Objectives: Semen analysis is the cornerstone for the valuation of the male partner in the infertile couples. This test has been standardized throughout the world through the World Health Organization (WHO) since the1970s by producing, editing, updating, and disseminating a semen analysis manual and guidelines. A retrospective study to give an insight about male infertility. Methods: This retrospective study assessed the semen findings of 1000 men evaluated at the Department of Urology, Al-Kindy Teaching Hospital in Baghdad-Iraq between January 2016 and May 2019. Semen analysis were done for them. Results: According to WHO standard for semen normality, 1000 samples that were analyzed, normospermia was shown in 835 (83.5%)males (95% CI=0.811-0.857) and 12% had oligospermia and the rest 4.5% was azospermia. The normospermic samples had significantly higher levels regarding the following parameters: count per ml (51.30±1.24) (P= 0.001), volume(3.34±2.31)(P=0.0001), pus cell (8.04±1.02)(P=0.0001), motility (22.81±5.8)(P=0.0001), abnormal motility (22.81±5.8)(P=0.0001) and normal (V)(P=0.0001)or abnormal morphology (25.86 ±12.4)(P=0.0002) when compared with oligospermia. Conclusions: Semen analysis is the keystone of infertile couple. Semen parameters like sperm concentration, motility and morphology, are indicators for male reproductive function. Sperm concentration is declining and there is a significant association between sperm concentration and sperm parameters.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIn the present work a dynamic analysis technique have been developed to investigate and characterize the quantity of elastic module degradation of cracked cantilever plates due to presence of a defect such as surface of internal crack under free vibration. A new generalized technique represents the first step in developing a health monitoring system, the effects of such defects on the modal frequencies has been the main key quantifying the elasticity modulii due to presence any type of un-visible defect. In this paper the finite element method has been used to determine the free vibration characteristics for cracked cantilever plate (internal flaws), this present work achieved by different position of crack. Stiffness re
... Show MoreFallacies are incorrect reasoning that make an argument seem less logically credible and easier to be identified as unsound. They are widespread; individuals commit them while engaging in various activities, including at work, at home, while creating advertisements, and in the media. This study aims to investigate the rhetorical strategies accompanied with producing the fallacious arguments selected from the American Film “12 Angry Men (1957)”. The study adopts Damer’s (2009) model for the identification of fallacy. As for rhetorical analysis, the study adopts Aristotle’s triangle of rhetoric and McGuigan’s (2007) taxonomy of rhetorical devices. The results uncover that the most violated criteria are relevance, acceptabili
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreThis study's objective is to assess how well UV spectrophotometry can be used in conjunction with multivariate calibration based on partial least squares (PLS) regression for concurrent quantitative analysis of antibacterial mixture (Levofloxacin (LIV), Metronidazole (MET), Rifampicin (RIF) and Sulfamethoxazole (SUL)) in their artificial mixtures and pharmaceutical formulations. The experimental calibration and validation matrixes were created using 42 and 39 samples, respectively. The concentration range taken into account was 0-17 μg/mL for all components. The calibration standards' absorbance measurements were made between 210 and 350 nm, with intervals of 0.2 nm. The associated parameters were examined in order to develop the optimal c
... Show MoreNovel artificial neural network (ANN) model was constructed for calibration of a multivariate model for simultaneously quantitative analysis of the quaternary mixture composed of carbamazepine, carvedilol, diazepam, and furosemide. An eighty-four mixing formula where prepared and analyzed spectrophotometrically. Each analyte was formulated in six samples at different concentrations thus twentyfour samples for the four analytes were tested. A neural network of 10 hidden neurons was capable to fit data 100%. The suggested model can be applied for the quantitative chemical analysis for the proposed quaternary mixture.
This study discusses the Critical Discourse Analysis of 2012 American Presidential Election Debate’. The researcher adopts a model proposed by Van Dijk’s (2006 d). Six ideological categories have been selected within the overall strategies of the ideological square are used. The categories are of three levels of discourse structure : (the meaning, the argumentation, and the rhetoric) .They have shown effective criteria for detecting the most disguised systems of racism and manipulation.
Based on the analysis, it can be concluded that the elite discourses of candidates contribute to the reproduction of domination, Orientalism, and Islamophobia. This can be appl
... Show More
This paper presents a stylistic analysis of two poems of well-known poets of the English literature, namely; E.E. Cummings and the Irish noble laureate Seamus Heaney. The researcher's attempt here is to approach Cummings’s poem “maggie and milly and molly and may” and Heaney’s “A Kite for Aibhín” from the stylistics’ point of view. The paper also analyzes the poems using the tools of linguistics with a view to make their meaning explicit.
It is worth noting that stylistics as a scientific discipline is really beneficial to those who are teaching and studyi
... Show MoreIn this study, the turbulent buoyancy driven fluid flow and heat transfer in a differentially heated rectangular enclosure filled with water is quantified numerically. The two dimensional governing differential equations are discretized using the finite volume method. SIMPLE algorithm is employed to obtain stabilized solution for high Rayleigh numbers by a computational code written in FORTRAN language. A parametric study is undertaken and the effect of Rayleigh numbers (1010 to 1014), the aspect ratio (30, 40 and 50), and the tilt angle (10o to 170o ) on fluid flow and heat transfer are investigated. The results of the adopted model in the present work is compared with previously published results and a qualitative agreement and a good
... Show More
