153 research outputs found

    Characterizations of alveolar repair after mandibular second molar extraction: an experimental study in rats

    Get PDF
    Characterizations of rat mandibular second molar extraction socket with significantly different buccal and lingual alveolar ridge width remain unclear. Objective: To observe alterations in the alveolar ridge after extraction of mandibular second molars, and to examine processes of alveolar socket healing in an experimental model of alveolar ridge absorption and preservation. Methodology: Eighteen Wistar rats were included and divided into six groups regarding healing time in the study. Bilateral mandibular second molars were extracted. The rats with tooth extraction sockets took 0, 1.5, 2, 3, 4 and 8 weeks of healing. Histological observation, tartrate-resistant acidic phosphatase (TRAP) staining, Masson’s trichrome staining, immunohistochemical staining and micro-computed tomography (micro-CT) were applied to estimate alterations in the alveolar ridge. Results: Different buccal and lingual alveolar ridge width led to different height loss. Lingual wall height (LH) decreased significantly two weeks after tooth extraction. Buccal wall height rarely reduced its higher ridge width. From two to eight weeks after extraction, bone volume (BV/TV), density (BMD), and trabecular thickness (Tb.Th) progressively increased in the alveolar socket, which gradually decreased in Tb.Sp and Tb.N. LH showed no significant change during the same period. Osteogenic marker OCN and OPN increased during bone repair from two to eight weeks. The reduced height of the lingual wall of the tooth extraction socket was rarely repaired in the later repair stage. Osteoclast activity led to absorption of the alveolar ridge of the alveolar bone wall within two weeks after operation. We observed positive expression of EMMPRIN and MMP-9 in osteoclasts that participated in the absorption of the spire region. Conclusion: Extraction of rat mandibular second molars may help the study of alveolar ridge absorption and preservation. The EMMPRIN-MMP-9 pathway may be a candidate for further study on attenuating bone resorption after tooth extraction

    Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)

    Get PDF
    In this paper, we present improved preimage attacks on the reduced-round \texttt{GOST} hash function family, which serves as the new Russian hash standard, with the aid of techniques such as the rebound attack, the Meet-in-the-Middle preimage attack and the multicollisions. Firstly, the preimage attack on 5-round \texttt{GOST-256} is proposed which is the first preimage attack for \texttt{GOST-256} at the hash function level. Then we extend the (previous) attacks on 5-round \texttt{GOST-256} and 6-round \texttt{GOST-512} to 6.5 and 7.5 rounds respectively by exploiting the involution property of the \texttt{GOST} transposition operation. Secondly, inspired by the preimage attack on \texttt{GOST-256}, we also study the impacts of four representative truncation patterns on the resistance of the Meet-in-the-Middle preimage attack against \texttt{AES}-like compression functions, and propose two stronger truncation patterns which make it more difficult to launch this type of attack. Based on our investigations, we are able to slightly improve the previous pseudo preimage attacks on reduced-round \texttt{Grøstl-256}

    Cryptanalysis of Reduced-Round Whirlwind (Full Version)

    Get PDF
    The \texttt{Whirlwind} hash function, which outputs a 512-bit digest, was designed by Barreto et al.et\ al. and published by \textit{Design, Codes and Cryptography} in 2010. In this paper, we provide a thorough cryptanalysis on \texttt{Whirlwind}. Firstly, we focus on security properties at the hash function level by presenting (second) preimage, collision and distinguishing attacks on reduced-round \texttt{Whirlwind}. In order to launch the preimage attack, we have to slightly tweak the original Meet-in-the-Middle preimage attack framework on \texttt{AES}-like compression functions by partially fixing the values of the state. Based on this slightly tweaked framework, we are able to construct several new and interesting preimage attacks on reduced-round \texttt{Whirlpool} and \texttt{AES} hashing modes as well. Secondly, we investigate security properties of the reduced-round components of \texttt{Whirlwind}, including semi-free-start and free-start (near) collision attacks on the compression function, and a limited-birthday distinguisher on the inner permutation. As far as we know, our results are currently the best cryptanalysis on \texttt{Whirlwind}

    Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)

