This study was conducted at the poultry farm located in the College of Agricultural Engineering Sciences, University of Baghdad, Abu Gharib (the old site), and laboratories of the Animal Production Department, Jadriya, to investigate the effect of adding hydrogen peroxide H2O2 at nanoscale levels to semen diluents of local roosters sperm in a number of semen characteristics. In this study, 80 roosters local Iraqi chickens were used, the roosters were trained three times a week, to collect semen, until the largest number of them responded. Then the best 40 of the roosters were elected for the purpose of collecting the semen with a pooled sample, and then the samples were diluted and divided equally into four parts. The concentrations of 0, 1, 10, 100, nM of H2O2 were added to each part of the diluted semen, then kept cool until the temperature reached 5 C for three periods (0, 24, 48 hours), and cryopreservation (48 hours) for all four addition levels. A number of laboratory characteristics were studied including percentages of individual motility, dead sperm, mitochondrial efficacy, and DNA Fragmentation at the end of each repetition (10 repetitions). A variation based on the concentration was observed in the results of hydrogen peroxide, as it ranged from the non-affectivity of the two treatments 1, 10 nM H2O2, to the deterioration in some laboratory characteristics for the treatment of 100 nM H2O2, and according to the interactions between the addition concentrations and the cooling and cryopreservation periods. From this experiment, it can be concluded the inefficiency of the hydrogen peroxide concentrations used to semen preservation.
This work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.
The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20
... Show MoreIn the theoretical part, removal of direct yellow 8 (DY8) from water solution was accomplished using Bentonite Clay as an adsorbent. Under batch adsorption, the adsorption was observed as a function of contact time, adsorbent dosage, pH, and temperature. The equilibrium data were fitted with the Langmuir and Freundlich adsorption models, and the linear regression coefficient R2 was used to determine the best fitting isotherm model. thermodynamic parameters of the ongoing adsorption mechanism, such as Gibb's free energy, enthalpy, and entropy, have also been measured. The batch method was also used for the kinetic calculations, and the day's adsorption assumes first-order rate kinetics. The kinetic studies also show that the intrapar
... Show MoreBackground: Asthma is a disease of the airways characterized by chronic inflammation associated with airway hyper-responsiveness and airway wall remodeling. Aims of the study: The aims of this study was to determine the prevalence of oral manifestations , identify different microorganism from oral micro flora and determination of salivary IgA and salivary flow rate in asthmatic patients taking different dose of Prednisolone in comparison with control group. Subjects, materials and methods: The study included 17 patients under treatment with Prednisolone (10-20 mg),15 patients take (20-30 mg) of Prednisolone and other 18 patients take (30 – 40mg) of Prednisolone, and 25 healthy control group (10 male and 15 female). Results : The mo
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreThe effect of different antibiotics on growth pigment and plasmid curing of Serratia marcescens were studied, S. marcescens was cultured in media containing(16_500)µg/ml of antibiotics, curing mutants unable to produce prodigiosin and lost one plasmid band were obtained of of ampicillin, amoxillin, antibiotics concentrations (64 500) µg/ml metheprim, ultracloxam, azithromycin, cephalexin and erythromycin treated with (350 500) µg/ml of The mutant cells rose- light color and and refampicin revealed S.marcescens inhibited ciprodar and tetracyclin, lincomycin did not lost the plasmid band chlaforan
Iraq's oil industry has been passed in different periods , began with domination of Western companies to invest in Iraqi oil at twenties of the last century , through the process of nationalization of the shares of those companies , beginning of the seventies , and ending with the new policies adopted by the government recently, which was contracting with international companies to develop the oil industry , because of what the outcome of the oil industry from a decline in artistic and physical ability as a result to the conditions of war and embargo imposed on Iraq before 2003.
The Iraqi government has introduced licensing of a contract to
... Show MoreKE Sharquie, AA Noaimi, MS Abass, American Journal of Dermatology and Venereology, 2019 - Cited by 4
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More