8,008 research outputs found

    Finite Temperature Casimir Effect in the Presence of Extra Dimensions

    Full text link
    We consider the finite temperature Casimir force acting on two parallel plates in a closed cylinder with the same cross section of arbitrary shape in the presence of extra dimensions. Dirichlet boundary conditions are imposed on one plate and fractional Neumann conditions with order between zero (Dirichlet) and one (Neumann) are imposed on the other plate. Formulas for the Casimir force show that it is always attractive for Dirichlet boundary conditions, and is always repulsive when the fractional order is larger than 1/2. For some fractional orders less than 1/2, the Casimir force can be either attractive or repulsive depending on the size of the internal manifold and temperature.Comment: To appear in the proceedings of 9th Conference on Quantum Field Theory under the Influence of External Conditions (QFEXT 09): Devoted to the Centenary of H. B. G. Casimir, Norman, Oklahoma, 21-25 Sep 200

    Role stress of local Japanese staff in Japanese companies in Australia

    Full text link
    This paper reports the findings from a qualitative study which investigates the level of work attitude and role stress (role ambiguity and role conflict) experienced by local hired Japanese staff in Japanese companies in Australia. The findings revealed that work attitudes of local hired Japanese staff were similar to those of employees in Japan. Role stress experiences of local hired Japanese staff refer to dissatisfaction with both Japanese expatriate staff and non-Japanese local staff. Three sources of their role stress experiences were also identified. These were lack of English language competence, source of recruitment, and cultural background. Each source is related to a particular type of role stress

    Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation

    Full text link
    This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the state estimation error of the system. The results provide basic understanding about the limit of the attack impact. The design of the optimal attack is based on a Markov decision process (MDP) formulation, which is solved efficiently using the value iteration method. Using the proposed framework, we quantify the effect of false positives and mis-detections on the system performance, which can help the joint design of the attack detection and mitigation. To demonstrate the use of the proposed framework in a real-world CPCS, we consider the voltage control system of power grids, and run extensive simulations using PowerWorld, a high-fidelity power system simulator, to validate our analysis. The results show that by carefully designing the attack sequence using our proposed approach, the attacker can cause a large deviation of the bus voltages from the desired setpoint. Further, the results verify the optimality of the derived attack sequence and show that, to cause maximum impact, the attacker must carefully craft his attack to strike a balance between the attack magnitude and stealthiness, due to the simultaneous presence of attack detection and mitigation

    Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems

    Get PDF
    Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this paper, we study false data injection (FDI) attacks against railways' traction power systems (TPSes). Specifically, we analyze two types of FDI attacks on the train-borne voltage, current, and position sensor measurements - which we call efficiency attack and safety attack -- that (i) maximize the system's total power consumption and (ii) mislead trains' local voltages to exceed given safety-critical thresholds, respectively. To counteract, we develop a global attack detection (GAD) system that serializes a bad data detector and a novel secondary attack detector designed based on unique TPS characteristics. With intact position data of trains, our detection system can effectively detect the FDI attacks on trains' voltage and current measurements even if the attacker has full and accurate knowledge of the TPS, attack detection, and real-time system state. In particular, the GAD system features an adaptive mechanism that ensures low false positive and negative rates in detecting the attacks under noisy system measurements. Extensive simulations driven by realistic running profiles of trains verify that a TPS setup is vulnerable to the FDI attacks, but these attacks can be detected effectively by the proposed GAD while ensuring a low false positive rate.Comment: IEEE/IFIP DSN-2016 and ACM Trans. on Cyber-Physical System

    Transcriptional factor PU.1 regulates decidual C1q expression in early pregnancy in human

