392 research outputs found
The intricate Galaxy disk: velocity asymmetries in Gaia-TGAS
We use the Gaia-TGAS data to compare the transverse velocities in Galactic
longitude (coming from proper motions and parallaxes) in the Milky Way disk for
negative and positive longitudes as a function of distance. The transverse
velocities are strongly asymmetric and deviate significantly from the
expectations for an axisymmetric Galaxy. The value and sign of the asymmetry
changes at spatial scales of several tens of degrees in Galactic longitude and
about 0.5 kpc in distance. The asymmetry is statistically significant at 95%
confidence level for 57% of the region probed, which extends up to ~1.2 kpc. A
percentage of 24% of the region studied shows absolute differences at this
confidence level larger than 5 km/s and 7% larger than 10 km/s. The asymmetry
pattern shows mild variations in the vertical direction and with stellar type.
A first qualitative comparison with spiral arm models indicates that the arms
are unlikely to be the main source of the asymmetry. We briefly discuss
alternative origins. This is the first time that global all-sky asymmetries are
detected in the Milky Way kinematics, beyond the local neighbourhood, and with
a purely astrometric sample.Comment: Accepted for publication in A&A Letter
Design and Fabrication of Coplanar YBCO Structures on Lithium Niobate Substrates
YBa2Cu3O7-δ (YBCO) with low RF losses has been successfully deposited onto lithium niobate (LNO) to improve the performance of electrooptic Mach-Zender modulators. Epitaxial, c-axis oriented superconducting YBCO thin films have been grown on X-cut LNO single crystals with a yttria-stabilized zirconia (YSZ) buffer layer by RF magnetron sputtering. This buffer layer is needed to obtain good superconducting properties of the YBCO grown. Numerical tools have been developed to analyze CPW structures based on YBCO/YSZ/LNO trilayers, and they indicate that YSZ thickness has to be kept to the minimum necessary for good YBCO growth. With this restriction, the RF losses of YBCO/YSZ/LNO samples have been measured. The results from these measurements are used to quantify the performance enhancement in a Mach-Zender modulator using YBCO electrodes
ETHNOPSYCHIATRIC INTERPRETATIONS OF SCHIZOPHRENIC ILLNESS: THE PROBLEM OF NERVIOS WITHIN MEXICAN-AMERICAN FAMILIES
Experimental Assessment of Filter Narrowing Effect for Low Bandwidth Connections in EON
The ac magnetic response of mesoscopic type II superconductors
The response of mesoscopic superconductors to an ac magnetic field is
numerically investigated on the basis of the time-dependent Ginzburg-Landau
equations (TDGL). We study the dependence with frequency and dc
magnetic field of the linear ac susceptibility
in square samples with dimensions of the order of the London penetration depth.
At the behavior of as a function of agrees very well
with the two fluid model, and the imaginary part of the ac susceptibility,
, shows a dissipative a maximum at the frequency
. In the presence of a magnetic field a
second dissipation maximum appears at a frequency . The most
interesting behavior of mesoscopic superconductors can be observed in the
curves obtained at a fixed frequency. At a fixed number of
vortices, continuously increases with increasing . We
observe that the dissipation reaches a maximum for magnetic fields right below
the vortex penetration fields. Then, after each vortex penetration event, there
is a sudden suppression of the ac losses, showing discontinuities in
at several values of . We show that these
discontinuities are typical of the mesoscopic scale and disappear in
macroscopic samples, which have a continuos behavior of . We
argue that these discontinuities in are due to the effect of
{\it nascent vortices} which cause a large variation of the amplitude of the
order parameter near the surface before the entrance of vortices.Comment: 12 pages, 9 figures, RevTex
On the Filter Narrowing Issues in Elastic Optical Networks
This paper describes the problematic filter narrowing effect in the context of next-generation elastic optical networks. First, three possible scenarios are introduced: the transition from an actual fixed-grid to a flexigrid network, the generic full flexi-grid network, and a proposal for a filterless optical network. Next, we investigate different transmission techniques and evaluate the penalty introduced by the filtering effect when considering Nyquist wavelength division multiplexing, single side-band direct-detection orthogonal frequency division multiplexing, and symbol-rate variable dual polarization quadrature amplitude modulation. Also, different approaches to compensate for the filter narrowing effect are discussed. Results show that the specific needs per each scenario can be fulfilled by the aforementioned technologies and techniques or a combination of them, when balancing performance, network reach, and cost
Modular SDN-enabled S-BVT Adopting Widely Tunable MEMS VCSEL for Flexible/Elastic Optical Metro Networks
We propose an SDN-enabled S-BVT adopting directly-modulated tunable VCSEL with direct-detection for optical metro networks and spectrum defragmentation. We experimentally assess it over different network paths up to 185km and in presence of adjacent slices
