1,145 research outputs found
Superflare G and K Stars and the Lithium abundance
We analyzed here the connection of superflares and the lithium abundance in G
and K stars based on Li abundance determinations conducted with the echelle
spectra of a full set of 280 stars obtained with the ELODIE spectrograph. For
high-active stars we show a definite correlation between and the
chromosphere activity. We show that sets of stars with high Li abundance and
having superflares possess common properties. It relates, firstly, to stars
with activity saturation. We consider the X-ray data for G, K, and M stars
separately, and show that transition from a saturation mode to solar-type
activity takes place at values of rotation periods 1.1, 3.3, and 7.2 days for
G2, K4 and M3 spectral types, respectively. We discuss bimodal distribution of
a number of G and K main-sequence stars versus an axial rotation and location
of superflare stars with respect to other Kepler stars. We conclude that
superflare G and K stars are mainly fast rotating young objects, but some of
them belong to stars with solar-type activity. At the same time, we found a
group of G stars with high Li content , but being
slower rotators with rotation periods > 10 days, which are characterized by low
chromospheric activity. This agrees with a large spread in Li abundances in
superflare stars. A mechanism leading to this effect is discussed.Comment: 6 pages, 8 figures. The 19th Cambridge Workshop on Cool Stars,
Stellar Systems, and the Su
Time-reversal symmetric resolution of unity without background integrals in open quantum systems
We present a new complete set of states for a class of open quantum systems,
to be used in expansion of the Green's function and the time-evolution
operator. A remarkable feature of the complete set is that it observes
time-reversal symmetry in the sense that it contains decaying states (resonant
states) and growing states (anti-resonant states) parallelly. We can thereby
pinpoint the occurrence of the breaking of time-reversal symmetry at the choice
of whether we solve Schroedinger equation as an initial-condition problem or a
terminal-condition problem. Another feature of the complete set is that in the
subspace of the central scattering area of the system, it consists of
contributions of all states with point spectra but does not contain any
background integrals. In computing the time evolution, we can clearly see
contribution of which point spectrum produces which time dependence. In the
whole infinite state space, the complete set does contain an integral but it is
over unperturbed eigenstates of the environmental area of the system and hence
can be calculated analytically. We demonstrate the usefulness of the complete
set by computing explicitly the survival probability and the escaping
probability as well as the dynamics of wave packets. The origin of each term of
matrix elements is clear in our formulation, particularly the exponential
decays due to the resonance poles.Comment: 62 pages, 13 figure
Partial Evaluation for Java Malware Detection
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Java exploits and to circumvent detection by Anti Virus (AV) software, obfuscation techniques are routinely applied to make an exploit more difficult to recognise. Popular obfuscation techniques for Java include string obfuscation and applying reflection to hide method calls; two techniques that can either be used together or independently. This paper shows how to apply partial evaluation to remove these obfuscations and thereby improve AV matching. The paper presents a partial evaluator for Jimple, which is a typed three-address code suitable for optimisation and program analysis, and also demonstrates how the residual Jimple code, when transformed back into Java, improves the detection rates of a number of commercial AV products
BCFA: Bespoke Control Flow Analysis for CFA at Scale
Many data-driven software engineering tasks such as discovering programming
patterns, mining API specifications, etc., perform source code analysis over
control flow graphs (CFGs) at scale. Analyzing millions of CFGs can be
expensive and performance of the analysis heavily depends on the underlying CFG
traversal strategy. State-of-the-art analysis frameworks use a fixed traversal
strategy. We argue that a single traversal strategy does not fit all kinds of
analyses and CFGs and propose bespoke control flow analysis (BCFA). Given a
control flow analysis (CFA) and a large number of CFGs, BCFA selects the most
efficient traversal strategy for each CFG. BCFA extracts a set of properties of
the CFA by analyzing the code of the CFA and combines it with properties of the
CFG, such as branching factor and cyclicity, for selecting the optimal
traversal strategy. We have implemented BCFA in Boa, and evaluated BCFA using a
set of representative static analyses that mainly involve traversing CFGs and
two large datasets containing 287 thousand and 162 million CFGs. Our results
show that BCFA can speedup the large scale analyses by 1%-28%. Further, BCFA
has low overheads; less than 0.2%, and low misprediction rate; less than 0.01%.Comment: 12 page
Conditioned reflex activity of rats at later periods after the end of flight aboard the Kosmos-605 biosatellite
The aftereffects of spaceflight on the higher nervous activity of rats were studied. A five lane maze with a feeding terminal was used to check such factors as transfer of experience, the habit and speed of reaching the goal in the maze, long term memory, and the dynamics of errors. During the 3rd-7th postflight week, functional disturbances in the rat HNA were manifested in the deterioration of the capacity for the transfer of experience and for locating the feeding compartment in the maze, thus indicating a general decrease of work capacity. The increased number of errors and failures pointed to exhaustion of higher nervous processes and to the weakened functional activity of the brain
- …