Background: Men with azoospermia require testicular and epididymal sperm aspiration for intracytoplasmic sperm injection. Women over 37 years of age demonstrate
an increase number of immature oocytes after induction of ovulation. The development of a technique for in vitro maturation (IVM) and fertilization (IVF) of
the oocytes using testicular, epididymal and vassal sperm (TS, ES, VS, respectively) will be of therapeutic value for the treatment of azoospermic patients.
Objectives: The goal of the study was to develop an animal model for the treatment of infertile couples with obstructive azoospermia and immature oocytes.
Materials and Methods: Canine ovaries and testes were collected from a local animal clinic. Immature oocytes were retrieved from the ovaries and cultured in modified tissue
culture medium (MTCM). The mature oocytes were in vitro fertilized by TS, ES, and VS. The normality of the fertilized oocytes was studied.
Results: Sperm motility index was significantly higher (P<0.01) in sperm retrieved from the vas deference compared to ES and TS. The concentration of the sperm was
significantly higher (P<0.05) in the testes compared to epididymis and vas deference while VS and ES normal morphology were significantly (p<0.01) better than TS. Viable oocyte
percentage was significantly higher (P<O.05) in 72 hours versus 96 hours culture durations. Significant higher IVF was reported in VS compared to other groups (P < 0.05) and the SPI
was significantly higher after 96 versus 72 hours duration (P<O.05).
Conclusion: IVM of the oocytes in MTCM for 72 and 96 h resulted in a significant increase in IVM rate compared to 48,120, and 144 h durations. In vitro viable mature
oocytes showed higher IVF rates when fertilized with VS compared to ES and TS. The results showed that canine oocytes are good model for azoospermic patients.
The heterogeneity nature of carbonate reservoirs shows sever scattering of the data, therefore, one has to be cautious in using the permeability- porosity correlation for calculating permeability unless a good correlation coefficient is available. In addition, a permeability- porosity correlation technique is not enough by itself since simulation studies also require more accurate tools for reservoir description and diagnosis of flow and non-flow units.
Evaluation of reservoir characterization was conducted by this paper for Mishrif Formation in south Iraqi oil field (heterogeneous carbonate reservoir), namely the permeability-porosity correlation, the hydraulic units (HU’s) an
... Show MoreThe heterogeneity nature of carbonate reservoirs shows sever scattering of the data, therefore, one has to be cautious in using the permeability- porosity correlation for calculating permeability unless a good correlation coefficient is available. In addition, a permeability- porosity correlation technique is not enough by itself since simulation studies also require more accurate tools for reservoir description and diagnosis of flow and non-flow units. Evaluation of reservoir characterization was conducted by this paper for Mishrif Formation in south Iraqi oil field (heterogeneous carbonate reservoir), namely the permeability-porosity correlation, the hydraulic units (HU’s) and global hydraulic elements (GHE
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreAs a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MoreThis paper is Interested with studying the performance of statistic test the hypothesis of independence of the two variables (the hypothesis that there is no correlation between the variables under study) in the case of data to meet the requirement of normal distribution in the case away from the distribution due to the presence of outliers (contaminated values) and compared with the performance of some of the other methods proposed and modified
Rumors are typically described as remarks whose true value is unknown. A rumor on social media has the potential to spread erroneous information to a large group of individuals. Those false facts will influence decision-making in a variety of societies. In online social media, where enormous amounts of information are simply distributed over a large network of sources with unverified authority, detecting rumors is critical. This research proposes that rumor detection be done using Natural Language Processing (NLP) tools as well as six distinct Machine Learning (ML) methods (Nave Bayes (NB), random forest (RF), K-nearest neighbor (KNN), Logistic Regression (LR), Stochastic Gradient Descent (SGD) and Decision Tree (
... Show MoreIn the present paper, by making use of the new generalized operator, some results of third order differential subordination and differential superordination consequence for analytic functions are obtained. Also, some sandwich-type theorems are presented.