vitrofertilization/intracytoplasmic sperm injection-embryo transfer (IVF/ICSI-ET) for infertile patients. Insulin like growth factor 1 (IGF1), Dehydroepiandrosterone sulfate (DHEAS) and Total Testosterone (TT) may have a role on follicle growth, oocyte quality, embryo quality and subsequent pregnancy in patients undergoing IVF cycles. To explore the possibility of using DHEAS, TT and IGF1 as predictive indicator for successful pregnancy in patients undergoing (IVF/ICSI-ET). A prospective study was performed enrolling (12) non pregnant control group,(7) pregnant control group,(18) non-pregnant PCOS group and (12) pregnant PCOS group. The collection of blood and follicular fluid (FF) samples was done at the day of oocyte aspiration. Electrochemiluminescence immunoassay (ECLIA) method was used to measure DHEAS levels, Chemiluminescence immunoassay (CLIA) method was used to measure TT levels and competitive enzyme-linked immunosorbent assay (ELISA) was used to measure IGF1 levels. Mean of FF DHEAS, serum DHEAS, FF TT and FF IGF1 were higher in pregnant control group than those of non-pregnant control group. The differences were statistically significant (except for serum DHEAS). Additionally, mean of FF DHEAS, serum DHEAS, FF TT, and FF IGF1 were statistically significant lower in pregnant PCOS group than those of non-pregnant PCOS group. Correlation analysis of control group revealed positive association between FF DHEAS and serum DHEAS levels with fertilization rate and cleavage rate. Correlation analysis of PCOS group found.
Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreAbstract
All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t
... Show MoreDiagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad
... Show MoreThe Light and the Dark is the fourth novel in a series written by Charles Percy Snow where it tackles a phase of gifted scholar and remarkable individual Roy Calvert as he search for a source of power and meaning in life to relieve his inner turmoil. The character Roy Calvert is based on Snow's friend, Charles Allbery who exposes the message the character of Roy intends to convey in a certain phase of his life and the prophecy the novel carries amid catastrophe so widespread in the thirties of the twentieth century
Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreA vector in a separable infinite dimensional Hilbert space is called disk-cyclic for bounded operator if the orbit α : 0, α∈;|∝| 1is dense in. The useful tool used to discover codisk-cyclic operation is called the disk-cyclic Criterion. In this paper we will show that some equivalent conditions of the