1,145 research outputs found

    Superflare G and K Stars and the Lithium abundance

    Full text link
    We analyzed here the connection of superflares and the lithium abundance in G and K stars based on Li abundance determinations conducted with the echelle spectra of a full set of 280 stars obtained with the ELODIE spectrograph. For high-active stars we show a definite correlation between logA(Li)\log A(Li) and the chromosphere activity. We show that sets of stars with high Li abundance and having superflares possess common properties. It relates, firstly, to stars with activity saturation. We consider the X-ray data for G, K, and M stars separately, and show that transition from a saturation mode to solar-type activity takes place at values of rotation periods 1.1, 3.3, and 7.2 days for G2, K4 and M3 spectral types, respectively. We discuss bimodal distribution of a number of G and K main-sequence stars versus an axial rotation and location of superflare stars with respect to other Kepler stars. We conclude that superflare G and K stars are mainly fast rotating young objects, but some of them belong to stars with solar-type activity. At the same time, we found a group of G stars with high Li content (logA(Li)=1.53)(\log A(Li) = 1.5 - 3), but being slower rotators with rotation periods > 10 days, which are characterized by low chromospheric activity. This agrees with a large spread in Li abundances in superflare stars. A mechanism leading to this effect is discussed.Comment: 6 pages, 8 figures. The 19th Cambridge Workshop on Cool Stars, Stellar Systems, and the Su

    Time-reversal symmetric resolution of unity without background integrals in open quantum systems

    Get PDF
    We present a new complete set of states for a class of open quantum systems, to be used in expansion of the Green's function and the time-evolution operator. A remarkable feature of the complete set is that it observes time-reversal symmetry in the sense that it contains decaying states (resonant states) and growing states (anti-resonant states) parallelly. We can thereby pinpoint the occurrence of the breaking of time-reversal symmetry at the choice of whether we solve Schroedinger equation as an initial-condition problem or a terminal-condition problem. Another feature of the complete set is that in the subspace of the central scattering area of the system, it consists of contributions of all states with point spectra but does not contain any background integrals. In computing the time evolution, we can clearly see contribution of which point spectrum produces which time dependence. In the whole infinite state space, the complete set does contain an integral but it is over unperturbed eigenstates of the environmental area of the system and hence can be calculated analytically. We demonstrate the usefulness of the complete set by computing explicitly the survival probability and the escaping probability as well as the dynamics of wave packets. The origin of each term of matrix elements is clear in our formulation, particularly the exponential decays due to the resonance poles.Comment: 62 pages, 13 figure

    Partial Evaluation for Java Malware Detection

    Get PDF
    The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Java exploits and to circumvent detection by Anti Virus (AV) software, obfuscation techniques are routinely applied to make an exploit more difficult to recognise. Popular obfuscation techniques for Java include string obfuscation and applying reflection to hide method calls; two techniques that can either be used together or independently. This paper shows how to apply partial evaluation to remove these obfuscations and thereby improve AV matching. The paper presents a partial evaluator for Jimple, which is a typed three-address code suitable for optimisation and program analysis, and also demonstrates how the residual Jimple code, when transformed back into Java, improves the detection rates of a number of commercial AV products

    BCFA: Bespoke Control Flow Analysis for CFA at Scale

    Full text link
    Many data-driven software engineering tasks such as discovering programming patterns, mining API specifications, etc., perform source code analysis over control flow graphs (CFGs) at scale. Analyzing millions of CFGs can be expensive and performance of the analysis heavily depends on the underlying CFG traversal strategy. State-of-the-art analysis frameworks use a fixed traversal strategy. We argue that a single traversal strategy does not fit all kinds of analyses and CFGs and propose bespoke control flow analysis (BCFA). Given a control flow analysis (CFA) and a large number of CFGs, BCFA selects the most efficient traversal strategy for each CFG. BCFA extracts a set of properties of the CFA by analyzing the code of the CFA and combines it with properties of the CFG, such as branching factor and cyclicity, for selecting the optimal traversal strategy. We have implemented BCFA in Boa, and evaluated BCFA using a set of representative static analyses that mainly involve traversing CFGs and two large datasets containing 287 thousand and 162 million CFGs. Our results show that BCFA can speedup the large scale analyses by 1%-28%. Further, BCFA has low overheads; less than 0.2%, and low misprediction rate; less than 0.01%.Comment: 12 page

    Conditioned reflex activity of rats at later periods after the end of flight aboard the Kosmos-605 biosatellite

    Get PDF
    The aftereffects of spaceflight on the higher nervous activity of rats were studied. A five lane maze with a feeding terminal was used to check such factors as transfer of experience, the habit and speed of reaching the goal in the maze, long term memory, and the dynamics of errors. During the 3rd-7th postflight week, functional disturbances in the rat HNA were manifested in the deterioration of the capacity for the transfer of experience and for locating the feeding compartment in the maze, thus indicating a general decrease of work capacity. The increased number of errors and failures pointed to exhaustion of higher nervous processes and to the weakened functional activity of the brain
    corecore