The present study aimed to investigate the anatomy, histology, and immunohistochemistry of parathyroid gland in two Iraqi mammals (Weasel, Herpestes javanicus and Long-ear hedgehog, Hemiechinus auritus) as a comparative study. A total of (20) animal for each species were used in the present study. Animals collected were immediately anesthesia and dissected to get the parathyroid gland. Methods of Humason and Bancroft and Stevens were employed for histological techniques. Different stains were used (Hematoxylin- Eosin stain-(H & E), Periodic Acid Schiff stain-(PAS), Azan stain, and Methyl Blue stain-(MB)) for staining the histological sections. Anti-calcitonin, code140778 marker used for immune-histochemical study. Results of the present study revealed that parathyroid glands in both animals under investigation were small, oval or irregular shape glands located in attached with thyroid gland. Histologically parathyroid gland in both studied animals were surrounded by thin connective tissue capsule, which represented as an extension from thyroid gland capsule, the capsule extended inside the gland tissue to separated it into several lobules. Three types of cells were recognized in the gland tissue represented by chief cells, oxyphil cells, and water clear cells. The immunohistochemical study of parathyroid gland in both species under investigation revealed response to interaction with calcitonin, as the cells appeared in brown color giving an evidence for the immune reaction in cytoplasm and plasma membrane of the cells, but the reaction in H. auritus was weaker than that in H. javanicus.
The existence of the tax Coupled with the existence of the power of the political Sociality and the evolution of its concept differes according to the concept of the role of the state and its evolution in the economical life and it represents on of the main sources of funding one hand and an effective means that enables the state to intervene in various aspects of the economic life on the other hand. Tax also can be considered as a tool used to re-distribue the in class. Perhaps Iraq suffers from and in the marginalization to the role of taxes in funding and in turn the adoption of the Iraqi budget on oil revenues to finance the aspects of expenitvre which can pose a risk on the total Iraq
... Show MoreThe speech act of refusals has been studied widely either alone or in relation to such areas as apology, requests, promotion, and invitation. The present study aims to investigate the strategies employed by Iraqi females in refusing marriage proposals. It attempts to explore their preferences to respond directly or indirectly in relation to their ages and educational background of the parents. The sample of the study consists of 25 participants; they are learners of English as a foreign language (EFL) at the College of Education for Women/ University of Baghdad. The data are collected by using a discourse completion task (DCT) followed by a follow up interview. The researchers used a Google form shared via emails to get responses from the p
... Show MoreDrug overdose and poisoning are common clinical problems and could occur with Diphenhydramine hydrochloride (DFH) (one of anti histaminic drug ). It therefore important to study the adsorption of the DFH on pharmaceutical adsorbents which could serve as possible antidotes for the emergency treatment of DFH overdose or poisoning when they occur. The rate and extent of adsorption of DFH on some pharmaceutical adsorbents, bauxite were investigated spectra photometrically also the effect temperature, pH, presence of sucrose as additive have been studied as well, adsorbent's weight and partical size.The equilibrium adsorption contact times were determined for clay surface. Adsorption isotherms have been analyzed by the freundlich model. The appa
... Show MoreAA Noaimi, IRAQI JOURNAL OF COMMUNITY MEDICINE, 2013 - Cited by 1
Health insurance and its benefits are of great importance and impact on the employees who represent the human capital of each organization because they are related to the health reality. The study took into account the most important and the last of his writing of the concepts and literary reviews and enriched the theoretical part of the practical side has addressed the financial data and analysis for the period from 2013 to 2017 to know the impact and the relationship between the variables that They were reviewed on the theoretical side. The study came out with a number of results, on the basis of which practical conclusions were drawn and reflected what was observed on the basis of which the recommendations were formulated
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreABSTRUCT
In This Paper, some semi- parametric spatial models were estimated, these models are, the semi – parametric spatial error model (SPSEM), which suffer from the problem of spatial errors dependence, and the semi – parametric spatial auto regressive model (SPSAR). Where the method of maximum likelihood was used in estimating the parameter of spatial error ( λ ) in the model (SPSEM), estimated the parameter of spatial dependence ( ρ ) in the model ( SPSAR ), and using the non-parametric method in estimating the smoothing function m(x) for these two models, these non-parametric methods are; the local linear estimator (LLE) which require finding the smoo
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More