Study showed structure of pecten oculi in the Kestrel Falco tinnunculus L.was
Pleated type and consisted of 17 folds which were thick. While in the Collared Dove
Streptopelia decaocto F. was Vaned type and consisted of 13 folds and it described
thin. The illustrated histological study of pecten oculi folds in the Kestrel and the
Collared Dove was composed of large number of capillaries, large blood vessels and
pigment cells which were few in Kestrel compare with the Collared Dove. The bridge
in the Kestrel and the Collared Dove pecten oculi was consisted of connective tissue,
many pigment cells, and contains on little capillaries and it linked the membrane to
the internal limiting membrane of the retina in the Kestrel.
Key words: birds, pecten oculi, morphology, histology
The goal of the research is to find the optimization in the test of the appropriate cross-over design for the experiment that the researcher is carrying out (under assumption that there are carry-over effects of the treatments) to posterior periods after the application period (which is often assumed to be the first period). The comparison between the double cross-over design and the cross-over design with extra period. The similarities and differences between the two designs were studied by measuring the Relative Efficiency (RE) of the experiment.
Background: One of the major problems in endodontics is micro-leakage of root canal fillings which might contribute to the failure of endodontic treatment. To avoid this problem, a variety of sealers have been tested. The objective of this, in vitro, study was to evaluate the shear bond strength of four resin based sealers (AH plus, silver free AH26, RealSeal SE and Perma Evolution permanent root canal filling material) to dentin. Materials and Methods: Forty non-carious extracted lower premolars were used. The 2mm of the occlusal surfaces of teeth were sectioned, to expose the dentin surface. The exposed dentin surfaces of teeth were washed with 5ml of 2.5% NaOCl solution followed by 5ml of 17 % EDTA then rinsed by deionized water to remov
... Show MoreThe article deals with the role of metaphors in forming the plot of L. Ulitskaya’s family chronicle “Medea and Her Children”. The author of the article describes the results of the next stage of research related to the works of Lyudmila Evgenievna Ulitskaya, a representative of modern Russian prose. The analysis of tropes and figures in the works written at the turn of the XXth – XXIth centuries is of importance for the study of the modern state of Russian language as an independent system. “Medea and Her Children” is one of the works by L. Ulitskaya (written in 1996), which, like her other works, is characterized by a unique style of narration, rich in vocabulary, lexical, semantic and stylistic diversity of the author’s word
... Show MoreThe experiment was carried out in College of Agricultural Engineering Sciences, University of Baghdad during November 1, 2019 to June 1, 2020. The experiment was designed according to a randomized complete block design. Each block contained 18 experimental units that included the three study factors. The first factor interaction between two inoculum densities and application methods, three levels control, treatment of seeds inoculation with 5g plant and treatment of seedlings inoculation whith 30g plant . The second factor was three -1 -1concentrations of spraying of kinetin 0, 75 and 150 mg L , and third factor include two levels of organic manure) and addition of fertilizer 2% of -1 the weight of the soil (O2). The results showed a signif
... Show MoreThis paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreIn this article, a new deterministic primality test for Mersenne primes is presented. It also includes a comparative study between well-known primality tests in order to identify the best test. Moreover, new modifications are suggested in order to eliminate pseudoprimes. The study covers random primes such as Mersenne primes and Proth primes. Finally, these tests are arranged from the best to the worst according to strength, speed, and effectiveness based on the results obtained through programs prepared and operated by Mathematica, and the results are presented through tables and graphs.