6,400 research outputs found

    Local times for solutions of the complex Ginzburg-Landau equation and the inviscid limit

    Get PDF
    We consider the behaviour of the distribution for stationary solutions of the complex Ginzburg-Landau equation perturbed by a random force. It was proved earlier that if the random force is proportional to the square root of the viscosity, then the family of stationary measures possesses an accumulation point as the viscosity goes to zero. We show that if ÎĽ\mu is such point, then the distributions of the L^2 norm and of the energy possess a density with respect to the Lebesgue measure. The proofs are based on It\^o's formula and some properties of local time for semimartingales.Comment: 12 page

    Quantum ring models and action-angle variables

    Full text link
    We suggest to use the action-angle variables for the study of properties of (quasi)particles in quantum rings. For this purpose we present the action-angle variables for three two-dimensional singular oscillator systems. The first one is the usual (Euclidean) singular oscillator, which plays the role of the confinement potential for the quantum ring. We also propose two singular spherical oscillator models for the role of the confinement system for the spherical ring. The first one is based on the standard Higgs oscillator potential. We show that, in spite of the presence of a hidden symmetry, it is not convenient for the study of the system's behaviour in a magnetic field. The second model is based on the so-called CP(1) oscillator potential and respects the inclusion of a constant magnetic field.Comment: 9 pages, nofigure

    Bootbandit: A macOS Bootloader Attack

    Get PDF
    Full disk encryption (FDE) is used to protect a computer system against data theft by physical access. If a laptop or hard disk drive protected with FDE is stolen or lost, the data remains unreadable without the encryption key. To foil this defense, an intruder can gain physical access to a computer system in a so-called “evil maid” attack, install malware in the boot (pre-operating system) environment, and use the malware to intercept the victim’s password. Such an attack relies on the fact that the system is in a vulnerable state before booting into the operating system. In this paper, we discuss an evil maid type of attack, in which the victim’s password is stolen in the boot environment, passed to the macOS user environment, and then exfiltrated from the system to the attacker’s remote command and control server. On a macOS system, this attack has additional implications due to “password forwarding” technology, in which users’ account passwords also serve as FDE passwords

    Dense QCD and phenomenology of compact stars

    Full text link
    I discuss three topics in physics of massive (two solar-mass and larger) neutron stars containing deconfined quark matter: (i) the equation of state of deconfined dense quark matter and its color superconducting phases, (ii) the thermal evolution of stars with quark cores, (iii) color-magnetic flux tubes in type-II superconducting quark matter and their dynamics driven by Aharonov-Bohm interactions with unpaired fermions.Comment: 8 pages, 3 figures. Contribution to the proceedings of "Xth Quark Confinement and the Hadron Spectrum", October 8-12, 2012, Munich, German
    • …
    corecore