The liver of marsh harrier grossly appeared as large, bi-lobed organ divided into left and right lobes, which are approximately equal in size and not divided into secondary lobes. Histologically, the liver of marsh harrier was found to contain numerous lobules which are not well defined by the connective tissue of the septa except that surrounded the portal triads. The parenchyma of liver composed of irregular branching cords of hepatocytes organized in double rows alternating with tortures path sinusoids which are lined with flattened endothelial cells and large, irregular outlined kupffer cells. Hepatic cords arranged in a radial pattern around the central vein of the liver lobule while in a subscapsular region they run parallel to the ca
... Show MoreThe problem of housing in Iraq is a long-rooted and rooted problem, and it needs a great effort to find out its causes and thus give essential points that contribute to alleviating and addressing it, and it is worth noting that research into the housing problem and the housing sector in Iraq is not done in isolation from other sectors and studies. As well as the economic policies pursued and the social and political conditions. It is known that the Iraqi economy is a unilateral (rentier) economy, that is, it depends almost entirely on exporting oil and obtaining revenues, and that the economic decision and economic policies followed in Iraq are greatly affected by several factors, including the economic, social and political fact
... Show MoreThe research aims to investigate the possibility of joint auditing in improving the market value of Iraqi companies listed on the Iraq Stock Exchange. The sample was represented by 10 Iraqi companies listed in the Iraq market for the period from 2014-2017 (2 years before implementation and 2 years after implementation) and the research was based on the idea that joint auditing enhances investor confidence and raises their level of security as a result of providing quality and reliable reports, and thus This indicates good news in the market that reflects on the performance of stocks and the market value of companies that adopt joint auditing. The results of the analysis indicate an improvement in the market value, but this improv
... Show MorePetrophysical properties evaluation from well log analysis has always been crucial for the identification and assessment of hydrocarbon bearing zones. East Baghdad field is located 10 km east of Baghdad city, where the southern area includes the two southern portions of the field, Khasib formation is the main reservoir of East Baghdad oil field.
In this paper, well log data of nine wells have been environmentally corrected, where the corrected data used to determine lithology, shale volume, porosity, and water saturation. Lithology identified by two methods; neutron-density and M-N matrix plots, while the shale volume estimated by single shale indicator and dual shale indicator, The porosity is calculated from the three common po
... Show MoreSurvival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete
... Show MoreThe general budget is usually linked to the role of the state in public life and economic activity, whether this role is neutral or interventionist and thus reflects the general objectives that the state seeks to achieve.
for importance of the public budget in clarifying the image of the political state philosophy and its objectives it seeks to achieve on the one hand and clarifying the degree and rank it occupies in the ladder of development among the other countries. This study is intended to highlight the concepts of the general budget and how its concept has evolved since the Middle Ages. Of the importance of the general budget in Iraq was not based on scientific and objective and then the study
... Show MoreBoth traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs a
... Show MoreBackground Rectal cancer is one of the most common malignant tumors of gastrointestinal tract. Combining chemotherapy with radiotherapy has a sound effect on its management.
Objectives Assessment the patterns of characterizations of rectal cancer. Evaluation of the efficacy, and long-term survival of pre-/ postoperative chemoradiation. Collecting all eligible evidence articles and summarize the results.
Methods By this systematic review and meta-analysis study, we include data of chemoradiation of rectal cancer articles from 2015 until 2019. The research was carried out at Baghdad Medical City oncology centers. Accordance with the
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More