نتایج جستجو برای: epididymal biometrics
تعداد نتایج: 11942 فیلتر نتایج به سال:
The present study aimed to compare the in vitro fertilizing capacity of frozen-thawed ejaculated and epididymal spermatozoa in order to standardize the semen preparation protocol for camel in vitro fertilization (IVF). Semen samples were collected from 7 Dromedary camels by means of artificial vagina (AV). Ten cauda epididymes were obtained from slaughtered adult camels, isolated, incised and r...
The cholesterol content of the sperm membrane is regulated during both maturation in the epididymis and capacitation in the female tract, two processes required for the spermatozoa to acquire their fertilising ability. Because Niemann-Pick disease, type C2 (NPC2) protein is one of the most abundant components of the epididymal fluid and contains a functional cholesterol-binding site that can tr...
BACKGROUND Epididymal anomalies and patent processus vaginalis are frequently found in boys with cryptorchidism or hydrocele. We conducted this study to evaluate the association between epididymal anomalies and testicular location or patent processus vaginalis in boys with undescended testis or hydrocele. METHODS Children undergoing surgery with undescended testis (group A, 136 boys and 162 t...
We find that Chuang and Chen’s biometrics-based multiserver authentication scheme is unable to resist against stolen smart card and forgery attacks; in addition, their scheme has weak biometrics detection and privacy preservation problems. Thus, in this paper, we propose an advanced biometrics-based authentication scheme for a multi-server environment with higher security and efficiency. Our sc...
The aim of the paper is to shed light on the factors affecting perception shifts in biometrics authentication. This study explores trust relationships in the adoption of biometrics using the valence framework to understand and explain the individual’s evaluation of risk concerning biometrics. Hypotheses are developed to suggest that individuals’ intention to use biometrics is influenced by trus...
BIOMETRICS are an important and widely used class of methods for identity verification and access control. Biometrics are attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, biometrics are fundamentally noisy and irreplaceable. There are always slight variati...
The proposed method is based on 2-dimensional quantization of distance vectors between biometrics features and pairs of random vectors in this method the concept of changeable cryptographic key generation using face biometrics signal. A previously introduced scheme, fuzzy vault, is utilized for secure binding of randomly generated key with extracted biometrics features. The major technical diff...
By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS), in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statist...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید