437 research outputs found

    On the stability and instability of Kelvin-Stuart cat's eyes flows

    Full text link
    Kelvin-Stuart vortices are classical mixing layer flows with many applications in fluid mechanics, plasma physics and astrophysics. We prove that the whole family of Kelvin-Stuart vortices is nonlinearly stable for co-periodic perturbations, and linearly unstable for multi-periodic or modulational perturbations. This verifies a long-standing conjecture since the discovery of the Kelvin-Stuart cat's eyes flows in the 1960s. Kelvin-Stuart cat's eyes also appear as magnetic islands which are magnetostatic equilibria for the 2D ideal MHD equations in plasmas. We prove nonlinear stability of Kelvin-Stuart magnetic islands for co-periodic perturbations, and give the first rigorous proof of the coalescence instability, which is important for magnetic reconnection.Comment: 122 page

    Adaptive Fuzzy Sliding Mode Controller for Attitude Coordinated Control in Spacecraft Formation

    Get PDF
    The attitude coordinated control problem of a spacecraft formation in leader-follower approach is considered in this paper. An adaptive fuzzy sliding mode control scheme is designed to achieve tracking and synchronization in spacecraft formation in the presence of model uncertainties and external disturbances. The proposed control law consists of two parts: equivalent control and switching control. In order to attenuate high-frequency chattering caused by the switching control, the adaptive fuzzy control is utilized to approximate the sign function of the switching control. Moreover, fuzzy rules are employed to smooth the switching control based on the sliding surface.Lyapunov theory is applied to proof the stability of the closedloop system. Finally, simulation results and comparative analysisare carried out to demonstrate the effectiveness of the proposed method

    Fuzzy Authorization for Cloud Storage

    Get PDF
    It is widely accepted that OAuth is the most popular authorization scheme adopted and implemented by industrial and academic world, however, it is difficult to adapt OAuth to the situation in which online applications registered with one cloud party intends to access data residing in another cloud party. In this thesis, by leveraging Ciphertext-Policy Attribute Based Encryption technique and Elgamal-like mask over the protocol, we propose a reading authorization scheme among diverse clouds, which is called fuzzy authorization, to facilitate an application registered with one cloud party to access to data residing in another cloud party. More importantly, we enable the fuzziness of authorization thus to enhance the scalability and flexibility of file sharing by taking advantage of the innate connections of Linear Secret-Sharing Scheme and Generalized Reed Solomon code. Furthermore, by conducting error checking and error correction, we eliminate operation of satisfying a access tree. In addition, the automatic revocation is realized with update of TimeSlot attribute when data owner modifies the data. We prove the security of our schemes under the selective-attribute security model. The protocol flow of fuzzy authorization is implemented with OMNET++ 4.2.2 and the bi-linear pairing is realized with PBC library. Simulation results show that our scheme can achieve fuzzy authorization among heterogeneous clouds with security and efficiency.1 yea

    Predictors of Pathology Smartphone Use: Reward Processing, Depressive Symptoms, and Self-Control

    Get PDF
    The widespread adoption of smartphones that allow us to work, engage with friends and family, and pursue leisure activities has been associated with the emergence of pathological smartphone use wherein individuals experience anxiety and depressive symptoms when separated from their devices and may be more likely to engage in risky behavior while using their phone. Consistent with the broader literature on behavioral addictions, smartphone pathology is associated with increased depressive symptoms and decreased self-control. The current study builds upon a foundation of evidence from studies of pathological technology use including video games, the Internet, and social media to explore the association between the neural correlates of reward processing and smartphone pathology, depressive symptoms, and self-control. Our findings reveal that greater levels of smartphone pathology are associated with decreased neural activity related to the processing of both gains and losses when the individual is the agent of choice in a simple gambling task. Additionally, we replicate the association between depressive symptoms, self-control and smartphone pathology; and further demonstrate that reward processing represents a unique predictor of pathology beyond any shared association with depressive symptoms and self-control

