10,300 research outputs found
Finite Temperature Casimir Effect in the Presence of Extra Dimensions
We consider the finite temperature Casimir force acting on two parallel
plates in a closed cylinder with the same cross section of arbitrary shape in
the presence of extra dimensions. Dirichlet boundary conditions are imposed on
one plate and fractional Neumann conditions with order between zero (Dirichlet)
and one (Neumann) are imposed on the other plate. Formulas for the Casimir
force show that it is always attractive for Dirichlet boundary conditions, and
is always repulsive when the fractional order is larger than 1/2. For some
fractional orders less than 1/2, the Casimir force can be either attractive or
repulsive depending on the size of the internal manifold and temperature.Comment: To appear in the proceedings of 9th Conference on Quantum Field
Theory under the Influence of External Conditions (QFEXT 09): Devoted to the
Centenary of H. B. G. Casimir, Norman, Oklahoma, 21-25 Sep 200
Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems
Modern urban railways extensively use computerized sensing and control
technologies to achieve safe, reliable, and well-timed operations. However, the
use of these technologies may provide a convenient leverage to cyber-attackers
who have bypassed the air gaps and aim at causing safety incidents and service
disruptions. In this paper, we study false data injection (FDI) attacks against
railways' traction power systems (TPSes). Specifically, we analyze two types of
FDI attacks on the train-borne voltage, current, and position sensor
measurements - which we call efficiency attack and safety attack -- that (i)
maximize the system's total power consumption and (ii) mislead trains' local
voltages to exceed given safety-critical thresholds, respectively. To
counteract, we develop a global attack detection (GAD) system that serializes a
bad data detector and a novel secondary attack detector designed based on
unique TPS characteristics. With intact position data of trains, our detection
system can effectively detect the FDI attacks on trains' voltage and current
measurements even if the attacker has full and accurate knowledge of the TPS,
attack detection, and real-time system state. In particular, the GAD system
features an adaptive mechanism that ensures low false positive and negative
rates in detecting the attacks under noisy system measurements. Extensive
simulations driven by realistic running profiles of trains verify that a TPS
setup is vulnerable to the FDI attacks, but these attacks can be detected
effectively by the proposed GAD while ensuring a low false positive rate.Comment: IEEE/IFIP DSN-2016 and ACM Trans. on Cyber-Physical System
Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation
This paper studies the performance and resilience of a cyber-physical control
system (CPCS) with attack detection and reactive attack mitigation. It
addresses the problem of deriving an optimal sequence of false data injection
attacks that maximizes the state estimation error of the system. The results
provide basic understanding about the limit of the attack impact. The design of
the optimal attack is based on a Markov decision process (MDP) formulation,
which is solved efficiently using the value iteration method. Using the
proposed framework, we quantify the effect of false positives and
mis-detections on the system performance, which can help the joint design of
the attack detection and mitigation. To demonstrate the use of the proposed
framework in a real-world CPCS, we consider the voltage control system of power
grids, and run extensive simulations using PowerWorld, a high-fidelity power
system simulator, to validate our analysis. The results show that by carefully
designing the attack sequence using our proposed approach, the attacker can
cause a large deviation of the bus voltages from the desired setpoint. Further,
the results verify the optimality of the derived attack sequence and show that,
to cause maximum impact, the attacker must carefully craft his attack to strike
a balance between the attack magnitude and stealthiness, due to the
simultaneous presence of attack detection and mitigation
Casimir effect of electromagnetic field in Randall-Sundrum spacetime
We study the finite temperature Casimir effect on a pair of parallel
perfectly conducting plates in Randall-Sundrum model without using scalar field
analogy. Two different ways of interpreting perfectly conducting conditions are
discussed. The conventional way that uses perfectly conducting condition
induced from 5D leads to three discrete mode corrections. This is very
different from the result obtained from imposing 4D perfectly conducting
conditions on the 4D massless and massive vector fields obtained by decomposing
the 5D electromagnetic field. The latter only contains two discrete mode
corrections, but it has a continuum mode correction that depends on the
thicknesses of the plates. It is shown that under both boundary conditions, the
corrections to the Casimir force make the Casimir force more attractive. The
correction under 4D perfectly conducting condition is always smaller than the
correction under the 5D induced perfectly conducting condition. These
statements are true at any temperature.Comment: 20 pages, 4 figure
The Multicomponent KP Hierarchy: Differential Fay Identities and Lax Equations
In this article, we show that four sets of differential Fay identities of an
-component KP hierarchy derived from the bilinear relation satisfied by the
