The present study designed to determine the ethanolic extract of Cyperus rotundus on Liver in Albino Male Mice . In the present study 18 Male mice were used they divided into six groups ( 1st group consedered control group , 2nd group injected by 250 mg/ml from extract , 3th group injected by 300 mg/ml from extract , 4th group injected by 350 mg/ml from extract , 5th group injected by 400 mg/ml from extract and the 6th group injected by 450 mg/ml from extract ) . the expermint lasted for two days and the doses gived by intraperitonial injection . showed from the study results that ethanolic extract for Cyperus rotundus have negative effect on Liver tissue in 250 , 300 , 350 mg/ml concentrations when comparsion with control group . the results from two last groups was the same effect to the first three groups but was more negative on Liver tissue from the first three groups treated . We concluded from the present results that ethanolic extract from rhizomes of Cyperus rotundus have negative effect on liver tissue in the different concentrations .
The Yamama Formation is a significant reservoir in the southern part of Iraq. This formation consists of limestone deposited throughout the Lower Cretaceous period within main retrogressive depositional series. This study aims to identify the impact of the diagenesis processes on the reservoir’s characteristics (porosity and permeability). Diagenesis processes’ analysis and the identification of Yamama Formation depended on the examination of more than 250 thin sections of the core samples from two wells that were used to determine different diagenetic environments and processes. The three identified diagenetic environments that affected Yamama reservoir were the marine, meteoric and burial environments. Eight diagenetic pr
... Show MoreIn this paper, we have employed a computation of three technique to reduce the computational complexity and bit rate for compressed image. These techniques are bit plane coding based on two absolute values, vector quantization VQ technique using Cache codebook and Weber's low condition. The experimental results show that the proposed techniques achieve reduce the storage size of bit plane and low computational complexity.
The Ottomans ruled Turkey for nearly six centuries, during which the Ottoman Empire passed through varying periods in terms of strength, influence, and the area of land they ruled. In the last decade of its rule, the Ottoman Empire was severely weakened in all political, military, administrative and economic aspects. In addition to the internal strife that was stirred up by the leaders of the Association (Union and Progression), that organization that led the coup movement against the Ottoman Empire later.
After the abolition of the Sultanate and the proclamation of the Turkish Republic, the social fabric in Turkey changed, and many customs and traditions alien to it emerged to society. One of the thing
... Show MorePositron annihilation lifetime has been utilized for the first time to investigate the free - volume hole properties in thermolumenscent dosimeter ( TLD ) as a function of gamma-dosc . The hole volume, free volume fraction determined form orthopsitronium lifetime are found to be ?lamatically increase to large values , and then to minimum values as a function ofgamma-dose . The free - volume holes size is found to be 0.163nm’ and to have maximum of 0.166nm^ at the gamma-dose of 0.1 and 0.8 Gy, respectively-
The present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.
An edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show MoreThe present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.
The Mawat Ophiolite Complex located in north-eastern Iraq represents part of the Iraqi Zagros Suture Zone, located at the border between the Arabian-Iranian plates. It consists of peridotite, gabbro, subvolcanic sheeted dykes and volcanic pillow lava. The geochemical signatures of the gabbro show a significant variation in major elements concentration, low concentrations of TiO2 (0.06-0.36 wt.%), Na2O (0.44-0.98 wt.%), K2O (0.024-0.48 wt.%), P2O5 (0.002-0.009 wt.%) and moderate variations in SiO2 (46.13-53.77 wt.%) with wide ranges and high concentration of Al2O3 (13.87-22.18 wt.%), Fe2O3 (0.04-2.95 wt.%), FeO (2.68-8.76 w
... Show MoreThe main purpose of this paper is to introduce and prove some fixed point theorems for two maps that
satisfy -contractive conditions with rational expression in partially ordered metric spaces, our results improve and unify a multitude of fixed point theorems and generalize some recent results in ordered partially metric space.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More