    Get PDF
    The GOST hash function family has served as the new Russian national hash standard (GOST R 34.11-2012) since January 1, 2013, and it has two members, i.e.i.e., GOST-256 and GOST-512 which correspond to two different output lengths. Most of the previous analyses of GOST emphasize on the compression function rather than the hash function. In this paper, we focus on security properties of GOST under the hash function setting. First we give two improved preimage attacks on 6-round GOST-512 compared with the previous preimage attack, i.e.i.e., a time-reduced attack with the same memory requirements and a memoryless attack with almost identical time. Then we improve the best collision attack on reduced GOST-256 (resp. GOST-512) from 5 rounds to 6.5 (resp. 7.5) rounds. Finally, we construct a limited-birthday distinguisher on 9.5-round GOST using the limited-birthday distinguisher on hash functions proposed at ASIACRYPT 2013. An essential technique used in our distinguisher is the carefully chosen differential trail, which can further exploit freedom degrees in the inbound phase when launching rebound attacks on the GOST compression function. This technique helps us to reduce the time complexity of the distinguisher significantly. We apply this strategy to Whirlpool, an ISO standardized hash function, as well. As a result, we construct a limited-birthday distinguisher on 9-round Whirlpool out of 10 rounds, and reduce the time complexity of the previous 7-round distinguisher. To the best of our knowledge, all of our results are the best cryptanalytic results on GOST and Whirlpool in terms of the number of rounds analyzed under the hash function setting

    TIPE2 regulates periodontal inflammation by inhibiting NF-κB p65 phosphorylation

    Get PDF
    The roles and molecular mechanisms of tumor necrosis factor-α-induced protein 8-like 2 (TIPE2) in periodontitis remain largely unknown. Objective: This study aimed to determine the expression of TIPE2 and NF-κB p65 in rat Porphyromonas gingivalis-induced periodontics in vivo. Methodology: Periodontal inflammation and alveolar bone resorption were analyzed using western blotting, micro-computed tomography, TRAP staining, immunohistochemistry, and immunofluorescence. THP-1 monocytes were stimulated using 1 μg/ml Pg. lipopolysaccharide (Pg.LPS) to determine the expression of TIPE2 in vitro. TIPE2 mRNA was suppressed by siRNA transfection, and the transfection efficiency was proven using western blotting and real-time PCR. The NF-κB pathway was activated by treating the cells with 1 μg/ml Pg.LPS to explore related mechanisms. Results: The expression of both TIPE2 and NF-κB p65 was increased in the gingival tissues of rat periodontitis compared with normal tissues. Positive expression of TIPE2 was distributed in inflammatory infiltrating cells and osteoclasts in the marginal lacunae of the alveolar bone. However, strong positive expression of TIPE2 in THP-1 was downregulated after Pg.LPS stimulation. TIPE2 levels negatively correlated with TNF-α and IL-1β. Decreased TIPE2 in THP-1 further promoted NF-κB p65 phosphorylation. Mechanistically, TIPE2 knockdown upregulated NF-κB signaling pathway activity. Conclusions: Taken together, these findings demonstrate that TIPE2 knockdown aggravates periodontal inflammatory infiltration via NF-κB pathway. Interventions aimed at increasing TIPE2 may help in the therapeutic applications for periodontitis

    Multilayer electronic component systems and methods of manufacture

    Get PDF
    Multilayer electronic component systems and methods of manufacture are provided. In this regard, an exemplary system comprises a first layer of liquid crystal polymer (LCP), first electronic components supported by the first layer, and a second layer of LCP. The first layer is attached to the second layer by thermal bonds. Additionally, at least a portion of the first electronic components are located between the first layer and the second layer

