Search Results/Filters    

Filters

Year

Banks




Expert Group










Full-Text


Issue Info: 
  • End Date: 

    آبان 1373
Measures: 
  • Citations: 

    3
  • Views: 

    327
  • Downloads: 

    0
Keywords: 
Abstract: 

برای دستیابی به افزایش درصد موفقیت «I.V.F» به کارگیری روش های مختلف تحریک تخمگذاری از جمله استفاده از «آگونیست های GnRH» متداول است. مشکل بعدی ناشی از تاثیرات نامطلوب به علت مدت طولانی مصرف این داروست که پژوهشکده «رویان» برای کاهش مدت استفاده از این دارو همراه با اثربخشی بیش تر، حدود 100 بیمار را بر اساس پروتکل «Long, Short» تحت مداوا قرار دادند و موادی از قبیل درصد دوزهای تحریک تخم گذاری، مواد آمپول های استفاده شده، درصد باروری و کیفیت تخمک مورد مقایسه قرار داده شد که با توجه به نتایج به دست آمده روش «Long Protocol» ارجح و در سایر موارد که از بیمار پاسخ مناسبی گرفته نشد به خصوص از نظر تعداد تخمک روش «Short Protocol» دارای انتخاب برتر می باشد.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 327

Issue Info: 
  • Year: 

    1394
  • Volume: 

    1
Measures: 
  • Views: 

    1031
  • Downloads: 

    0
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (pdf) مراجعه فرمایید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1031

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Issue Info: 
  • Year: 

    2009
  • Volume: 

    11
  • Issue: 

    SUPPL. 1
  • Pages: 

    33-33
Measures: 
  • Citations: 

    0
  • Views: 

    191
  • Downloads: 

    0
Abstract: 

Objective: To compare the efficacy of using mild ovarian stimulation Protocol and conventional stimulation Protocol in IVF outcome.Materials and Methods: We randomized 200 women with regularly menstruation who were candidate for IVF. They had undergone stimulation with clomiphene citrate, gonadotropin and GnRH antagonist or gonadotropin and GnRH agonist.Results: There were no significant difference in mean age, cause of infertility, basal FSH, BMI, endometrial thickness on the HCG administration and clinical pregnancy rate in two groups. The number of recovered oocytes, embryos obtained, embryos transferred,, peak estradiol on the HCG administration and OHSS were significantly higher in agonist group. Significantly more patients in agonist group had embryo cryopreserved.Conclusion: The CC/ gonadotropin/ GnRH antagonist is an acceptable alternative Protocol for IVF in patients with regularly menstruation.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 191

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2008
  • Volume: 

    6
  • Issue: 

    1
  • Pages: 

    33-37
Measures: 
  • Citations: 

    0
  • Views: 

    396
  • Downloads: 

    181
Abstract: 

Background: Recently different studies suggested that discontinuation of gonadotrophin releasing hormone analogue (GnRHa) at beginning of ovarian stimulation (improvement of ovarian response to gonadotrophins) may have some benefit to poor responder patients in invitro fertilization (IVF) cycles.Objective:The efficacy of GnRHa stop Protocol in poor responder patients in IVF cycles was assessed.Materials and Methods: This study was a prospective, randomized controlled trial that 40 poor responder patients (less than three mature follicles in a previous cycle) with normal basal follicle stimulating hormone (FSH) were randomly allocated into two Protocols: 1) Non-stop Protocol: long GnRHa suppression, and start gonadotrophins from day 3 of mense. 2) Stop-Protocol: GnRHa is stopped with the onset of menses, and gonadotrophin doses remained similar to group 1.Results: A significantly higher number of follicles, oocytes, embryos and fertilization rate also shorter stimulation days and lower human menopausal gonadotropins (HMG) ampoules were recorded in the stop Protocol compared to the control group. Both Protocols resulted in a similar cancellation rate, pregnancy rate, estradiol level and LH level.Conclusion: Early follicular cessation of GnRHa permitted the retrieval of a significantly higher number of follicles, oocytes and embryos, and can reduce the number of HMG and stimulation days.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 396

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 181 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SAFKHANI M.

Issue Info: 
  • Year: 

    2017
  • Volume: 

    5
  • Issue: 

    2 (18)
  • Pages: 

    59-66
Measures: 
  • Citations: 

    0
  • Views: 

    753
  • Downloads: 

    0
Abstract: 

Authentication Protocols are tools used to ensure the identity of the parties in cyberspace. If these Protocols are compromised، the cyber security is threatened. These threats are of paramount importance in military applications. Recently، in [1] an authentication Protocol، called SPRS has been considered and several attacks such as secret disclosure attack، tag impersonation attack and tag traceability attack have been applied on it. In addition، authors of that paper، presented the improved version of the Protocol and claimed the improved Protocol، unlike its predecessor، is secure against the attacks applied on the predecessor version and also other active and passive attacks. In this paper، we show that unfortunately، the security claims of authors do not hold and the improved Protocol is also vulnerable against secret disclosure attack and tag traceability attack. We offer two versions of the secret disclosure attack which are offline and online versions. The basis of the attacks presented in this paper is that given Y=PRNG(X) and PRNG function is a public function and X and Y are 16 bits، performing an exhaustive search to find X as a pre-image of Y with a maximum of 216 off-line evaluations of PRNG function is possible. The offline version of the attack with the complexity of one run of Protocol eavesdropping and doing 233 evaluations of PRNG function can disclose 4 secret values of Protocol i. e. Ki، Pi، NT and EPCS which are 16 bits and the online version of the attack with the complexity of two times impersonating the reader and doing 217 evaluations of PRNG function can disclose these 4 secret values of Protocol. Given these secret disclosure attacks، the improved Protocol is not secure against other active and passive attacks as well. In addition، we propose a tag traceability attack to trace a given tag which does not depend on the length of the output of the PRNG function. Given this attack، an adversary can trace a given tag between any two sessions with the reader.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 753

