The present study deals with the morphological and histological aspects of the forebrain(Cerebrum) in the Columba livia domestica (Gmelin, 1789) to identify the histoarchitecture of its layers. This bird' has a large head found as perpendicular to the longitudinal axis. The morphological results reveal that for brain (Cerebrum) pear shaped, its outer surface is smooth without folds or deep grooves. Cerebrum is made up of two regions, the Pallium and the Subpallium. The Cerebral cortex includes four layers of hyperpallium (Wulst) , Dorsolateral corticoid area (CDL), Hippocampus, Piriform cortex. The internal cortex of cerebrum consists of Dorsal Ventricle ridge which includes the mesopallium, nidopallium, and archospallium. All these regions includes Pyramidal cells, which have different sizes and densities, as well as many other neurons and Neuralgial. The Subpallium is divided to Striatum which is consisted of nerve fibers of nerve cells and the Palldium, which is the deepest part of the brain with light- color.
Objective(s): The study aims Finding relationship between UTI and demographic variable include: child's age, child's gender, if males are circumcised or not, child's order in his family, father's level of education, mother's level of education, place of residence and family socioeconomic status. Methodology: A descriptive study was conducted on students of primary schools for both sexes, for the period from 19th. February 2014 through to 4th March 2014. A selected sample from two steps the first stage is to choose a school by a stratified- cluster sample, getting schools that have been selected (12) sch
In this research, beam expander, BEX, is explained and designed for illuminating the
remote flying target. The BEX is optically designed to be suited for Nd:YAG laser of given
specifications. The BEX is modified to be zoom one to meet the conditions of preventing the
receiving unit; i.e the photodetector, from getting saturated at near and far laser tracking.
Decollimation could be achieved by automatic motor, which controls zoom lens of the BEX
according to the required expansion ratio of beam expander
This study is aimed to Green-synthesize and characterize Al NPs from Clove (Syzygium aromaticum
L.) buds plant extract and to investigate their effect on isolated and characterized Salmonella enterica growth.
S. aromaticum buds aqueous extract was prepared from local market clove, then mixed with Aluminum nitrate
Al(NO3)3. 9 H2O, 99.9% in ¼ ratio for green-synthesizing of Al NPs. Color change was a primary confirmation
of Al NPs biosynthesis. The biosynthesized nanoparticles were identified and characterized by AFM, SEM,
EDX and UV–Visible spectrophotometer. AFM data recorded 122nm particles size and the surface roughness
RMs) of the pure S. aromaticum buds aqueous extract recorded 17.5nm particles s
Background: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More