Background: The discriminative power of the classical WHO parameters in relation to male fertility is quite low, because they only address few aspects of sperm quality and function. This has led investigators to focus their attention on the male gamete and in particular its genome.Objective: To explore which of the sperm DNA damage parameters measured by comet assay are more reliable, and their relations with the standard semen parameters.Methods: Study was done on 40 infertile men selected from couples attending the Institute of Embryo Reasearch and Infertility Treatment at Al-Kadhimiya City/ Baghdad in the period between February 2009 and May 2009, with a history of infertility of ≥1 years; and 15 healthy volunteers of proven fertility serving as control. Samples were allowed to liquefy for at least 30 minutes at 37°C and then evaluated according to the guidelines of the World Health Organization, 1999. The single cell gel electrophoresis (comet) assay was studied in the ejaculated spermatozoa. The exclusion criteria were the presence of azoospermia and severe oligospermia. Results were compared with the standard semen characteristics (concentration, motility and morphology).Results: Compared to healthy volunteers, infertile patients had highly significantly higher values of comet parameters (P = 0.00001). In all infertile patients, comet extent did not correlate with any of the classical semen parameters; whereas, tail length (μm), % DNA in tail, tail moment and olive moment had all significant negative correlations with the standard parameters. Significant positive correlations were observed between the studied comet parameters, except for the comet extent which was not significantly correlated with tail length and % DNA in tail (P = 0.06, P = 0.7; respectively).Conclusion: Comet assay is a very useful technique in assessing sperm DNA damage. Comet tail parameters and comet extent, may clarify different aspects of DNA damage, and together give a better insight to the integrity of the male genome.Keywards: sperm, comet extent, % DNA in tail, tail moment and olive moment
The Purpose of this research is a comparison between two types of multivariate GARCH models BEKK and DVECH to forecast using financial time series which are the series of daily Iraqi dinar exchange rate with dollar, the global daily of Oil price with dollar and the global daily of gold price with dollar for the period from 01/01/2014 till 01/01/2016.The estimation, testing and forecasting process has been computed through the program RATS. Three time series have been transferred to the three asset returns to get the Stationarity, some tests were conducted including Ljung- Box, Multivariate Q and Multivariate ARCH to Returns Series and Residuals Series for both models with comparison between the estimation and for
... Show MoreRecently, wireless communication environments with high speeds and low complexity have become increasingly essential. Free-space optics (FSO) has emerged as a promising solution for providing direct connections between devices in such high-spectrum wireless setups. However, FSO communications are susceptible to weather-induced signal fluctuations, leading to fading and signal weakness at the receiver. To mitigate the effects of these challenges, several mathematical models have been proposed to describe the transition from weak to strong atmospheric turbulence, including Rayleigh, lognormal, Málaga, Nakagami-m, K-distribution, Weibull, Negative-Exponential, Inverse-Gaussian, G-G, and Fisher-Snedecor F distributions. This paper extensive
... Show MoreScience is linked to each other bonds assets, branches and even close to each other; to become a link of this type of patterns of scientific integration, and perhaps the most prominent science that saw the overlap and interdependence of science and jurisprudence and its origins, and this interdependence did not stop at the epistemological foundations of knowledge; To the branches, methods of extraction, and diligence to extend to the terminology; to find similar terms in both flags; to become those terms similar in the word and meaning and even the end, but we do not lack terms similar in pronunciation and differing in meaning; and this difference is imposed by the specificity of each science and what M E; however, approached many terms
... Show MoreMethicillin resistant Staphylococcus aureus (MRSA) is one of the principal nosocomial causative agents. This bacterium has the capability to resist wide range of antibiotics and it is responsible for many diseases like skin, nose and wounds infection. In this study, randomly amplified polymorphic DNA (RAPD)-PCR was applied with ten random primers to examine the molecular diversity among methicillin resistant Staphylococcus aureus (MRSA) isolates in the hospitals and to investigate the genetic distance between them. 90 Isolates were collected from clinical specimens from Iraqi hospitals for a total of 90 isolates. Only 10 strains (11.11%) were found to be MRSA. From these 10 primers, only 9 gave clear amplification products. 91 fragment l
... Show MoreBackground:Periodontal diseases and dental caries are the most common oral diseases, but they can be adequately prevented by adopting a specific health behavior and plaque control.The study was carried out to determine and compare oral health status; it included both caries experience, gingival health and oral hygiene behavior betweenfirst and fifth yearsof Al-Mustansiriyahdental students. Materials and methods: Total sample of the study consisted of 50 students at first year (25 males, 25 females)and 60 students at fifth year (30 males, 30 females). Plaque andgingival indices,dental caries indices (DMFS and DMFT) wererecorded to evaluateoral health status for each student. Further questionnaires were given to evaluate different oral hyg
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe following study was conducted to investigate the correlation between the expression of three different genes (NOB1, DDX47, CD101( with the occurrence and development of chronic myeloid leukemia (CML) in Iraq. The difference in the expression of these genes between patients and healthy controls was studied. Moreover the correlation of age and gender with CML occurrence and comparing with control was also examined. Results showed significant increases in mean of gene expression level (ΔCt) of patient groups for all genes compared to the corresponding ΔCt means in control group, also the gene expression folding (2-ΔΔCt) reflect significant differences in the expression of these genes and CD101, mRNA showed the highest level in CML pati
... Show MoreThere is an evidence that channel estimation in communication systems plays a crucial issue in recovering the transmitted data. In recent years, there has been an increasing interest to solve problems due to channel estimation and equalization especially when the channel impulse response is fast time varying Rician fading distribution that means channel impulse response change rapidly. Therefore, there must be an optimal channel estimation and equalization to recover transmitted data. However. this paper attempt to compare epsilon normalized least mean square (ε-NLMS) and recursive least squares (RLS) algorithms by computing their performance ability to track multiple fast time varying Rician fading channel with different values of Doppler
... Show More