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    183-191
Measures: 
  • Citations: 

    0
  • Views: 

    1005
  • Downloads: 

    0
Abstract: 

Nowadays, RFID technology is using widely in our daily lives. This technology is used in many applications such as healthcare, military, identifying friend or foe of fighter-aircraft and etc. In order to provide security and privacy of RFID systems, different authentication Protocols have been proposed. Pang proposed a RFID authentication Protocol based on EPC C-1 G-2 standard. They claimed that their Protocol is secure against various attacks and provides user privacy. It is shown that Protocol proposed by pang is not safe and suffer from attacks such as tag ID exposure, tag impersonation, reader impersonation and de-synchronization. Also to enhance security of RFID users, an improved version of this Protocol is proposed, showing that it is secure against aforementioned attacks. In addition, complexity and efficiency of the improved Protocol is compared with some similar ones and it is shown that the improved Protocol is completely secure. Eventually, security of the improved Protocol is compared with some existed Protocols.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1005

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    3
  • Issue: 

    3 (11)
  • Pages: 

    39-48
Measures: 
  • Citations: 

    0
  • Views: 

    1499
  • Downloads: 

    0
Abstract: 

In recent years, cyber security has become one of the main objectives of military organizations. On the other hand, forces identification, authentication and their security have become one of the basic needs of military centers. Although data encryption prevents user access to data contents, an attacker can forges exchanged data by access to communications channels. As a result, providing secure Protocols for authentication systems, to prevent different attacks is very important. In this paper, we cryptanalyze a mutual RFID authentication Protocol (SPRS) that presented in 2013. Unlike climes of the designers of Protocol, we show that their Protocol has some weaknesses yet and does not secure against some attacks such as rival secret values, tag impersonation and tractability. Then, an improved version of SPRS Protocol is proposed that eliminates SPRS weaknesses. Also, the security and the privacy of proposed Protocol are compared with some mutual authentication Protocols that proposed recently.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1499

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    25
  • Issue: 

    5
  • Pages: 

    11-17
Measures: 
  • Citations: 

    0
  • Views: 

    80
  • Downloads: 

    0
Abstract: 

Introduction Chronic anovulation is one of the most common causes of infertility in women with polycystic ovary syndrome (PCOS) and there are several treatments for it. The present study was performed aimed to determine the efficacy of the stair-step Protocol (SSP) using clomiphene citrate (CC) in patients with polycystic ovary syndrome and compare it with the traditional regimen. Methods This double-blind randomized clinical trial study was performed on 60 patients with PCOS in Sanandaj Besat Hospital in 2018-2019. Patients were randomly divided into control (traditional) and study (stair-step) groups. In the stair-step group, the patient received 50 mg of CC daily for 5 days from the fifth day of the cycle, and if there was no response, the dose was doubled, and failure to respond led to the use of 150 mg. In the control group, the process of CC administration in each cycle was for 5 days with the prescribed doses. The effect of CC administration was determined by ultrasonography one week after the end of the drug. Finally, the variables of egg size, ovulation interval, pregnancy rate, and CC side effects were compared in the two groups using SPSS software (version 18), Kolmogorov-Smirnov test, and t-test. P<0. 05 was considered statistically significant. Results The ovulation period was significantly shorter in the SSP than in the control group (21. 40±, 0. 98 vs. 51. 86±, 5. 94 days). Ovulation rate (17. 72±, 2. 40 vs. 19. 03±, 4. 40) and pregnancy rate (0. 87±, 0. 12 vs. 0. 93±, 0. 10) were not significantly different between the case and control groups. Moreover, no significant difference was found between the groups regarding the side effects of CC and endometrial thickness (p>0. 05). Conclusion SSP has a very short treatment period with no adverse effects on ovulation and pregnancy. It also has no side effects in patients with PCOS.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 80

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2009
  • Volume: 

    7
  • Issue: 

    SUPPL 1
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    204
  • Downloads: 

    0
Abstract: 

Introduction: The aim of this prospective study was to evaluate the efficacy of gonadotropin releasing hormone (GnRH) antagonist in comparison with the standard long Protocol in the first cycle of ART.Materials and Methods: We randomized 120 patients undergoing ART for the first time. Included criteria were FSH<10 IU and age <35 years; excluded criteria were endocrine abnormality and polycystic ovaries. Group 1 (n=60) was stimulated with a standard long Protocol and group 2 (n=60) received GnRH antagonist.Results: There was no statistically significant difference in the age, infertility duration, basal FSH, BMI, the number of oocytes retrieved, embryo transferred, endometrial thickness, ovarian hyper stimulation syndrome and clinical pregnancy in two groups. Serum estradiol and consumption of gonadotropins were significantly lower in the antagonist Protocol.Conclusion: GnRH-antagonists are effective, safe and well tolerated alternative to agonists in the first cycle of ART.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 204

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Issue Info: 
  • Year: 

    2023
  • Volume: 

    11
  • Issue: 

    3
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    14
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 14

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button