a swelling necrosis, hypertrophy of nuclei, thickening and degeneration in some hepatocytes, as well as the observed scatter of hepatocytes, and the increasing size and number of Kupffer cells as well as the expansion of sinusoids, as seen hyperplasia of Bile duct cells.
The research aims at:
- Identifying the problems facing kindergarten teachers.
- Identifying the nature of the problems facing kindergarten teachers.
To achieve the aim of the research, the researcher prepared a questionnaire to identify the problems that face the teachers of kindergartens. The questionnaire was subjected to the consultation of a group of specialized expertise in the educational and psychological sciences to certify the propriety of the items of the questionnaire and it gained a rate of (80%), and the stability of the scale gained (0.91) and it stands for a correlation parameter with a statistical significance and it was calculated by using Person’s R Corre
... Show MoreThe ion tail temperature of the comet ISON was calculated by using magneto-hydrodynamic MHD laws. From these equations the focus is concentrating on determine the ion tail temperature from the relations of dynamic and static pressures results.MHD equations are numerically solved using Matlab simulation code using cubic volume element method, based on three dimensionl Cartesian coordinates that devided into equal 15x15x15 equally spaced mesh. The simulation was performed using 3-D Lax explicit method considering normalised physical propreties relative to those of the solar wind at 1 AU. The results explained that it is possible to deduce two types of temperature, the first being the isotropic temperature which is shown to vary slowly with
... Show MoreThe cadastral map is very important because it has technical and materialist
specification of the property borders and these maps which are land registration
based on it in Iraq, the problem is an ancient maps and unfit for use, despite its
importance, Therefor the updating and digitize the cadastral map is very pivotal, this
is what we have done in the present work.
In the present work, we have an old cadastral map (as a paper) was made in 1932
with modern satellite image (Quick Bird ) 2006, which has 61 cm resolution for the
same area after. Geometric correction technique has been applied by using image-toimage
method or (image registration ) and after that we get new agricultural cadaster
map and connect the
In this paper, we define a new subclass of multivalent functions defined by the generalized integral operator with negative coefficients in the open unit disk U. We also give and study some interesting properties such as coefficient estimates, subordination theorems and integral means inequalities by using the famous Littlewood's subordination theorem. Finally, we conclude a type of inequalities that is upper bound and lower bound for topology multivalent functions of all analytic functions.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More<span>Deepfakes have become possible using artificial intelligence techniques, replacing one person’s face with another person’s face (primarily a public figure), making the latter do or say things he would not have done. Therefore, contributing to a solution for video credibility has become a critical goal that we will address in this paper. Our work exploits the visible artifacts (blur inconsistencies) which are generated by the manipulation process. We analyze focus quality and its ability to detect these artifacts. Focus measure operators in this paper include image Laplacian and image gradient groups, which are very fast to compute and do not need a large dataset for training. The results showed that i) the Laplacian
... Show MoreBackground: A major difference between the treatment of the skin lesions and the odontogenic and non-odontogenic sinuses. We aimed to analyze a substantial number of consecutive causes in order to clinical suspicion in the differential diagnoses may be correctly weighted. Materials and methods: The material of this research consisted of 40 patients. A complete history is collected from the patients with the duration and the site of the sinus present, the patient was examined for factors of the fistulas and sinuses and its associations, and patient having any concomitant lesions, a medical consultation done for opinion and management. Clinical examination with facial fistulas and sinuses was mandatory to avoid any mistakes that may occur. A
... Show MoreThe topic of modulus of smoothness still gets the interest of many researchers due to its applicable usage in different fields, especially for function approximation. In this paper, we define a new modulus of smoothness of weighted type. The properties of our modulus are studied. These properties can be easily used in different fields, in particular, the functions in the Besov spaces when