The quantitative determination of the estrogen E2, Progestron P4 & follicle stimulating hormones FSH in the serums of Albino mice used in the experiments & treated by crude alcoholic extracted 95% of the seeds & leaves of Apium graveolens was a significant increase in the concentration of estrogen of different kinds of the extracted in comparison with the values of the coefficient of the control group, that is the study recorded a significant increase of the concentration of estrogen; it was the highest in the mice which was administrated by the methanolic extracted 95%, then it was less in the mouse which was administrated by the ethanolic extracted., and it was the least in the mice which were administrated by the crude ethanolic-methanoloic extracted of the seeds of Apium graveolens; while the increase of the concentration of estrogen of different crude alcoholic extracted leaves of Apium graveolens was the highest than the extracted of the seeds, & it was less concentration in the mice which were administrated by the methanolic extracted 95%, & then it was the least in the mice which were administrated by the crude ethanolic-methanolic extracted leaves of Apium graveolens in comparison with the values of the control group. Further, the plant extracted created a significant increase of the concentration of progestron P4; the statistics analysis recorded that the concentration of progestron was the highest in the mice which were administrated by the methanolic extracted 95%, then it was less in the mice which were administrated by the ethanolic extracted 95%, and the least in the mice which were administrated by the crude ethanolic-methanolic extracted of the seeds of apium graveolens whereas, a significant increase of the concentration of progrstrone was recorded in the leaves of Apium graveolens as follows: it was the highest in the mice which were administrated by the ethanolic extracted 95%, then it was less in the mice which were administrated by the crude methanolic extracted 95%, and it was the least in the mice which were administrated by the crude ethnolic-methanolic extracted in comparison with the coefficient of control group. The study also proved that there was a significant increase of the concentration of the follicle stimulating hormone FSH whose greatest concentration in the mice which was administrated by the crude ethanolic-methanolic for the seeds of Apim graveolens, it was less concentration in the mice which was administrated by crude methanolic extracted 95% of the seeds, and it was the least in the mice which was administrated by the methanolic extracted 95% of the leaves of Apium graveolens in comparison with the concentrations of the coefficient of the control group. While, the results recorded a significant decrease of the FSH in the mice which was administrated by the crude ethanolic extracted of the seeds & leaves of Apium graveolens a highest decrease, it was less concentration in the mice which was administrated by the crude ethanolic-methanolic extracted of the leaves of apium graveolens, in comparison with the concentration in the control group.
The aim of this study is to investigate the main causes of the family violence and its
social effects.
The study reveals that main factors causes of the violence are interaction between
multi-factors.
The study shows that the poverty, low educational level, house crowded, large family
size, all of these variables causes of the violence, and then causes of family disorganization
and juvenile delinquency.
The study contain of three sections:
First: Focused on the causes of the violence.
Second: The interaction between multi factors.
Third: Social effects of family violence.
Image pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). The
... Show MoreOur aim in this paper is to introduce the notation of nearly primary-2-absorbing submodule as generalization of 2-absorbing submodule where a proper submodule of an -module is called nearly primary-2-absorbing submodule if whenever , for , , , implies that either or or . We got many basic, properties, examples and characterizations of this concept. Furthermore, characterizations of nearly primary-2-absorbing submodules in some classes of modules were inserted. Moreover, the behavior of nearly primary-2-absorbing submodule under -epimorphism was studied.
KHalaf Alhmar and what we get from his poem
The ground state proton, neutron and matter densities andcorresponding root mean square radii of unstable proton-rich 17Neand 27P exotic nuclei are studied via the framework of the twofrequencyshell model. The single particle harmonic oscillator wavefunctions are used in this model with two different oscillator sizeparameters core b and halo , b the former for the core (inner) orbitswhereas the latter for the halo (outer) orbits. Shell model calculationsfor core nucleons and for outer (halo) nucleons in exotic nuclei areperformed individually via the computer code OXBASH. Halostructure of 17Ne and 27P nuclei is confirmed. It is found that thestructure of 17Ne and 27P nuclei have 25 / 2 (1d ) and 1/ 2 2s -dominantconfigurations, resp
... Show MoreIn this paper, we introduced module that satisfying strongly -condition modules and strongly -type modules as generalizations of t-extending. A module is said strongly -condition if for every submodule of has a complement which is fully invariant direct summand. A module is said to be strongly -type modules if every t-closed submodule has a complement which is a fully invariant direct summand. Many characterizations for modules with strongly -condition for strongly -type module are given. Also many connections between these types of module and some related types of modules are investigated.
This research is mainly about the Arabic poetical work of the poet “Fadhuli AL-Baghdadi ». It aims to show the poetic purposes used like (advice, flirting and praise). This research sheds some lights on how the poetical work was hardly found because it has only one copy, which is originally a transcript
This study analyses AL-Baghdadi's poems, as well as Sheding some lights on earlier life and his other compositions, AL-Baghdadi is considered a tri-lingual poet who wrote in Turkish, Arabic and persian. His Surname as "AL- Baghdadin was as mentioned by some historians, due to his being born in Baghdad or to All a resident in Baghdad at that some poets, who wrote in Arabic have been mentioned here also, like The judge Burhan Al-
... Show MoreThis article investigates the relationship between foot angle and jump stability, focusing on minimizing injury risk. Here are the key points: Importance: Understanding foot angle is crucial for improving jump stability, athletic performance, and reducing jump-related injuries like ankle sprains. Ideal Foot Angle: Research suggests a forward foot angle of around 15 degrees might be ideal for many people during jumps. This angle distributes forces evenly across the foot, lowers the center of gravity, and provides more surface area for pushing off the ground. Factors Affecting Ideal Angle: The optimal angle can vary depending on the type of jump (vertical vs. long jump), fitness level, and personal preference. Incorrect Foot Angles: Landing w
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreA good performance of reinforced concrete structures is ensured by the bond between steel and concrete, which makes the materials work together, forming a part of solidarity. The behavior of the bond between the reinforcing bar and the surrounding concrete is significant to evaluate the cracking control in serviceability limit state and load capacity in the ultimate limit state. In this investigation, the bond stresses between reinforcing bar and reactive powder concrete (RPC) was considered to compare it with that of normal strength concrete (NSC). The push-out test with short embedment length is considered in this study to evaluate the bond strength, bond stress-slip relationship, and bond stress-crack width relationsh
... Show More