Abstract Background: The emptied sheep’s ovarian follicles recently used as a container for spermatozoa during cryopreservation, it was found a proper carrier to cryopreserving spermatozoa in vapor-dependent cryopreservation. The aim of this study was to evaluate the effect of two periods of exposure to liquid nitrogen (LN2)vapor on the parameter of spermatozoa during cryopreservation in this technique. Method: The study was conducted on 30 semen samples from patients with oligozoospermia diagnosed by semen analysis according to the standard criteria of World Health Orgnization (WHO) 2010. Sheep’s ovarian follicles obtained from local slaughterhouse and prepared by slicing the ovaries and evacuating the follicular fluid and oocyte. Each semen sample diluted 1:1 with cryosolution (glycerol 10%) and injected within eight emptied sheep’s ovarian follicles. The first four follicles represent P1; exposed to LN2 vapor for 7.5 minutes and the other four follicles represent P2; exposed to LN2 vapor for 15 minutes before emerged in liquid nitrogen. Sperm progressive motility, total motility, normal morphology and DNA fragmentation index (DFI) were analyzed for all samples pre-freezing and post-thawing. Results: After two months of cryopreservation, sperm progressive motility and total motility significantly (P<0.01) increased post-thawing in P2 as compared with P1, while both of P1 and P2 significantly (P<0.01) decreased as compared with pre-freezing. Normal morphology significantly (P<0.01) decreased post thawing in both P1 and P2 as compared with pre-freezing, while no significantly difference foundbetween P1and P2. DFI significantly (P<0.01) increased post-thawing in P1 and P2 as compared with pre-freezing, while in P2 DFI was significantly lower than in P1. Conclusions: The exposure to liquid nitrogen vapor for 15 minutes in emptied ovarian follicles technique gives a better results than exposure to the vapor for 7.5 minutes regarding sperm progressive motility, total motility and DFI.
That any industrial company that must think about marketing mechanisms and who are the beneficiaries and the pursuit of gain customer satisfaction with access to competitive advantages. Most industrialized our companies from a variety of problems experienced both in the field of production, marketing, or keep up with new developments or commitment to quality standards, which caused the reluctance of customers to buy local products for various reasons, and especially in light of unplanned economic policy and exposure to market to imported products flooding the market with various goods and services that do not can the domestic industry rival, which has competitive advantages and meet business requirements, but others arrived to stop or as
... Show MoreDetergent is one of the pollutants that poses significant threats to ecological systems. Detergents can also dissolve in wastewater and negatively impact the efficiency of wastewater treatment facilities. They are used for a variety of functions, most notably hygiene, and are an integral aspect of human life. This means that there are a variety of routes by which detergent components can reach the environment. In this Study, twenty-three detergent samples from local markets in Baghdad. The aim of this study is to investigate the concentration of heavy metals Cobalt (Co), Chromium (Cr),Lead (Pb),Zinc (Zn), Iron (Fe) and Cadmium (Cd) in some detergents using Atomic Absorption Spectrophotometer. The results of the concentration of heavy elemen
... Show MoreOne hundred samples of root canal bacteria were isolated from patients teeth with primary and secondary infected root canal from all the ages . Biochemical and microscopial tests were done for identification of these isolates. Twenty four isolates were confirmed as E. faecalis species by using these tests. Genetic diagnosis for the all isolates was also done by using polymerase chain reaction ( PCR ). Thirty two isolates were confirmed to belong to E. faecalis species by using this test.
<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreIn this research, a new technique is suggested to reduce the long time required by the encoding process by using modified moment features on domain blocks. The modified moment features were used in accelerating the matching step of the Iterated Function System (IFS). The main disadvantage facing the fractal image compression (FIC) method is the over-long encoding time needed for checking all domain blocks and choosing the least error to get the best matched domain for each block of ranges. In this paper, we develop a method that can reduce the encoding time of FIC by reducing the size of the domain pool based on the moment features of domain blocks, followed by a comparison with threshold (the selected threshold based on experience
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreThe printed Arabic character recognition are faced numerous challenges due to its character body which are changed depending on its position in any sentence (at beginning or in the middle or in the end of the word). This paper portrays recognition strategies. These strategies depend on new pre-processing processes, extraction the structural and numerical features to build databases for printed alphabetical Arabic characters. The database information that obtained from features extracted was applied in recognition stage. Minimum Distance Classifier technique (MDC) was used to classify and train the classes of characters. The procedure of one character against all characters (OAA) was used in determination the rate
... Show MoreThe current study shows the cytotoxicity effect of the Crassula ovata n-hexane extract on esophagus can¬cer. C. ovata is a perennial succulent plant belonging to the Crassulaceae family. In Africa, the leaves were used medicinally to cure epilepsy and diarrhoea by boiling them in milk. The hexane fraction, which is obtained through the maceration method, demonstrates the presence of many compounds that have an anticancer effect, which are ob¬tained by gas chromatography - mass spectroscopy. The phytosterol compound was isolated by a preparative thin layer chromato¬graph and was identified by liquid chromatography - mass spectroscopy. The hexane fraction was found to possess a strong anticancer effect against esophagus cancer. The
... Show MoreUpper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that usin
... Show More