Background: The discriminative power of the classical WHO parameters in relation to male fertility is quite low, because they only address few aspects of sperm quality and function. This has led investigators to focus their attention on the male gamete and in particular its genome.Objective: To explore which of the sperm DNA damage parameters measured by comet assay are more reliable, and their relations with the standard semen parameters.Methods: Study was done on 40 infertile men selected from couples attending the Institute of Embryo Reasearch and Infertility Treatment at Al-Kadhimiya City/ Baghdad in the period between February 2009 and May 2009, with a history of infertility of ≥1 years; and 15 healthy volunteers of proven fertility serving as control. Samples were allowed to liquefy for at least 30 minutes at 37°C and then evaluated according to the guidelines of the World Health Organization, 1999. The single cell gel electrophoresis (comet) assay was studied in the ejaculated spermatozoa. The exclusion criteria were the presence of azoospermia and severe oligospermia. Results were compared with the standard semen characteristics (concentration, motility and morphology).Results: Compared to healthy volunteers, infertile patients had highly significantly higher values of comet parameters (P = 0.00001). In all infertile patients, comet extent did not correlate with any of the classical semen parameters; whereas, tail length (μm), % DNA in tail, tail moment and olive moment had all significant negative correlations with the standard parameters. Significant positive correlations were observed between the studied comet parameters, except for the comet extent which was not significantly correlated with tail length and % DNA in tail (P = 0.06, P = 0.7; respectively).Conclusion: Comet assay is a very useful technique in assessing sperm DNA damage. Comet tail parameters and comet extent, may clarify different aspects of DNA damage, and together give a better insight to the integrity of the male genome.Keywards: sperm, comet extent, % DNA in tail, tail moment and olive moment
THE Schiff base reaction played an important role of the condensation reaction between 2-aminophenol and Glyoxylic acid in the presence of calculated amounts of KOH as a catalyst. The reaction has been carried out in ethanol under reflux and stirring condition for 3.5 hrs. All syntheses were carried out under hydrogen gas forming a new potassium (E)-1-hydroxy-2-(2-hydroxyphenylimino)ethanolate ligand type [NO2]. The ligand of the general formula K2[Mn(L2)] type and its Mnп complex K2[Mn(N2O4)] type, has been characterized by spectroscopic methods (F.T-I.R. and U.V-Vis.), elemental analysis (C.H.N) metal content, magnetic susceptibility measurement, Thin-layer chromatography (T.L.C), X-RD powder diffraction, 1H-NMR, 13C-NMR molar conductanc
... Show MoreSimple and sensitive batch and Flow-injection spectrophotometric methods for the determination of Procaine HCl in pure form and in injections were proposed. These methods were based on a diazotization reaction of procaine HCl with sodium nitrite and hydrochloric acid to form diazonium salt, which is coupled with chromatropic acid in alkaline medium to form an intense pink water-soluble dye that is stable and has a maximum absorption at 508 nm. A graphs of absorbance versus concentration show that Beer’s law is obeyed over the concentration range of 1-40 and 5-400 µg.ml-1 of Procaine HCl, with detection limits of 0.874 and 3.75 µg.ml-1 of Procaine HCl for batch and FIA methods respectively. The FIA average sample throughput was 70 h-1. A
... Show MoreVerbs are an important material in the construction of the sentence, as they are among the requirements of every sophisticated language, and in this regard, Ibn Al-Gothic (d. 367 AH): “Know that verbs are the origins of the buildings of most speech, and thus scholars called them buildings.” Verbs are the source of expression of the speakers’ ideas to represent the element of activity and movement, and with their knowledge We infer the meanings of Arabic words, and Ibn Al-Sarraj (d. 316 AH) defined it: “The verb denotes a meaning and a time, and that time is either past, present, or future.” Its letters are original and does not drop from its construction a letter in the conjugation of its conjugations, and it is in Arabic two type
... Show MoreThe accuracy of the skillful performance of the front and back dimensions of badminton in volleyball, occurs through the investment of complex exercises (physical skills) in a single performance and its characteristics that give the correct movement behavior and speed to the accuracy of the performance of the strokes as well as the identification of changes in some physiological indicators of By using these compound exercises. The research problem lies: I found a weakness in the accuracy of the performance of the front and back dimensions strike and diagnosed this through the tests that it conducted on the players to identify and know the problem, and attributed this weakness to a weakness in the necessary physical and skill abilities and t
... Show MoreNanocrystalline copper sulphide (Cu2-xS) powders were synthesized by chemical precipitation from their aqueous solutions composed of different molar ratio of copper sulfate dehydrate (CuSO4.5H2O) and thiorea (NH2)2CS as source of Cu+2, S-2 ions respectively, and sodium ethylene diamine tetra acetic acid dehydrate (EDTA) as a complex agent. The compositions, morphological and structural properties of the nanopowders were characterized by energy dispersive spectroscopy (EDS), scanning electron microscope (SEM), and X-ray diffraction (XRD), respectively. The compositional results showed that the copper content was high and the Sulfur content was low for both CuS and Cu2S nanopowders. SEM images shows that all products consist of aggregate o
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThis study aims to recognize the process of using computer in publicschools in Ma`an governorate in terms of hardware, capabilities, and teachers usage. It also aims to identify the most important obstacles those schools face from a teachers perspective.
The study sample consists of (150) teachers from different disciplines. The researcher prepared two questionnaires related to the research pivotal, then presented to a group of arbitrators to be used in this final form. The data was analyzed statistically and the study concluded that there is a shortage in the computer services provided to teachers, and there is a w
... Show MoreThis study aimed to extraction of essential oil from peppermint leaves by using hydro distillation methods. In the peppermint oil extraction with hydro distillation method is studied the effect of the extraction temperature to the yield of peppermint oil. Besides it also studied the kinetics during the extraction process. Then, 2nd -order mechanism was adopted in the model of hydro distillation for estimation many parameters such as the initial extraction rate, capacity of extraction and the constant rat of extraction with various temperature. The same model was also used to estimate the activation energy. The results showed a spontaneous process, since the Gibbs free energy had a value negative sign.
This research dealt with the analysis of murder crime data in Iraq in its temporal and spatial dimensions, then it focused on building a new model with an algorithm that combines the characteristics associated with time and spatial series so that this model can predict more accurately than other models by comparing them with this model, which we called the Combined Regression model (CR), which consists of merging two models, the time series regression model with the spatial regression model, and making them one model that can analyze data in its temporal and spatial dimensions. Several models were used for comparison with the integrated model, namely Multiple Linear Regression (MLR), Decision Tree Regression (DTR), Random Forest Reg
... Show MoreIn this study, generation of elliptical gears with different teeth profiles of crowned involute, double circular arc (DCA), and combined (crowned involute with DCA) has been developed. The resulting mathematical equations have been computerized and feed to CNC end mill machine to manufacture elliptical gear models with different profiles. These models are investigated in plane polariscope to show the resulting stresses under certain load. Comparison of photo-elastic stress results shows that combined elliptical gears with DCA side as a loaded side have a minimum resulting contact stress with a reduction percentage of 40% compare with contact stresses in counterpart elliptical gear of involute profile (which is commonly u
... Show More