The present study was designed to evaluate the immunological status in a sample of Iraqi males with primary infertility and them age range18-55 years, who were attending the Centre of Infertility and in vitro Fertilization (Kamal Al-Samaraie Hospital, Baghdad) during the period December 2008 – April 2009. They were divided into three groups; 40 patients with anti-sperm antibodies (ASA), 20 patients with Asthenozoospermia (AST) and 20 patients with azoospermia (AZO). In adition to20 fertile males was as control group. The parameters of evaluations were standard seminal fluid analysis, anti-sperm antibodies and anti-mitochondrial antibodies in serum, Therefore, two types of samples were collected from each subject; seminal fluid and blood. The following results were obtained: 1. There was a significant (P ? 0.05) decrease count of sperms in ASA (44.6 x 106 sperm/ml) and AST (46.9 x 106 sperm/ml) patients as compared to controls (63.2 x 106 sperm/ml) but the the result with in normal limit. 2. Serum anti-sperm antibodies were positive in 100.% of ASA patients, while in AZO patients, a much lower percentage was observed (25% for serum), and a much lower percentage was observed in controls (5% for serum but these influence were not clear). In contrast, none of the AST patients were positive ASA. These results were positively correlated with the corresponding serum and seminal fluid level, and the highest level was observed in ASA patients (107.6 U/ml). These differences were statistically significant. 3. Serum AMA showed different percentages in ASA, AST and AZO patients and controls (37.5, 25.0 and 20.0, 15.0%, respectively), but these differences were not significant. However, their serum level was significantly increased in ASA patients as compared to controls (11.9 vs. 6.5 U/ml).
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The Tel Hajar formation in the studied area has been divided into five microfacics units:
1) Fine hiogenic dolomite facies.
2) Sandy rich dolomite facies.
3) Dolomite diagenetic facies.
4) Recrystal1ized wackestone in microfacies.
5) Mudsione facies.
Microfacics reflect shallow marine water with open Circulation in the lower part of the formation and the environment of the upper is enclosed between upper tide and tide. The most important diagenesis was recrystallization and spary calcite deposit inside fossils chambers and pores.
The research aims to identify the role of community participation in achieving organizational distinction in the Dhulia's municipality, which is one of the formations of the Ministry of Construction, Housing, Municipalities and Public Works in Salah al-Din Governorate, which is one of the service organizations that have a fundamental role in providing service to the community, which has faced many administrative challenges and many problems caused by the rapid and continuous changes in the environment, therefore modern management concepts must be adopted, such as community participation and the knowledge of its role To achieve its goals, which helps it in facing changes as well as achieving organizational excelle
... Show MoreExtracting, studying and interpreting the morphological database of a basin is a basic building block for building a correct geomorphological understanding of this basin. In this work, Arc GIS 10.8 software and SRTM DEM satellite images were used. The principle of data integration was adopted by extracting the quantitative values of the morphometric characteristics that are affected by the geomorphological condition of the studied basin, then eliciting an optimal conception of the geomorphological condition of the basin from the meanings and connotations of these combined transactions. Hypsometric integration was extracted for each region in the basin separately with the value of integration of the plot curve for the relative heights of
... Show MoreAmong the issues that preoccupied ancient and modern grammarians is the phenomenon of grammatical disagreement among grammarians and their differences in many grammatical issues that many of them go back to the phenomenon of dialectical difference, so this filled our thinking with a lot of things that led us to look at the side of the reasons for this grammatical difference, and here lies the significance of research to know that it is a linguistic phenomenon dealing with the living language used among the Arabs and linguistic phenomena that reflect linguistic reality as well. Thus our chagrin determination in research and investigation in this issue is the scarcity of dialectical studies at the compositional grammar side, and the lack o
... Show MoreForm naming system Simiaúaa can not be studied in isolation from the dimensionality of social and psychological , no doubt that names carry data psyche during social interaction , deflagration volunteered her body signifier in formats that meet the margin emotional part of the signified , Vtngams forms functions in coordinated trading to function as semantic double , it operates on coding , as well as carry emotional charge .
The science of semiotics cares Pettmvsal indications and forms of circulation, and is made form the semantic patterns , and pattern of production , and methods of functioning . Stop quite a few specialists and critics and researchers at Dalia ignorant poet and knight known ( Duraid bin embolism Jashmi ) ; it rep
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreIn the geotechnical engineering applications, precise understandings are yet to be established on the effects of a foundation stiffness on its bearing capacity and settlement. The modern foundation construction uses the new available construction materials that totally change the relative stiffness of the footing structures-soil interactions such as waste material and landfill area of more residential purposes. Conventional bearing capacity equations were dealt with common rigid footing and thus cannot be used for reduced foundation rigidity. Therefore, this study investigates the effects of foundation relative stiffness on its load-displacement behaviour and the soil deformation field using compression test of a strip smooth footings on su
... Show More