169 research outputs found

    Controlling the stability transfer between oppositely traveling waves and standing waves by inversion-symmetry-breaking perturbations

    Get PDF
    The effect of an externally applied flow on symmetry degenerated waves propagating into opposite directions and standing waves that exchange stability with the traveling waves via mixed states is analyzed. Wave structures that consist of spiral vortices in the counter rotating Taylor-Couette system are investigated by full numerical simulations and explained quantitatively by amplitude equations containing quintic coupling terms. The latter are appropriate to describe the influence of inversion symmetry breaking perturbations on many oscillatory instabilities with O(2) symmetry.Comment: 4 pages, 4 figure

    Competition between Traveling Fluid Waves of Left and Right Spiral Vortices and Their Different Amplitude Combinations

    Full text link
    Stability, bifurcation properties, and the spatiotemporal behavior of different nonlinear combination structures of spiral vortices in the counter rotating Taylor-Couette system are investigated by full numerical simulations and by coupled amplitude equation approximations. Stable cross-spiral structures with continuously varying content of left and right spiral modes are found. They provide a stability transferring connection between the initially stable, axially counter propagating wave states of pure spirals and the axially standing waves of so-called ribbons that become stable slightly further away from onset of vortex flow.Comment: 4 pages, 5 figure

    Transition from the Couette-Taylor system to the plane Couette system

    Full text link
    We discuss the flow between concentric rotating cylinders in the limit of large radii where the system approaches plane Couette flow. We discuss how in this limit the linear instability that leads to the formation of Taylor vortices is lost and how the character of the transition approaches that of planar shear flows. In particular, a parameter regime is identified where fractal distributions of life times and spatiotemporal intermittency occur. Experiments in this regime should allow to study the characteristics of shear flow turbulence in a closed flow geometry.Comment: 5 pages, 5 figure

    First insights into the phylogenetic diversity of Mycobacterium tuberculosis in Nepal

    Get PDF
    BACKGROUND: Tuberculosis (TB) is a major public health problem in Nepal. Strain variation in Mycobacterium tuberculosis may influence the outcome of TB infection and disease. To date, the phylogenetic diversity of M. tuberculosis in Nepal is unknown. METHODS AND FINDINGS: We analyzed 261 M. tuberculosis isolates recovered from pulmonary TB patients recruited between August 2009 and August 2010 in Nepal. M. tuberculosis lineages were determined by single nucleotide polymorphisms (SNP) typing and spoligotyping. Drug resistance was determined by sequencing the hot spot regions of the relevant target genes. Overall, 164 (62.8%) TB patients were new, and 97 (37.2%) were previously treated. Any drug resistance was detected in 50 (19.2%) isolates, and 16 (6.1%) were multidrug-resistant. The most frequent M. tuberculosis lineage was Lineage 3 (CAS/Delhi) with 106 isolates (40.6%), followed by Lineage 2 (East-Asian lineage, includes Beijing genotype) with 84 isolates (32.2%), Lineage 4 (Euro-American lineage) with 41 (15.7%) isolates, and Lineage 1 (Indo-Oceanic lineage) with 30 isolates (11.5%). Based on spoligotyping, we found 45 different spoligotyping patterns that were previously described. The Beijing (83 isolates, 31.8%) and CAS spoligotype (52, 19.9%) were the dominant spoligotypes. A total of 36 (13.8%) isolates could not be assigned to any known spoligotyping pattern. Lineage 2 was associated with female sex (adjusted odds ratio [aOR] 2.58, 95% confidence interval [95% CI] 1.42-4.67, p = 0.002), and any drug resistance (aOR 2.79; 95% CI 1.43-5.45; p = 0.002). We found no evidence for an association of Lineage 2 with age or BCG vaccination status. CONCLUSIONS: We found a large genetic diversity of M. tuberculosis in Nepal with representation of all four major lineages. Lineages 3 and 2 were dominating. Lineage 2 was associated with clinical characteristics. This study fills an important gap on the map of the M. tuberculosis genetic diversity in the Asian reg

