392 research outputs found

    The intricate Galaxy disk: velocity asymmetries in Gaia-TGAS

    Full text link
    We use the Gaia-TGAS data to compare the transverse velocities in Galactic longitude (coming from proper motions and parallaxes) in the Milky Way disk for negative and positive longitudes as a function of distance. The transverse velocities are strongly asymmetric and deviate significantly from the expectations for an axisymmetric Galaxy. The value and sign of the asymmetry changes at spatial scales of several tens of degrees in Galactic longitude and about 0.5 kpc in distance. The asymmetry is statistically significant at 95% confidence level for 57% of the region probed, which extends up to ~1.2 kpc. A percentage of 24% of the region studied shows absolute differences at this confidence level larger than 5 km/s and 7% larger than 10 km/s. The asymmetry pattern shows mild variations in the vertical direction and with stellar type. A first qualitative comparison with spiral arm models indicates that the arms are unlikely to be the main source of the asymmetry. We briefly discuss alternative origins. This is the first time that global all-sky asymmetries are detected in the Milky Way kinematics, beyond the local neighbourhood, and with a purely astrometric sample.Comment: Accepted for publication in A&A Letter

    Design and Fabrication of Coplanar YBCO Structures on Lithium Niobate Substrates

    Get PDF
    YBa2Cu3O7-δ (YBCO) with low RF losses has been successfully deposited onto lithium niobate (LNO) to improve the performance of electrooptic Mach-Zender modulators. Epitaxial, c-axis oriented superconducting YBCO thin films have been grown on X-cut LNO single crystals with a yttria-stabilized zirconia (YSZ) buffer layer by RF magnetron sputtering. This buffer layer is needed to obtain good superconducting properties of the YBCO grown. Numerical tools have been developed to analyze CPW structures based on YBCO/YSZ/LNO trilayers, and they indicate that YSZ thickness has to be kept to the minimum necessary for good YBCO growth. With this restriction, the RF losses of YBCO/YSZ/LNO samples have been measured. The results from these measurements are used to quantify the performance enhancement in a Mach-Zender modulator using YBCO electrodes

    The ac magnetic response of mesoscopic type II superconductors

    Full text link
    The response of mesoscopic superconductors to an ac magnetic field is numerically investigated on the basis of the time-dependent Ginzburg-Landau equations (TDGL). We study the dependence with frequency ω\omega and dc magnetic field HdcH_{dc} of the linear ac susceptibility χ(Hdc,ω)\chi(H_{dc}, \omega) in square samples with dimensions of the order of the London penetration depth. At Hdc=0H_{dc}=0 the behavior of χ\chi as a function of ω\omega agrees very well with the two fluid model, and the imaginary part of the ac susceptibility, χ"(ω)\chi"(\omega), shows a dissipative a maximum at the frequency νo=c2/(4πσλ2)\nu_o=c^2/(4\pi \sigma\lambda^2). In the presence of a magnetic field a second dissipation maximum appears at a frequency ωpν0\omega_p\ll\nu_0. The most interesting behavior of mesoscopic superconductors can be observed in the χ(Hdc)\chi(H_{dc}) curves obtained at a fixed frequency. At a fixed number of vortices, χ"(Hdc)\chi"(H_{dc}) continuously increases with increasing HdcH_{dc}. We observe that the dissipation reaches a maximum for magnetic fields right below the vortex penetration fields. Then, after each vortex penetration event, there is a sudden suppression of the ac losses, showing discontinuities in χ"(Hdc)\chi"(H_{dc}) at several values of HdcH_{dc}. We show that these discontinuities are typical of the mesoscopic scale and disappear in macroscopic samples, which have a continuos behavior of χ(Hdc)\chi(H_{dc}). We argue that these discontinuities in χ(Hdc)\chi(H_{dc}) are due to the effect of {\it nascent vortices} which cause a large variation of the amplitude of the order parameter near the surface before the entrance of vortices.Comment: 12 pages, 9 figures, RevTex

    On the Filter Narrowing Issues in Elastic Optical Networks

    Get PDF
    This paper describes the problematic filter narrowing effect in the context of next-generation elastic optical networks. First, three possible scenarios are introduced: the transition from an actual fixed-grid to a flexigrid network, the generic full flexi-grid network, and a proposal for a filterless optical network. Next, we investigate different transmission techniques and evaluate the penalty introduced by the filtering effect when considering Nyquist wavelength division multiplexing, single side-band direct-detection orthogonal frequency division multiplexing, and symbol-rate variable dual polarization quadrature amplitude modulation. Also, different approaches to compensate for the filter narrowing effect are discussed. Results show that the specific needs per each scenario can be fulfilled by the aforementioned technologies and techniques or a combination of them, when balancing performance, network reach, and cost

    Modular SDN-enabled S-BVT Adopting Widely Tunable MEMS VCSEL for Flexible/Elastic Optical Metro Networks

    Get PDF
    We propose an SDN-enabled S-BVT adopting directly-modulated tunable VCSEL with direct-detection for optical metro networks and spectrum defragmentation. We experimentally assess it over different network paths up to 185km and in presence of adjacent slices