Protocol analysis modulo combination of theories: A case study in Maude-NPA
There is a growing interest in formal methods and tools to analyze cryptographic protocols modulo algebraic properties of their underlying cryptographic functions. It is well-known that an intruder who uses algebraic equivalences of such functions can mount attacks that would be impossible if the cryptographic functions did not satisfy such equivalences. In practice, however, protocols use a collection of well-known functions, whose algebraic properties can naturally be grouped together as a union of theories E 1... ¿ n. Reasoning symbolically modulo the algebraic properties E 1... ¿ n requires performing (E 1... ¿ n)-unification. However, even if a unification algorithm for each individual E i is available, this requires combining the existing algorithms by methods that are highly non-deterministic and have high computational cost. In this work we present an alternative method to obtain unification algorithms for combined theories based on variant narrowing. Although variant narrowing is less efficient at the level of a single theory E i, it does not use any costly combination method. Furthermore, it does not require that each E i has a dedicated unification algorithm in a tool implementation. We illustrate the use of this method in the Maude-NPA tool by means of a well-known protocol requiring the combination of three distinct equational theories. © 2011 Springer-Verlag.R. Sasse and J. Meseguer have been partially supported by NSF Grants CNS0716638, CNS-0831064 and CNS-0904749. S. Escobar has been partially supported
by the EU (FEDER) and the Spanish MEC/MICINN under grant TIN 2007-68093-
C02-02. C. Meadows has been partially supported by NSF Grant CNS-0904749National Science Foundation, EEUUSasse, R.; Escobar Román, S.; Meadows, C.; Meseguer, J. (2011). Protocol analysis modulo combination of theories: A case study in Maude-NPA. En Security and Trust Management. Springer Verlag (Germany). 6710:163-178. doi:10.1007/978-3-642-22444-7_11S1631786710Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2–32 (2006)Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.-C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005)Baader, F., Schulz, K.U.: Unification in the union of disjoint equational theories: Combining decision procedures. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, pp. 50–65. Springer, Heidelberg (1992)Basin, D.A., Mödersheim, S., Viganò, L.: An on-the-fly model-checker for security protocol analysis. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 253–270. Springer, Heidelberg (2003)Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. In: Treinen, R. (ed.) RTA 2009. LNCS, vol. 5595, pp. 148–163. Springer, Heidelberg (2009)Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW, pp. 82–96. IEEE Computer Society, Los Alamitos (2001)Bursuc, S., Comon-Lundh, H.: Protocol security and algebraic properties: Decision results for a bounded number of sessions. In: Treinen, R. (ed.) RTA 2009. LNCS, vol. 5595, pp. 133–147. Springer, Heidelberg (2009)Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: LICS, pp. 261–270. IEEE Computer Society, Los Alamitos (2003)Chevalier, Y., Rusinowitch, M.: Hierarchical combination of intruder theories. Inf. Comput. 206(2-4), 352–377 (2008)Chevalier, Y., Rusinowitch, M.: Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures. Theor. Comput. Sci. 411(10), 1261–1282 (2010)Ciobâcă, Ş., Delaune, S., Kremer, S.: Computing knowledge in security protocols under convergent equational theories. In: Schmidt, R.A. (ed.) CADE-22. LNCS, vol. 5663, pp. 355–370. Springer, Heidelberg (2009)Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 294–307. Springer, Heidelberg (2005)Cortier, V., Delaitre, J., Delaune, S.: Safely composing security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, pp. 352–363. Springer, Heidelberg (2007)Cremers, C.J.F.: The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties. Theoretical Computer Science 367(1-2), 162–202 (2006)Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: Cryptographic protocol analysis modulo equational properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009 Tutorial Lectures. LNCS, vol. 5705, pp. 1–50. Springer, Heidelberg (2009)Escobar, S., Meseguer, J., Sasse, R.: Effectively checking or disproving the finite variant property. Technical Report UIUCDCS-R-2008-2960, Department of Computer Science - University of Illinois at Urbana-Champaign (April 2008)Escobar, S., Meseguer, J., Sasse, R.: Effectively checking the finite variant property. In: Voronkov, A. (ed.) RTA 2008. LNCS, vol. 5117, pp. 79–93. Springer, Heidelberg (2008)Escobar, S., Meseguer, J., Sasse, R.: Variant narrowing and equational unification. Electr. Notes Theor. Comput. Sci. 238(3), 103–119 (2009)Escobar, S., Sasse, R., Meseguer, J.: Folding variant narrowing and optimal variant termination. In: Ölveczky, P.C. (ed.) WRLA 2010. LNCS, vol. 6381, pp. 52–68. Springer, Heidelberg (2010)Fabrega, F.J.T., Herzog, J., Guttman, J.: Strand Spaces: What Makes a Security Protocol Correct? Journal of Computer Security 7, 191–230 (1999)Guo, Q., Narendran, P.: Unification and matching modulo nilpotence. In: CADE-13. LNCS, vol. 1104, pp. 261–274. Springer, Heidelberg (1996)Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), IETF RFC 2409, (November 1998)Jouannaud, J.