1,445 research outputs found

    Special Issue on Cyber Security

    Get PDF
    In the present cyber age, public services are getting more and more dependent on use of Information and communication technologies (ICT) day by day. A number of applications viz., Internet of Things, PDF, cloud computing and virtualization and machine to machine (M2M) system usage are sneaking deeply into our everyday life. The more we depend on ICT, the more deepens our concern about IT security or cyber security. Cyber security protects the data and integrity of assets that belong to or connect to a network. It is meant to defend those assets against all sorts of threat actors throughout the life cycle of a cyber attack. It is quite unsurprising that cyber security industry is growing at the same pace as ICT is doing

    Normal mode analysis for scalar fields in BTZ black hole background

    Full text link
    We analyze the possibility of inequivalent boundary conditions for a scalar field propagating in the BTZ black hole space-time. We find that for certain ranges of the black hole parameters, the Klein-Gordon operator admits a one-parameter family of self-adjoint extensions. For this range, the BTZ space-time is not quantum mechanically complete. We suggest a physically motivated method for determining the spectra of the Klein-Gordon operator.Comment: 6 pages, no figure, late

    Real and imaginary chemical potential in 2-color QCD

    Full text link
    In this paper we study the finite temperature SU(2) gauge theory with staggered fermions for non-zero imaginary and real chemical potential. The method of analytical continuation of Monte Carlo results from imaginary to real chemical potential is tested by comparison with simulations performed {\em directly} for real chemical potential. We discuss the applicability of the method in the different regions of the phase diagram in the temperature -- imaginary chemical potential plane.Comment: 15 pages, 7 figures; a few comments added; version published on Phys. Rev.

    The effect of maternal ketanserin treatment on foetal 5-HT receptor function in umbilical cord artery of pre-eclamptic patients

    Get PDF
    Background: Maternal treatment with the 5-HT2Areceptor antagonist ketanserin (KT) in pre-eclamptic patients is associated with a high placental transmission of KT, resulting in pharmacologically active levels of KT in the umbilical cord artery (UCA) and the neonate. Prolonged exposure to a 5-HT receptor antagonist may influence the functionality of foetal 5-HT receptors and compromise foetal development. Objective: To study whether exposure to KT influences the characteristics of foetal 5-HT receptors, functional studies were performed on 5-HT2Aand 5-HT1B/1Dreceptors in UCA from pre-eclamptic patients treated with KT. Methods: UCAs were obtained, immediately after delivery, from pre-eclamptic patients (n = 7), treated antenatally with intravenous KT. Pre-eclamptic patients (n = 13), not treated with KT (non-KT), were included as a control group. Segments of UCA were prepared and mounted in tissue baths and isometric force changes were determined. Cumulative concentration response curves to 5-HT and to the 5-HT1B/1Dreceptor agonist sumatriptan were constructed in the absence or presence of the 5-HT2Areceptor antagonist KT or the 5-HT1B/1Dreceptor antagonist GR125743, respectively. Results: All UCA segments showed contractile responses to both 5-HT and sumatriptan, and the concentration response curves showed a rightward shift with increasing concentrations of KT and

    λ8\frac{\lambda}{8}-period optical potentials

    Full text link
    A Raman configuration of counterpropagating traveling wave fields, one of which is lin⊥linlin\bot lin polarized and the other lin∥linlin\Vert lin polarized, is shown to lead to optical potentials having λ8\frac{\lambda}{8} periodicity. Such optical potentials may be used to construct optical lattices having λ8% \frac{\lambda}{8} periodicity. Using numerical diagonalization, we obtain the optical potentials for 85^{\text{85}}Rb atoms.Comment: 3 pages, 2 figure

    Non-Equilibrium Electron Transport in Two-Dimensional Nano-Structures Modeled by Green's Functions and the Finite-Element Method

    Get PDF
    We use the effective-mass approximation and the density-functional theory with the local-density approximation for modeling two-dimensional nano-structures connected phase-coherently to two infinite leads. Using the non-equilibrium Green's function method the electron density and the current are calculated under a bias voltage. The problem of solving for the Green's functions numerically is formulated using the finite-element method (FEM). The Green's functions have non-reflecting open boundary conditions to take care of the infinite size of the system. We show how these boundary conditions are formulated in the FEM. The scheme is tested by calculating transmission probabilities for simple model potentials. The potential of the scheme is demonstrated by determining non-linear current-voltage behaviors of resonant tunneling structures.Comment: 13 pages,15 figure

    Processing of aluminum-graphite particulate metal matrix composites by advanced shear technology

    Get PDF
    Copyright @ 2009 ASM International. This paper was published in Journal of Materials Engineering and Performance 18(9) and is made available as an electronic reprint with the permission of ASM International. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplications of any material in this paper for a fee or for commercial purposes, or modification of the content of this paper are prohibited.To extend the possibilities of using aluminum/graphite composites as structural materials, a novel process is developed. The conventional methods often produce agglomerated structures exhibiting lower strength and ductility. To overcome the cohesive force of the agglomerates, a melt conditioned high-pressure die casting (MC-HPDC) process innovatively adapts the well-established, high-shear dispersive mixing action of a twin screw mechanism. The distribution of particles and properties of composites are quantitatively evaluated. The adopted rheo process significantly improved the distribution of the reinforcement in the matrix with a strong interfacial bond between the two. A good combination of improved ultimate tensile strength (UTS) and tensile elongation (e) is obtained compared with composites produced by conventional processes.EPSR

    Angular Resolution of the Pachmarhi Array of Cerenkov Telescopes

    Get PDF
    The Pachmarhi Array of Cerenkov Telescopes consists of a distributed array of 25 telescopes that are used to sample the atmospheric Cerenkov Photon showers. Each telescope consists of 7 parabolic mirrors each viewed by a single photo-multiplier tube. Reconstruction of photon showers are carried out using fast timing information on the arrival of pulses at each PMT. The shower front is fitted to a plane and the direction of arrival of primary particle initiating the shower is obtained. The error in the determination of the arrival direction of the primary has been estimated using the {\it split} array method. It is found to be ∼2.4′ \sim 2.4^\prime ~ for primaries of energy >3T˜eV > 3 \~TeV. The dependence of the angular resolution on the separation between the telescopes and the number of detectors are also obtained from the data.Comment: 26 pages, 11 Postscript figures; uses elsart.cls. To appear in Astroparticle Physic

    A Survey of Cybersecurity of Digital Manufacturing

    Get PDF
    The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance quality and productivity, which reduces inventory and the lead time for delivering custom, batch-of-one products based on achieving convergence of additive, subtractive, and hybrid manufacturing machines, automation and robotic systems, sensors, computing, and communication networks, artificial intelligence, and big data. A DM system consists of embedded electronics, sensors, actuators, control software, and interconnectivity to enable the machines and the components within them to exchange data with other machines, components therein, the plant operators, the inventory managers, and customers. This article presents the cybersecurity risks in the emerging DM context, assesses the impact on manufacturing, and identifies approaches to secure DM
    • …
    corecore