    Get PDF
    "Copyright: © 2015 Madhukaran, Kishore, Jamil, Teo, Choolani and Lu. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms."C1q is the first recognition subcomponent of the complement classical pathway, which in addition to being synthesized in the liver, is also expressed by macrophages and dendritic cells (DCs). Trophoblast invasion during early placentation results in accumulation of debris that triggers the complement system. Hence, both early and late components of the classical pathway are widely distributed in the placenta and decidua. In addition, C1q has recently been shown to significantly contribute to feto-maternal tolerance, trophoblast migration, and spiral artery remodeling, although the exact mechanism remains unknown. Pregnancy in mice, genetically deficient in C1q, mirrors symptoms similar to that of human preeclampsia. Thus, regulated complement activation has been proposed as an essential requirement for normal successful pregnancy. Little is known about the molecular pathways that regulate C1q expression in pregnancy. PU.1, an Ets-family transcription factor, is required for the development of hematopoietic myeloid lineage immune cells, and its expression is tissue-specific. Recently, PU.1 has been shown to regulate C1q gene expression in DCs and macrophages. Here, we have examined if PU.1 transcription factor regulates decidual C1q expression. We used immune-histochemical analysis, PCR, and immunostaining to localize and study the gene expression of PU.1 transcription factor in early human decidua. PU.1 was highly expressed at gene and protein level in early human decidual cells including trophoblast and stromal cells. Surprisingly, nuclear as well as cytoplasmic PU.1 expression was observed. Decidual cells with predominantly nuclear PU.1 expression had higher C1q expression. It is likely that nuclear and cytoplasmic PU.1 localization has a role to play in early pregnancy via regulating C1q expression in the decidua during implantation

    Focal points and fiscal discipline. ACES Cases No. 2013.2

    Get PDF
    Many studies suggest that balanced budget rules can restrain sovereign debt and lower sovereign borrowing costs, even if those rules are never enforced in court. Typically, this is explained as a result of a legal deterrence logic, in which the threat of judicial enforcement deters sovereigns from violating the rules. By contrast, we argue that balanced budget rules work by coordinating decentralized punishment of sovereigns by bond markets, rather than by posing a credible threat of judicial enforcement. Therefore, the clarity of the focal point provided by the rule, rather than the strength of its judicial enforcement mechanisms, determines its effectiveness. We develop a formal model that captures the logic of our argument, and we assess this model using data on US states. We then consider implications of our argument for the impact of the balanced budget rules recently imposed on eurozone states in the Fiscal Compact Treaty

    Pistons modeled by potentials

    Full text link
    In this article we consider a piston modelled by a potential in the presence of extra dimensions. We analyze the functional determinant and the Casimir effect for this configuration. In order to compute the determinant and Casimir force we employ the zeta function scheme. Essentially, the computation reduces to the analysis of the zeta function associated with a scalar field living on an interval [0,L][0,L] in a background potential. Although, as a model for a piston, it seems reasonable to assume a potential having compact support within [0,L][0,L], we provide a formalism that can be applied to any sufficiently smooth potential.Comment: 10 pages, LaTeX. A typo in eq. (3.5) has been corrected. In "Cosmology, Quantum Vacuum and Zeta Functions: In Honour of Emilio Elizalde", Eds. S.D. Odintsov, D. Saez-Gomez, and S. Xambo-Descamps. (Springer 2011) pp 31

    Understanding organisational use of IT/IS for demand and supply chain management in a MNC pharmaceutical company

    Get PDF
    Demand supply chain management (DSCM), which integrates market segmentation with supply chain strategy supported by proper alignment in organizational configuration, is regarded by researchers as the next stage of evolution of supply chain management. Through an exploratory case study of the pharmaceutical industry, this study investigates the role of information systems / information technology (IS/IT) as an enabler of DSCM. The findings reveal that there is little alignment between IS and supply chain strategy even though technology is used widely in the company that is investigated. The lack of alignment has prevented the organisation from being DSCM capable. The study highlights the impacts of lack of alignment between IS and DSCM and helps practitioners understand the implications

    Casimir effect of electromagnetic field in D-dimensional spherically symmetric cavities

    Full text link
    Eigenmodes of electromagnetic field with perfectly conducting or infinitely permeable conditions on the boundary of a D-dimensional spherically symmetric cavity is derived explicitly. It is shown that there are (D-2) polarizations for TE modes and one polarization for TM modes, giving rise to a total of (D-1) polarizations. In case of a D-dimensional ball, the eigenfrequencies of electromagnetic field with perfectly conducting boundary condition coincides with the eigenfrequencies of gauge one-forms with relative boundary condition; whereas the eigenfrequencies of electromagnetic field with infinitely permeable boundary condition coincides with the eigenfrequencies of gauge one-forms with absolute boundary condition. Casimir energy for a D-dimensional spherical shell configuration is computed using both cut-off regularization and zeta regularization. For a double spherical shell configuration, it is shown that the Casimir energy can be written as a sum of the single spherical shell contributions and an interacting term, and the latter is free of divergence. The interacting term always gives rise to an attractive force between the two spherical shells. Its leading term is the Casimir force acting between two parallel plates of the same area, as expected by proximity force approximation.Comment: 28 page
    corecore