55 research outputs found

    Personnel Support of Prosecutor’s Office of Simbirsk (Ulyanovsk) Province in 1922—1928

    Get PDF
    The article deals with the staffing of the prosecutor’s office in the Simbirsk (Ulyanovsk) province in 1922—1928. The relevance of the study is due to the fact that, from an objective point of view, for the first time on the basis of the introduction into scientific circulation of previously inaccessible due to their secrecy archival materials, seized from the depositories of the State Archive of the Ulyanovsk Region and the State Archive of Recent History of the Ulyanovsk Region, the prosecutor’s office personnel work of the authorities was comprehensively analyzed in the regional context in the Simbirsk (Ulyanovsk) province during the period of the new economic policy. The authors studied the specifics of the selection and placement of personnel specialists in accordance with the approved criteria in the prosecutor’s office, traced changes in the regular staff, determined the level of material support for prosecutors, and also noted positive and negative factors in the implemented personnel policy. In the course of the work, it was found that the ongoing personnel policy made it possible to form such a model of the prosecutor’s office, during the functioning of which the Bolsheviks could control the activities of government bodies, law enforcement agencies, economic institutions, public and private organizations, feel safe, and also regularly influence society

    Phase transitions for PP-adic Potts model on the Cayley tree of order three

    Full text link
    In the present paper, we study a phase transition problem for the qq-state pp-adic Potts model over the Cayley tree of order three. We consider a more general notion of pp-adic Gibbs measure which depends on parameter \rho\in\bq_p. Such a measure is called {\it generalized pp-adic quasi Gibbs measure}. When ρ\rho equals to pp-adic exponent, then it coincides with the pp-adic Gibbs measure. When ρ=p\rho=p, then it coincides with pp-adic quasi Gibbs measure. Therefore, we investigate two regimes with respect to the value of ρp|\rho|_p. Namely, in the first regime, one takes ρ=expp(J)\rho=\exp_p(J) for some J\in\bq_p, in the second one ρp<1|\rho|_p<1. In each regime, we first find conditions for the existence of generalized pp-adic quasi Gibbs measures. Furthermore, in the first regime, we establish the existence of the phase transition under some conditions. In the second regime, when ˚p,qpp2|\r|_p,|q|_p\leq p^{-2} we prove the existence of a quasi phase transition. It turns out that if ˚p<q1p2<1|\r|_p<|q-1|_p^2<1 and \sqrt{-3}\in\bq_p, then one finds the existence of the strong phase transition.Comment: 27 page

    Counterrevolutionary Crimes in Judicial Practice of Simbirsk Governorate Revolutionary Tribunal in 1918-1920

    Get PDF
    The article is devoted to the analysis of counterrevolutionary crimes in 1918-1920 on the basis of the cases accepted for consideration by Simbirsk Governorate Revolutionary Tribunal. The authors introduce previously unavailable archival documents into scientific circulation. Details are given to such aspects of the topic as the jurisprudence of the emergency justice system in the fight against the counter-revolution, as well as the necessary conditions for the final verdict against the accused. The analysis of the verdicts issued by the emergency justice body is carried out. Attention is paid to examples of acts committed by citizens in 1918-1920 and recognized as counterrevolutionary. Statistical data on the activity of the emergency justice body of Simbirsk governorate are given. The novelty of the research is seen in the fact that for the first time a large layer of previously classified unpublished archival documents was introduced into scientific circulation. The main conclusions of the study are the following key provisions: firstly, Simbirsk Governorate Revolutionary Tribunal was an effective tool of the Bolshevik regime, and secondly, the emergency justice body in 1918-1920 paid close attention to the investigation of counter-revolutionary cases, which amounted to about 29 %, and thirdly, in sentencing Tribunal staff were guided by the class principle

    Reconstructive surgery for oral cavity cancer

    Get PDF
    Treatment of patients with advanced oral cavity cancer remains challenging

