Message in the tune of readers and denial to those who say infidelity tunes
Objective: The aim of this study to detect the correlation between trace elements such as zinc, copper and
spermatogenesis, sperm viability and motility.
Methodology: Serum and semen samples were collected from one hundred twenty patients with age ranged (20-
50 years) attending the high institute for Embryo Research and Infertility Treatment/ Baghdad University, in
addition to thirty fertile males their age comparable to that of patients. The period of this study was from June
2004 until the end of October 2004.
Results: The result of routine seminal fluid analysis of all infertile males was divided according to WHO, (1999) limit
into four groups: Asthenospermia(A), Asthenoteratospermia(AT), Oligoasthenoteratospermi
Stress with all its kinds are the results of a nick development Leading to delinquency burdening the ability of people.. development gas its effect on self and body reflecting on health ( physically, Psychological. And mentally) and finally leading to death (Al emara,2001,2).
Stress refers to he degree of response of the individual to events and environmental changes in his daily life with their physiological effects such as headaches , backaches, and gastric ulcer that have different effect depending on the personality of the person and his psychological characteristics differences airing individuals ( Al emirs, zool,2 )
The aims:
- knowi
The aim of this study was to identify the effectiveness of using generative learning model in learning kinetic series on rings and horizontal bar in artistic gymnastics for men ,Also, the two groups were better in learning the two series of movements on the rings and horizontal bar . The experimental method was used to design two parallel groups with pretested and posttest .The sample included third graders at the College of Physical Education and Sports Sciences - University of Baghdad ,The third class (d) was chosen to represent the control group that applied the curriculum in the college, with (12) students per group. After conducting the tribal tests, the main experiment was carried out for (8) weeks at the rate of two units per week di
... Show MoreIn this work, we have developed a model that describes the relationships between top predators (such as tigers, hyenas, and others), crop raiders (such as baboons, warthogs, and deer), and prey (such as deer) in the coffee forests of southwest Ethiopia. Various potential equilibrium points are identified. Additionally, the model's stability in the vicinity of these equilibrium points is examined. An investigation of the model's Hopf bifurcation is conducted concerning several significant parameters. It is found that prey species may be extinct due to a lower growth rate and consumption by top predators in the absence of human interference in the carrying capacity of prey. It is observed that top predators may be extinct due to human interfe
... Show MoreBackground: Benign Prostate Hypertrophy(BPH)is a common urological problem worldwide which is defined as denomatous hyperplasia of the periurethralpart of prostate gland that occurs especially in men over 50 years old and that tend to obstruct urination by constriction the urethra Objectives: The study was aimed to investigate the level of Malondialdehyde (MDA), Nitric Oxide (NO) and Superoxide Dismutase (SOD) as an antioxidant, besides other factors such as the level of Lipids Profile (Total Chlosterol (TC), High Density Lipoprotein Cholesterol (HDL-C), Low Density Lipoprotein Cholesterol (LDL-C), Very Low Density Lipoprotein Cholesterol (VLDL-C), and Triglyceride (TG))in patients suffer from BPH . Methods: In this study ;clinical ,spec
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe goal of this study is to build an application that can be used in difficult cases and sudden circumstances during the pandemic and post-disaster state, which can be the development of digital risk management and mitigating the difficult impact of the epidemic through the improvement of IT and IoT that can be fine by finding initial solutions and make the world like a digital city that could be managed by the network. We provide this study to gain an overview of reasons for delayed and exceeded costs in a select of thirty Iraqi case projects by controlling the time and cost. The drivers of delay have been investigated in multiple countries/contexts. however, there is little country data available under the conditions that have ch
... Show MoreAbstract
Target costing and cleaner production are among the most important techniques in the field of cost and management accounting, which, when integrated, enable economic units to achieve the goal of cost management by reducing it by calculating cost more accurately than traditional methods.To achieve this, the researcher relied on the inductive approach in writing the theoretical framework for the research, relying on foreign and Arabic books, dissertations and university theses, foreign and Arabic research and periodicals related to the subject of the research, and relying on the descriptive and analytical approach in
... Show More