    Protocol analysis modulo combination of theories: A case study in Maude-NPA

    Full text link
    There is a growing interest in formal methods and tools to analyze cryptographic protocols modulo algebraic properties of their underlying cryptographic functions. It is well-known that an intruder who uses algebraic equivalences of such functions can mount attacks that would be impossible if the cryptographic functions did not satisfy such equivalences. In practice, however, protocols use a collection of well-known functions, whose algebraic properties can naturally be grouped together as a union of theories E 1... ¿ n. Reasoning symbolically modulo the algebraic properties E 1... ¿ n requires performing (E 1... ¿ n)-unification. However, even if a unification algorithm for each individual E i is available, this requires combining the existing algorithms by methods that are highly non-deterministic and have high computational cost. In this work we present an alternative method to obtain unification algorithms for combined theories based on variant narrowing. Although variant narrowing is less efficient at the level of a single theory E i, it does not use any costly combination method. Furthermore, it does not require that each E i has a dedicated unification algorithm in a tool implementation. We illustrate the use of this method in the Maude-NPA tool by means of a well-known protocol requiring the combination of three distinct equational theories. © 2011 Springer-Verlag.R. Sasse and J. Meseguer have been partially supported by NSF Grants CNS0716638, CNS-0831064 and CNS-0904749. S. Escobar has been partially supported by the EU (FEDER) and the Spanish MEC/MICINN under grant TIN 2007-68093- C02-02. C. Meadows has been partially supported by NSF Grant CNS-0904749National Science Foundation, EEUUSasse, R.; Escobar Román, S.; Meadows, C.; Meseguer, J. (2011). Protocol analysis modulo combination of theories: A case study in Maude-NPA. En Security and Trust Management. Springer Verlag (Germany). 6710:163-178. doi:10.1007/978-3-642-22444-7_11S1631786710Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2–32 (2006)Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.-C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005)Baader, F., Schulz, K.U.: Unification in the union of disjoint equational theories: Combining decision procedures. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, pp. 50–65. Springer, Heidelberg (1992)Basin, D.A., Mödersheim, S., Viganò, L.: An on-the-fly model-checker for security protocol analysis. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 253–270. Springer, Heidelberg (2003)Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. In: Treinen, R. (ed.) RTA 2009. LNCS, vol. 5595, pp. 148–163. Springer, Heidelberg (2009)Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW, pp. 82–96. IEEE Computer Society, Los Alamitos (2001)Bursuc, S., Comon-Lundh, H.: Protocol security and algebraic properties: Decision results for a bounded number of sessions. In: Treinen, R. (ed.) RTA 2009. LNCS, vol. 5595, pp. 133–147. Springer, Heidelberg (2009)Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: LICS, pp. 261–270. IEEE Computer Society, Los Alamitos (2003)Chevalier, Y., Rusinowitch, M.: Hierarchical combination of intruder theories. Inf. Comput. 206(2-4), 352–377 (2008)Chevalier, Y., Rusinowitch, M.: Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures. Theor. Comput. Sci. 411(10), 1261–1282 (2010)Ciobâcă, Ş., Delaune, S., Kremer, S.: Computing knowledge in security protocols under convergent equational theories. In: Schmidt, R.A. (ed.) CADE-22. LNCS, vol. 5663, pp. 355–370. Springer, Heidelberg (2009)Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 294–307. Springer, Heidelberg (2005)Cortier, V., Delaitre, J., Delaune, S.: Safely composing security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, pp. 352–363. Springer, Heidelberg (2007)Cremers, C.J.F.: The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties. Theoretical Computer Science 367(1-2), 162–202 (2006)Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: Cryptographic protocol analysis modulo equational properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009 Tutorial Lectures. LNCS, vol. 5705, pp. 1–50. Springer, Heidelberg (2009)Escobar, S., Meseguer, J., Sasse, R.: Effectively checking or disproving the finite variant property. Technical Report UIUCDCS-R-2008-2960, Department of Computer Science - University of Illinois at Urbana-Champaign (April 2008)Escobar, S., Meseguer, J., Sasse, R.: Effectively checking the finite variant property. In: Voronkov, A. (ed.) RTA 2008. LNCS, vol. 5117, pp. 79–93. Springer, Heidelberg (2008)Escobar, S., Meseguer, J., Sasse, R.: Variant narrowing and equational unification. Electr. Notes Theor. Comput. Sci. 238(3), 103–119 (2009)Escobar, S., Sasse, R., Meseguer, J.: Folding variant narrowing and optimal variant termination. In: Ölveczky, P.C. (ed.) WRLA 2010. LNCS, vol. 6381, pp. 52–68. Springer, Heidelberg (2010)Fabrega, F.J.T., Herzog, J., Guttman, J.: Strand Spaces: What Makes a Security Protocol Correct? Journal of Computer Security 7, 191–230 (1999)Guo, Q., Narendran, P.: Unification and matching modulo nilpotence. In: CADE-13. LNCS, vol. 1104, pp. 261–274. Springer, Heidelberg (1996)Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), IETF RFC 2409, (November 1998)Jouannaud, J.-P., Kirchner, C., Kirchner, H.: Incremental construction of unification algorithms in equational theories. In: Díaz, J. (ed.) ICALP 1983. LNCS, vol. 154, pp. 361–373. Springer, Heidelberg (1983)Küsters, R., Truderung, T.: Reducing protocol analysis with xor to the xor-free case in the Horn theory based approach. In: ACM Conference on Computer and Communications Security, pp. 129–138 (2008)Küsters, R., Truderung, T.: Using ProVerif to analyze protocols with Diffie-Hellman exponentiation. In: CSF, pp. 157–171. IEEE Computer Society, Los Alamitos (2009)Lafourcade, P., Terrade, V., Vigier, S.: Comparison of cryptographic verification tools dealing with algebraic properties. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 173–185. Springer, Heidelberg (2010)Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147–166. Springer, Heidelberg (1996)Meadows, C.: The NRL protocol analyzer: An overview. J. Log. Program. 26(2), 113–131 (1996)Meseguer, J.: Conditional rewriting logic as a united model of concurrency. Theor. Comput. Sci. 96(1), 73–155 (1992)Meseguer, J.: Membership algebra as a logical framework for equational specification. In: Parisi-Presicce, F. (ed.) WADT 1997. LNCS, vol. 1376, pp. 18–61. Springer, Heidelberg (1998)Meseguer, J., Thati, P.: Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Higher-Order and Symbolic Computation 20(1–2), 123–160 (2007)Ohlebusch, E.: Advanced Topics in Term Rewriting. Springer, Heidelberg (2002)Santiago, S., Talcott, C.L., Escobar, S., Meadows, C., Meseguer, J.: A graphical user interface for Maude-NPA. Electr. Notes Theor. Comput. Sci. 258(1), 3–20 (2009)Schmidt-Schauß, M.: Unification in a combination of arbitrary disjoint equational theories. J. Symb. Comput. 8(1/2), 51–99 (1989)Terese (ed.): Term Rewriting Systems. Cambridge University Press, Cambridge (2003)Turuani, M.: The CL-atse protocol analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 277–286. Springer, Heidelberg (2006

