نتایج جستجو برای: epididymal biometrics

تعداد نتایج: 11942  

D. A. El-Badry K. Gh. M. Mahmoud, T. H. Scholkamy

The present study aimed to compare the in vitro fertilizing capacity of frozen-thawed ejaculated and epididymal spermatozoa in order to standardize the semen preparation protocol for camel in vitro fertilization (IVF). Semen samples were collected from 7 Dromedary camels by means of artificial vagina (AV). Ten cauda epididymes were obtained from slaughtered adult camels, isolated, incised and r...

Journal: :Reproduction, fertility, and development 2014
Dolores Busso María José Oñate-Alvarado Elisa Balboa Juan Castro Carlos Lizama Gabriela Morales Susana Vargas Steffen Härtel Ricardo D Moreno Silvana Zanlungo

The cholesterol content of the sperm membrane is regulated during both maturation in the epididymis and capacitation in the female tract, two processes required for the spermatozoa to acquire their fertilising ability. Because Niemann-Pick disease, type C2 (NPC2) protein is one of the most abundant components of the epididymal fluid and contains a functional cholesterol-binding site that can tr...

Journal: :BMC urology 2015
Sun-Ouck Kim Seong Woong Na Ho Song Yu Dongdeuk Kwon

BACKGROUND Epididymal anomalies and patent processus vaginalis are frequently found in boys with cryptorchidism or hydrocele. We conducted this study to evaluate the association between epididymal anomalies and testicular location or patent processus vaginalis in boys with undescended testis or hydrocele. METHODS Children undergoing surgery with undescended testis (group A, 136 boys and 162 t...

Journal: :I. J. Network Security 2016
Chin-Chen Chang Wei-Yuan Hsueh Ting-Fang Cheng

We find that Chuang and Chen’s biometrics-based multiserver authentication scheme is unable to resist against stolen smart card and forgery attacks; in addition, their scheme has weak biometrics detection and privacy preservation problems. Thus, in this paper, we propose an advanced biometrics-based authentication scheme for a multi-server environment with higher security and efficiency. Our sc...

Journal: :Journal of Biomedicine and Biotechnology 2012

Journal: :Big Data Histories 2018

2015
Dan Kim Obi Ogbanufe

The aim of the paper is to shed light on the factors affecting perception shifts in biometrics authentication. This study explores trust relationships in the adoption of biometrics using the valence framework to understand and explain the individual’s evaluation of risk concerning biometrics. Hypotheses are developed to suggest that individuals’ intention to use biometrics is influenced by trus...

2013
Shantanu Rane Ye Wang Stark C. Draper Prakash Ishwar

BIOMETRICS are an important and widely used class of methods for identity verification and access control. Biometrics are attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, biometrics are fundamentally noisy and irreplaceable. There are always slight variati...

2012

The proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors in this method the concept of changeable cryptographic key generation using face biometrics signal. A previously introduced scheme, fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical diff...

2013
Alawi A. Al-Saggaf Haridas Acharya

By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS), in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statist...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید