Background: The need for assisted reproduction technologies (ART) for the establishment of pregnancies has steadily increased worldwide. Therefore, it is of vital importance that an efficient sperm preparation technique used for retrieval of high-quality spermatozoa contributes to the creations of high-quality embryos, with high implantation potential.
Objective: to study the effect of swim up technique on human sperm motility and DNA integrity.
Subject and methods: A prospective study carried on 70 samples of human semen; each sample, divided into 2 parts, one part was prepared by swim-up technique and the other not, and then study sperm motility and DNA integrity in both parts. Sperm DNA integrity was determined using a modified alkaline single cell gel electrophoresis (comet) assay and acridine orange test (AOT), and motility was determined by light microscope.
Result(s): the results showed that swim up technique give a significant. increasing in motility percentage and a significant. decreasing in DNA damage (P< 0.05) than unprepared human sperm.
Conclusion(s): Swim up technique for sperm preparation is increasing motility and decreasing DNA damage.
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe study deals with the issue of multi-choice linear mathematical programming. The right side of the constraints will be multi-choice. However, the issue of multi-purpose mathematical programming can not be solved directly through linear or nonlinear techniques. The idea is to transform this matter into a normal linear problem and solve it In this research, a simple technique is introduced that enables us to deal with this issue as regular linear programming. The idea is to introduce a number of binary variables And its use to create a linear combination gives one parameter was used multiple. As well as the options of linear programming model to maximize profits to the General Company for Plastic Industries product irrigation sy
... Show MoreThis study aimed at recognizing the impact of empowerment of human resources strategy on enhancing the financial performance in working banks in Jordan, the axes of the strategy were: informative sharing, free and independence, working teams, and organizational power. To achieve the objective of the study, a questionnaire is designed and distributed on the sample of the study, which represented 60 employees of Banks. After analyzing the data by using SPSS, the study resulted that there is positive impact of empowerment of human resources strategy on enhancing the financial performance in working banks in Jordan. It suggested that the working banks in Jordan should establish database, and to create working teams.
... Show MoreSearch marked (the reflection of diode technology light emitting (LED) on the modular design of external lighting) is an analytical study of the units, external lighting for gardens and adopted in its work on the diode technology emitting light to reach the magnitude of the effect and the change happening where according to this technique was the problem of the research in which is (what emotion the formal and functional units of external lighting according diode technology light emitting) and identified in the first part of it, including the goals came Search of b (statement reversal winning technical transformation of lighting from incandescent bulbs to light emitting diode technology (LED) on each of shape design and the nature of the
... Show MoreABSTRACT
This study was conducted in the poultry field of the department of animal production, college of agricultural engineering sciences, university of Baghdad for the period from 10/15/2021 to 11/25/2021 with the aim of showing the effect of adding different levels of dill seeds to the diet on productive and carcass traits For broiler meat. In this study, 200 unsexed broiler chicks of breed (Ross 308) were used, one day age, with a starting weight of 41.46 g. The chicks were randomly distributed to 5 treatments, and each treatment included 4 replicates, 10 birds for each replicate. The birds were fed three diets: the starter diet, the growth diet and the final diet. The experiment treatments were T1,
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe present study aims at empirically investigating the effect of vocabulary learning strategies on Iraqi intermediate school students’vocabulary performance and reading comprehension. The population of the present study includes all the 1st year male students of Al-Wark’a intermediate school of Al-Risafa 1/ General Directorate of Education for the first course of the academic year (2015-2016). To achieve the aim of the study ,a pre-test and post-test after (5) weeks of experiment are administrated .The sample of the present study consists of (100) subjects :(50) students as an experimental group and other (50) students as a control group . The subj
... Show MoreThe obligatory duty must be fulfilled for attachment to the discharge, whatever the reasons for the missingness, whether it is left by mistake or omission or deliberate, whether with or without excuse. What is likely in this research to spend Ramadan on laxity.
The one who delayed making up Ramadaan fasts until he realized another Ramadaan, fasted the second and spent the first after him, and no ransom on him, either with an excuse or without an excuse.