tau function of the hierarchy are sufficient to derive the auxiliary linear
equations for the wave functions. From this, we derive the Lax representation
for the -component KP hierarchy, which are equations satisfied by some
pseudodifferential operators with matrix coefficients. Besides the Lax
equations with respect to the time variables proposed in \cite{2}, we also
obtain a set of equations relating different charge sectors, which can be
considered as a generalization of the modified KP hierarchy proposed in
\cite{3}.Comment: 19 page
Focal points and fiscal discipline. ACES Cases No. 2013.2
Many studies suggest that balanced budget rules can restrain sovereign debt and lower sovereign borrowing costs, even if those rules are never enforced in court. Typically, this is explained as a result of a legal deterrence logic, in which the threat of judicial enforcement deters sovereigns from violating the rules. By contrast, we argue that balanced budget rules work by coordinating decentralized punishment of sovereigns by bond markets, rather than by posing a credible threat of judicial enforcement. Therefore, the clarity of the focal point provided by the rule, rather than the strength of its judicial enforcement mechanisms, determines its effectiveness. We develop a formal model that captures the logic of our argument, and we assess this model using data on US states. We then consider implications of our argument for the impact of the balanced budget rules recently imposed on eurozone states in the Fiscal Compact Treaty
Conformal Mappings and Dispersionless Toda hierarchy
Let be the space consists of pairs , where is a
univalent function on the unit disc with , is a univalent function
on the exterior of the unit disc with and
. In this article, we define the time variables , on which are holomorphic with respect to the natural
complex structure on and can serve as local complex coordinates
for . We show that the evolutions of the pair with
respect to these time coordinates are governed by the dispersionless Toda
hierarchy flows. An explicit tau function is constructed for the dispersionless
Toda hierarchy. By restricting to the subspace consists
of pairs where , we obtain the integrable hierarchy
of conformal mappings considered by Wiegmann and Zabrodin \cite{WZ}. Since
every homeomorphism of the unit circle corresponds uniquely to
an element of under the conformal welding
, the space can be naturally
identified as a subspace of characterized by . We
show that we can naturally define complexified vector fields \pa_n, n\in \Z
on so that the evolutions of on
with respect to \pa_n satisfy the dispersionless Toda
hierarchy. Finally, we show that there is a similar integrable structure for
the Riemann mappings . Moreover, in the latter case, the time
variables are Fourier coefficients of and .Comment: 23 pages. This is to replace the previous preprint arXiv:0808.072
Pistons modeled by potentials
In this article we consider a piston modelled by a potential in the presence
of extra dimensions. We analyze the functional determinant and the Casimir
effect for this configuration. In order to compute the determinant and Casimir
force we employ the zeta function scheme. Essentially, the computation reduces
to the analysis of the zeta function associated with a scalar field living on
an interval in a background potential. Although, as a model for a
piston, it seems reasonable to assume a potential having compact support within
, we provide a formalism that can be applied to any sufficiently smooth
potential.Comment: 10 pages, LaTeX. A typo in eq. (3.5) has been corrected. In
"Cosmology, Quantum Vacuum and Zeta Functions: In Honour of Emilio Elizalde",
Eds. S.D. Odintsov, D. Saez-Gomez, and S. Xambo-Descamps. (Springer 2011) pp
31
Impaired interferon-γ responses, increased interleukin-17 expression, and a tumor necrosis factor–α transcriptional program in invasive aspergillosis
This article is available open access through the publisher’s website. Copyright @ 2009 Oxford University Press.Background - Invasive aspergillosis (IA) is the most common cause of death associated with fungal infection in the developed world. Historically, susceptibility to IA has been associated with prolonged neutropenia; however, IA has now become a major problem in patients on calcineurin inhibitors and allogenic hematopoetic stem cell transplant patients following engraftment. These observations suggest complex cellular mechanisms govern immunity to IA. Methods - To characterize the key early events that govern outcome from infection with Aspergillus fumigatus we performed a comparative immunochip microarray analysis of the pulmonary transcriptional response to IA between cyclophosphamide-treated mice and immunocompetent mice at 24 h after infection. Results - We demonstrate that death due to infection is associated with a failure to generate an incremental interferon-γ response, increased levels of interleukin-5 and interleukin-17a transcript, coordinated expression of a network of tumor necrosis factor–α-related genes, and increased levels of tumor necrosis factor–α. In contrast, clearance of infection is associated with increased expression of a number genes encoding proteins involved in innate pathogen clearance, as well as apoptosis and control of inflammation. Conclusion - This first organ-level immune response transcriptional analysis for IA has enabled us to gain new insights into the mechanisms that govern fungal immunity in the lung.The BBSRC, CGD Research Trust, and the MRC
- …
