The increase in the use of thyme in Iraq and neighboring countries, which may
be result in serious side effects necessitate the demand for testing different
concentrations of thyme extract (500,750,1000) mg/kg of body weight on rats to be
given either by injection or feeding grinded dried thyme leaves added to pellets
(50,100,150) g /kg of pellet in of different periods , (10,20,30) days for injection
and feeding 2 times weekly. Thyme extracts leaves effects on RBCs, WBCs and
Differential WBCs counts were measured. statistical analysis showed significance
increase difference (P≤0.05) in RBCs, WBCs and Lymphocyte, Nutrophile and
Monocyte counts and decrease in Eosinphil counts in rats treated with 1000 mg of
t
Many studies and researches related to the audio and visual medium have shed light on the creative process that has taken place through them as well as the aesthetic and artistic creation and have dealt with many fields of knowledge and creativity in this field of art, which managed to study and follow its intellectual and technical tools for creating achievements through this medium, in its forefront come the elements of the cinematic language, which is characterized by possessing multiple features of aesthetic and semantic employment to reach the recipient as it is a tool of the artistic expression that gives the material it deals with aesthetic and intellectual dimensions from various aspects. "The artistic expression cannot be achiev
... Show MoreThe principle of citizenship has international dimensions that affect the application of the principle, such as the structure of the international system, and the control of the concepts of globalization, international organizations which played an important role in the consolidation of this principle.
The problem of the study revolves around the effects of international variables on the principle of citizenship in Kuwait during the period 1991-2018.
The study used several indicators, such as: the rule of law, achieving the principle of separation of powers, the right to form parties, the application of the law of nationality, and racial discrimination, women's rights, and freedom of expression.
Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreThe use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.
Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show More