Infertility can be detected when the couples have not completed pregnancy after a year or more of normal coitus. So, in order to treat infertility, there are many supported reproductive techniques are in practice. The success rate of these techniques depends upon the way by which preparation of the paternal semen sample. Over the past 30 years, the manual has been standard as providing global standards and has been used extensively by research and clinical laboratories throughout the world. The spermatozoa of all placental (eutherian) mammals, including humans, are in a protective, no labile formal at ejaculation and are incapable of fertilization even if they are placed in direct contact with an oocyte. Accordingly, they must undergo a sub
... Show MoreBackground: Hashimoto's thyroiditis has been found to coexist with differentiated thyroid cancer in surgical specimens, but an association between the two conditions has been discounted by the medical literature. So, we performed this research to determine any potential relationship between Hashimoto's thyroiditis and the risk of developing differentiated thyroid cancer in clinical status. we assessed the related clinical factors linking these conditions, especially serum thyroid-stimulating hormone concentration, family history of thyroid disease, gender& young age group. Aim of study: to determine that hashimoto’s thyroiditis increases risk for differentiated thyroid carcinoma. Patients and method: This study is a Cross-sectiona
... Show MoreThe subject of this research involves studying adsorption to remove hexavalent chromium Cr(VI) from aqueous solutions. Adsorption process on bentonite clay as adsorbent was used in the Cr(VI) concentration range (10-100) ppm at different temperatures (298, 303, 308 and 313)K, for different periods of time. The adsorption isotherms were obtained by obeying Langmuir and Freundlich adsorption isotherm with R2 (0.9921-0.9060) and (0.994-0.9998), respectively. The thermodynamic parameters were calculated by using the adsorption process at four different temperatures the values of ?H, ?G and ?S was [(+6.582 ? +6.547) kJ.mol-1, (-284.560 ? -343.070) kJ.mol-1 and (+0.977 ? +1.117) kJ.K-1.mol-1] respectively. This data indicates the spontaneous sorp
... Show MoreThe problem of the research lies in choosing agility tests suitable to the test taker to observe the relative changes in some players. In addition to that, there are a lot of agility tests that lack special test models that coordinate gender and age. This means the youth basketball player on one hand and time and distance in applying the tests on the other. The importance of the research lies in designing agility tests for youth basketball players to achieve variations in tests a matter that will benefit coaches in their training. The subjects of the research were (30) youth basketball players from the specialized school of the National Center that sponsor gifted basketball players in Baghdad for the season 2014 – 2015. The data was colle
... Show MoreGlaucoma is a visual disorder, which is one of the significant driving reason for visual impairment. Glaucoma leads to frustrate the visual information transmission to the brain. Dissimilar to other eye illness such as myopia and cataracts. The impact of glaucoma can’t be cured; The Disc Damage Likelihood Scale (DDLS) can be used to assess the Glaucoma. The proposed methodology suggested simple method to extract Neuroretinal rim (NRM) region then dividing the region into four sectors after that calculate the width for each sector and select the minimum value to use it in DDLS factor. The feature was fed to the SVM classification algorithm, the DDLS successfully classified Glaucoma d
Monaural source separation is a challenging issue due to the fact that there is only a single channel available; however, there is an unlimited range of possible solutions. In this paper, a monaural source separation model based hybrid deep learning model, which consists of convolution neural network (CNN), dense neural network (DNN) and recurrent neural network (RNN), will be presented. A trial and error method will be used to optimize the number of layers in the proposed model. Moreover, the effects of the learning rate, optimization algorithms, and the number of epochs on the separation performance will be explored. Our model was evaluated using the MIR-1K dataset for singing voice separation. Moreover, the proposed approach achi
... Show MoreVisual analytics becomes an important approach for discovering patterns in big data. As visualization struggles from high dimensionality of data, issues like concept hierarchy on each dimension add more difficulty and make visualization a prohibitive task. Data cube offers multi-perspective aggregated views of large data sets and has important applications in business and many other areas. It has high dimensionality, concept hierarchy, vast number of cells, and comes with special exploration operations such as roll-up, drill-down, slicing and dicing. All these issues make data cubes very difficult to visually explore. Most existing approaches visualize a data cube in 2D space and require preprocessing steps. In this paper, we propose a visu
... Show MoreThe Mauddud reservoir, Khabaz oil field which is considered one of the main carbonate reservoirs in the north of Iraq. Recognizing carbonate reservoirs represents challenges to engineers because reservoirs almost tend to be tight and overall heterogeneous. The current study concerns with geological modeling of the reservoir is an oil-bearing with the original gas cap. The geological model is establishing for the reservoir by identifying the facies and evaluating the petrophysical properties of this complex reservoir, and calculate the amount of hydrocarbon. When completed the processing of data by IP interactive petrophysics software, and the permeability of a reservoir was calculated using the concept of hydraulic units then, there
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show More