8,660 research outputs found

    Doubly connected V-states for the generalized surface quasi-geostrophic equations

    Full text link
    In this paper, we prove the existence of doubly connected V-states for the generalized SQG equations with α]0,1[.\alpha\in ]0,1[. They can be described by countable branches bifurcating from the annulus at some explicit "eigenvalues" related to Bessel functions of the first kind. Contrary to Euler equations \cite{H-F-M-V}, we find V-states rotating with positive and negative angular velocities. At the end of the paper we discuss some numerical experiments concerning the limiting V-states.Comment: 65 page

    An analytical and numerical study of steady patches in the disc

    Full text link
    In this paper, we prove the existence of mm-fold rotating patches for the Euler equations in the disc, for both simply-connected and doubly-connected cases. Compared to the planar case, the rigid boundary introduces rich dynamics for the lowest symmetries m=1m=1 and m=2m=2. We also discuss some numerical experiments highlighting the interaction between the boundary of the patch and the rigid one.Comment: 56 page

    Performance analysis of a security architecture for active networks in Java

    Get PDF
    Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network operation. Active networks are composed of special nodes (named Active Router) that are able to execute active code to offer the active services. This technology introduces some security threats that must be solved using a security architecture. We have developed a security architecture (ROSA) for an active network platform (SARA). Java has been used as programming language in order to provide portability, but it imposes some performance limitations. This paper analyses the penalty of using Java and proposes some mechanisms to improve the performance of cryptographic implementations in Java.Publicad
    corecore