    Recent advances in symmetric and network dynamics

    Get PDF
    We summarize some of the main results discovered over the past three decades concerning symmetric dynamical systems and networks of dynamical systems, with a focus on pattern formation. In both of these contexts, extra constraints on the dynamical system are imposed, and the generic phenomena can change. The main areas discussed are time-periodic states, mode interactions, and non-compact symmetry groups such as the Euclidean group. We consider both dynamics and bifurcations. We summarize applications of these ideas to pattern formation in a variety of physical and biological systems, and explain how the methods were motivated by transferring to new contexts René Thom's general viewpoint, one version of which became known as “catastrophe theory.” We emphasize the role of symmetry-breaking in the creation of patterns. Topics include equivariant Hopf bifurcation, which gives conditions for a periodic state to bifurcate from an equilibrium, and the H/K theorem, which classifies the pairs of setwise and pointwise symmetries of periodic states in equivariant dynamics. We discuss mode interactions, which organize multiple bifurcations into a single degenerate bifurcation, and systems with non-compact symmetry groups, where new technical issues arise. We transfer many of the ideas to the context of networks of coupled dynamical systems, and interpret synchrony and phase relations in network dynamics as a type of pattern, in which space is discretized into finitely many nodes, while time remains continuous. We also describe a variety of applications including animal locomotion, Couette–Taylor flow, flames, the Belousov–Zhabotinskii reaction, binocular rivalry, and a nonlinear filter based on anomalous growth rates for the amplitude of periodic oscillations in a feed-forward network

    Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees

    Get PDF
    Composable security definitions, at times called simulation-based definitions, provide strong security guarantees that hold in any context. However, they are also met with some skepticism due to many impossibility results; goals such as commitments and zero-knowledge that are achievable in a stand-alone sense were shown to be unachievable composably (without a setup) since provably no efficient simulator exists. In particular, in the context of adaptive security, the so-called simulator commitment problem arises: once a party gets corrupted, an efficient simulator is unable to be consistent with its pre-corruption outputs. A natural question is whether such impossibility results are unavoidable or only artifacts of frameworks being too restrictive. In this work, we propose a novel type of composable security statement that evades the commitment problem. Our new type is able to express the composable guarantees of schemes that previously did not have a clear composable understanding. To this end, we leverage the concept of system specifications in the Constructive Cryptography framework, capturing the conjunction of several interval-wise guarantees, each specifying the guarantees between two events. We develop the required theory and present the corresponding new composition theorem. We present three applications of our theory. First, we show in the context of symmetric encryption with adaptive corruption how our notion naturally captures the expected confidentiality guarantee---the messages remain confidential until either party gets corrupted---and that it can be achieved by any standard semantically secure scheme (negating the need for non-committing encryption). Second, we present a composable formalization of (so far only known to be standalone secure) commitment protocols, which is instantiable without a trusted setup like a CRS. We show it to be sufficient for being used in coin tossing over the telephone, one of the early intuitive applications of commitments. Third, we reexamine a result by Hofheinz, Matt, and Maurer [Asiacrypt\u2715] implying that IND-ID-CPA security is not the right notion for identity-based encryption, unmasking this claim as an unnecessary framework artifact

    Genomic Diversity of Mycobacterium tuberculosis Complex Strains in Cantabria (Spain), a Moderate TB Incidence Setting

