18,692 research outputs found
Pharmacological activity of 2,3,8-tri-O-methyl ellagic acid isolated from the stem bark of Irvingia gabonensis
2,3,8-Tri-O-methyl ellagic acid was isolated from the stem bark of Irvingia gabonensis. The acid showed significant antimicrobial activity on some pathogens
Non-Abelian Proca model based on the improved BFT formalism
We present the newly improved Batalin-Fradkin-Tyutin (BFT) Hamiltonian
formalism and the generalization to the Lagrangian formulation, which provide
the much more simple and transparent insight to the usual BFT method, with
application to the non-Abelian Proca model which has been an difficult problem
in the usual BFT method. The infinite terms of the effectively first class
constraints can be made to be the regular power series forms by ingenious
choice of and -matrices. In this new
method, the first class Hamiltonian, which also needs infinite correction terms
is obtained simply by replacing the original variables in the original
Hamiltonian with the BFT physical variables. Remarkably all the infinite
correction terms can be expressed in the compact exponential form. We also show
that in our model the Poisson brackets of the BFT physical variables in the
extended phase space are the same structure as the Dirac brackets of the
original phase space variables. With the help of both our newly developed
Lagrangian formulation and Hamilton's equations of motion, we obtain the
desired classical Lagrangian corresponding to the first class Hamiltonian which
can be reduced to the generalized St\"uckelberg Lagrangian which is non-trivial
conjecture in our infinitely many terms involved in Hamiltonian and Lagrangian.Comment: Notable improvements in Sec. I
Stealthy Deception Attacks Against SCADA Systems
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to
network attacks such as session hijacking. Hence, research focuses on network
anomaly detection based on meta--data (message sizes, timing, command
sequence), or on the state values of the physical process. In this work we
present a class of semantic network-based attacks against SCADA systems that
are undetectable by the above mentioned anomaly detection. After hijacking the
communication channels between the Human Machine Interface (HMI) and
Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a
fake view of the industrial process, deceiving the human operator into taking
manual actions. Our most advanced attack also manipulates the messages
generated by the operator's actions, reversing their semantic meaning while
causing the HMI to present a view that is consistent with the attempted human
actions. The attacks are totaly stealthy because the message sizes and timing,
the command sequences, and the data values of the ICS's state all remain
legitimate.
We implemented and tested several attack scenarios in the test lab of our
local electric company, against a real HMI and real PLCs, separated by a
commercial-grade firewall. We developed a real-time security assessment tool,
that can simultaneously manipulate the communication to multiple PLCs and cause
the HMI to display a coherent system--wide fake view. Our tool is configured
with message-manipulating rules written in an ICS Attack Markup Language (IAML)
we designed, which may be of independent interest. Our semantic attacks all
successfully fooled the operator and brought the system to states of blackout
and possible equipment damage
BRST Quantization of the Proca Model based on the BFT and the BFV Formalism
The BRST quantization of the Abelian Proca model is performed using the
Batalin-Fradkin-Tyutin and the Batalin-Fradkin-Vilkovisky formalism. First, the
BFT Hamiltonian method is applied in order to systematically convert a second
class constraint system of the model into an effectively first class one by
introducing new fields. In finding the involutive Hamiltonian we adopt a new
approach which is more simpler than the usual one. We also show that in our
model the Dirac brackets of the phase space variables in the original second
class constraint system are exactly the same as the Poisson brackets of the
corresponding modified fields in the extended phase space due to the linear
character of the constraints comparing the Dirac or Faddeev-Jackiw formalisms.
Then, according to the BFV formalism we obtain that the desired resulting
Lagrangian preserving BRST symmetry in the standard local gauge fixing
procedure naturally includes the St\"uckelberg scalar related to the explicit
gauge symmetry breaking effect due to the presence of the mass term. We also
analyze the nonstandard nonlocal gauge fixing procedure.Comment: 29 pages, plain Latex, To be published in Int. J. Mod. Phys.
A coalescence model for freely decaying two-dimensional turbulence
We propose a ballistic coalescence model (punctuated-Hamiltonian approach)
mimicking the fusion of vortices in freely decaying two-dimensional turbulence.
A temporal scaling behaviour is reached where the vortex density evolves like
. A mean-field analytical argument yielding the approximation
is shown to slightly overestimate the decay exponent whereas
Molecular Dynamics simulations give , in agreement with
recent laboratory experiments and simulations of Navier-Stokes equation.Comment: 6 pages, 1 figure, to appear in Europhysics Letter
Strong Lefschetz elements of the coinvariant rings of finite Coxeter groups
For the coinvariant rings of finite Coxeter groups of types other than H,
we show that a homogeneous element of degree one is a strong Lefschetz element
if and only if it is not fixed by any reflections. We also give the necessary
and sufficient condition for strong Lefschetz elements in the invariant
subrings of the coinvariant rings of Weyl groups.Comment: 18 page
XTE J1739-302: An Unusual New X-ray Transient
A new x-ray transient, designated XTE J1739-302, was discovered with the
Proportional Counter Array (PCA) on the Rossi X-ray Timing Explorer (RXTE) in
data from 12 August 1997. Although it was the brightest source in the Galactic
Center region while active (about 3.0 x 10^-9 ergs/cm2/s from 2 to 25 keV), it
was only observed on that one day; it was not detectable nine days earlier or
two days later. There is no known counterpart at other wavelengths, and its
proximity to the Galactic Center will make such an identification difficult due
to source confusion and extinction. The x-ray spectrum and intensity suggest a
giant outburst of a Be/neutron star binary, although no pulsations were
observed and the outburst was shorter than is usual from these systems.Comment: 11 pages incorporating 6 figures, AAStex; accepted for The
Astrophysical Journal, Part 2 (Letters
Consistency of Lambda-Lambda hypernuclear events
Highlights of Lambda-Lambda emulsion events are briefly reviewed. Given three
accepted events, shell-model predictions based on p-shell Lambda hypernuclear
spectroscopic studies are shown to reproduce the Lambda-Lambda (LL) binding
energies of LL10Be and LL13B in terms of the LL binding energy of LL6He.
Predictions for other species offer judgement on several alternative
assignments of the LL13B KEK-E176 event, and on the assignments LL11Be and
LL12Be suggested recently for the KEK-E373 HIDA event. The predictions of the
shell model, spanning a wide range of A values, are compared with those of
cluster models, where the latter are available.Comment: Based on talk given by Avraham Gal at EXA 2011, Vienna, September
2011; Proceedings version prepared for the journal Hyperfine Interactions;
v2--slight changes, matches published versio
Stability of the vortex lattice in D-wave superconductors
Use is made of Onsager's hydrodynamic equation to derive the vibration
spectrum of the vortex lattice in d-wave superconductor. In particular the
rhombic lattice (i.e. the tilted square lattice) is found to be
stable for . Here denotes the critical field at which
the vortex lattice transition takes place.Comment: 7 pages, Revte
- …