149 research outputs found

    MUCOADHESIVE POLYMERIC FILMS OF ACYCLOVIR PRONIOSOMES FOR BUCCAL ADMINISTRATION

    Get PDF
    Objective: The aim of the present work was to formulate and evaluate proniosomes of the poorly soluble drug, acyclovir incorporated in mucoadhesive polymeric films for improved buccal mucosal permeability of the drug while achieving prolonged release. Methods: Acyclovir was formulated as proniosomes using Span 60 and cholesterol. The prepared proniosomes were loaded into mucoadhesive polymeric films prepared with varying quantities of carbopol 934P and HPMC K15M. The proniosome incorporated films were evaluated for physicomechanical characters, mucoadhesion, swelling index, drug content, in vitro drug release and ex vivo permeation through porcine buccal mucosa. Results: Hydration of the proniosomes produced spherical vesicles or niosomes, which was confirmed by Scanning Electron Microscopy. The optimized formulation selected on the basis of vesicle size, entrapment efficiency PDI, Zetz potential and in vitro drug release was selected for incorporation into mucoadhesive polymeric films. All the films showed excellent physicomechanical characters. Formulations with higher proportions of carbopol produced slower in vitro drug release. The kinetics of release of drug from all the formulations appeared to be zero-order based on their regression coefficient values. Comparative evaluation of ex vivo permeation from niosomal and non-niosomal films indicated that the former demonstrated improved mucosal permeation and drug release was also sustained for the 8 h period. Conclusion: Mucoadhesive films impregnated with acyclovir loaded proniosomes could be a potential approach for buccal delivery of acyclovir for improving its absorption and bioavailability.&nbsp

    Study of cosmic ray diurnal variation on a day-to-day basis

    Get PDF
    From a careful examination of the diurnal variation of cosmic ray intensity at high energies and the interplanetary field characteristics, the average characteristics of diurnal variation were recently explained by us in terms of a balance between outward convection and field aligned diffusion, the latter arising out of a positive radial density gradient. In this paper, we extend this new concept to explain the large variability observed in the diurnal variation on a day-to-day basis and further demonstrate that the measurement of diurnal anisotropy characteristic of cosmic ray particles on a day-to-day basis can be used directly to infer the nature and scale sizes of interplanetary field parameters. Comparing with the magnetic field vector, we show that this simple concept holds good on more than 80% of days. On the rest 20% of days which have a predominant morning maxima, the diurnal anisotropy characteristics seem to indicate the presence of a significant component of transverse diffusion current in addition to the normal convection and diffusion flow. Such days are found to be present in the form of trains of consecutive days and are found to be associated with abrupt changes in the interplanetary field direction having scale sizes >4 hr. The value of K⊄/K|| which is normally about ≀0.05 is found to be ≈1.0 on non-field aligned days

    Amplifying the Security of Functional Encryption, Unconditionally

    Get PDF
    Security amplification is a fundamental problem in cryptography. In this work, we study security amplification for functional encryption (FE). We show two main results: 1) For any constant epsilon in (0,1), we can amplify any FE scheme for P/poly which is epsilon-secure against all polynomial sized adversaries to a fully secure FE scheme for P/poly, unconditionally. 2) For any constant epsilon in (0,1), we can amplify any FE scheme for P/poly which is epsilon-secure against subexponential sized adversaries to a fully subexponentially secure FE scheme for P/poly, unconditionally. Furthermore, both of our amplification results preserve compactness of the underlying FE scheme. Previously, amplification results for FE were only known assuming subexponentially secure LWE. Along the way, we introduce a new form of homomorphic secret sharing called set homomorphic secret sharing that may be of independent interest. Additionally, we introduce a new technique, which allows one to argue security amplification of nested primitives, and prove a general theorem that can be used to analyze the security amplification of parallel repetitions

    The BLG Theory in Light-Cone Superspace

    Full text link
    The light-cone superspace version of the d=3, N=8 superconformal theory of Bagger, Lambert and Gustavsson (BLG) is obtained as a solution to constraints imposed by OSp(2,2|8) superalgebra. The Hamiltonian of the theory is shown to be a quadratic form of the dynamical supersymmetry transformation.Comment: 45 pages, v2: reference added, minor typos corrected, published versio

    Towards a tensionless string field theory for the N=(2,0) CFT in d=6

    Get PDF
    We describe progress in using the field theory of tensionless strings to arrive at a Lagrangian for the six-dimensional N=(2,0)\mathcal N=(2,0) conformal theory. We construct the free part of the theory and propose an ansatz for the cubic vertex in light-cone superspace. By requiring closure of the (2,0)(2,0) supersymmetry algebra, we fix the cubic vertex up to two parameters.Comment: 46 pages, 2 figures. V2: references added; minor changes and improvement

    Evidence that Differences in Fructosamine-3-Kinase Activity May be Associated with the Glycation Gap in Human Diabetes

    Get PDF
    The phenomenon of a discrepancy between glycated haemoglobin levels and other indicators of average glycaemia may be due to many factors but can be measured as the glycation gap (GGap). This GGap is associated with differences in complications in patients with diabetes and may possibly be explained by dissimilarities in deglycation in turn leading to altered production of Advanced Glycation End (AGE) products. We hypothesised that variations in the level of the deglycating enzyme Fructosamine-3-kinase (FN3K) might be associated with the GGap. We measured erythrocyte FN3K concentrations and enzyme activity in a population dichotomised for a large positive or negative GGap. FN3K protein was higher and we found a striking 3-fold greater activity (323%) at any given FN3K protein level in the erythrocytes of the negative compared with positive GGap groups. This was associated with lower AGE levels in the negative GGap group (79%), lower pro-inflammatory adipokines (Leptin/Adiponectin ratio) (73%) and much lower pro-thrombotic PAI-1 levels (19%). We conclude that FN3K may play a key role in the GGap and thus diabetes complications such that FN3K may be potential predictor of the risk of diabetes complications. Pharmacological modifications of its activity may provide a novel approach to their prevention

