The present study aims to give some details about the normal anatomical and histological structure of the liver, pancreas and gall bladder in Cyprinus carpio Linnaeus, 1758 and Mesopotamichthys sharpeyi (Günther, 1874). Anatomical results revealed that the liver of C. carpio is a reddish-brown in color, located in the anterior part of abdominal cavity and dispersed between most of the intestines, which is divided into two lobes; while in M. sharpeyi the liver is light brown in color located in the anterior part of abdominal cavity and extends to the end of the intestinal tract with two lobs. The gallbladder situated in the right side of the liver in both species. Histological results in both species showed that the liver consists of hepatocytes arranged radially around a central vein, separated by blood sinusoids, not divided into distinct hexagonal lobules, no portal traids as in higher vertebrates. The wall of gallbladder consist of three distinct layers: Tunica mucosa, tunica muscularis and tunica serosa. Microscopic results showed that exocrine pancreatic tissue was diffused type in both species located in liver and consists of acini as "hepatopancreas ", however, pancreatic tissue diffused between the intestinal coiling in C. carpio, and in the internal surface of the liver in M. sharpeyi. Endocrine parts of pancreas were observed in few numbers of cell masses in various sizes among exocrine pancreatic cells.
Obesity is a disease describe a case of excessive accumulation of body fats. Obesity is linked to the morbidity of human health, such as the development of hypertension. The study designed to investigate the levels of glucose, urea, creatinine, and lipid profile parameters in sera of obese female and hypertensive obese female. The study included 90 subjects who divided onto three groups equally, in which they are healthy control, normotensive obese, and hypertensive obese. A significant elevation (P<0.01) has observed in the level of glucose, urea, creatinine, triglycerides (TGs), cholesterol, LDL-C, and VLDL-C in obese females compared with control, yet only TGs and VLDL-C were si
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreThe present work deals with five species of parasitic Hymenoptera belonging to Pteromalidae, Eupelmidae and Eurytornidae which have been reared from brachid beetles. A new species, Eurytoma irakensis is described and the species, Bruchocida orientalis Crawford is recorded for the first time from Iraq.
In this paper we introduce the idea of the commutator of two fuzzy subsets of a group and study the concept of the commutator of two fuzzy subsets of a group .We introduce and study some of its properties .
Diverse organismsuch as mammals and fishes exposure to noxious waste in the surroundings is a continuous routine and the active absorption and propagation of contaminants in humans is through the food chain. In order to determine the level of toxicity across the food chain,this research was structured to identify some biochemical alterations in the hepatic tissue of rats fed cadmium, cyanide and a mixture of cyanide and cadmium contaminated catfish diet. Fish were assigned into four groups and were exposed to both toxicants (cadmium and cyanide) in the single and combined states. Each toxicant was administered as cadmium chloride (CdCl2) and potassium cyanide (KCN) on a dose of 0.4 mg of the toxicant/100 ml water
... Show MoreThere are many diseases that affect the arteries, especially those related to their elasticity and stiffness, and they can be guessed by estimating and calculating the modulus of elasticity. Hence, the accurate calculation of the elastic modulus leads to an accurate assessment of these diseases, especially in their early stages, which can contribute to the treatment of these diseases early. Most of the calculations used the one-dimensional (1D) modulus of elasticity. From a mechanical point of view, the stresses to which the artery is subjected are not one-dimensional, but three-dimensional. Therefore, estimating at least a two-dimensional (2D) modulus of elasticity will necessarily be more accurate. To the knowledge of researchers, there i
... Show MorePower-electronic converters are essential elements for the effective interconnection of renewable energy sources to the power grid, as well as to include energy storage units, vehicle charging stations, microgrids, etc. Converter models that provide an accurate representation of their wideband operation and interconnection with other active and passive grid components and systems are necessary for reliable steady state and transient analyses during normal or abnormal grid operating conditions. This paper introduces two Laplace domain-based approaches to model buck and boost DC-DC converters for electromagnetic transient studies. The first approach is an analytical one, where the converter is represented by a two-port admittance model via mo
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThis experiment was carried out in the College of Agricultural Engineering Sciences, Univ. of Baghdad, during autumn 2021 growing season to investigate possibility study of increase lettuce antioxidant and biological yield, growing and producing lettuce hydroponically under film technique (NFT) using a globally approved standard solution (Cooper solution), Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is LED light (B and R), Then levels of second factor were randomly distributed within each replicate, which included spraying with organic nutrients which was Cymbopogon citratus and Hibiscus sabdariffa at two