76 research outputs found

    Exponential homogenization of linear second order elliptic PDEs with periodic coefficients

    Get PDF
    A problem of homogenization of a divergence-type second order uniformly elliptic operator is considered with arbitrary bounded rapidly oscillating periodic coefficients, either with periodic "outer" boundary conditions or in the whole space. It is proved that if the right-hand side is Gevrey regular (in particular, analytic), then by optimally truncating the full two-scale asymptotic expansion for the solution one obtains an approximation with an exponentially small error. The optimality of the exponential error bound is established for a one-dimensional example by proving the analogous lower bound

    Security bound for CTR-ACPKM internally re-keyed encryption mode

    Get PDF
    In 2018 the CTR-ACPKM internally re-keyed block cipher mode was adopted in Russian Standardization System and must pass through the last formal standardization stages in IETF. The main distinctive feature of this mode is that during each message processing, the key, used for data blocks transformation, is periodically changed. In the current paper we obtained the security bound for this mode in the standard IND-CPNA security model

    Reconstructing initial data using observers: error analysis of the semi-discrete and fully discrete approximations

    Get PDF
    A new iterative algorithm for solving initial data inverse problems from partial observations has been recently proposed in Ramdani et al. (Automatica 46(10), 1616-1625, 2010 ). Based on the concept of observers (also called Luenberger observers), this algorithm covers a large class of abstract evolution PDE's. In this paper, we are concerned with the convergence analysis of this algorithm. More precisely, we provide a complete numerical analysis for semi-discrete (in space) and fully discrete approximations derived using finite elements in space and an implicit Euler method in time. The analysis is carried out for abstract Schrödinger and wave conservative systems with bounded observation (locally distributed)

    Transposase-DNA complex structures reveal mechanisms for conjugative transposition of antibiotic resistance

    Get PDF
    Conjugative transposition drives the emergence of multidrug resistance in diverse bacterial pathogens, yet the mechanisms are poorly characterized. The Tn1549 conjugative transposon propagates resistance to the antibiotic vancomycin used for severe drug-resistant infections. Here, we present four high-resolution structures of the conserved Y-transposase of Tn1549 complexed with circular transposon DNA intermediates. The structures reveal individual transposition steps and explain how specific DNA distortion and cleavage mechanisms enable DNA strand exchange with an absolute minimum homology requirement. This appears to uniquely allow Tn916-like conjugative transposons to bypass DNA homology and insert into diverse genomic sites, expanding gene transfer. We further uncover a structural regulatory mechanism that prevents premature cleavage of the transposon DNA before a suitable target DNA is found and generate a peptide antagonist that interferes with the transposase-DNA structure to block transposition. Our results reveal mechanistic principles of conjugative transposition that could help control the spread of antibiotic resistance genes

    On the Security of One Password Authenticated Key Exchange Protocol

    Get PDF
    In this paper the Security Evaluated Standardized Password Authenticated Key Exchange (SESPAKE) protocol is proposed (this protocol is approved in the standardization system of the Russian Federation) and its cryptographic properties are analyzed. The SESPAKE protocol includes a key agreement step and a key authentication step. We define new indistinguishability-based adversary model with a threat of false authentication that is an extension of the original indistinguishability-based model up to the case of protocols with authentication step without key diversification. We prove the protocol security under two types of threats: a classic threat of distinguishing a generated session key from a random string and a threat of false authentication. This protocol is the first password authenticated key exchange protocol (PAKE) protocol without key diversification for a full version of which a security proof has been obtained. The paper also contains a brief review of the known results dedicated to analysis of cryptographic properties of PAKE protocols

    On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing

    Get PDF
    This paper presents a security bound in the standard security model for the Magma cipher CTR encryption mode and the «CryptoPro Key Meshing» (CPKM) re-keying method that was previously used with the GOST 28147-89 cipher. We enumerate the main requirements that should be followed during the development of re-keying methods, then we propose a modified method and justify its advantages over CPKM. We also obtain certain results about the operational features of the Kuznyechik cipher CTR encryption mode with several re-keying methods

