The ceiling of the midbrain has a couple of optic lobes which are prominent and used as an optic center that reflex what it receives from eye retina fibers. The histology of optic tectum has been studied in Iraqi water snake natrix tesselata tesselata . It was found that the number of optic tectum were seven main strata organized from the outside to the inside as follows : the stratum zonula (SZ), the stratum opticum (SO), the stratum fibrosum et griseum superficialis (SFGS), the stratum griseum central (SGC), the stratum album central (SAC), the stratum griseum periventricular (SGP), and the stratum album periventricular (SAP). the three last strata consider deep layers on the optic tectum It was noticed that the thinnest strata was the first (SZ), which is (20-25)µ m, in its thickness, while the thickest strata was the third (SFGS), which is (150-180)µ m. this stratum consist of three substrata (a.b.c). it was found that the optic fibers that come from eye retina enter the optic tectum through the second stratum which is the (SO) . so these fibers go out from optic tectum through the sixth stratum which is the (AGP). the fourth (SGC) contained a concentrated cells of three types which are ,the medium pear shape neuron , medium fusiform neuron , and medium multipolar neuron.
Understanding energy metabolism and intracellular energy transmission requires knowledge of the function and structure of the mitochondria. Issues with mitochondrial morphology, structure, and function are the most prevalent symptoms. They can damage organs such as the heart, brain, and muscle due to a variety of factors, such as oxidative damage, incorrect metabolism of energy, or genetic conditions. The control of cell metabolism and physiology depends on functional connections between mitochondrial and biological surroundings. Therefore, it is essential to research mitochondria in situ or in vivo without isolating them from their surrounding biological environment. Finding and spotting abnormal alterations in mitochondria is the
... Show MoreThe study of these selected traces shows that what Imam Mardini did on Imam al-Zayla'i and enabled him to graduate the hadiths of the book (guidance and conclusions) as well as in choosing the novel closest to Murad the work and not as described by al-Zayla'i .... never deserves descriptions.
In this research we study the effect of UV radiation on pure PC samples and doped samples with plasticizer (DOP) for different exposure times (6, 12, 18, 24h). The study have been made on the change in the IR spectra causes by the UV radiation on both kinds of samples, besides the morphology changes were also studied by the optical microscope. From the results we conclude that the increasing of exposure causes the elaboration of CO2 and C2 gases.
Background: The rhizome of ginger is used in cooking and for medicinal purposes such as anti-bacterial, anti-fungal, anti-inflammatory and antioxidant. The aims of the study were to test the effect of ethanolic extract of ginger on growth, adherence and acidogenicity of mutans streptococci in comparison to chlorhexidine gluconate 0.2% and de-ionized water. Materials and methods: From saliva often volunteers (dental students 20-22 years); mutans streptococci was isolated, purified and diagnosed according to morphological characteristic and biochemical tests. Ginger was powdered and extracted, different concentrations of ginger extract were prepared. Chlorhexidine gluconate 0.2% used as a control positive; while de-ionized water was used as a
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreMalaysia will be an ageing population by 2030 as the number of those aged 60 years and above has increased drastically from 6.2 percent in 2000 and is expected to reach 13.6 percent by 2030. There are many challenges that will be faced due to the ageing population, one of which is the increasing cost of pensions in the future. In view of that, it is necessary to investigate the effect of actuarial assumptions on pension liabilities under the perspective of ageing. To estimate the pension liabilities, the Projected Unit Credit method is used in the study and commutation functions are employed in the process. Demographic risk and salary risk have been identified as major risks in analyzing pension liabilities in this study. The sensitivity
... Show MoreThis review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More