    Get PDF
    Background Tuberculosis (TB) control strategies are focused mainly on prevention, early diagnosis, compliance to treatment and contact tracing. The objectives of this study were to explore the frequency and risk factors of recent transmission of clinical isolates of Mycobacterium tuberculosis complex (MTBC) in Cantabria in Northern Spain from 2012 through 2013 and to analyze their clonal complexity for better understanding of the transmission dynamics in a moderate TB incidence setting. Methods DNA from 85 out of 87 isolates from bacteriologically confirmed cases of MTBC infection were extracted directly from frozen stocks and genotyped using the mycobacterial interspersed repetitive units-variable number tandem repeat (MIRU-VNTR) method. The MIRUVNTRplus database tool was used to identify clusters and lineages and to build a neighbor joining (NJ) phylogenetic tree. In addition, data were compared to the SITVIT2 database at the Pasteur Institute of Guadeloupe. Results The rate of recent transmission was calculated to 24%. Clustering was associated with being Spanish-born. A high prevalence of isolates of the Euro-American lineage was found. In addition, MIRU-VNTR profiles of the studied isolates corresponded to previously found MIRU-VNTR types in other countries, including Spain, Belgium, Great Britain, USA, Croatia, South Africa and The Netherlands. Six of the strains analyzed represented clonal variants. Conclusion Transmission of MTBC is well controlled in Cantabria. The majority of TB patients were born in Spain. The population structure of MTBC in Cantabria has a low diversity of major clonal lineages with the Euro-American lineage predominating

    Mycobacterium tuberculosis causing tuberculous lymphadenitis in Maputo, Mozambique

    Get PDF
    BACKGROUND: The zoonosis bovine tuberculosis (TB) is known to be responsible for a considerable proportion of extrapulmonary TB. In Mozambique, bovine TB is a recognised problem in cattle, but little has been done to evaluate how Mycobacterium bovis has contributed to human TB. We here explore the public health risk for bovine TB in Maputo, by characterizing the isolates from tuberculous lymphadenitis (TBLN) cases, a common manifestation of bovine TB in humans, in the Pathology Service of Maputo Central Hospital, in Mozambique, during one year. RESULTS: Among 110 patients suspected of having TBLN, 49 had a positive culture result. Of those, 48 (98 %) were positive for Mycobacterium tuberculosis complex and one for nontuberculous mycobacteria. Of the 45 isolates analysed by spoligotyping and Mycobacterial Interspersed Repetitive Unit - Variable Number Tandem Repeat (MIRU-VNTR), all were M. tuberculosis. No M. bovis was found. Cervical TBLN, corresponding to 39 (86.7 %) cases, was the main cause of TBLN and 66.7 % of those where from HIV positive patients. We found that TBLN in Maputo was caused by a variety of M. tuberculosis strains. The most prevalent lineage was the EAI (n?=?19; 43.2 %). Particular common spoligotypes were SIT 48 (EAI1_SOM sublineage), SIT 42 (LAM 9), SIT 1 (Beijing) and SIT53 (T1), similar to findings among pulmonary cases. CONCLUSIONS: M. tuberculosis was the main etiological agent of TBLN in Maputo. M. tuberculosis genotypes were similar to the ones causing pulmonary TB, suggesting that in Maputo, cases of TBLN arise from the same source as pulmonary TB, rather than from an external zoonotic source. Further research is needed on other forms of extrapulmonary TB and in rural areas where there is high prevalence of bovine TB in cattle, to evaluate the risk of transmission of M. bovis from cattle to humans.Swedish International Development Cooperation Agency / Department for Research Cooperation (Sida/SAREC) through Eduardo Mondlane University and Karolinska Institutet Research and Training (KIRT) collaboratio

    Indifferentiable Authenticated Encryption

    Get PDF
    We study Authenticated Encryption with Associated Data (AEAD) from the viewpoint of composition in arbitrary (single-stage) environments. We use the indifferentiability framework to formalize the intuition that a “good” AEAD scheme should have random ciphertexts subject to decryptability. Within this framework, we can then apply the indifferentiability composition theorem to show that such schemes offer extra safeguards wherever the relevant security properties are not known, or cannot be predicted in advance, as in general-purpose crypto libraries and standards. We show, on the negative side, that generic composition (in many of its configurations) and well-known classical and recent schemes fail to achieve indifferentiability. On the positive side, we give a provably indifferentiable Feistel-based construction, which reduces the round complexity from at least 6, needed for blockciphers, to only 3 for encryption. This result is not too far off the theoretical optimum as we give a lower bound that rules out the indifferentiability of any construction with less than 2 rounds
    • …
    corecore