    Recovering the observable part of the initial data of an infinite-dimensional linear system with skew-adjoint generator

    Get PDF
    We consider the problem of recovering the initial data (or initial state) of infinite-dimensional linear systems with unitary semigroups. It is well-known that this inverse problem is well posed if the system is exactly observable, but this assumption may be very restrictive in some applications. In this paper we are interested in systems which are not exactly observable, and in particular, where we cannot expect a full reconstruction. We propose to use the algorithm studied by Ramdani et al. in (Automatica 46:1616–1625, 2010) and prove that it always converges towards the observable part of the initial state. We give necessary and sufficient condition to have an exponential rate of convergence. Numerical simulations are presented to illustratethe theoretical results

    SULFURIC ACID EXTRACTION FROM A DILUTED ACIDIC SULFATE EFFLUENT

    Full text link
    The paper is devoted to study recovery of sulfuric acid form diluted acidic effluents using liquid extraction. Among the extractants studied, the extraction system containing triisooctyl amine, 1-octanol and ditolilphosphinic acids was found to be the most suitable for sulfuric acid revovery.Работа выполнена при финансовой поддержке Минобрнауки России, соглашение о предоставлении субсидии от 26.09.2017 г. № 14.575.21.0137 (уникальный идентификатор соглашения RFMEFI57517X0137), в рамках ФЦП “Исследования и разработки по приоритетным направлениям развития научно-технологического комплекса России на 2014–2020 годы”

    RECOVERY OF SCANDIUM FROM PROCESSING OF OXIDIZED NICKEL ORES WASTES

    Full text link
    One of the possible sources of scandium production – wastes (slags) from processing of oxidized nickel ores, has been considered in present research work. The hydrometallurgical method has been selected as the primary for scandium extraction. Different reagents for leaching of scandium, such as sulfuric acid, various carbonate salts and fluorides, have been examined. Sulfuric acid has been recognized as an optimal leaching reagent. Sulfuric acid concentration at 100 g/l allowed to extract scandium at 97%

    A new class of glycomimetic drugs to prevent free fatty acid-induced endothelial dysfunction

    Get PDF
    Background: Carbohydrates play a major role in cell signaling in many biological processes. We have developed a set of glycomimetic drugs that mimic the structure of carbohydrates and represent a novel source of therapeutics for endothelial dysfunction, a key initiating factor in cardiovascular complications. Purpose: Our objective was to determine the protective effects of small molecule glycomimetics against free fatty acid­induced endothelial dysfunction, focusing on nitric oxide (NO) and oxidative stress pathways. Methods: Four glycomimetics were synthesized by the stepwise transformation of 2,5­dihydroxybenzoic acid to a range of 2,5­substituted benzoic acid derivatives, incorporating the key sulfate groups to mimic the interactions of heparan sulfate. Endothelial function was assessed using acetylcholine­induced, endotheliumdependent relaxation in mouse thoracic aortic rings using wire myography. Human umbilical vein endothelial cell (HUVEC) behavior was evaluated in the presence or absence of the free fatty acid, palmitate, with or without glycomimetics (1µM). DAF­2 and H2DCF­DA assays were used to determine nitric oxide (NO) and reactive oxygen species (ROS) production, respectively. Lipid peroxidation colorimetric and antioxidant enzyme activity assays were also carried out. RT­PCR and western blotting were utilized to measure Akt, eNOS, Nrf­2, NQO­1 and HO­1 expression. Results: Ex vivo endothelium­dependent relaxation was significantly improved by the glycomimetics under palmitate­induced oxidative stress. In vitro studies showed that the glycomimetics protected HUVECs against the palmitate­induced oxidative stress and enhanced NO production. We demonstrate that the protective effects of pre­incubation with glycomimetics occurred via upregulation of Akt/eNOS signaling, activation of the Nrf2/ARE pathway, and suppression of ROS­induced lipid peroxidation. Conclusion: We have developed a novel set of small molecule glycomimetics that protect against free fatty acidinduced endothelial dysfunction and thus, represent a new category of therapeutic drugs to target endothelial damage, the first line of defense against cardiovascular disease
    corecore