673 research outputs found

    Taxonomy of P2P Applications

    Get PDF
    Peer-to-peer (p2p) networks have gained immense popularity in recent years and the number of services they provide continuously rises. Where p2p-networks were formerly known as file-sharing networks, p2p is now also used for services like VoIP and IPTV. With so many different p2p applications and services the need for a taxonomy framework rises. This paper describes the available p2p applications grouped by the services they provide. A taxonomy framework is proposed to classify old and recent p2p applications based on their characteristics

    Hyperpigmentation of hard palate induced by chloroquine therapy

    Get PDF
    The antimalarials are one of the most commonly prescribed drugs for conditions such as lupus erythematosus and rheumatoid arthritis, and the side effects, though infrequent, are well known. The antimalarial agent chloroquine diphosphate usually causes pigmentary changes in the oral mucosa characterized by a bluish-grey to black discolorations mainly in the hard palate. Considering only the hard palate hyperpigmentation caused by chloroquine, to the best of our knowledge, only 13 cases have been reported in the English language literature. We described an additional case of palate hyperpigmentation related to the chronic use of chloroquine diphosphate in a 60-year-old Mexican woman. Although the diagnosis is usually made based on medication history and clinical presentation, a biopsy specimen may be helpful to confirm the diagnosis. Clinicians must be aware of these drugs and their adverse effects in order to make the correct diagnosis and decide on the optimal treatment for the condition

    Effectiveness of a process-oriented patient-tailored outpatient neuropsychological rehabilitation programme for patients in the chronic phase after ABI

    Get PDF
    The objective of this prospective cohort study was to examine the effectiveness of an outpatient neuropsychological rehabilitation programme for patients with acquired brain injury (ABI) and their relatives. The participants were 26 ABI patients with a mean age of 44.7 (SD 11.7) years and 24 caregivers. Mean time since injury was 3.0 (SD 3.6) years. The intervention consisted of a patient-tailored process-oriented neuropsychological rehabilitation programme focusing on facilitation of the adaptation process. Repeated measurements were taken prior to treatment (T0), directly after treatment (T1) and 6 months later (T2). Primary outcome measures were cognitive failures (CFQ), quality of life (SA-SIP30), and individualised goals (GAS). Patients improved significantly on individualised goals between T0 and T1 (p<.01). This effect retained at T2. There were no significant differences on CFQ and SA-SIP30. The programme had a positive effect on attainment of the patient's individual goals. This was not associated with a higher level of participation or a better quality of life

    Generalized thermodynamics and Fokker-Planck equations. Applications to stellar dynamics, two-dimensional turbulence and Jupiter's great red spot

    Full text link
    We introduce a new set of generalized Fokker-Planck equations that conserve energy and mass and increase a generalized entropy until a maximum entropy state is reached. The concept of generalized entropies is rigorously justified for continuous Hamiltonian systems undergoing violent relaxation. Tsallis entropies are just a special case of this generalized thermodynamics. Application of these results to stellar dynamics, vortex dynamics and Jupiter's great red spot are proposed. Our prime result is a novel relaxation equation that should offer an easily implementable parametrization of geophysical turbulence. This relaxation equation depends on a single key parameter related to the skewness of the fine-grained vorticity distribution. Usual parametrizations (including a single turbulent viscosity) correspond to the infinite temperature limit of our model. They forget a fundamental systematic drift that acts against diffusion as in Brownian theory. Our generalized Fokker-Planck equations may have applications in other fields of physics such as chemotaxis for bacterial populations. We propose the idea of a classification of generalized entropies in classes of equivalence and provide an aesthetic connexion between topics (vortices, stars, bacteries,...) which were previously disconnected.Comment: Submitted to Phys. Rev.

    Scaling laws and vortex profiles in 2D decaying turbulence

    Full text link
    We use high resolution numerical simulations over several hundred of turnover times to study the influence of small scale dissipation onto vortex statistics in 2D decaying turbulence. A self-similar scaling regime is detected when the scaling laws are expressed in units of mean vorticity and integral scale, as predicted by Carnevale et al., and it is observed that viscous effects spoil this scaling regime. This scaling regime shows some trends toward that of the Kirchhoff model, for which a recent theory predicts a decay exponent Îľ=1\xi=1. In terms of scaled variables, the vortices have a similar profile close to a Fermi-Dirac distribution.Comment: 4 Latex pages and 4 figures. Submitted to Phys. Rev. Let

    TAuth: Verifying timed security protocols

    Get PDF
    Quantitative timing is often explicitly used in systems for better security, e.g., the credentials for automatic website logon often has limited lifetime. Verifying timing relevant security protocols in these systems is very challenging as timing adds another dimension of complexity compared with the untimed protocol verification. In our previous work, we proposed an approach to check the correctness of the timed authentication in security protocols with fixed timing constraints. However, a more difficult question persists, i.e., given a particular protocol design, whether the protocol has security flaws in its design or it can be configured secure with proper parameter values? In this work, we answer this question by proposing a parameterized verification framework, where the quantitative parameters in the protocols can be intuitively specified as well as automatically analyzed. Given a security protocol, our verification algorithm either produces the secure constraints of the parameters, or constructs an attack that works for any parameter values. The correctness of our algorithm is formally proved. We implement our method into a tool called PTAuth and evaluate it with several security protocols. Using PTAuth, we have successfully found a timing attack in Kerberos V which is unreported before.No Full Tex

    Statistical mechanics of Fofonoff flows in an oceanic basin

    Get PDF
    We study the minimization of potential enstrophy at fixed circulation and energy in an oceanic basin with arbitrary topography. For illustration, we consider a rectangular basin and a linear topography h=by which represents either a real bottom topography or the beta-effect appropriate to oceanic situations. Our minimum enstrophy principle is motivated by different arguments of statistical mechanics reviewed in the article. It leads to steady states of the quasigeostrophic (QG) equations characterized by a linear relationship between potential vorticity q and stream function psi. For low values of the energy, we recover Fofonoff flows [J. Mar. Res. 13, 254 (1954)] that display a strong westward jet. For large values of the energy, we obtain geometry induced phase transitions between monopoles and dipoles similar to those found by Chavanis and Sommeria [J. Fluid Mech. 314, 267 (1996)] in the absence of topography. In the presence of topography, we recover and confirm the results obtained by Venaille and Bouchet [Phys. Rev. Lett. 102, 104501 (2009)] using a different formalism. In addition, we introduce relaxation equations towards minimum potential enstrophy states and perform numerical simulations to illustrate the phase transitions in a rectangular oceanic basin with linear topography (or beta-effect).Comment: 26 pages, 28 figure
    • …
    corecore