The liver is one of the largest glands in the digestive system and performs 13 various functions, including the secretion of hormones and enzymes. The gallbladder serves as a storage reservoir for secretions before they are released into the digestive system through the duodenum. The bile ducts branch from the liver’s lobes and ultimately connect to the digestive system, making this structure significant and distinct among different animal species. This review focuses on the differences between dogs and cats, highlighting the importance of these differences from both health and pathological perspectives. After conducting a detailed scientific review of the biliary tree in dogs and cats, we concluded that cats are more susceptible to the disease than dogs. We recommend conducting extensive radiological studies to determine which species experience cases of this disease more frequently. Additionally, it would be beneficial to explore crossbreeding with another species with a biliary tree structure that offers protection against certain diseases affecting the liver and bile
This work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreSolar module operating temperature is the second major factor affects the performance of solar photovoltaic panels after the amount of solar radiation. This paper presents a performance comparison of mono-crystalline Silicon (mc-Si), poly-crystalline Silicon (pc-Si), amorphous Silicon (a-Si) and Cupper Indium Gallium di-selenide (CIGS) photovoltaic technologies under Climate Conditions of Baghdad city. Temperature influence on the solar modules electric output parameters was investigated experimentally and their temperature coefficients was calculated. These temperature coefficients are important for all systems design and sizing. The experimental results revealed that the pc-Si module showed a decrease in open circuit v
... Show MoreThe present work shows a theoretical results that have been used the functional Hybrid of three parameters Lee-Yang-Parr (B3LYP) of the quantum mechanical approach for density functional theory with (Spanish Initiative for Electronic Simulations with Thousands of Atoms) SIESTA code. All calculations were carried out employing the used method at the Gaussian 09 package of programs. It was reported the main point for research on dominance of the bandgap of elongated pi-conjugated molecules by using different chemical groups replacing hydrogen atom in the most molecules that used in this work. The side groups creates another factor that controls the value of the band gap. The dihedral angle between the two pheny
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreThis study was aimed to determine a phytotoxicity experiment with kerosene as a model of a total petroleum hydrocarbon (TPHs) as Kerosene pollutant at different concentrations (1% and 6%) with aeration rate (0 and 1 L/min) and retention time (7, 14, 21, 28 and 42 days), was carried out in a subsurface flow system (SSF) on the Barley wetland. It was noted that greatest elimination 95.7% recorded at 1% kerosene levels and aeration rate 1L / min after a period of 42 days of exposure; whereas it was 47% in the control test without plants. Furthermore, the percent of elimination efficiencies of hydrocarbons from the soil was ranged between 34.155%-95.7% for all TPHs (Kerosene) concentrations at aeration rate (0 and 1 L/min). The Barley c
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreIn the present study, a powder mixture of elements Ti and Ni was mechanically alloyed in a high energy ball mill. Microstructure of the nanosized amorphous milled product in different stages of milling has been characterized by X- ray diffraction, scanning electron microscopy and differential thermal analysis. We found that time of mechanical alloying is more significant to convert all crystalline structure to the amorphous phase. Nanocrystalline phase was achieved as a result of the mechanical alloying process. The results also indicates that the phase transformation and the grain size occurs in these alloys are controlled by ball milling time
يعد نظام الإدارة البيئية ( EMS ) على وفق المواصفة ISO 14001:2015 من الانظمة الإدارية الحديثة والمهمة في وقتنا الحالي، اذ هو أحد أدوات الأدارة البيئية بعّده مدخلاً للمعالجة أو الحد من المخاطر البيئية وآثارها، وبالخصوص الاثار الناجمة من الصناعة النفطية والتي تعد المصدر الرئيس للتلوث البيئي وهدر ونفاذ الموارد الطبيعية. تتجلى مشكلة الدراسة في ضعف عملية تشخيص والحد من مخاطر الج
... Show MoreIn this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.