-P., Kirchner, C., Kirchner, H.: Incremental construction of unification algorithms in equational theories. In: Díaz, J. (ed.) ICALP 1983. LNCS, vol. 154, pp. 361–373. Springer, Heidelberg (1983)Küsters, R., Truderung, T.: Reducing protocol analysis with xor to the xor-free case in the Horn theory based approach. In: ACM Conference on Computer and Communications Security, pp. 129–138 (2008)Küsters, R., Truderung, T.: Using ProVerif to analyze protocols with Diffie-Hellman exponentiation. In: CSF, pp. 157–171. IEEE Computer Society, Los Alamitos (2009)Lafourcade, P., Terrade, V., Vigier, S.: Comparison of cryptographic verification tools dealing with algebraic properties. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 173–185. Springer, Heidelberg (2010)Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147–166. Springer, Heidelberg (1996)Meadows, C.: The NRL protocol analyzer: An overview. J. Log. Program. 26(2), 113–131 (1996)Meseguer, J.: Conditional rewriting logic as a united model of concurrency. Theor. Comput. Sci. 96(1), 73–155 (1992)Meseguer, J.: Membership algebra as a logical framework for equational specification. In: Parisi-Presicce, F. (ed.) WADT 1997. LNCS, vol. 1376, pp. 18–61. Springer, Heidelberg (1998)Meseguer, J., Thati, P.: Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Higher-Order and Symbolic Computation 20(1–2), 123–160 (2007)Ohlebusch, E.: Advanced Topics in Term Rewriting. Springer, Heidelberg (2002)Santiago, S., Talcott, C.L., Escobar, S., Meadows, C., Meseguer, J.: A graphical user interface for Maude-NPA. Electr. Notes Theor. Comput. Sci. 258(1), 3–20 (2009)Schmidt-Schauß, M.: Unification in a combination of arbitrary disjoint equational theories. J. Symb. Comput. 8(1/2), 51–99 (1989)Terese (ed.): Term Rewriting Systems. Cambridge University Press, Cambridge (2003)Turuani, M.: The CL-atse protocol analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 277–286. Springer, Heidelberg (2006
Development of surface plasmon resonance-based sensor for detection of silver nanoparticles in food and the environment
Silver nanoparticles are recognized as effective antimicrobial agents and have been implemented in various consumer products including washing machines, refrigerators, clothing, medical devices, and food packaging. Alongside the silver nanoparticles benefits, their novel properties have raised concerns about possible adverse effects on biological systems. To protect consumer’s health and the environment, efficient monitoring of silver nanoparticles needs to be established. Here, we present the development of human metallothionein (MT) based surface plasmon resonance (SPR) sensor for rapid detection of nanosilver. Incorporation of human metallothionein 1A to the sensor surface enables screening for potentially biologically active silver nanoparticles at parts per billion sensitivity. Other protein ligands were also tested for binding capacity of the nanosilver and were found to be inferior to the metallothionein. The biosensor has been characterized in terms of selectivity and sensitivity towards different types of silver nanoparticles and applied in measurements of real-life samples—such as fresh vegetables and river water. Our findings suggest that human MT1-based SPR sensor has the potential to be utilized as a routine screening method for silver nanoparticles, that can provide rapid and automated analysis dedicated to environmental and food safety monitoring
Physical properties of Centaur (60558) 174P/Echeclus from stellar occultations
The Centaur (60558) Echeclus was discovered on March 03, 2000, orbiting
between the orbits of Jupiter and Uranus. After exhibiting frequent outbursts,
it also received a comet designation, 174P. If the ejected material can be a
source of debris to form additional structures, studying the surroundings of an
active body like Echeclus can provide clues about the formation scenarios of
rings, jets, or dusty shells around small bodies. Stellar occultation is a
handy technique for this kind of investigation, as it can, from Earth-based
observations, detect small structures with low opacity around these objects.
Stellar occultation by Echeclus was predicted and observed in 2019, 2020, and
2021. We obtain upper detection limits of rings with widths larger than 0.5 km
and optical depth of = 0.02. These values are smaller than those of
Chariklo's main ring; in other words, a Chariklo-like ring would have been
detected. The occultation observed in 2020 provided two positive chords used to
derive the triaxial dimensions of Echeclus based on a 3D model and pole
orientation available in the literature. We obtained km, km, and km, resulting in an area-equivalent
radius of km. Using the projected limb at the occultation epoch
and the available absolute magnitude (), we
calculate an albedo of . Constraints on the
object's density and internal friction are also proposed.Comment: Corrected and typeset versio
- …