1,551 research outputs found

    Mid-gut ACTH-secreting neuroendocrine tumor unmasked with (18)F-dihydroxyphenylalanine-positron emission tomography.

    Get PDF
    Ectopic ACTH Cushing's syndrome (EAS) is often caused by neuroendocrine tumors (NETs) of lungs, pancreas, thymus, and other less frequent locations. Localizing the source of ACTH can be challenging. A 64-year-old man presented with rapidly progressing fatigue, muscular weakness, and dyspnea. He was in poor condition and showed facial redness, proximal amyotrophy, and bruises. Laboratory disclosed hypokalemia, metabolic alkalosis, and markedly elevated ACTH and cortisol levels. Pituitary was normal on magnetic resonance imaging (MRI), and bilateral inferior petrosal sinus blood sampling with corticotropin-releasing hormone stimulation showed no significant central-to-periphery gradient of ACTH. Head and neck, thoracic and abdominal computerized tomography (CT), MRI, somatostatin receptor scintigraphy (SSRS), and (18)F-deoxyglucose-positron emission tomography (FDG-PET) failed to identify the primary tumor. (18)F-dihydroxyphenylalanine (F-DOPA)-PET/CT unveiled a 20-mm nodule in the jejunum and a metastatic lymph node. Segmental jejunum resection showed two adjacent NETs, measuring 2.0 and 0.5 cm with a peritoneal metastasis. The largest tumor expressed ACTH in 30% of cells. Following surgery, after a transient adrenal insufficiency, ACTH and cortisol levels returned to normal values and remain normal over a follow-up of 26 months. Small mid-gut NETs are difficult to localize on CT or MRI, and require metabolic imaging. Owing to low mitotic activity, NETs are generally poor candidates for FDG-PET, whereas SSRS shows poor sensitivity in EAS due to intrinsically low tumor concentration of type-2 somatostatin receptors (SST2) or to receptor down regulation by excess cortisol. However, F-DOPA-PET, which is related to amine precursor uptake by NETs, has been reported to have high positive predictive value for occult EAS despite low sensitivity, and constitutes a useful alternative to more conventional methods of tumor localization. LEARNING POINTS: Uncontrolled high cortisol levels in EAS can be lethal if untreated.Surgical excision is the keystone of NETs treatment, thus tumor localization is crucial.Most cases of EAS are caused by NETs, which are located mainly in the lungs. However, small gut NETs are elusive to conventional imaging and require metabolic imaging for detection.FDG-PET, based on tumor high metabolic rate, may not detect NETs that have low mitotic activity. SSRS may also fail, due to absent or low concentration of SST2, which may be down regulated by excess cortisol.F-DOPA-PET, based on amine-precursor uptake, can be a useful method to localize the occult source of ACTH in EAS when other methods have failed

    Attacks on quantum key distribution protocols that employ non-ITS authentication

    Full text link
    We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD-postprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.Comment: 34 page

    One-dimensional Ising ferromagnet frustrated by long-range interactions at finite temperatures

    Get PDF
    We consider a one-dimensional lattice of Ising-type variables where the ferromagnetic exchange interaction J between neighboring sites is frustrated by a long-ranged anti-ferromagnetic interaction of strength g between the sites i and j, decaying as |i-j|^-alpha, with alpha>1. For alpha smaller than a certain threshold alpha_0, which is larger than 2 and depends on the ratio J/g, the ground state consists of an ordered sequence of segments with equal length and alternating magnetization. The width of the segments depends on both alpha and the ratio J/g. Our Monte Carlo study shows that the on-site magnetization vanishes at finite temperatures and finds no indication of any phase transition. Yet, the modulation present in the ground state is recovered at finite temperatures in the two-point correlation function, which oscillates in space with a characteristic spatial period: The latter depends on alpha and J/g and decreases smoothly from the ground-state value as the temperature is increased. Such an oscillation of the correlation function is exponentially damped over a characteristic spatial scale, the correlation length, which asymptotically diverges roughly as the inverse of the temperature as T=0 is approached. This suggests that the long-range interaction causes the Ising chain to fall into a universality class consistent with an underlying continuous symmetry. The e^(Delta/T)-temperature dependence of the correlation length and the uniform ferromagnetic ground state, characteristic of the g=0 discrete Ising symmetry, are recovered for alpha > alpha_0.Comment: 12 pages, 7 figure

    The 5.25 & 5.7 μ\mum Astronomical Polycyclic Aromatic Hydrocarbon Emission Features

    Full text link
    Astronomical mid-IR spectra show two minor PAH features at 5.25 and 5.7 μ\mum (1905 and 1754 cm1^{\rm - 1}) that hitherto have been little studied, but contain information about the astronomical PAH population that complements that of the major emission bands. Here we report a study involving both laboratory and theoretical analysis of the fundamentals of PAH spectroscopy that produce features in this region and use these to analyze the astronomical spectra. The ISO SWS spectra of fifteen objects showing these PAH features were considered for this study, of which four have sufficient S/N between 5 and 6 μ\mum to allow for an in-depth analysis. All four astronomical spectra show similar peak positions and profiles. The 5.25 μ\mum feature is peaked and asymmetric, while the 5.7 μ\mum feature is broader and flatter. Detailed analysis of the laboratory spectra and quantum chemical calculations show that the astronomical 5.25 and 5.7 μ\mum bands are a blend of combination, difference and overtone bands primarily involving CH stretching and CH in-plane and CH out-of-plane bending fundamental vibrations. The experimental and computational spectra show that, of all the hydrogen adjacency classes possible on PAHs, solo and duo hydrogens consistently produce prominent bands at the observed positions whereas quartet hydrogens do not. In all, this a study supports the picture that astronomical PAHs are large with compact, regular structures. From the coupling with primarily strong CH out-of-plane bending modes one might surmise that the 5.25 and 5.7 μ\mum bands track the neutral PAH population. However, theory suggests the role of charge in these astronomical bands might also be important.Comment: Accepted ApJ, 40 pages in pre-print, 14 figures, two onlin