    Indistinguishability Obfuscation: From Approximate to Exact

    Get PDF
    We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2+Ï” fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. As a step towards our results, which is of independent interest, we also obtain an approximate-to-exact transformation for functional encryption. At the core of our techniques is a method for “fooling” the obfuscator into giving us the correct answer, while preserving the indistinguishability-based security. This is achieved based on various types of secure computation protocols that can be obtained from different standard assumptions. Put together with the recent results of Canetti, Kalai and Paneth (TCC 2015), Pass and Shelat (TCC 2016), and Mahmoody, Mohammed and Nemathaji (TCC 2016), we show how to convert indistinguishability obfuscation schemes in various ideal models into exact obfuscation schemes in the plain model.National Science Foundation (U.S.) (Grant CNS-1350619)National Science Foundation (U.S.) (Grant CNS-1414119

    Conceptualizing pathways linking women's empowerment and prematurity in developing countries.

    Get PDF
    BackgroundGlobally, prematurity is the leading cause of death in children under the age of 5. Many efforts have focused on clinical approaches to improve the survival of premature babies. There is a need, however, to explore psychosocial, sociocultural, economic, and other factors as potential mechanisms to reduce the burden of prematurity. Women's empowerment may be a catalyst for moving the needle in this direction. The goal of this paper is to examine links between women's empowerment and prematurity in developing settings. We propose a conceptual model that shows pathways by which women's empowerment can affect prematurity and review and summarize the literature supporting the relationships we posit. We also suggest future directions for research on women's empowerment and prematurity.MethodsThe key words we used for empowerment in the search were "empowerment," "women's status," "autonomy," and "decision-making," and for prematurity we used "preterm," "premature," and "prematurity." We did not use date, language, and regional restrictions. The search was done in PubMed, Population Information Online (POPLINE), and Web of Science. We selected intervening factors-factors that could potentially mediate the relationship between empowerment and prematurity-based on reviews of the risk factors and interventions to address prematurity and the determinants of those factors.ResultsThere is limited evidence supporting a direct link between women's empowerment and prematurity. However, there is evidence linking several dimensions of empowerment to factors known to be associated with prematurity and outcomes for premature babies. Our review of the literature shows that women's empowerment may reduce prematurity by (1) preventing early marriage and promoting family planning, which will delay age at first pregnancy and increase interpregnancy intervals; (2) improving women's nutritional status; (3) reducing domestic violence and other stressors to improve psychological health; and (4) improving access to and receipt of recommended health services during pregnancy and delivery to help prevent prematurity and improve survival of premature babies.ConclusionsWomen's empowerment is an important distal factor that affects prematurity through several intervening factors. Improving women's empowerment will help prevent prematurity and improve survival of preterm babies. Research to empirically show the links between women's empowerment and prematurity is however needed

    Random Probing Security: Verification, Composition, Expansion and New Constructions

    Get PDF
    International audienceThe masking countermeasure is among the most powerful countermeasures to counteract side-channel attacks. Leakage models have been exhibited to theoretically reason on the security of such masked implementations. So far, the most widely used leakage model is the probing model defined by Ishai, Sahai, and Wagner at (CRYPTO 2003). While it is advantageously convenient for security proofs, it does not capture an adversary exploiting full leakage traces as, e.g., in horizontal attacks. Those attacks target the multiple manipulations of the same share to reduce noise and recover the corresponding value. To capture a wider class of attacks another model was introduced and is referred to as the random probing model. From a leakage parameter p, each wire of the circuit leaks its value with probability p. While this model much better reflects the physical reality of side channels, it requires more complex security proofs and does not yet come with practical constructions. In this paper, we define the first framework dedicated to the random probing model. We provide an automatic tool, called VRAPS, to quantify the random probing security of a circuit from its leakage probability. We also formalize a composition property for secure random probing gadgets and exhibit its relation to the strong non-interference (SNI) notion used in the context of probing security. We then revisit the expansion idea proposed by Ananth, Ishai, and Sahai (CRYPTO 2018) and introduce a compiler that builds a random probing secure circuit from small base gadgets achieving a random probing expandability property. We instantiate this compiler with small gadgets for which we verify the expected properties directly from our automatic tool. Our construction can tolerate a leakage probability up to 2 −8 , against 2 −25 for the previous construction, with a better asymptotic complexity

    India after the 2014 general elections:BJP dominance and the crisis of the third party system

    Get PDF
    This article critically assesses claims that India has entered a new party system after the 2014 general elections, marked by renationalisation with the BJP as the new 'dominant' party.' To assess these claims, we examine the electoral rise of the BJP in the build-up to and since the 2014 general elections until the state assembly elections in December 2018. Overall, we argue that despite the emerging dominance of the BJP, a core feature of the third party system -a system of binodal interactions- has remained largely intact albeit in a somewhat weaker form. Furthermore, by comparing the post 2014 Indian party system with key electoral features of the first three party systems, we conclude that the rise of the BJP has thrown the third-party system into crisis, but does not yet define the consolidation of a new party system
    • 

    corecore