117 research outputs found

    THE STATE POLICY OF THE RUSSIAN FEDERATION ON THE NORTHERN AND ARCTIC TERRITORIES IN THE 1990S: STAGES, PRIORITIES, MECHANISMS, AND RESULTS

    Get PDF
    Purpose: The purpose of the study is to determine the state policy of the Russian Federation on the Northern and Arctic territories in the 1990s. Methodology: This is analytical-logical research that has been done through content analysis and documentary and library research. Result: Results showed that First of all Russia abruptly changed the priorities of its policy to the Far North setting the course to leave the region in all spheres. Dozens of polar expeditions from the USA, Norway, and Germany were sent to the Russian sector of polar lands. Russia itself rapidly turned off its economic presence in the North. “The North Pole-31” (drifting polar station) was stopped for 12 years on June 25, 1991. Applications: This research can be used for universities, teachers, and students. Novelty/Originality: In this research, the model of the state policy of the Russian Federation on the northern and arctic territories in the 1990s is presented in a comprehensive and complete manner

    Mesenchymal stromal cells of bone marrow and azathioprine in Crohn's disease therapy

    Get PDF
    Crohn's disease (CD) is a chronic, recurring disease of the gastrointestinal tract of unclear etiology. One of the new approaches to CD therapy is the use of the possibilities of stem cells, in particular, mesenchymal stromal cells (MSCs). Currently, the use of MSC in clinical practice for the treatment of chronic inflammatory and autoimmune diseases is being studied in patients who receive concomitant therapy with other immunomodulatory medications. Aim. To evaluate the effectiveness of MSCs therapy in patients with CD receiving azathioprine (AZA). Materials and methods. The study included 34 patients with inflammatory (luminal) form of CD. The 1st group of patients (n=15) received anti-inflammatory therapy using MSCs culture in combination with AZA. The 2nd group (n=19) received MSCs without AZA. The severity of the attack was assessed in points in accordance with the of Crohn's disease activity index (CDAI). Immunoglobulins (IgA, IgG, IgM), interleukins (IL) 1β, 4, 10, tumor necrosis factor-α (TNF-α), interferon-γ (INF-γ), transforming growth factor-1β (TGF-1β), C-reactive protein (CRP), platelets and erythrocyte sedimentation rate (ESR) at 2, 6 and 12 months from the beginning of MSCs therapy. Results. The initial mean CDAI in the 1st group was 337.6±17.1 points, in the 2nd group - 332.7±11.0 points (p=0.3). In both groups of patients there was a significant decrease in CDAI after 2 months. From the beginning of therapy MSCs: in the 1st group to 118.9±12.4 points, in the 2nd - 120.3±14.1 points (p=0.7), after 6 months - 110.3±11.1 and 114.3±11.8 points (p=0.8), respectively. After 12 months CDAI in the 1st group was 99.9±10.8 points, in the 2nd group it was 100.6±12.1 points (p=0.8). The level of IgA, IgG, IgM was significantly lower in the group of patients with a longer history of the disease and long-term ASA. After the introduction of MSC in both groups of patients with BC, there was a tendency for the growth of pro - and anti-inflammatory cytokines, with a significantly lower level of pro-inflammatory cytokines - INF-γ, TNF-α, IL-1β - in the 1st group, indicating potentiation of the immunosuppressive effect of MSCs and AZA, which provides a more pronounced anti-inflammatory effect. Conclusion. Transplantation of MSCs promotes an increase in the serum of patients with CD initially reduced concentration of IG, cytokines and restoring their balance as the onset of clinical remission. The combination with AZA has a more pronounced anti-inflammatory effect

    Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model

    Get PDF
    Encrypted multi-maps (EMMs) enable clients to outsource the storage of a multi-map to a potentially untrusted server while maintaining the ability to perform operations in a privacy-preserving manner. EMMs are an important primitive as they are an integral building block for many practical applications such as searchable encryption and encrypted databases. In this work, we formally examine the tradeoffs between privacy and efficiency for EMMs. Currently, all known dynamic EMMs with constant overhead reveal if two operations are performed on the same key or not that we denote as the global key-equality pattern\mathit{global\ key\text{-}equality\ pattern}. In our main result, we present strong evidence that the leakage of the global key-equality pattern is inherent for any dynamic EMM construction with O(1)O(1) efficiency. In particular, we consider the slightly smaller leakage of decoupled key-equality pattern\mathit{decoupled\ key\text{-}equality\ pattern} where leakage of key-equality between update and query operations is decoupled and the adversary only learns whether two operations of the same type\mathit{same\ type} are performed on the same key or not. We show that any EMM with at most decoupled key-equality pattern leakage incurs Ω(logn)\Omega(\log n) overhead in the leakage cell probe model\mathit{leakage\ cell\ probe\ model}. This is tight as there exist ORAM-based constructions of EMMs with logarithmic slowdown that leak no more than the decoupled key-equality pattern (and actually, much less). Furthermore, we present stronger lower bounds that encrypted multi-maps leaking at most the decoupled key-equality pattern but are able to perform one of either the update or query operations in the plaintext still require Ω(logn)\Omega(\log n) overhead. Finally, we extend our lower bounds to show that dynamic, response-hiding\mathit{response\text{-}hiding} searchable encryption schemes must also incur Ω(logn)\Omega(\log n) overhead even when one of either the document updates or searches may be performed in the plaintext

    Masking Fuzzy-Searchable Public Databases

    Get PDF
    We introduce and study the notion of keyless fuzzy search (KlFS) which allows to mask a publicly available database in such a way that any third party can retrieve content if and only if it possesses some data that is “close to” the encrypted data – no cryptographic keys are involved. We devise a formal security model that asks a scheme not to leak any information about the data and the queries except for some well-defined leakage function if attackers cannot guess the right query to make. In particular, our definition implies that recovering high entropy data protected with a KlFS scheme is costly. We propose two KlFS schemes: both use locality-sensitive hashes (LSH), cryptographic hashes and symmetric encryption as building blocks. The first scheme is generic and works for abstract plaintext domains. The second scheme is specifically suited for databases of images. To demonstrate the feasibility of our KlFS for images, we implemented and evaluated a prototype system that supports image search by object similarity on a masked database

    Low-Temperature Polymorphic Phase Transition in a Crystalline Tripeptide L-Ala-L-Pro-Gly·H2O Revealed by Adiabatic Calorimetry

    Get PDF
    We demonstrate application of precise adiabatic vacuum calorimetry to observation of phase transition in the tripeptide l-alanyl-l-prolyl-glycine monohydrate (APG) from 6 to 320 K and report the standard thermodynamic properties of the tripeptide in the entire range. Thus, the heat capacity of APG was measured by adiabatic vacuum calorimetry in the above temperature range. The tripeptide exhibits a reversible first-order solid-to-solid phase transition characterized by strong thermal hysteresis. We report the standard thermodynamic characteristics of this transition and show that differential scanning calorimetry can reliably characterize the observed phase transition with <5 mg of the sample. Additionally, the standard entropy of formation from the elemental substances and the standard entropy of hypothetical reaction of synthesis from the amino acids at 298.15 K were calculated for the studied tripeptide.National Institute of Biomedical Imaging and Bioengineering (U.S.) (EB-003151)National Institute of Biomedical Imaging and Bioengineering (U.S.) (EB-001960)National Institute of Biomedical Imaging and Bioengineering (U.S.) (EB-002026

    The first combined russian experience of using perampanel in children and adolescents with epilepsy in everyday clinical practice