    Analysis of the IBM CCA Security API Protocols in Maude-NPA

    Full text link
    Standards for cryptographic protocols have long been attractive candidates for formal verification. It is important that such standards be correct, and cryptographic protocols are tricky to design and subject to non-intuitive attacks even when the underlying cryptosystems are secure. Thus a number of general-purpose cryptographic protocol analysis tools have been developed and applied to protocol standards. However, there is one class of standards, security application programming interfaces (security APIs), to which few of these tools have been applied. Instead, most work has concentrated on developing special-purpose tools and algorithms for specific classes of security APIs. However, there can be much advantage gained from having general-purpose tools that could be applied to a wide class of problems, including security APIs. One particular class of APIs that has proven difficult to analyze using general-purpose tools is that involving exclusive-or. In this paper we analyze the IBM 4758 Common Cryptographic Architecture (CCA) protocol using an advanced automated protocol verification tool with full exclusive-or capabilities, the Maude-NPA tool. This is the first time that API protocols have been satisfactorily specified and analyzed in the Maude-NPA, and the first time XOR-based APIs have been specified and analyzed using a general-purpose unbounded session cryptographic protocol verification tool that provides direct support for AC theories. We describe our results and indicate what further research needs to be done to make such protocol analysis generally effective.Antonio González-Burgueño, Sonia Santiago and Santiago Escobar have been partially supported by the EU (FEDER) and the Spanish MINECO under grants TIN 2010-21062-C02-02 and TIN 2013-45732-C4-1-P, and by Generalitat Valenciana PROMETEO2011/052. José Meseguer has been partially supported by NSF Grant CNS 13-10109.González Burgueño, A.; Santiago Pinazo, S.; Escobar Román, S.; Meadows, C.; Meseguer, J. (2014). Analysis of the IBM CCA Security API Protocols in Maude-NPA. En Security Standardisation Research. Springer International Publishing. 111-130. https://doi.org/10.1007/978-3-319-14054-4_8S111130Abadi, M., Blanchet, B., Fournet, C.: Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur. 10(3) (2007)Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: 14th IEEE Computer Security Foundations Workshop (CSFW 2014), Cape Breton, Nova Scotia, Canada, June 2001, pp. 82–96. IEEE Computer Society (2014)Bond, M.: Attacks on cryptoprocessor transaction sets. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 220–234. Springer, Heidelberg (2001)Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A.: A formal analysis of some properties of kerberos 5 using msr. In: CSFW, pp. 175–1790. IEEE Computer Society (2002)Cachin, C., Chandran, N.: A secure cryptographic token interface. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, pp. 141–153 (2009)Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: 18th Annual IEEE Symposium on Logic in Computer Science, LICS 2003 (2003)Comon-Lundh, H., Shmatikov, V.: Intruder deductions, constraint solving and insecurity decision in presence of exclusive-or. In: 18th Annual IEEE Symposium on Logic in Computer Science (LICS 2003), pp. 271–280 (2003)Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 148–164. Springer, Heidelberg (2003)Cortier, V., Keighren, G., Steel, G.: Automatic analysis of the aecurity of XOR-based key management schemes. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol. 4424, pp. 538–552. Springer, Heidelberg (2007)Cortier, V., Steel, G.: A generic security API for symmetric key management on cryptographic devices. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 605–620. Springer, Heidelberg (2009)Erbatur, S., et al.: Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 73–90. Springer, Heidelberg (2012)Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009. LNCS, vol. 5705, pp. 1–50. Springer, Heidelberg (2007)Escobar, S., Meadows, C., Meseguer, J., Santiago, S.: Sequential Protocol Composition in Maude-NPA. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 303–318. Springer, Heidelberg (2010)Thayer Fabrega, F.J., Herzog, J., Guttman, J.: Strand Spaces: What Makes a Security Protocol Correct? Journal of Computer Security 7, 191–230 (1999)González-Burgueño, A.: Protocol Analysis Modulo Exclusive-Or Theories: A Case study in Maude-NPA. Master’s thesis, Universitat Politècnica de València (March 2014), https://angonbur.webs.upv.es/Previous_work/Master_Thesis.pdfIBM. Comment on Mike’s Bond paper A Chosen Key Difference Attack on Control Vectors (2001), http://www.cl.cam.ac.uk/~mkb23/research/CVDif-Response.pdfIBM. CCA basic services reference and guide: CCA basic services reference and guide for the IBM 4758 PCI and IBM 4764 (2001), http://www-03.ibm.com/security/cryptocards/pdfs/bs327.pdf.2008Keighren, G.: Model Checking IBM’s Common Cryptographic Architecture API. Technical Report 862, University of Edinburgh (October 2006)Kemmerer, R.A.: Using formal verification techniques to analyze encryption protocols. In: IEEE Symposium on Security and Privacy, pp. 134–139. IEEE Computer Society (1987)Küsters, R., Truderung, T.: Reducing protocol analysis with xor to the xor-free case in the horn theory based approach. J. Autom. Reasoning 46(3-4), 325–352 (2011)Linn, J.: Generic security service application program interface version 2, update 1. IETF RFC 2743 (2000), https://datatracker.ietf.org/doc/rfc2743Longley, D., Rigby, S.: An automatic search for security flaws in key management schemes. Computers & Security 11(1), 75–89 (1992)Meadows, C.: Applying formal methods to the analysis of a key management protocol. Journal of Computer Security 1(1) (1992)Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming 26(2), 113–131 (1996)Meadows, C., Cervesato, I., Syverson, P.: Specification and Analysis of the Group Domain of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. Journal of Computer Security 12(6), 893–932 (2004)Meadows, C.: Analysis of the internet key exchange protocol using the nrl protocol analyzer. In: IEEE Symposium on Security and Privacy, pp. 216–231. IEEE Computer Society (1999)Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic snalysis of security protocols. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 696–701. Springer, Heidelberg (2013)Mukhamedov, A., Gordon, A.D., Ryan, M.: Towards a verified reference implementation of a trusted platform module. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds.) Security Protocols 2009. LNCS, vol. 7028, pp. 69–81. Springer, Heidelberg (2013)National Institute of Standards and Technology. FIPS PUB 46-3: Data Encryption Standard (DES), supersedes FIPS 46-2 (October 1999)Nieuwenhuis, R. (ed.): CADE 2005. LNCS (LNAI), vol. 3632. Springer, Heidelberg (2005)Steel, G.: Deduction with xor constraints in security api modelling. In: Nieuwenhuis (ed.) [30], pp. 322–336Verma, K.N., Seidl, H., Schwentick, T.: On the complexity of equational horn clauses. In: Nieuwenhuis (ed.) [30], pp. 337–35

