17,808 research outputs found
Diffusion in a continuum model of self-propelled particles with alignment interaction
In this paper, we provide the corrections to the hydrodynamic
model derived by Degond and Motsch from a kinetic version of the model by
Vicsek & coauthors describing flocking biological agents. The parameter
stands for the ratio of the microscopic to the macroscopic scales.
The corrected model involves diffusion terms in both the mass and
velocity equations as well as terms which are quadratic functions of the first
order derivatives of the density and velocity. The derivation method is based
on the standard Chapman-Enskog theory, but is significantly more complex than
usual due to both the non-isotropy of the fluid and the lack of momentum
conservation
Detection and Prevention of Cyber-Attacks in Networked Control Systems
This paper addresses the problem of detection and prevention of cyber attacks in discrete event systems where the supervisor communicates with the plant via network channels. Random control delays may occur in such networked systems, hence the control of the supervisor could be affected. Furthermore, there is an attacker targeting the vulnerable actuators. The attacker can corrupt the control input generated by the supervisor, and aims at driving the plant to unsafe states. We propose a new approach to model the closed-loop system subject to control delays and attacks. The notion of AE-safe controllability in the networked control system is defined: it describes the ability to prevent the plant from reaching unsafe states after attacks are detected. A method for testing AE-safe controllability is also presented. Copyright (C) 2020 The Authors
D-Branes in Field Theory
Certain gauge theories in four dimensions are known to admit semi-classical
D-brane solitons. These are domain walls on which vortex flux tubes may end.
The purpose of this paper is to develop an open-string description of these
D-branes. The dynamics of the domain walls is shown to be governed by a
Chern-Simons-Higgs theory which, at the quantum level, captures the classical
"closed string" scattering of domain wall solitons.Comment: 23 Pages, 3 figures. v2: reference adde
Geometric vs. Dynamical Gates in Quantum Computing Implementations Using Zeeman and Heisenberg Hamiltonians
Quantum computing in terms of geometric phases, i.e. Berry or
Aharonov-Anandan phases, is fault-tolerant to a certain degree. We examine its
implementation based on Zeeman coupling with a rotating field and isotropic
Heisenberg interaction, which describe NMR and can also be realized in quantum
dots and cold atoms. Using a novel physical representation of the qubit basis
states, we construct and Hadamard gates based on Berry and
Aharonov-Anandan phases. For two interacting qubits in a rotating field, we
find that it is always impossible to construct a two-qubit gate based on Berry
phases, or based on Aharonov-Anandan phases when the gyromagnetic ratios of the
two qubits are equal. In implementing a universal set of quantum gates, one may
combine geometric and Hadamard gates and dynamical
gate.Comment: published version, 5 page
Safety-oriented Testing for High-speed Rail Onboard Equipment Using Petri Nets
With its ability to operate at high speeds and capacity, high-speed rail offers a fast, dependable, and ecofriendly urban transportation option. Safety-critical systems such as high-speed rail signaling systems must be tested regularly to assess compliance with specifications and ensure reliable performance. Given that the onboard equipment is the core component of the signaling system, conducting safety testing on this equipment is of utmost importance. Current methods of analyzing test requirements mainly rely on human interpretation of specifications. However, the official technical specifications usually only outline standard operational scenarios, which could result in an inefficient and unclear safety analysis. This paper focuses on safety-oriented testing for onboard equipment. In particular, we propose a Petri net based approach to generate test cases for diverse operational scenarios. This approach improves both the efficiency and reliability of the testing process while ensuring compliance with safety requirements
A Polynomial Approach to Verifying the Existence of a Threatening Sensor Attacker
The development of cyber-physical systems (CPS) has brought much attention of researchers to cyber-attack and cyber-security. A sensor attacker targeting on a supervised discrete event system can modify a set of sensor readings and cause the closed-loop system to reach undesirable states. In this letter, we propose a new attack detection mechanism under which the supervisor only needs to keep track of the last observable event received. Given a plant and a supervisor enforcing a state specification, we define a sensor attacker threatening if it may cause the closed-loop system to enter a forbidden state. Our goal is to verify whether there exists such a threatening sensor attacker for a given controlled system. A new structure, called All Sensor Attack (ASA), is proposed to capture all possible sensor attacks launched by the attacker. Based on the ASA automaton, a necessary and sufficient condition for the existence of a stealthy threatening sensor attacker is presented. Finally, we show that the condition can be verified in polynomial time
Discrete Lie Advection of Differential Forms
In this paper, we present a numerical technique for performing Lie advection
of arbitrary differential forms. Leveraging advances in high-resolution finite
volume methods for scalar hyperbolic conservation laws, we first discretize the
interior product (also called contraction) through integrals over Eulerian
approximations of extrusions. This, along with Cartan's homotopy formula and a
discrete exterior derivative, can then be used to derive a discrete Lie
derivative. The usefulness of this operator is demonstrated through the
numerical advection of scalar fields and 1-forms on regular grids.Comment: Accepted version; to be published in J. FoC
Aharonov-Anandan phase in Lipkin-Meskov-Glick model
In the system of several interacting spins, geometric phases have been
researched intensively.However, the studies are mainly focused on the adiabatic
case (Berry phase), so it is necessary for us to study the non-adiabatic
counterpart (Aharonov and Anandan phase). In this paper, we analyze both the
non-degenerate and degenerate geometric phase of Lipkin-Meskov-Glick type
model, which has many application in Bose-Einstein condensates and entanglement
theory. Furthermore, in order to calculate degenerate geometric phases, the
Floquet theorem and decomposition of operator are generalized. And the general
formula is achieved
- …