    Get PDF
    Background. Real world data help to provide more information on the effects and tolerability of therapy. However, data on the use of perampanel in Russian population of children remain limited. aim. To conduct a retrospective analysis of perampanel efficacy and tolerability in children and adolescents with epilepsy in real clinical practice. Materials and methods. A total of 106 children aged 4–18 years receiving perampanel as part of combination therapy for epilepsy were observed at 18 centers. Seizure frequency at 1–3, after 6 and 12 months of treatment, presence and type of adverse events (AEs) were analyzed. The main assessed efficacy parameters were seizure control, significant (≥50 %) decrease in seizure frequency. All other outcomes (<50 % decrease, no change or increased seizure frequency) were considered to be no effect. The assessed safety parameters were the percentage of patients with or without AEs and the percentage of perampanel withdrawals due to AEs. results. We defined 3 age groups for comparison: children 4–6, 7–11 and 12–17 years old. Perampanel efficacy was 69 % (seizure control – 23.6 %, ≥50 % decrease in seizure frequency – 45.3 %). The mean duration of the effect was 7.3 ± 4.1 months. No significant difference in efficacy between age groups was found. However, some greater efficacy of perampanel was noted in adolescents: absence of effect in the form of remission or significant decrease in seizures frequency was noted only in 25.5 %, with 40 % in children 4–11 years old. Among those with inefficacy, 3.8 % reported seizure aggravation. AEs occurred in only 23 % of patients, with the least frequent occurrence in adolescents (11.8 %) and the most frequent in children aged 7–11 years (40 %). The most frequent AEs was sluggishness and/or drowsiness. Discontinuation of perampanel due to AEs was required in 7.6 %. Conclusion. Perampanel has demonstrated high efficacy and good tolerability in real clinical practice among children from 4 years of age and adolescents with partial (focal) and secondary generalized seizures. The AEs that developed were not serious and very rarely led to withdrawal of the therapy. The results are comparable to those of phase III studies and previous real-world data. The usage of perampanel in children with primary generalized seizures should be further investigated. © 2022 ABV-Press Publishing House. All rights reserved.EisaiО.А. Рахманина / O.A. Rakhmanina: https://orcid.org/0000-0001-9218-2531 И.В. Волков / I.V. Volkov: https://orcid.org/0000-0002-7816-7535 О.К. Волкова / O.K. Volkova: https://orcid.org/0000-0003-3314-3895 Ю.А. Александров / Yu.A. Aleksandrov: https://orcid.org/0000-0003-3887-5219 М.В. Бархатов / M.V. Barkhatov: https://orcid.org/0000-0002-6372-4677 И.С. Бахтин / I.S. Bakhtin: https://orcid.org/0000-0003-3600-687X Г.М. Бережная / G.M. Berezhnaya: https://orcid.org/0000-0003-3917-422X А.Ю. Карась / A.Yu. Karas: https://orcid.org/0000-0001-9089-9627 Д.В. Морозов / D.V. Morozov: https://orcid.org/0000-0003-4389-9143 И.С. Бахтин / I.S. Bakhtin: https://orcid.org/0000-0003-3600-687X Т.Р. Томенко / T.R. Tomenko: https://orcid.org/0000-0002-0652-1996 Ж.М. Цоцонава / Zh.M. Tsotsonava: https://orcid.org/0000-0003-3275-5099 Конфликт интересов и финансирование. Публикация подготовлена при финансовой поддержке компании «Эйсай». Авторы несут полную ответственность за содержание статьи и редакционные решения. Conflict of interest and funding. This publication was funded by Eisai. The authors are fully responsible for the content of the article and editorial decisions

    Механизм действия фоллистатин-подобного белка-1 (FSTL-1)

