Background: Oocytes are susceptible to alterations in the various fatty acid contents of follicular fluid (FF), which may influence maturation and embryogenesis. Different fatty acids exert various effects on intracytoplasmic sperm injection (ICSI), which needs further studies to uncover the involved mechanisms. Objectives: To assess FF fatty acids in women undergoing ICSI and to correlate them with ICSI parameters, namely the total count of aspirated oocytes, oocyte maturation rate, fertilization rate and percentage of good-quality embryos. Methods: Fifty women undergoing ICSI were enrolled in this cross-sectional study. FF samples were collected during oocyte retrieval and were analyzed for fatty acids using gas chromatography. Fatty acids were calculated as percentages of the total fatty acids. Results: The most common fatty acids found in the FF of women who underwent ICSI were palmitic acid, stearic acid, and oleic acid, with median (interquartile range) of 58.61%(21.66%), 26.27%(14.31%), and 20.13%(31.05%), respectively. Palmitic acid correlated inversely and significantly with oocyte maturation rate, fertilization rate, and percentage of good-quality embryos, with p=0.003, 0.037, and 0.028, respectively. Stearic acid correlated negatively and significantly with oocyte maturation rate (p=0.037) and fertilization rate (p=0.041). Furthermore, an inversely significant correlation was noticed between propionic acid and the percentage of good-quality embryos, as indicated by p=0.014. Conclusions: Palmitic, stearic, and propionic acids in the FF might influence ICSI parameters; thus, they might be used as markers of oocyte developmental competence. Nevertheless, further research is warranted.
In this study, the effects of different loading doses of cerium in the prepared NaY zeolite from Iraqi kaolin were investigated. Al-Duara refinery atmospheric residue fluid catalytic cracking was selected as palpation reaction for testing the catalytic activity of cerium loading NaY zeolite. The insertion of cerium in NaY zeolites has been synthesized by simple ion exchange methods. Three samples of modified zeolite Y have been obtained by replacing the sodium ions in the original sample with cerium and the weight percent added are 0.35, 0.64, and 1.06 respectively. The effects of cerium loading to zeolite Y in different weight percent on the cracking catalysts were studied by employing a laboratory fluidized
... Show MoreInflammatory control is essential to diminish injury and make renal injury treatment simpler. Proposed therapeutics have primarily targeted pro-inflammatory variables. Juniperus oxycedrus was frequently used to treat a variety of infectious disorders, hyperglycemia, obesity, TB, bronchitis, inflammation, and pneumonia. Juniperus oxycedrus twigs and leaves were defatted with n-hexane using Soxhlet apparatus then the residue of plant material dried and re-extracted sequentially by two different solvents Ethylacetate and methanol. The pro-inflammatory markers IL-1 and iNOS, as well as the potential kidney biomarker KIM-1, TNF-α, and transcription factor NF-KB were measured using the RealTime Quantitative qPCR method. The results showed that J
... Show MoreThe research aims to know the traits or characteristics of woman in terms of her external
appearance, motives for her behavior, feelings, mood and ability.
It, moreover, seeks woman’s relationship with others as it is presented by the Iraqi
satirical television show “ State of Melon “.
The researcher adopted for that survey approach using the method of content analysis
to study the research sample represented by “ State of Melon “ show which was
exposed through the screen of a group of channels:
“Hona Baghdad Satellite Channel, then Asia Satellite Channel, Dijla Satellite Channel,
and UTV Satellite Channel.”For this, the researcher used Margaret Gallagher’s Model to analyze the image of
woman in
Background: As a multifactorial disorder, temporomandibular joint (TMD) is difficult to diagnose, and multiple factors affect the joint and cause the temporomandibular disorder. Standardization of clinical diagnosis of TMD should be used to reach a definite clinical diagnosis; the condylar bone may degenerate in accordance with these disorders. Aims: Evaluate the correlation between the clinical diagnosis and degenerative condylar change (flattening, sclerosis, erosion, and osteophyte). Materials and Methods: A prospective study with a study group of 97 TMD patients (total of 194 joints) aged 20 to 50. Patients were sent to cone beam computed tomography (CBCT) to assess the degenerative condylar change. Results: No association was found bet
... Show MoreEven though in recent decades a bulk of studies have been accomplished on the use of communicative language teaching (CLT) in English as a foreign language (EFL) environments, fairly a limited numbers of studies precisely dealt with investigating the attitudes of language teachers, students and supervisors concerning the principals of CLT in the context of Iraq. Henceforth, this study was designed to delve into the attitudes of teachers, learners and supervisors about the implementation. To this end, the study was accomplished using a mixed method design. The present study was carried out in two phases: designing and using a questionnaire plus interviewing the teachers, students and supervisors (51 language learners, 41 teachers and
... Show MorePVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,
... Show MoreNowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More