    Development of surface plasmon resonance-based sensor for detection of silver nanoparticles in food and the environment

    Get PDF
    Silver nanoparticles are recognized as effective antimicrobial agents and have been implemented in various consumer products including washing machines, refrigerators, clothing, medical devices, and food packaging. Alongside the silver nanoparticles benefits, their novel properties have raised concerns about possible adverse effects on biological systems. To protect consumer’s health and the environment, efficient monitoring of silver nanoparticles needs to be established. Here, we present the development of human metallothionein (MT) based surface plasmon resonance (SPR) sensor for rapid detection of nanosilver. Incorporation of human metallothionein 1A to the sensor surface enables screening for potentially biologically active silver nanoparticles at parts per billion sensitivity. Other protein ligands were also tested for binding capacity of the nanosilver and were found to be inferior to the metallothionein. The biosensor has been characterized in terms of selectivity and sensitivity towards different types of silver nanoparticles and applied in measurements of real-life samples—such as fresh vegetables and river water. Our findings suggest that human MT1-based SPR sensor has the potential to be utilized as a routine screening method for silver nanoparticles, that can provide rapid and automated analysis dedicated to environmental and food safety monitoring

    Physical properties of Centaur (60558) 174P/Echeclus from stellar occultations

    Full text link
    The Centaur (60558) Echeclus was discovered on March 03, 2000, orbiting between the orbits of Jupiter and Uranus. After exhibiting frequent outbursts, it also received a comet designation, 174P. If the ejected material can be a source of debris to form additional structures, studying the surroundings of an active body like Echeclus can provide clues about the formation scenarios of rings, jets, or dusty shells around small bodies. Stellar occultation is a handy technique for this kind of investigation, as it can, from Earth-based observations, detect small structures with low opacity around these objects. Stellar occultation by Echeclus was predicted and observed in 2019, 2020, and 2021. We obtain upper detection limits of rings with widths larger than 0.5 km and optical depth of τ\tau = 0.02. These values are smaller than those of Chariklo's main ring; in other words, a Chariklo-like ring would have been detected. The occultation observed in 2020 provided two positive chords used to derive the triaxial dimensions of Echeclus based on a 3D model and pole orientation available in the literature. We obtained a=37.0±0.6a = 37.0\pm0.6 km, b=28.4±0.5b = 28.4 \pm 0.5 km, and c=24.9±0.4c= 24.9 \pm 0.4 km, resulting in an area-equivalent radius of 30.0±0.530.0 \pm 0.5 km. Using the projected limb at the occultation epoch and the available absolute magnitude (Hv=9.971±0.031\rm{H}_{\rm{v}} = 9.971 \pm 0.031), we calculate an albedo of pv=0.050±0.003p_{\rm{v}} = 0.050 \pm 0.003. Constraints on the object's density and internal friction are also proposed.Comment: Corrected and typeset versio
    corecore