Background: Oocytes are susceptible to alterations in the various fatty acid contents of follicular fluid (FF), which may influence maturation and embryogenesis. Different fatty acids exert various effects on intracytoplasmic sperm injection (ICSI), which needs further studies to uncover the involved mechanisms. Objectives: To assess FF fatty acids in women undergoing ICSI and to correlate them with ICSI parameters, namely the total count of aspirated oocytes, oocyte maturation rate, fertilization rate and percentage of good-quality embryos. Methods: Fifty women undergoing ICSI were enrolled in this cross-sectional study. FF samples were collected during oocyte retrieval and were analyzed for fatty acids using gas chromatography. Fa
... Show MoreIn this work, strains and dynamic crack growth were studied and analyzed in thin flat plate with a surface crack at the center, subjected to cycling low velocity impact loading for two types of aluminum plates (2024, 6061). Experimental and numerical methods were implemented to achieve this research. Numerical analysis using program (ANSYS11-APDL) based on finite element method used to analysis the strains with respect to time at crack tip and then find the velocity of the crack growth under cycling impact loading. In the experimental work, a rig was designed and manufactured to applying the cycling impact loading on the cracked specimens. The grid points was screened in front of the crack tip to measure the elastic-plas
... Show MoreIn this paper, a least squares group finite element method for solving coupled Burgers' problem in 2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved. The theoretical results show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the effic
... Show MoreBackground: Oocytes are susceptible to alterations in the various fatty acid contents of follicular fluid (FF), which may influence maturation and embryogenesis. Different fatty acids exert various effects on intracytoplasmic sperm injection (ICSI), which needs further studies to uncover the involved mechanisms. Objectives: To assess FF fatty acids in women undergoing ICSI and to correlate them with ICSI parameters, namely the total count of aspirated oocytes, oocyte maturation rate, fertilization rate and percentage of good-quality embryos. Methods: Fifty women undergoing ICSI were enrolled in this cross-sectional study. FF samples were collected during oocyte retrieval and were analyzed for fatty acids using gas chromatography. Fa
... Show MoreThe current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreLanguage as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show MoreSpecialized Escherichia coli (E. coli) isolates, called uropathogenic E. coli (UPEC), cause most of urinary tract infections (UITs). Once bacteria reached the urinary tract of the host, they have to adhere to the host cell for the colonization. For this purpose, bacteria have different structures including fimbrial adhesins. Most of the UPECs contain type 1 fimbriae encoded by fim operon (fimB, E, A, I, C, D, F, G, H) which is responsible for the adhesive ability in these isolates. Ninety-four isolates of UPEC were obtained from UTI patients in Baghdad hospitals and their diagnosis were confirmed by the PCR method using 16srDNA as a housekeeping gene. The UPEC isolates were tested for their ability of adherence to the urothelial cells obtai
... Show MoreAddressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore
... Show MoreBackground: Oral cancer is a highly lethal and disfiguring disease. Squamous cell carcinoma of the oral cavity constitutes about 90% of all oral malignancies. The aims of the study was to achieve an epidemiological description of the oral squamous cell carcinoma in Iraq in general and in Iraqi governorates except Kurdistan region retrospectively during period 2001-2013 Materials and Methods: Data were collected from department of oral and maxillofacial pathology, college of dentistry, university of Baghdad, Nuclear medicine and radiotherapy hospital, Iraqi cancer registry center, Main hospitals in Baghdad and Iraqi governorates, Private labs. for histopathological examinations. The descriptive and inferential statistical methods were used
... Show More