59,757 research outputs found

    Cluster synchronization in networks of coupled non-identical dynamical systems

    Full text link
    In this paper, we study cluster synchronization in networks of coupled non-identical dynamical systems. The vertices in the same cluster have the same dynamics of uncoupled node system but the uncoupled node systems in different clusters are different. We present conditions guaranteeing cluster synchronization and investigate the relation between cluster synchronization and the unweighted graph topology. We indicate that two condition play key roles for cluster synchronization: the common inter-cluster coupling condition and the intra-cluster communication. From the latter one, we interpret the two well-known cluster synchronization schemes: self-organization and driving, by whether the edges of communication paths lie at inter or intra-cluster. By this way, we classify clusters according to whether the set of edges inter- or intra-cluster edges are removable if wanting to keep the communication between pairs of vertices in the same cluster. Also, we propose adaptive feedback algorithms on the weights of the underlying graph, which can synchronize any bi-directed networks satisfying the two conditions above. We also give several numerical examples to illustrate the theoretical results

    Stochastic Tools for Network Intrusion Detection

    Full text link
    With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detection systems (IDSs) and honeypots scattered throughout the network. This combines the advantages of two security technologies. A honeypot is an activity-based network security system, which could be the logical supplement of the passive detection policies used by IDSs. This integration forces us to balance security performance versus cost by scheduling device activities for the proposed system. By formulating the scheduling problem as a decentralized partially observable Markov decision process (DEC-POMDP), decisions are made in a distributed manner at each device without requiring centralized control. The partially observable Markov decision process (POMDP) is a useful choice for controlling stochastic systems. As a combination of two Markov models, POMDPs combine the strength of hidden Markov Model (HMM) (capturing dynamics that depend on unobserved states) and that of Markov decision process (MDP) (taking the decision aspect into account). Decision making under uncertainty is used in many parts of business and science.We use here for security tools.We adopt a high-quality approximation solution for finite-space POMDPs with the average cost criterion, and their extension to DEC-POMDPs. We show how this tool could be used to design a network security framework.Comment: Accepted by International Symposium on Sensor Networks, Systems and Security (2017

    Study on the spectrum of the injected relativistic protons

    Full text link
    About 10TeV gamma-ray emission within 10 pc region from the Galactic Center had been reported by 4 independent groups. Considering that this TeV gamma-ray emission is produced via a hadronic model, and the relativistic protons came from the tidal disruption of stars by massive black holes, we investigate the spectral nature of the injected relativistic protons required by the hadronic model. The calculation was carried on the tidal disruption of the different types of stars and the different propagation mechanisms of protons in the interstellar medium. Compared with the observation data from HESS, we find for the best fitting that the power-law index of the spectrum of the injected protons is about -1.9, when a red giant star is tidally disrupted, and the effective confinement of protons diffusion mechanism is adopted.Comment: 2 pages, IAU Symposium 25

    Comparison of the Geometrical Characters Inside Quark- and Gluon-jet Produced by Different Flavor Quarks

    Full text link
    The characters of the angular distributions of quark jets and gluon jets with different flavors are carefully studied after introducing the cone angle of jets. The quark jets and gluon jets are identified from the 3-jet events which are produced by Monte Carlo simulation Jetset7.4 in e+e- collisions at s\sqrt s=91.2GeV. It turns out that the ranges of angular distributions of gluon jets are obviously wider than that of quark jets at the same energies. The average cone angles of gluon jets are much larger than that of quark jets. As the multiplicity or the transverse momentum increases, the cone-angle distribution without momentum weight of both the quark jet and gluon jet all increases, i.e the positive linear correlation are present, but the cone-angle distribution with momentum weight decreases at first, then increases when n > 4 or p_t > 2 GeV. The characters of cone angular distributions of gluon jets produced by quarks with different flavors are the same, while there are obvious differences for that of the quark jets with different flavors.Comment: 13 pages, 6 figures, to be published on the International Journal of Modern Physics
    corecore