This research was conducted to study the histological structure of the eye in the tree frog (Hyla arborea savignyi) and showed that it is composed of the eyeball and the lens and optic nerve. Appeared eyeball is surrounded by three Tunica from the inside to the outside are Tunica Interna, Tunica vasculosa, Tunica fibrosa. The tunica interna consists of the retina that consists of 10 layers are from outer to inner pigment epithelial layer, rods and cones layer, external limiting membrane, outer nuclear layer, outer plexiform layer, inner nuclear layer, inner plexiform layer , ganglion cells layer , nerve fibers layer, internal limiting membrane .The vascular tunic or Uvea consists of the choroid, ciliary body , and iris . The fibrous coat consists of sclera ,cornea ,limbus cornea. The lens showed Biconvex discoid.
ABSTRACT Background: The main goal of chemomechanical endodontic treatment is the reduction or elimination of microorganisms from root canal system. The intracanal medicaments were used to enhance the disinfection process. This study was conducted to evaluate the antibacterial effect of thymus vulgaris, tea tree essential oils and cold pressed black seed oil (BSO) against E.faecalis. Materials and methods: E.faecalis was isolated from ten patients in need for endodontic treatment. The sensitivity of E.faecalis to the tested oils was evaluated in different concentrations in agar well diffusion method and compared with calcium hydroxide. The sensitivity of E.faecalis to vapor of the tested oils was also evaluated, in disk vaporization method
... Show MoreThe financial markets are one of the sectors whose data is characterized by continuous movement in most of the times and it is constantly changing, so it is difficult to predict its trends , and this leads to the need of methods , means and techniques for making decisions, and that pushes investors and analysts in the financial markets to use various and different methods in order to reach at predicting the movement of the direction of the financial markets. In order to reach the goal of making decisions in different investments, where the algorithm of the support vector machine and the CART regression tree algorithm are used to classify the stock data in order to determine
... Show MoreAN Salih, LO Hamza, Ann. For. Res, 2022 - Cited by 2
Abstract Objective: Comparison of femtosecond small incision lenticule extraction (FS-SMILE) versus Femtosecond laser Insitu keratomileusis (FS-LASIK) regarding dry eye disease (DED) and corneal sensitivity (CS) after those refractive surgeries. Methods: A comparative prospective study conducted for a period of 2 years; from March 2017 until February, 2019. Enrolled patients were diagnosed with myopia. Fifty patients (100 eyes) were scheduled for bilateral FS-SMILE and the other 50 patients (100 eyes) had been scheduled for bilateral FS-LASIK. Both groups were followed for six months after surgery. The age, gender, and preoperative refraction for both groups were matched. Complete evaluation of dry eye disease had been
... Show MoreAbstract Objective: Comparison of femtosecond small incision lenticule extraction (FS-SMILE) versus Femtosecond laser Insitu keratomileusis (FS-LASIK) regarding dry eye disease (DED) and corneal sensitivity (CS) after those refractive surgeries. Methods: A comparative prospective study conducted for a period of 2 years; from March 2017 until February, 2019. Enrolled patients were diagnosed with myopia. Fifty patients (100 eyes) were scheduled for bilateral FS-SMILE and the other 50 patients (100 eyes) had been scheduled for bilateral FS-LASIK. Both groups were followed for six months after surgery. The age, gender, and preoperative refraction for both groups were matched. Complete evaluation of dry eye disease had been
... Show MoreThe current study primarily aims to develop a dictionary system for tracing mobile phone numbers for call centers of mobile communication companies. This system tries to save the numbers using a digital search tree in order to make the processes of searching and retrieving customers’ information easier and faster. Several shrubs that represent digits of the total phone numbers will be built through following the phone number digits to be added to the dictionary, with the owner name being at the last node in the tree. Thus, by such searching process, every phone number can be tracked digit-by-digit according to a required path inside its tree, until reaching the leaf. Then, the value stored in the node, that rep
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant
... Show MoreObjective: This project aimed to study the morphological description and histological structure of ileum in Iraqi black partridge (