    Properties of powdered metal-ceramic materials obtained from by-products of the mining and metallurgical industry of Uzbekistan

    Get PDF
    One of the actual problems of production is the use of various waste products, in particular metallurgical. The method of powder metallurgy allows the use of waste from metallurgical industries. This is used in this work to obtain an antifriction porous material based on iron and copper. Iron and copper powders obtained at the Almalyk Mining and Metallurgical Combine by restoring iron and copper scale of metallurgical plants are used. Pyrite, a waste product of the Almalyk Mining and Metallurgical Combine, is used as an additive material. Tests have shown the possibility of manufacturing metal-ceramic iron and copper-containing antifriction alloys with pyrite additive based on local raw materials

    Weighted ergodic theorems for Banach-Kantorovich lattice Lp(^,μ^)L_{p}(\hat{\nabla},\hat{\mu})

    Full text link
    In the present paper we prove weighted ergodic theorems and multiparameter weighted ergodic theorems for positive contractions acting on Lp(^,μ^)L_p(\hat{\nabla},\hat{\mu}). Our main tool is the use of methods of measurable bundles of Banach-Kantorovich lattices.Comment: 11 page

    Efficiency of radiotherapy during local hyperthermia in the treatment of laryngeal and laryngopharyngeal cancer

    Get PDF
    Cancer of the larynx and laryngopharynx, which is accessible to visual and instrumental examination, remains the most relevant and complicated problem among head and neck malignances as before. Investigations show that the incidence of cancer at these sites in Russia in the last decade has risen from 4.5 to 9.67 %. This is a severe and poor prognostic form of cancer, which is characterized by its nonspecific early clinical manifestations, complex anatomic and topographic structure, and a high rate of regional metastases. The mainstay of treatment for head and neck cancer involves 3 components: surgery, chemotherapy, and radiotherapy (RT), which are performed alone or in combination. The most commonly used technique is combined, frequently crippling due to organ-removing operations. The clinical introduction of current radio modifiers, local and deep hyperthermia systems, is a promising approach to improving the results of treatment, to enhancing the radiation damage of RT, and to achieving the tumor regression sufficient for surgical intervention without augmenting the early and late toxicity inherent in chemoradiation treatment. The results of the performed study of 35 patients with T2–3N0–2M0 laryngeal and laryngopharyngeal cancer proved the high efficiency of local hyperthermia in treating malignancies in this region during both preoperative (grades III– IV therapeutic pathomorphism) and radical beam RT
    corecore