There are many animal models for polycystic ovary (PCO); using exogenous testosterone enanthate is one of the methods of induction of these models. However, induction of insulin resistance should also be studied in the modeling technics. Therefore, the present study aims to investigate the expression of insulin receptor substrate (Irs)-2 mRNA in the liver tissue of rat PCO model. Nineteen Wistar rats were divided into three groups; (1) PCO modeling group (N =7) received daily 1.0 mg/100g testosterone enanthate solved in olive oil along with free access dextrose water 5%, (2) vehicle group (N =6), which handled like the PCO group, but did not receive testosterone enanthate, (3) control group (N =6) with standard care. Al
... Show MoreDrought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreBN Rashid
This review is concluded of 8-Hydroxyquinline (8HQ) compound and derivatives which has a very significant interests with a strong fluorescence , furthermore the relationship between divalent metal ions and characteristic of chelating . In the same way coordinated features have increase of its organic action and inorganic behavior by giving many samples of compounds which are a good chelating agents ligands with more capable of forming very stable complexes.Therefore, the role of (8HQ) is not limited on complexes only but its applications in different fields so this review will focus on demonstration preparation methods and properties of (8HQ) derivatives with their complexes and applications, hopefully that we will cover a part of scientifi
... Show MoreThe power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha
... Show MoreIraq is one of the most important countries in the world that has received its share of terrorist acts by the terrorist organization the Islamic State of Iraq and al-Sham (ISIS), which has caused instability, especially during the period of ISIS's control of seven Iraqi provinces (2014-2017). This stage has caused a decline in the levels of human and economic development and its inconsistency with the capabilities and needs of the Iraqi population. Therefore, this study aims to investigate the hypothesis that there is a close relationship between the decline in development in Iraq and the brutal practices of ISIS that it committed during his period of control over many Iraqi cities and regions. This study used several method
... Show MoreBackground: COVID-19 is a disease that started in Wuhan/China in late 2019 and continued through 2020 worldwide. Scientists worldwide continue to research to find vaccines, treatments, and medication for this disease. Studies also conenue to find the pathogenicity and epidemiology mechanisms. Materials and Methods: In this work, we analyzed cases obtained from Alshifaa center in Baghdad/Iraq for 23/2/2020-31/5/2020 with total instances of 797, positive cases of 393, and death cases of 30. Results: Results showed that the highest infection cases were among people aged between 41-45. Also, it was found that males' number of cases was more than females. In contrast, death cases were significantly higher in males than females. It was not
... Show More