    Superconductivity at 32K and anisotropy in Tl0.58Rb0.42Fe1.72Se2 crystals

    Full text link
    Single crystals of Tl0.58Rb0.42Fe1.72Se2 are successfully grown with the superconducting transition temperatures Tconset=32K and Tczero=31.4K. The Hall coefficient exhibits a multi-band behavior, which is very similar to that of all other Fe-based superconductors. We found that the susceptibility at the normal state decreases with decreasing the temperature, indicating a strong antiferromagnetic (AFM) spin fluctuation at the normal state, which might be related to the superconductivity (SC). We also determined the upper critical fields in ab-plane and along c-axis. The anisotropy of the superconductivity determined by the ratio of Hc2ab and Hc2c is estimated to 5.0, which is larger than that in (Ba,K)Fe2As2 and BaFe2-xCoxAs2, but smaller than that in cuprate superconductors.Comment: 4 pages, 4 figure

    You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning

    Full text link
    As Deep Packet Inspection (DPI) middleboxes become increasingly popular, a spectrum of adversarial attacks have emerged with the goal of evading such middleboxes. Many of these attacks exploit discrepancies between the middlebox network protocol implementations, and the more rigorous/complete versions implemented at end hosts. These evasion attacks largely involve subtle manipulations of packets to cause different behaviours at DPI and end hosts, to cloak malicious network traffic that is otherwise detectable. With recent automated discovery, it has become prohibitively challenging to manually curate rules for detecting these manipulations. In this work, we propose CLAP, the first fully-automated, unsupervised ML solution to accurately detect and localize DPI evasion attacks. By learning what we call the packet context, which essentially captures inter-relationships across both (1) different packets in a connection; and (2) different header fields within each packet, from benign traffic traces only, CLAP can detect and pinpoint packets that violate the benign packet contexts (which are the ones that are specially crafted for evasion purposes). Our evaluations with 73 state-of-the-art DPI evasion attacks show that CLAP achieves an Area Under the Receiver Operating Characteristic Curve (AUC-ROC) of 0.963, an Equal Error Rate (EER) of only 0.061 in detection, and an accuracy of 94.6% in localization. These results suggest that CLAP can be a promising tool for thwarting DPI evasion attacks.Comment: 12 pages, 12 figures; accepted to ACM CoNEXT 202

    Cloning and Characterization of Human MUC19 Gene

    Get PDF
    The most recently discovered gel-forming mucin, MUC19, is expressed in both salivary glands and tracheal submucosal glands. We previously cloned the 3′−end partial sequence ({"type":"entrez-nucleotide","attrs":{"text":"AY236870","term_id":"32395927","term_text":"AY236870"}}AY236870), and here report the complete sequencing of the entire MUC19 cDNA. One highly variable region (HVR) was discovered in the 5′ end of MUC19. A total of 20 different splicing variants were detected in HVR, and 18 variants are able to translate into proteins along with the rest of the MUC19 sequence. The longest variant of MUC19 consists of 182 exons, with a transcript of approximately 25 kb. A central exon of approximately 12 kb contains highly repetitive sequences and has no intron interruption. The deduced MUC19 protein has the bona fide gel-forming mucin structure, VWD-VWD-VWD-“threonine/serine-rich repeats”-VWC-CT. An unusual structural feature of MUC19, which is lacking in other gel-forming mucins, is its long amino terminus upstream of the first VWD domain. The long amino terminus is mostly translated from the sequences in HVR, and contains serine-rich repetitive sequences. To validate the integrity of the MUC19 sequence, primers from both the 3′ and 5′ end were used to demonstrate a similar tissue expression pattern of MUC19 in trachea and salivary glands. In addition, antibodies were developed against either the amino (N) or carboxy (C) terminus of MUC19, and similar antibody staining patterns were observed in both salivary and tracheal submucosal glands. In conclusion, we have cloned and elucidated the entire MUC19 gene, which will facilitate understanding of the function and regulation of this important, yet understudied, mucin gene in airway diseases
    corecore