    Get PDF
    The paper provides current data on some proteins of the TGF- p family which are potentially capable of exerting a protective effect in diseases of the heart, lungs, placenta, gonads, and pancreas. The study investigated the anti-inflammatory properties of follistatin-like protein-1 (FSTL-1), one of the proteins of this family, at the cellular level. It was demonstrated that FSTL-1 is responsible for heart muscle regeneration in mammals through activation of angiogenic factors. Despite the fact that this protein plays a key role in myocardial regeneration, its concentration in the epicardium decreases immediately after a heart attack, which hampers effective self-repair of the heart. The paper summarises the results of studies of the efficacy of intravenous administration of FSTL-1 in rats with myocardial infarction. However, the administration of a foreign protein can cause allergic reactions, therefore a drug that induces FSTL-1 secretion was chosen instead.The aim of the study was to provide experimental substantiation of the possibility of exogenous regulation of FSTL-1 secretion.Materials and methods: FSTL-1 concentration in rat plasma was assessed by enzyme immunoassay before and after treatment with the antioxidant drug ethyl methyl hydroxypyridine malate. The antioxidant was administered to 15 healthy male Wistar rats subcutaneously 3 times a day at a dose of 6 mg/day for 14 days. A fasting blood sample was obtained on the first day before administration of the drug and on day 15.Results: after the period of treatment with ethyl methyl hydroxypyridine malate the concentration of FSTL-1 in the plasma of the laboratory rats increased significantly (p = 0.0011) to reach 0.92 ± 0.11 ng/mL as compared to the initial concentration of 0.48 ± 0.04 ng/mL.Conclusion: the study provided experimental evidence for new properties of ethyl methyl hydroxypyridine malate, i.e. induction of FSTL-1 in healthy rats. Further studies are encouraged to assess potential use of this drug as an inductor of FSTL-1 in myocardial ischemia.Приведены современные данные о некоторых белках семейства TGF-p, потенциально способных оказывать протективное действие при патологиях сердца, легких, плаценты, половых желез и поджелудочной железы. Были изучены противовоспалительные свойства одного из представителей данного семейства белков — фоллистатин-подобного белка-1 (FSTL-1) на клеточном уровне. Установлено, что FSTL-1 отвечает за регенерацию сердечной мышцы у млекопитающих за счет активации ангиогенных факторов. Несмотря на ведущую роль данного белка в регенерации миокарда, его концентрация в эпикарде сразу после инфаркта уменьшается, что не позволяет сердцу эффективно са-мовосстанавливаться. Приведены данные исследований об эффективности внутривенного введения FSTL-1 у крыс с инфарктом миокарда. Однако поскольку введение чужеродного белка может вызывать аллергические реакции, более рациональным решением стал выбор лекарственного средства, индуцирующего секрецию FSTL-1.Цель работы: экспериментальное обоснование возможности применения экзогенной регуляции секреции фоллистатин-подобного белка-1.Материалы и методы: исследования концентрации FSTL-1 в плазме крыс проводили методом иммуноферментного анализа до и после курса применения антиоксидантного лекарственного средства этилметилгидроксипири-дина малата. Антиоксидант вводили 15 здоровым самцам крыс линии Wistar подкожно 3 раза в сутки в дозе 6 мг/сут, курсом 14 сут. Кровь отбирали из вены натощак в первые сутки до введения препарата и на 15 сут.Результаты: после курса введения этилметилгидроксипиридин малата концентрация FSTL-1 в плазме крови крыс достоверно (р = 0,0011) увеличивалась у экспериментальных животных и составила 0,92 ± 0,11 нг/мл относительно исходного значения 0,48 ± 0,04 нг/мл.Заключение: экспериментально подтверждены новые свойства этилметилгидроксипиридина малата — индукция фоллистатин-подобного белка-1 у здоровых крыс. Предлагается рассмотреть потенциальную возможность применения данного лекарственного средства как индуктора FSTL-1 при ишемии миокарда