    关于中澳自由贸易协议潜在优势的分析模型——一份为中澳自由贸易协议可行性研究作准备的独立报告

    Get PDF
    1.2002年,为了促进双边贸易和投资,中国和澳大利亚建立了一个经济贸易框架。在这个框架下,一项关于未来中澳自由贸易协定(FTA)的联合可行性研究已经出炉。2.受澳大利亚外交贸易部委任,莫纳什大学的政策研究中心对关于中澳自由贸易协定所带来的潜在利益进行模型分析,并与来自中国社科院和南开大学的专家共同着手这项研究。3.在这项研究中,我们从三个方面对自由贸易协定进行模拟:消除商品贸易中的边境保护主义、投资自由化以及消除服务贸易壁垒。分析框架为一个多国家、多部门的可计算的一般均衡模型,即"莫纳什的多国家模型"。在我们的模拟中,假设基于自由贸易协定下的政策调整是于2006年开始贯彻落实的。4.在模拟FTA下政策调整所带来的冲击方面,我们首先模拟了一个常规发展模式(或称"基准模式"),基准模式描述了在中澳没有签订FTA情况下中国和澳大利亚经济的发展进程。与基准假设相比,其改变程度将被视为FTA下政策调整所带来的效应。5.从模型中,我们可以得出这样的结论:FTA使得中澳两国的产出增加并使得福利提高。据估计,FTA将提高中澳两国2006年至2015年期间的实际国内生产总值(GDP)和实际国民生产总值(GNP)的现值(见42页图表7.1),数值如下:澳大利亚实际GDP:180亿美元中国实际GDP:640亿美元澳大利亚实际GNP:220亿美元中国实际GNP:520亿美元6.从2005年至2015年期间的年均增长率方面来讲,FTA估计将使澳大利亚的实际GDP年均增长0.039个百分点,使中国的实际GDP年均增长0.042个百分点。7.两国实际GDP的增长主要归功于不断增加的资本、不断提高的生产率水平和得到优化利用的资源。澳大利亚实际GDP增长的一个潜在的重要因素就是贸易条件的改善。8.通过不断增长的双边贸易和投资,FTA强化了中澳双方的经济合作伙伴关系;就整体而言,它也在世界范围内创造了贸易:由于中澳FTA的签订,世界进口量相较于基线水平也相应增长。9.为了更好地利用资源,两国实现了各部门之间的劳动力调整,这主要是为了消除商品贸易边境保护主义。然而,由于两国之间的互补性,部门间的这种劳动力再分配还是更倾向于促进两国间已发生的自然调整进程。而且,与中澳两国在还没有自由贸易协定时的全球化中已发生的合作相比,这种调整只能属于小规模范畴的调整。10.澳大利亚从自由贸易协定获利最大的产业有谷物、羊毛织品、绒线、矿物和有色金属。中国获利最大的产业则是制造业,特别是纺织品、服装和其它杂项制成品(如玩具和体育用品等);而两国的服务部门则都能从FTA中获益。11.如果2006年至2010年期间,政策调整能够逐步实施,则至2015年FTA所带来的长期效应将和在2006年完全贯彻执行FTA的效果没有区别。然而,越早实施FTA将会使两国更早获益,而相比较而言,如果采取不急不愠的措施,那么其导致实际GDP和实际GNP获益的现值将减少

    关于中澳自由贸易协议潜在优势的分析模型

    Get PDF
    1. 2002年,为了促进双边贸易和投资,中国和澳大利亚建立了一个经济贸易框架。在这个框架下,一项关于未来中澳自由贸易协定(FTA)的联合可行性研究已经出炉。2. 受澳大利亚外交贸易部委任,莫纳什大学的政策研究中心对关于中澳自由贸易协定所带来的潜在利益进行模型分析,并与来自中国社科院和南开大学的专家共同着手这项研究。3. 在这项研究中,我们从三个方面对自由贸易协定进行模拟:消除商品贸易中的边境保护主义、投资自由化以及消除服务贸易壁垒。分析框架为一个多国家、多部门的可计算的一般均衡模型,即“莫纳什的多国家模型”。在我们的模拟中,假设基于自由贸易协定下的政策调整是于2006年开始贯彻落实的。4. 在模拟FTA下政策调整所带来的冲击方面,我们首先模拟了一个常规发展模式(或称“基准模式”),基准模式描述了在中澳没有签订FTA情况下中国和澳大利亚经济的发展进程。与基准假设相比,其改变程度将被视为FTA下政策调整所带来的效应。译者单位:厦门大学经济学院国际经济与贸易系(361005

    A Review of Current Methodologies for Regional Evapotranspiration Estimation from Remotely Sensed Data

    Get PDF
    An overview of the commonly applied evapotranspiration (ET) models using remotely sensed data is given to provide insight into the estimation of ET on a regional scale from satellite data. Generally, these models vary greatly in inputs, main assumptions and accuracy of results, etc. Besides the generally used remotely sensed multi-spectral data from visible to thermal infrared bands, most remotely sensed ET models, from simplified equations models to the more complex physically based two-source energy balance models, must rely to a certain degree on ground-based auxiliary measurements in order to derive the turbulent heat fluxes on a regional scale. We discuss the main inputs, assumptions, theories, advantages and drawbacks of each model. Moreover, approaches to the extrapolation of instantaneous ET to the daily values are also briefly presented. In the final part, both associated problems and future trends regarding these remotely sensed ET models were analyzed to objectively show the limitations and promising aspects of the estimation of regional ET based on remotely sensed data and ground-based measurements
    corecore