نتایج جستجو برای: maturation parameter p000

تعداد نتایج: 270686  

افروغ, مهسا, عرفانی مجد, نعیم, نجف زاده ورزی, حسین,

Background & Aims: Diabetes mellitus is a metabolic disease which causes congenital anomalies and misabortion in females. Decrease in follicle growth and maturation and quality of oocytes occur in type 1 diabetes. The antidiabetic effect of Aloe vera is reported by several investigators. In this study, the effects of Aloe vera gel on diabetic mice oocyte were examined. Materials & Metho...

مکاری زاده , آرام, دلیرژ , نوروز , مرشدی, احمد , پروین, پروا,

 Background & Aims: Dendritic cells are the most potent antigen presenting cells in induction or polarization of T-dependent immune responses. In cancerous patients, suppressive or detoured immune responses regard to tumor cells, prevent appropriate functions of dendritic cells. Nowadays, in vitro production, expansion and maturation of dendritic cells in presence of safe maturation factors whi...

Eftekhar M Karimi HA Khalili MA Yazdanpanah F

Background: 15% of oocytes collected in ART cycles are immature. These oocytes may be matured following IVM program. It is possible to cryopreserve the immature oocytes for further use in ART after application of IVM. The aim was to determine the maturation rate, morphology and viability of human immature oocytes after fresh IVM and vitrified-IVM program. Materials and Methods: 63 women who und...

Azadbakht M Khazaei M, Rashidi Z Sadri S

Background: Cryopreservation of ovaries is an important technique in assisted reproduction technology. Physical forces like hydrostatic pressure have a pivotal role in reproduction systems. Due to changes in intrafollicular pressure during ovulatory process, this study designed to examine the effects of hydrostatic pressure on oocyte maturation and cell death in cumulus cells from cryopreserved...

2003
Piero Cosi Andrea Fusaro Graziano Tisato

LUCIA, a new Italian talking head based on a modified version of the Cohen-Massaro’s labial coarticulation model is described. A semi-automatic minimization technique, working on real cinematic data, acquired by the ELITE optoelectronic system, was used to train the dynamic characteristics of the model. LUCIA is an MPEG-4 standard facial animation system working on standard FAP visual parameter...

2009
Sébastien Canard Cécile Delerablée Aline Gouget Emeline Hufschmitt Fabien Laguillaumie Hervé Sibert Jacques Traoré Damien Vergnaud

We present the first fair e-cash system with a compact wallet that enables users to spend efficiently k coins while only sending to the merchant O(λ log k) bits, where λ is a security parameter. The best previously known schemes require to transmit data of size at least linear in the number of spent coins. This result is achieved thanks to a new way to use the Batch RSA technique and a tree-bas...

Journal: :J. Algorithms 2003
Tomás Feder Rajeev Motwani Liadan O'Callaghan Christopher Olston Rina Panigrahy

We consider the problem of estimating the length of a shortest path in a DAG whose edge lengths are known only approximately but can be determined exactly at a cost. Initially, each edge e is known only to lie within an interval [le; he]; the estimation algorithm can pay ce to nd the exact length of e. In particular, we study the problem of nding the cheapest set of edges such that, if exactly ...

Journal: :IACR Cryptology ePrint Archive 2014
Hyung Tae Lee Jae Hong Seo

At Crypto 2013, Coron, Lepoint, and Tibouchi (CLT) proposed a practical Graded Encoding Scheme (GES) over the integers, which has very similar cryptographic features to ideal multilinear maps. In fact, the scheme of Coron et al. is the second proposal of a secure GES, and has advantages over the first scheme of Garg, Gentry, and Halevi (GGH). For example, unlike the GGH construction, the subgro...

Journal: :IACR Cryptology ePrint Archive 2005
Tsz Hon Yuen Victor K.-W. Wei

We construct the first constant-size hierarchical identity-based signature (HIBS) without random oracles the signature size is O(λs) bits, where λs is the security parameter, and it is independent of the number of levels in the hierarchy. We observe that an efficient hierarchical identity-based signcryption (HIBSC) scheme without random oracles can be compositioned from our HIBS and Boneh, Boye...

2005
Albert Krohn Michael Beigl Christian Decker Tobias Zimmer

The ordering of messages according to a given time measure is a largely discussed topic. Nevertheless, wireless or wired systems considering the order of messages do not use the access layer to accomplish this task. In this paper, we discuss the use of non-destructive bit-wise arbitration on the MAC layer for real-time message ordering in wireless sensor networks. With this access method, it is...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید