Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 4
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

A review of Marek Węcowski’s book Dylemat więźnia. Ostracyzm ateński i jego pierwotne cele (A Prisoner’s Dilemma: Athenian Ostracism and Its Original Purpose).

Go to article

Authors and Affiliations

Paweł Sawiński
Download PDF Download RIS Download Bibtex

Abstract

This paper discusses the influence of the direction of applied deformation on the ability to gelation of thermosensitive chitosan hydrogels. The application of the shear rate equal in value to the classically performed oscillatory measurements leads to significantly different shapes of experimental curves. It was found that the type of mechanically applied deformation has a significant impact on the gelation ability of colloidal chitosan solutions and conditions of sol-gel phase transition. Simple shear leads to a phase transition at a lower temperature or in a shorter time compared to oscillatory tests. Moreover, based on the final values of dynamic viscosity in rotational measurements, it was found that stronger crosslinking of the polymer structure was observed.

Go to article

Authors and Affiliations

Anna Rył
ORCID: ORCID
Piotr Owczarz
ORCID: ORCID
Download PDF Download RIS Download Bibtex

Abstract

Umbilical hernia is one of the most common problems in young calves. This problem occurs in dairy sector as well as in the local farmers. Present study was conducted to compare outcomes of four different techniques of herniorrhaphy. Twenty four young calves (n=24) were divided in 4 groups (A, B, C, and D) which underwent four different surgical techniques. Group A underwent vicryl plus suture material and pants-over-west technique, Group B underwent mesh application with Dexon suture material by using simple interrupted suture pattern, Group C underwent closed method with Nylon No. 3 suture material by using vertical mattress suture pattern and Group D underwent clamp application method with Silk No. 2 suture material by using simple interrupted suture pattern. The result showed that mesh application method was comparatively better with respect to feed intake, body weight gain and healing time. There was no reoccurrence with non-significant hematological changes (p≤0.05). It is concluded that mesh application method is safer than other three techniques and there are no systemic effects of this surgical intervention on calves’ health.
Go to article

Bibliography


Alibhai SM, Duong-Hua M, Sutradhar R, Fleshner NE, Warde P, Cheung AM, Paszat LF (2009) Impact of androgen deprivation therapy on cardiovascular disease and diabetes. J clin Oncol. 27: 3452.
Amaya D, Christoffersen P, Jacobs K, Vasquez A (2015) Does realized skewness predict the cross-section of equity returns? J Fin Eco 118: 135-167.
Anjum NA, Singh N, Singh MK, Sayeed I, Duarte AC, Pereira E, Ahmad I (2014) Single-bilayer graphene oxide sheet impacts and underly-ing potential mechanism assessment in germinating faba bean (Vicia faba L.). Sci Total En 472: 834-841.
Bellavance A, Bonneville-Hébert A, Desrochers A, Fecteau G (2010) Surgical correction of a diaphragmatic hernia in a newborn calf. Canad Vet J 51: 767.
Crane R, Dickinson M, Popescu IC, Scott T(2011) Magnetite and zero-valent iron nanoparticles for the remediation of uranium contaminated environmental water. Water Res 45: 2931-2942.
Doijode V (2019). Umbilical hernia in ruminant calves: A review. Pharma Innovation 8: 164-167.
Ergul Z, Akinci M, Ugurlu C, Kulacoglu H, Yilmaz K (2012) Prophylactic antibiotic use in elective inguinal hernioplasty in a trauma center. Hernia 16: 145-151.
Fazili M, Buchoo B, Bhattacharyya H, Khan I (2013) Uncomplicated (simple) umbilical hernia in crossbred dairy calves: management with or without surgery. Indian J Vet Surg 34: 111-114.
Gonzalez R, Mason E, Duncan T, Wilson R, Ramshaw BJ (2003) Laparoscopic versus open umbilical hernia repair. JSLS 7: 323.
Hermann DM, Kilic E, Kügler S, Isenmann S, Bähr M (2001) Adenovirus-mediated glial cell line-derived neurotrophic factor (GDNF) ex-pression protects against subsequent cortical cold injury in rats. Neurobiol Dis 8: 964-973.
Jaman MM, Mishra P, Rahman M, Alam MM (2018) Clinical and laboratory investigation on the recurrence of the umbilical hernia after herniorrhaphy in bovine calves. J Bangladesh Agri Uni 16: 464-470.
Kool M, Jones DT, Jäger N, Northcott PA, Pugh TJ, Hovestadt V, Piro RM, Esparza LA, Markant SL, Remke M, Milde T (2014) Genome sequencing of SHH medulloblastoma predicts genotype-related response to smoothened inhibition. Cancer Cell 25: 393-405.
Marciniak SJ, Yun CY, Oyadomari S, Novoa I, Zhang Y, Jungreis R, Nagata K, Harding HP, Ron D (2004) CHOP induces death by pro-moting protein synthesis and oxidation in the stressed endoplasmic reticulum. Gene Dev 18(24): 3066-3077.
Muschaweck U (2003) Umbilical and epigastric hernia repair. Surg Clin 83: 1207-1221.
Riley CB, Cruz AM, Bailey JV, Barber SM, Fretz PB (1996) Comparison of herniorrhaphy versus clamping of umbilical hernias in horses: a retrospective study of 93 cases (1982-1994). Canad Vet J 37: 295.
Steenholdt C, Hernandez J (2004) Risk factors for umbilical hernia in Holstein heifers during the first two months after birth. J Am Vet Med Assoc 224: 1487-1490.
Udegbunam JE, Fjelde KK, Evje S, Nygaard G (2015) On the advection-upstream-splitting-method hybrid scheme: a simple transient-flow model for managed-pressure- -drilling and underbalanced-drilling applications. SPE Dril Comp 30: 98-109.
Wilhelm M, Hölzer J, Dobler L, Rauchfuss K, Midasch O, Kraft M, Angerer J, Wiesmüller G (2009) Preliminary observations on perfluori-nated compounds in plasma samples (1977–2004) of young German adults from an area with perfluorooctanoate-contaminated drinking water. Int J Hyg En Health 212: 142-145.
Go to article

Authors and Affiliations

A. Fatima
1
M. Arif Khan
1
S. Aslam
1
K. Ashraf
2
A. Khalid Mahmood
1
M. Asif
1
S. Shah
1
N. Hussain
1

  1. Department of Veterinary Surgery and Pet Sciences, University of Veterinary and Animal Sciences, Out fall road 54000, Lahore-Pakistan
  2. Department of Parasitology, University of Veterinary and Animal Sciences, Out fall road 54000, Lahore-Pakistan
Download PDF Download RIS Download Bibtex

Abstract

The purpose of this paper is to generate cryptographically strong elliptic curves over prime fields Fp, where p is a Mersenne prime, one of the special primes or a random prime. We search for elliptic curves which orders are also prime numbers. The cryptographically strong elliptic curves are those for which the discrete logarithm problem is computationally hard. The required mathematical conditions are formulated in terms of parameters characterizing the elliptic curves.We present an algorithm to generate such curves. Examples of elliptic curves of prime order are generated with Magma.
Go to article

Bibliography

[1] Daniel J. Bernstein and Tanja Lange. SafeCurves: choosing safe curves for elliptic curve cryptography, 2015. http://safecurves.cr.yp.to (accessed 27 September 2015).
[2] I. Blake, G. Serroussi, N. Smart. Elliptic curves in cryptography. Cambridge University Press, 1999.
[3] H. Cohen. A course in computational number theory. Springer 1983.
[4] H. Cohen, G. Frey. Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman and Hall CRC, 1994.
[5] P. Da˛browski, R. Gliwa, J. Szmidt, R. Wicik. Generation and Implementation of Cryptographically Strong Elliptic Curves. Number-Theoretical Methods in Cryptology. First International Conference, NuTMiC 2017. Warsaw, Poland, 11-13, 2017. Lecture Notes in Computer Sciences, (Eds), Jerzy Kaczorowski, Josef Piprzyk, Jacek Pomykała. Volume 10737, pages 25-36. 2017.
[6] W. Diffie, M. E. Hellman. New Directions in Cryptography. IEEE Trans. Information Theory, IT 22(6), pp. 644-654, 1976.
[7] Jean-Pierre Flori, Jerome Plut, Jean-Rene Reinhard. Diversity and transparency for ECC. NIST Workshop on ECC Standards, June 11-12, 2015.
[8] Gerhard Frey, private communication, 2015.
[9] G. Frey, H. Rück. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of Computations, 62 91994), 865-874.
[10] S. D. Galbraith, P. Gaudry. Recent progress on the elliptic curve discrete logarithm problem. Cryptology ePrint Archive, 2015/1022.
[11] Steven D. Galbraith and James McKee. The probability that the number of points on an elliptic curve over a finite field is prime. J. London Math. Soc. (2), 62(3):671–684, 2000.
[12] R. Gliwa, J. Szmidt, R. Wicik Searching for cryptographically secure elliptic curves over prime fields. Science and Military, 2016, nr 1, volume 11, pages 10-13, ISSN 1336-8885 (print), ISSN 2453-7632 (on-line).
[13] R. Granger, M. Scott. Faster ECC over F2521��1. In: Katz, J. ed., PKC 2015. LNCS, vol. 9020, pp. 539–553.[14] D. Johnson, A. Menezes. The Elliptic Curve Digital Signature Algorithm (ECDSA). Technical Report CORR 99-34, University of Waterloo, Canada. http://www.math.uwaterloo.ca
[15] Manfred Lochter and Andreas Wiemers. Twist insecurity, 2015. iacr. ePrint Archive 577 (2015).
[16] A. Menezes, T. Okamoto, S. Vanstone. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE. Transactions on Information Theory, 39 (1993), 1639-1646.
[17] N. Koblitz. Elliptic curve cryptosystems. Math. Comp., 48(177), pp. 203- 209, 1987.
[18] V. S. Miller. Use of elliptic curves in cryptography. In Advances in Cryptology - CRYPTO’85, LNCS vol 218, pp. 417-426, 1985.
[19] P. Pohlig, M. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transaction on Information Theory, 24 (1979), 106-110.
[20] J. Pollard. Monte Carlo methods for index computations mod pn: Mathematics of Computations, 32 (1978), 918-924.
[21] R. L. Rivest, A. Shamir, L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM, 21(2), pp. 120- 126, 1978.
[22] T. Satoh, K. Araki. Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves, Commentarii Mathematici Universitatis Sancti Pauli, 47 (1998), 81-92.
[23] I. Semaev. Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p. Mathematics of Computations, 67 (1998), 353-356.
[24] N. Smart. The discrete logarithm problem on elliptic curves uf trace one. Journal of Cryptology, 12 (1999), 193-196.
[25] J. H. Silverman. The arithmetic of elliptic curves. Springer 1986.
[26] Elliptic Curve Cryptography (ECC) Brainpool Standard. Curves and Curve Generation, v. 1.0. 2005. Request for Comments: 5639, 2010. 7027, 2013. http://www.bsi.bund.de
[27] Technical and Implementation Guidance on Generation and Application of Elliptic Curves for NATO classified, 2010.
[28] US Department of Commerce. N.I.S.T. 2000. Federal Information Processing Standards Publication 186-2. FIPS 186-2. Digital Signature Standard.
[29] Standards for Efficient Cryptography Group. Recommended elliptic curve domain parameters, 2000. www.secg.org/collateral/sec2.pdf
[30] Mersenne prime. en.wikipedia.org
[31] Magma Computational Algebra System. School of Mathematics and Statistics. University of Sydney.
Go to article

Authors and Affiliations

Marcin Barański
1
Rafał Gliwa
1
Janusz Szmidt
1

  1. Military Communication Institute, National Research Institute, Warszawska 22A, 05-130 Zegrze

This page uses 'cookies'. Learn more