Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 2
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

The aim of the study was to develop new laparoscopic technique for repeated recovery of sheep oocytes. Oocytes were aspirated with specifically designed catheter. It allowed to recover oocytes without ovary damage and to preserve very good quality of recovered oocytes. Fifteen ewes were oocytes donors. Oocytes were collected: one time (group I, n=15), two times (group II, n=15), three times (group III, n=10), four times (group IV, n=5). The endoscope was inserted into the abdominal cavity. Two trockars for putting the manipulators were inserted 15 cm cranial from the udder. Oocytes were collected by aspiration of the follicular fluid from the ovarian follicles. The observed clinical complications were: ovary bleeding and cicatrix at place of needle insertion, the fragmentary adhesion of infundibulum and ovary, adhesions of omentum and peri- toneum near the place where the grasping forceps were inserted and adhesion of ovary and uterus. Ovarian follicles (n=204) were aspirated, 130 (63.8%) oocytes were obtained. Out of 130 obtained oocytes, 112 were qualified for in vitro maturation. The remaining 18 oocytes (13.8%) were rejected due to cytoplasmic changes. The proposed technique allows for the collecting oocytes of good quality that can be used for IMV/IVF techniques and cloning.

Go to article

Authors and Affiliations

J. Wieczorek
J. Koseniuk
M. Cegla
Download PDF Download RIS Download Bibtex

Abstract

This research investigates the intricacies of X.509 certificates within a comprehensive corporate infrastructure. Spanning over two decades, the examined enterprise has heavily depended on its internal certificate authority and Public Key Infrastructure (PKI) to uphold its data and systems security. With the broad application of these certificates, from personal identification on smart cards to device and workstation authentication via Trusted Platform Modules (TPM), our study seeks to address a pertinent question on how prevalent are weak RSA keys within such a vast internal certificate repository. Previous research focused primarily on key sets publicly accessible from TLS and SSH servers or PGP key repositories. On the contrary, our investigation provides insights into the private domain of an enterprise, introducing new dimensions to this problem. Among our considerations are the trustworthiness of hardware and software solutions in generating keys and the consequential implications of identified vulnerabilities on organizational risk management. The obtained results can contribute to enhancing security strategies in enterprises.
Go to article

Authors and Affiliations

Konrad Kamiński
1 2
ORCID: ORCID
Wojciech Mazurczyk
1
ORCID: ORCID

  1. Faculty of Electrical Engineering and Communication, Warsaw University of Technology, Warsaw, Poland
  2. SecurityTechnology Development and Transformation Division, Orange Polska S.A.,Warsaw, Poland

This page uses 'cookies'. Learn more