Background: Red clover oil (Trifolium pratense) has isoflavones bunches which have estrogen-like exercises and may establish an option in contrast to hormone substitution treatment. The present study investigated the impact of Red clover oil on bone healing in rats by histomorphometric study. Materials and Methods: Intra bony defect was performed in right femur of thirty six healthy male albino rats. Then these rats were randomly divided into three groups (12 rats each): one control and 2 experimental groups. For control, the bony defect was left for normal healing; for the experimental (S) group, the defect was treated with hemostatic absorbable gelatin sponge; and for experimental (RS) group, the bony defect was treated with 0.2 ml red clover oil and covered by haemostatic absorbable gelatin sponge. Six rats from each group were sacrificed at 2 and 4 weeks intervals. Histomorphometric analysis was performed on H&E bone section of all the studied groups which includes counting of bone cells (osteoblasts, osteocytes and osteoclasts), trabecular number, trabecular area and bone marrow space area. Results: Histomorphometric results of bone cells revealed that the combination group stimulated larger numbers of osteoblasts and osteocytes than in sponge and control group. Number of new bone trabeculae, trabecular area and bone marrow space area showed higher mean values in combination groups than others. Highly significant differences between groups were observed in all histomorphometric parameters throughout all durations. Conclusion: Red clover oil stimulated larger numbers of osteoblasts and osteoclasts, indicating increased bone remodeling especially at 2 weeks interval as compared with sponge and control groups. Key words: Bone defect, Red clover, Rats.
The aim of the research is to demonstrate the importance of leadership empowerment in its dimensions (knowledge, participation in decision-making, incentives, trust between the leader and subordinate, delegation of authority and communication) and its impact on enhancing the effectiveness of the company in its dimensions Represented by (achievement of objectives, quality of insurance service, adaptation to work environment and job satisfaction), by adopting the questionnaire as a main tool in collecting data from officials in the National Insurance Company, numbering (56) surveyed in job sites (section manager, division official and unit official) Their answers were analyzed using the SPSS statistical program in calculating the a
... Show MoreThe scholars differed very much in determining the grammatical doctrine of Ibn Qaysan. It was said that he confused between the two sects and took the two groups(1) and that he took from Abu Abbas the fox and Abu al-Abbas almabrd(2).He was descended from the two sheikhs almbrad and fox(3), This research to find out his grammatical opinions in the tools and grammatical words that appeared in the Book of Resonance of Multiplication to the many reported by Ibn Hayyan in it, he has seen the books of Ibn Kisan did not reach us.
The collection of these opinions and analysis is important for the scholars. Because the books of Ibn Kaysan specialized in grammar have lost their most important, the books that are similar to the book of Ibn al-Ha
يعد الاقتصاد الياباني احد اكبر الاقتصادات الرأسمالية المتقدمة ويحتل المرتبة الثالثة بعد الاقتصاد الأمريكي واقتصاد الاتحاد الاوربي من حيث حجم الناتج المحلي الإجمالي والذي يكاد يقترب من (5) تريليون دولار سنويا.
لقد ادت التطورات المتلاحقة التي شهدها الاقتصاد العالمي وخاصة في حقل التمويل الدولي خلال العشرين سنة الاخيرة الى تصاعد وارتفاع في حجم وحركه رؤوس الاموال الدولية على اوسع نطاق بحيث ا
... Show MoreAbstract
The current research aims to identify the effect of the proposed strategy in accordance with realistic mathematics on the achievement and mathematical Interrelation of third Intermediate students. Two samples were tested from the middle third grade in a school affiliated with the General Directorate of Baghdad- Rusafa, the first for the academic year (2022-2021). The experimental group is (30) students taught according to the proposed strategy, and the control group is (30) students based on the traditional method. To achieve the research objective, the researchers developed a test for achievement consisting of (30) items and a test of sports interconnection composed of (20) items. The results of the stu
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreAfter word war ll, the United States of America pursued a policy of containment aimed at preventing the Soviet Union from penetrating into the countries of the world, especially the regions of the Middle East, Therefore, it worked to emphasize the establishment of relations that include various political, economic and even cultural aspects, and focused its policy in his aspect on Turkey due to its geopolitical position. At a time when Turkey was undergoing developments at various levels and a change in govemment policy after the Demccratic Party came to power, which focused in its foreign policy on strengthening reltions with the West in general and the United States America in particular. The US government was the supporter of Democrat
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More