    Dual-Mode NIZKs from Obfuscation

    Get PDF
    Two standard security properties of a non-interactive zero-knowledge (NIZK) scheme are soundness and zero-knowledge. But while standard NIZK systems can only provide one of those properties against unbounded adversaries, dual-mode NIZK systems allow to choose dynamically and adaptively which of these properties holds unconditionally. The only known dual-mode NIZK systems are Groth-Sahai proofs (which have proved extremely useful in a variety of applications), and the FHE-based NIZK constructions of Canetti et al. and Peikert et al, which are concurrent and independent to this work. However, all these constructions rely on specific algebraic settings. Here, we provide a generic construction of dual-mode NIZK systems for all of NP. The public parameters of our scheme can be set up in one of two indistinguishable ways. One way provides unconditional soundness, while the other provides unconditional zero-knowledge. Our scheme relies on subexponentially secure indistinguishability obfuscation and subexponentially secure one-way functions, but otherwise only on comparatively mild and generic computational assumptions. These generic assumptions can be instantiated under any one of the DDH, k-LIN, DCR, or QR assumptions. As an application, we reduce the required assumptions necessary for several recent obfuscation-based constructions of multilinear maps. Combined with previous work, our scheme can be used to construct multilinear maps from obfuscation and a group in which the strong Diffie-Hellman assumption holds. We also believe that our work adds to the understanding of the construction of NIZK systems, as it provides a conceptually new way to achieve dual-mode properties

    Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model

    Get PDF
    The Schnorr blind signing protocol allows blind issuing of Schnorr signatures, one of the most widely used signatures. Despite its practical relevance, its security analysis is unsatisfactory. The only known security proof is rather informal and in the combination of the generic group model (GGM) and the random oracle model (ROM) assuming that the ``ROS problem\u27\u27 is hard. The situation is similar for (Schnorr-)signed ElGamal encryption, a simple CCA2-secure variant of ElGamal. We analyze the security of these schemes in the algebraic group model (AGM), an idealized model closer to the standard model than the GGM. We first prove tight security of Schnorr signatures from the discrete logarithm assumption (DL) in the AGM+ROM. We then give a rigorous proof for blind Schnorr signatures in the AGM+ROM assuming hardness of the one-more discrete logarithm problem and ROS. As ROS can be solved in sub-exponential time using Wagner\u27s algorithm, we propose a simple modification of the signing protocol, which leaves the signatures unchanged. It is therefore compatible with systems that already use Schnorr signatures, such as blockchain protocols. We show that the security of our modified scheme relies on the hardness of a problem related to ROS that appears much harder. Finally, we give tight reductions, again in the AGM+ROM, of the CCA2 security of signed ElGamal encryption to DDH and signed hashed ElGamal key encapsulation to DL

    Oblivious Pseudorandom Functions from Isogenies

    Get PDF
    An oblivious PRF, or OPRF, is a protocol between a client and a server, where the server has a key kk for a secure pseudorandom function FF, and the client has an input xx for the function. At the end of the protocol the client learns F(k,x)F(k,x), and nothing else, and the server learns nothing. An OPRF is verifiable if the client is convinced that the server has evaluated the PRF correctly with respect to a prior commitment to kk. OPRFs and verifiable OPRFs have numerous applications, such as private-set-intersection protocols, password-based key-exchange protocols, and defense against denial-of-service attacks. Existing OPRF constructions use RSA-, Diffie-Hellman-, and lattice-type assumptions. The first two are not post-quantum secure. In this paper we construct OPRFs and verifiable OPRFs from isogenies. Our main construction uses isogenies of supersingular elliptic curves over Fp2\mathbb{F}_{p^{2}} and tries to adapt the Diffie-Hellman OPRF to that setting. However, a recent attack on supersingular-isogeny systems due to Galbraith et al. [ASIACRYPT 2016] makes this approach difficult to secure. To overcome this attack, and to validate the server\u27s response, we develop two new zero-knowledge protocols that convince each party that its peer has sent valid messages. With these protocols in place, we obtain an OPRF in the SIDH setting and prove its security in the UC framework. Our second construction is an adaptation of the Naor-Reingold PRF to commutative group actions. Combining it with recent constructions of oblivious transfer from isogenies, we obtain an OPRF in the CSIDH setting
    corecore