10,300 research outputs found

    Finite Temperature Casimir Effect in the Presence of Extra Dimensions

    Full text link
    We consider the finite temperature Casimir force acting on two parallel plates in a closed cylinder with the same cross section of arbitrary shape in the presence of extra dimensions. Dirichlet boundary conditions are imposed on one plate and fractional Neumann conditions with order between zero (Dirichlet) and one (Neumann) are imposed on the other plate. Formulas for the Casimir force show that it is always attractive for Dirichlet boundary conditions, and is always repulsive when the fractional order is larger than 1/2. For some fractional orders less than 1/2, the Casimir force can be either attractive or repulsive depending on the size of the internal manifold and temperature.Comment: To appear in the proceedings of 9th Conference on Quantum Field Theory under the Influence of External Conditions (QFEXT 09): Devoted to the Centenary of H. B. G. Casimir, Norman, Oklahoma, 21-25 Sep 200

    Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems

    Get PDF
    Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this paper, we study false data injection (FDI) attacks against railways' traction power systems (TPSes). Specifically, we analyze two types of FDI attacks on the train-borne voltage, current, and position sensor measurements - which we call efficiency attack and safety attack -- that (i) maximize the system's total power consumption and (ii) mislead trains' local voltages to exceed given safety-critical thresholds, respectively. To counteract, we develop a global attack detection (GAD) system that serializes a bad data detector and a novel secondary attack detector designed based on unique TPS characteristics. With intact position data of trains, our detection system can effectively detect the FDI attacks on trains' voltage and current measurements even if the attacker has full and accurate knowledge of the TPS, attack detection, and real-time system state. In particular, the GAD system features an adaptive mechanism that ensures low false positive and negative rates in detecting the attacks under noisy system measurements. Extensive simulations driven by realistic running profiles of trains verify that a TPS setup is vulnerable to the FDI attacks, but these attacks can be detected effectively by the proposed GAD while ensuring a low false positive rate.Comment: IEEE/IFIP DSN-2016 and ACM Trans. on Cyber-Physical System

    Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation

    Full text link
    This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the state estimation error of the system. The results provide basic understanding about the limit of the attack impact. The design of the optimal attack is based on a Markov decision process (MDP) formulation, which is solved efficiently using the value iteration method. Using the proposed framework, we quantify the effect of false positives and mis-detections on the system performance, which can help the joint design of the attack detection and mitigation. To demonstrate the use of the proposed framework in a real-world CPCS, we consider the voltage control system of power grids, and run extensive simulations using PowerWorld, a high-fidelity power system simulator, to validate our analysis. The results show that by carefully designing the attack sequence using our proposed approach, the attacker can cause a large deviation of the bus voltages from the desired setpoint. Further, the results verify the optimality of the derived attack sequence and show that, to cause maximum impact, the attacker must carefully craft his attack to strike a balance between the attack magnitude and stealthiness, due to the simultaneous presence of attack detection and mitigation

    Casimir effect of electromagnetic field in Randall-Sundrum spacetime

    Full text link
    We study the finite temperature Casimir effect on a pair of parallel perfectly conducting plates in Randall-Sundrum model without using scalar field analogy. Two different ways of interpreting perfectly conducting conditions are discussed. The conventional way that uses perfectly conducting condition induced from 5D leads to three discrete mode corrections. This is very different from the result obtained from imposing 4D perfectly conducting conditions on the 4D massless and massive vector fields obtained by decomposing the 5D electromagnetic field. The latter only contains two discrete mode corrections, but it has a continuum mode correction that depends on the thicknesses of the plates. It is shown that under both boundary conditions, the corrections to the Casimir force make the Casimir force more attractive. The correction under 4D perfectly conducting condition is always smaller than the correction under the 5D induced perfectly conducting condition. These statements are true at any temperature.Comment: 20 pages, 4 figure

    The Multicomponent KP Hierarchy: Differential Fay Identities and Lax Equations

    Full text link
    In this article, we show that four sets of differential Fay identities of an NN-component KP hierarchy derived from the bilinear relation satisfied by the tau function of the hierarchy are sufficient to derive the auxiliary linear equations for the wave functions. From this, we derive the Lax representation for the NN-component KP hierarchy, which are equations satisfied by some pseudodifferential operators with matrix coefficients. Besides the Lax equations with respect to the time variables proposed in \cite{2}, we also obtain a set of equations relating different charge sectors, which can be considered as a generalization of the modified KP hierarchy proposed in \cite{3}.Comment: 19 page

    Focal points and fiscal discipline. ACES Cases No. 2013.2

    Get PDF
    Many studies suggest that balanced budget rules can restrain sovereign debt and lower sovereign borrowing costs, even if those rules are never enforced in court. Typically, this is explained as a result of a legal deterrence logic, in which the threat of judicial enforcement deters sovereigns from violating the rules. By contrast, we argue that balanced budget rules work by coordinating decentralized punishment of sovereigns by bond markets, rather than by posing a credible threat of judicial enforcement. Therefore, the clarity of the focal point provided by the rule, rather than the strength of its judicial enforcement mechanisms, determines its effectiveness. We develop a formal model that captures the logic of our argument, and we assess this model using data on US states. We then consider implications of our argument for the impact of the balanced budget rules recently imposed on eurozone states in the Fiscal Compact Treaty

