This study was conducted at the poultry farm located in the College of Agricultural Engineering Sciences, University of Baghdad, Abu Gharib (the old site), and laboratories of the Animal Production Department, Jadriya, to investigate the effect of adding hydrogen peroxide H2O2 at nanoscale levels to semen diluents of local roosters sperm in a number of semen characteristics. In this study, 80 roosters local Iraqi chickens were used, the roosters were trained three times a week, to collect semen, until the largest number of them responded. Then the best 40 of the roosters were elected for the purpose of collecting the semen with a pooled sample, and then the samples were diluted and divided equally into four parts. The concentrations of 0, 1, 10, 100, nM of H2O2 were added to each part of the diluted semen, then kept cool until the temperature reached 5 C for three periods (0, 24, 48 hours), and cryopreservation (48 hours) for all four addition levels. A number of laboratory characteristics were studied including percentages of individual motility, dead sperm, mitochondrial efficacy, and DNA Fragmentation at the end of each repetition (10 repetitions). A variation based on the concentration was observed in the results of hydrogen peroxide, as it ranged from the non-affectivity of the two treatments 1, 10 nM H2O2, to the deterioration in some laboratory characteristics for the treatment of 100 nM H2O2, and according to the interactions between the addition concentrations and the cooling and cryopreservation periods. From this experiment, it can be concluded the inefficiency of the hydrogen peroxide concentrations used to semen preservation.
Abstract:
Purpose\The researcher paper aims to determine the impact of information technology on the job performance, for Iraq private ban as through the use of technology dimensions of job performance.
The aim of this research: this study aims to discuss the importance of information technology and its role in achieving job performance and its impact on the Iraq banking sector design/ methodology/ approach used entrance design/methodology/approach- pilot, the questionnaire was used to collect data in order to develop a model to measure reliably and correctly to the variables of information technology and job performance, and hypotheses were tested through the use of some statisti
... Show MoreIn this study, composite materials were prepared using unsaturated polyester resin as binder with two types of fillers (sawdust and chopped reeds). The molding method is used to prepare sheets of UPE / sawdust composite and UPE / chopped reeds composite. The mechanical properties were studied including flexural strength and Young's modulus for the samples at normal conditions (N.C). The Commercial wood, UPE and its composite samples were immersed in water for about 30 days to find the weight gain (Mt%) of water for the samples, also to find the effect of water on their flexural strength and Young's modulus. The results showed that the samples of UPE / chopped reeds composite gained highest values of flexural strength (24.
... Show MoreBackground: Saliva is one of the most important etiological host factors in relation to dental caries. It affects the carious process by its organic and inorganic constituents; in addition to its physiological functions as (flow rate, pH and buffer capacity). The aims of this study were to determine the concentrations of major elements (calcium and phosphorus) and trace elements (ferrous iron, nickel, chromium and aluminum) in saliva among a group of adolescent girls, and to explore the relation of these elements, flow rate and pH with dental caries. Material & Methods: The study group consisted of 25 girls with an age of 13-15 years old. Dental caries was diagnosed by both clinical and radiographical examinations following the criteria of
... Show MoreIn this paper, we consider inequalities in which the function is an element of n-th partially order space. Local and Global uniqueness theorem of solutions of the n-the order Partial differential equation Obtained which are applications of Gronwall's inequalities.
There are significant differences between the pre and post-tests in favor of the post-test in the tests) stroke volume (S.V), cardiac thrust (C.O.P), left ventricular volume, maximum oxygen consumption Vo2max), which indicates the effect of the proposed training approach.There are significant differences between the pre and post-tests in favor of the post-test in the achievement level test with air rifle shooting for young female shooters, which indicates the effect of the proposed training curriculum.There are no significant differences between the pre and post-tests in the tests (heart rate (HR) before exercise, heart rate (HR) after exercise, systolic blood pressure rate before exercise, systolic blood pressure rate after exercis
... Show MoreThis research aims to use chemical reaction to determine some of beta lactam antibiotics which include cephalexin and ceftriaxone in some pharmaceuticals by formation Prussian Blue complexes and using them for the UV-Vis., determination of drugs at wavelengths range (700- 720)nm by reaction them with FeCl3 in the presence of reagent K3[Fe(CN)6] in acid media . The optimal experimental conditions for the complex formation have been studied such as volume of HCl , K3[Fe(CN)6] , FeCl3 ,temperature and reaction time .Analytical figures of merits obtained on applying the developed procedure for cephalexin and ceftriaxone resp. are Linearity,(2-10),(1-7)?g.ml-1 LOD(0.0601,0.0330) ?g.ml-1. The de
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More