The results of the current study showed that the thyroid gland in an adult domestic cat (Felis catus) is located in the neck area on both sides of the trachea at rings 1–5. The gland consists of two lobes (right and left), and it is surrounded by a capsule of connective tissue consisting of two outer and inner layers, and a layer of fatty tissue overlaps with the outer layer of the capsule. In addition, the results of this study found that the histological structure of the thyroid gland is composed of several follicles that appear in different sizes and shapes. The follicles are lined with simple cuboidal epithelial tissue and sometimes appear lined with high and low simple cuboidal epithelial tissue. The gland is histologically composed of two types of cells: epithelial cells and parafollicular cells, or calcitonin cells (C-cells), the latter being few in number compared to the epithelial cells and appearing as single cells or forming clusters in two locations: the first is between the follicular and the second is intrafollicular.
The research aims to reveal the professional self and the school climate among the educational counselors. The research problem is crystallized in the following:
1-Identifying the professional level of the educational counselors.
2- Knowing the level of the school climate with the educational counselors.
3- Are there statistically significant differences in the professional self and the school climate between the educational counselors of different gender (male / female)?
4- Is there a relationship between the professional self and the school climate of the research sample?
To answer these questions, the research was conducted on educational counselors in secondary schools in the district of Falluj
... Show MoreThe research (Virtual Reality Technology and its Uses in Industrial Product Design) is interested in the virtual reality technology used in the industrial product design and consequently knowing the functions achieved in the industrial product according to the data of that technology which participates in activating the mental and imaginary image of the user which show the parameters of the technical transformation of that product. The terms used in the research have been defined to guide the reader. The second chapter, the theoretical framework consisted of three sections the first is concerned with technology in the industrial design. The second is concerned with the virtual environment and the virtual reality. The thirds chapter consi
... Show MoreObjectives: The current study aims to evaluate parents' knowledge towards diabetes mellitus (type I); to identify the association between parents' knowledge and their demographic characteristics; and to identify the association between parents' knowledge and demographic characteristics of their children. Methodology: Descriptive study carried out during the period from January to April 2015 on purposive sample of 100 parents with their children with diabetes mellitus who attending diabetes and endocrine treatment center. An evaluation tool is constructed by the researcher based on previous literature regarding
My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreAbstract
The research Compared two methods for estimating fourparametersof the compound exponential Weibull - Poisson distribution which are the maximum likelihood method and the Downhill Simplex algorithm. Depending on two data cases, the first one assumed the original data (Non-polluting), while the second one assumeddata contamination. Simulation experimentswere conducted for different sample sizes and initial values of parameters and under different levels of contamination. Downhill Simplex algorithm was found to be the best method for in the estimation of the parameters, the probability function and the reliability function of the compound distribution in cases of natural and contaminateddata.
... Show More
Visualization of water flow around different bluff bodies at different Reynolds number ranging (1505 - 2492) was realized by designing and building a test rig which contains an open channel capable to ensure water velocity range (4-8cm/s) in this channel. Hydrogen bubbles generated from the ionized water using DC power supply are visualized by a light source and photographed by a digital camera. Flow pattern around a circular disk of (3.6cm) diameter and (3mm) thickness, a sphere of (3.8cm) diameter and a cylinder of
(3.2cm) diameter and (10cm) length are studied qualitatively. Parameters of the vortex ring generated in the wake region of the disk and the separation angle of water stream lines from the surface of the sphere are plott
Aim: The Aim of the study is to compare between Er,Cr:YSGG 2780 nm laser and carbide fissure bur in root-end resection regarding the morphological variations, temperature changes and the duration of resection process.
Settings and Design: 5 W, 25 Hz, 50% water, 80% air,25.47 J/cm2 .
Material and method: twenty-one extracted single rooted teeth endodontically were treated, twenty teeth were obturated and divided into two groups according to method of resection. Group 1 root-end resected using cross cut carbide bur while group 2 root-end resected using laser with MGG6 sapphire tip of 600 μm diameter. Temperature on external root surface and duration of resection were recor
... Show MoreWireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreIn the present paper we introduce and study new classes of soft separation axioms in soft bitopological spaces, namely, soft (1,2)*-omega separation axioms and weak soft (1,2)*-omega separation axioms by using the concept of soft (1,2)*-omega open sets. The equivalent definitions and basic properties of these types of soft separation axioms also have been studied.