    Conformal Mappings and Dispersionless Toda hierarchy

    Full text link
    Let D\mathfrak{D} be the space consists of pairs (f,g)(f,g), where ff is a univalent function on the unit disc with f(0)=0f(0)=0, gg is a univalent function on the exterior of the unit disc with g()=g(\infty)=\infty and f(0)g()=1f'(0)g'(\infty)=1. In this article, we define the time variables tn,nZt_n, n\in \Z, on D\mathfrak{D} which are holomorphic with respect to the natural complex structure on D\mathfrak{D} and can serve as local complex coordinates for D\mathfrak{D}. We show that the evolutions of the pair (f,g)(f,g) with respect to these time coordinates are governed by the dispersionless Toda hierarchy flows. An explicit tau function is constructed for the dispersionless Toda hierarchy. By restricting D\mathfrak{D} to the subspace Σ\Sigma consists of pairs where f(w)=1/g(1/wˉ)ˉf(w)=1/\bar{g(1/\bar{w})}, we obtain the integrable hierarchy of conformal mappings considered by Wiegmann and Zabrodin \cite{WZ}. Since every C1C^1 homeomorphism γ\gamma of the unit circle corresponds uniquely to an element (f,g)(f,g) of D\mathfrak{D} under the conformal welding γ=g1f\gamma=g^{-1}\circ f, the space HomeoC(S1)\text{Homeo}_{C}(S^1) can be naturally identified as a subspace of D\mathfrak{D} characterized by f(S1)=g(S1)f(S^1)=g(S^1). We show that we can naturally define complexified vector fields \pa_n, n\in \Z on HomeoC(S1)\text{Homeo}_{C}(S^1) so that the evolutions of (f,g)(f,g) on HomeoC(S1)\text{Homeo}_{C}(S^1) with respect to \pa_n satisfy the dispersionless Toda hierarchy. Finally, we show that there is a similar integrable structure for the Riemann mappings (f1,g1)(f^{-1}, g^{-1}). Moreover, in the latter case, the time variables are Fourier coefficients of γ\gamma and 1/γ11/\gamma^{-1}.Comment: 23 pages. This is to replace the previous preprint arXiv:0808.072

    Pistons modeled by potentials

    Full text link
    In this article we consider a piston modelled by a potential in the presence of extra dimensions. We analyze the functional determinant and the Casimir effect for this configuration. In order to compute the determinant and Casimir force we employ the zeta function scheme. Essentially, the computation reduces to the analysis of the zeta function associated with a scalar field living on an interval [0,L][0,L] in a background potential. Although, as a model for a piston, it seems reasonable to assume a potential having compact support within [0,L][0,L], we provide a formalism that can be applied to any sufficiently smooth potential.Comment: 10 pages, LaTeX. A typo in eq. (3.5) has been corrected. In "Cosmology, Quantum Vacuum and Zeta Functions: In Honour of Emilio Elizalde", Eds. S.D. Odintsov, D. Saez-Gomez, and S. Xambo-Descamps. (Springer 2011) pp 31

    Impaired interferon-γ responses, increased interleukin-17 expression, and a tumor necrosis factor–α transcriptional program in invasive aspergillosis

    Get PDF
    This article is available open access through the publisher’s website. Copyright @ 2009 Oxford University Press.Background - Invasive aspergillosis (IA) is the most common cause of death associated with fungal infection in the developed world. Historically, susceptibility to IA has been associated with prolonged neutropenia; however, IA has now become a major problem in patients on calcineurin inhibitors and allogenic hematopoetic stem cell transplant patients following engraftment. These observations suggest complex cellular mechanisms govern immunity to IA. Methods - To characterize the key early events that govern outcome from infection with Aspergillus fumigatus we performed a comparative immunochip microarray analysis of the pulmonary transcriptional response to IA between cyclophosphamide-treated mice and immunocompetent mice at 24 h after infection. Results - We demonstrate that death due to infection is associated with a failure to generate an incremental interferon-γ response, increased levels of interleukin-5 and interleukin-17a transcript, coordinated expression of a network of tumor necrosis factor–α-related genes, and increased levels of tumor necrosis factor–α. In contrast, clearance of infection is associated with increased expression of a number genes encoding proteins involved in innate pathogen clearance, as well as apoptosis and control of inflammation. Conclusion - This first organ-level immune response transcriptional analysis for IA has enabled us to gain new insights into the mechanisms that govern fungal immunity in the lung.The BBSRC, CGD Research Trust, and the MRC
    corecore