    Dynamics of systems with isotropic competing interactions in an external field: a Langevin approach

    Full text link
    We study the Langevin dynamics of a ferromagnetic Ginzburg-Landau Hamiltonian with a competing long-range repulsive term in the presence of an external magnetic field. The model is analytically solved within the self consistent Hartree approximation for two different initial conditions: disordered or zero field cooled (ZFC), and fully magnetized or field cooled (FC). To test the predictions of the approximation we develop a suitable numerical scheme to ensure the isotropic nature of the interactions. Both the analytical approach and the numerical simulations of two-dimensional finite systems confirm a simple aging scenario at zero temperature and zero field. At zero temperature a critical field hch_c is found below which the initial conditions are relevant for the long time dynamics of the system. For h<hch < h_c a logarithmic growth of modulated domains is found in the numerical simulations but this behavior is not captured by the analytical approach which predicts a t1/2t^1/2 growth law at T=0T = 0

    Unforgeable Quantum Encryption

    Get PDF
    We study the problem of encrypting and authenticating quantum data in the presence of adversaries making adaptive chosen plaintext and chosen ciphertext queries. Classically, security games use string copying and comparison to detect adversarial cheating in such scenarios. Quantumly, this approach would violate no-cloning. We develop new techniques to overcome this problem: we use entanglement to detect cheating, and rely on recent results for characterizing quantum encryption schemes. We give definitions for (i.) ciphertext unforgeability , (ii.) indistinguishability under adaptive chosen-ciphertext attack, and (iii.) authenticated encryption. The restriction of each definition to the classical setting is at least as strong as the corresponding classical notion: (i) implies INT-CTXT, (ii) implies IND-CCA2, and (iii) implies AE. All of our new notions also imply QIND-CPA privacy. Combining one-time authentication and classical pseudorandomness, we construct schemes for each of these new quantum security notions, and provide several separation examples. Along the way, we also give a new definition of one-time quantum authentication which, unlike all previous approaches, authenticates ciphertexts rather than plaintexts.Comment: 22+2 pages, 1 figure. v3: error in the definition of QIND-CCA2 fixed, some proofs related to QIND-CCA2 clarifie

    Options to Accelerate Ozone Recovery: Ozone and Climate Benefits

    Get PDF
    The humankind or anthropogenic influence on ozone primarily originated from the chlorofluorocarbons and halons (chlorine and bromine). Representatives from governments have met periodically over the years to establish international regulations starting with the Montreal Protocol in 1987, which greatly limited the release of these ozone-depleting substances (DDSs). Two global models have been used to investigate the impact of hypothetical reductions in future emissions of ODSs on total column ozone. The investigations primarily focused on chlorine- and bromine-containing gases, but some computations also included nitrous oxide (N2O). The Montreal Protocol with ODS controls have been so successful that further regulations of chlorine- and bromine-containing gases could have only a fraction of the impact that regulations already in force have had. if all anthropogenic ODS emissions were halted beginning in 2011, ozone is calculated to be higher by about 1-2% during the period 2030-2100 compared to a case of no additional ODS restrictions. Chlorine- and bromine-containing gases and nitrous oxide are also greenhouse gases and lead to warming of the troposphere. Elimination of N 20 emissions would result in a reduction of radiative forcing of 0.23 W/sq m in 2100 than presently computed and destruction of the CFC bank would produce a reduction in radiative forcing of 0.005 W/sq m in 2100. This paper provides a quantitative way to consider future regulations of the CFC bank and N 20 emission

    Efficacy of climate forcings in PDRMIP models

    Get PDF
    Quantifying the efficacy of different climate forcings is important for understanding the real-world climate sensitivity. This study presents a systematic multimodel analysis of different climate driver efficacies using simulations from the Precipitation Driver and Response Model Intercomparison Project (PDRMIP). Efficacies calculated from instantaneous radiative forcing deviate considerably from unity across forcing agents and models. Effective radiative forcing (ERF) is a better predictor of global mean near-surface air temperature (GSAT) change. Efficacies are closest to one when ERF is computed using fixed sea surface temperature experiments and adjusted for land surface temperature changes using radiative kernels. Multimodel mean efficacies based on ERF are close to one for global perturbations of methane, sulfate, black carbon, and insolation, but there is notable intermodel spread. We do not find robust evidence that the geographic location of sulfate aerosol affects its efficacy. GSAT is found to respond more slowly to aerosol forcing than CO2 in the early stages of simulations. Despite these differences, we find that there is no evidence for an efficacy effect on historical GSAT trend estimates based on simulations with an impulse response model, nor on the resulting estimates of climate sensitivity derived from the historical period. However, the considerable intermodel spread in the computed efficacies means that we cannot rule out an efficacy-induced bias of +/- 0.4 K in equilibrium climate sensitivity to CO2 doubling when estimated using the historical GSAT trend
    corecore