Toxoplasmosis is the most common, widespread disease in the world which is caused by Toxoplasma gondii.The objective of the current study is to determine the effect of the Toxoplasma gondii infection on male sperm, especially on the mitochondria of sperm for men who suffer infertility and the possibility of a hereditary mutation. Sixty seminal fluid and serum samples were taken from sub- fertile patients who attended Teba center for in vitro fertilization / Babylon and similarly samples were also obtained from healthy individuals as a control group, their ages ranged from 20 to 60 years old during the period from 1st may /2016 till 25th January/2017. All samples subjected to the tests included Macroscopic and microscopic examination, molecular methods was used for DNA extraction, amplification and sequencing. Statistical analysis showed non-significant differences (P<0.01) among age groups and ) between rural 41(68%) and urban 19(32%). However, sperm motility and count recorded highly significant differences (P<0.01) in the mean value for healthy (74.85, 68.017) as compared with the patients (10.30, 10.217). There were also a significant differences (P<0.01) in the mean concentration of Ant-Toxoplasma IgG antibody (1.327μ/ml) in comparison with control group (0.564μ/ml). A highly significant differences (P<0.01) was detected when comparing the positive 55(92%) and negative 5(8%) samples for oligospermia and a significant difference (P<0.05) for Asthenospermia 21(35%), 39(65%). Two mutation 2(3%) were detected in the exchange for fifty eight 58(97%) with a highly significant difference (P<0.01). It was found that the mutation occurred in Asthenospermia of ND1 gene in the site SNP T4216C (T to C) and the site SNP C3450T (C to T) of Mitochondrial DNA. This study confirmed that a mutation in the ND1 gene that is located in the mitochondria of sperms, specifically in people who suffer from infertility, is occurred due to Toxoplasma gondii.
A disease of the reproductive system known as "infertility" is characterized by the inability to conceive after twelve months or more of sexual activity. This study was carried out to investigate the level of the DAZ protein in “Azoospermia” Iraqi patients. One hundred and fifty human blood samples were collected from different regions in Baghdad governorate include (private medicals Labs and “high institute for infertility diagnosis” assisted reproductive techniques and Kamal Al- Samara'ay IVF Hospital). The control group (fertile) consists of 50 males with an age range between 22-51 years old, while the patient (infertile group) consists of 100 sample males with ages ranging between 25-51 years old. The correlation of mean age for
... Show MoreFacial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) f
... Show MoreBackground: Bacterial DNA released upon bacterial autolysis or killed by antibiotics, hence, many inflammatogenic reactions will be established leading to serious tissue damage. Aim: the present work aimed to elucidate the histopathological changes caused by prokaryotic (bacterial) DNA and eukaryotic (candidal) DNA. Materials and methods: twenty one Staphylococcus aureus and 36 Candida albicans isolates were isolated from UTI patients. Viable cells and DNA of the highest antibiotic sensitive isolates were injected, intraurethraly, in mice. Results were evaluated via histopathological examination. Results: Mildest reactions were obtained from mice challenged with viable C. albicans compared with those challenged with viable S. aureus. Dos
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreConducted Althilelat chemical models of crude oil back to the reservoir Fertile from the fields of Baghdad and Kut and models of crude oil back to the reservoir ??????? of Haklbe Tikrit and Baghdad were calculated their properties Alvezaúah Kalkthaqh and weight, quality and degree of August j (API) and know the quality Nfothma that was light or heavy and make the comparison between Alinvtin also conducted chemical analyzes of the two models of Almia associated with each of the oil above Almkmnin and measured Ktvthma and Zojithma and concentrations of some dissolved salts in them and clarify the relationship between the oil reservoir and water associated with oil fields...
Indexes of topological play a crucial role in mathematical chemistry and network theory, providing valuable insights into the structural properties of graphs. In this study, we investigate the Resize graph of G2(3), a significant algebraic structure arising from the exceptional Lie group (G2) over the finite field F3. We compute several well-known topological indices, including the Zagreb indices, Wiener index, and Randić index, to analyze the graph's connectivity and complexity. Our results reveal intricate relationships between the algebraic structure of G2(3) and its graphical properties, offering a deeper understanding of its combinatorial and spectral characteristics. These findings contribute to the broader study of algebraic graph t
... Show MoreThe aim of this study was investigating the correlation between elevation of Prolactin levels and the increase of the concentrations of total sialic acids. The study was performed on 149 women consisted of 93 infertile hyperprolactinimic women (patients), age ranged16-38 years old, and 56 normoprolactinemic women as a control group, 18-37 years old. Serum prolactin (PRL) and gonadotroph hormones (Follicle stimulating hormone FSH and Luteinizing hormone LH) were measured using enzymatic immunoassay (EIA) method, resorcinol method for serum total sialic acids (SIA). Patients were divided into four groups, each group represented the level of prolactin of infertile women as follow: G1= (21-30), G2= (31-40), G3= (41-50), and G4= (51-60) ng/mL. S
... Show MoreAfter about twelve months or maybe more, some people can’t achieve pregnancy. This might be a sign of infertility as a reproductive system disease. The following study was carried out to investigate the DAZ 1 gene methylation level and its association with azoospermia in Iraqi patients. One hundred and fifty human blood samples were collected from from different regions in Baghdad governorate, including (private medicals Labs and the high institute for infertility diagnosis assisted reproductive techniques and Kamal Al- Samara'ay IVF Hospital) from both fertile and infertile men. The control group consists of 50 samples ranging from 22 to 51 years old, while the patient (infertile group) consists of 100 samples ranging between 25 and 51 y
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More