10,342 research outputs found

    Loop-Erasure of Plane Brownian Motion

    Full text link
    We use the coupling technique to prove that there exists a loop-erasure of a plane Brownian motion stopped on exiting a simply connected domain, and the loop-erased curve is the reversal of a radial SLE2_2 curve.Comment: 10 page

    Restriction Properties of Annulus SLE

    Full text link
    For κ∈(0,4]\kappa\in(0,4], a family of annulus SLE(κ;Λ)(\kappa;\Lambda) processes were introduced in [14] to prove the reversibility of whole-plane SLE(κ)(\kappa). In this paper we prove that those annulus SLE(κ;Λ)(\kappa;\Lambda) processes satisfy a restriction property, which is similar to that for chordal SLE(κ)(\kappa). Using this property, we construct n≥2n\ge 2 curves crossing an annulus such that, when any n−1n-1 curves are given, the last curve is a chordal SLE(κ)(\kappa) trace.Comment: 37 page

    Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation

    Full text link
    This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the state estimation error of the system. The results provide basic understanding about the limit of the attack impact. The design of the optimal attack is based on a Markov decision process (MDP) formulation, which is solved efficiently using the value iteration method. Using the proposed framework, we quantify the effect of false positives and mis-detections on the system performance, which can help the joint design of the attack detection and mitigation. To demonstrate the use of the proposed framework in a real-world CPCS, we consider the voltage control system of power grids, and run extensive simulations using PowerWorld, a high-fidelity power system simulator, to validate our analysis. The results show that by carefully designing the attack sequence using our proposed approach, the attacker can cause a large deviation of the bus voltages from the desired setpoint. Further, the results verify the optimality of the derived attack sequence and show that, to cause maximum impact, the attacker must carefully craft his attack to strike a balance between the attack magnitude and stealthiness, due to the simultaneous presence of attack detection and mitigation

    Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems

    Get PDF
    Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this paper, we study false data injection (FDI) attacks against railways' traction power systems (TPSes). Specifically, we analyze two types of FDI attacks on the train-borne voltage, current, and position sensor measurements - which we call efficiency attack and safety attack -- that (i) maximize the system's total power consumption and (ii) mislead trains' local voltages to exceed given safety-critical thresholds, respectively. To counteract, we develop a global attack detection (GAD) system that serializes a bad data detector and a novel secondary attack detector designed based on unique TPS characteristics. With intact position data of trains, our detection system can effectively detect the FDI attacks on trains' voltage and current measurements even if the attacker has full and accurate knowledge of the TPS, attack detection, and real-time system state. In particular, the GAD system features an adaptive mechanism that ensures low false positive and negative rates in detecting the attacks under noisy system measurements. Extensive simulations driven by realistic running profiles of trains verify that a TPS setup is vulnerable to the FDI attacks, but these attacks can be detected effectively by the proposed GAD while ensuring a low false positive rate.Comment: IEEE/IFIP DSN-2016 and ACM Trans. on Cyber-Physical System

    Many-body dynamics of a Bose system with attractive interactions on a ring

    Full text link
    We investigate the many-body dynamics of an effectively attractive one-dimensional Bose system confined in a toroidal trap. The mean-field theory predicts that a bright-soliton state will be formed when increasing the interparticle interaction over a critical point. The study of quantum many-body dynamics in this paper reveals that there is a modulation instability in a finite Bose system correspondingly. We show that Shannon entropy becomes irregular near and above the critical point due to quantum correlations. We also study the dynamical behavior of the instability by exploring the momentum distribution and the fringe visibility, which can be verified experimentally by releasing the trapComment: 6 pages,5 figure

    Cylindrical vector beams for rapid polarization-dependent measurements in atomic systems

    Full text link
    We demonstrate the use of cylindrical vector beams - beams with spatially varying polarization - for detecting and preparing the spin of a warm rubidium vapor in a spatially dependent manner. We show that a modified probe vector beam can serve as an atomic spin analyzer for an optically pumped medium, which spatially modulates absorption of the beam. We also demonstrate space-variant atomic spin by optical pumping with the vector beams. The beams are thus beneficial for making singleshot polarization-dependent measurements, as well as for providing a means of preparing samples with position-dependent spin.Comment: 8 pages, 5 figures. Accepted in Optics Expres

    Nox4 is critical for hypoxia-inducible factor 2-alpha transcriptional activity in von Hippel-Lindau-deficient renal cell carcinoma

    Get PDF
    Inactivation of the von Hippel-Lindau tumor suppressor (VHL) is an early event in \u3e60% of sporadic clear cell renal cell carcinoma (RCC). Loss of VHL E3 ubiquitin ligase function results in accumulation of the alpha-subunit of the hypoxia-inducible heterodimeric transcription factor (HIF-alpha) and transcription of an array of genes including vascular endothelial growth factor, transforming growth factor-alpha, and erythropoietin. Studies have shown that HIF-alpha can be alternatively activated by reactive oxygen species. Nox4 is an NADP(H) oxidase that generates signaling levels of superoxide and is found in greatest abundance in the distal renal tubules. To determine if Nox4 contributes to HIF activity in RCC, we examined the impact of Nox4 expression on HIF-alpha expression and transactivation. We report here that small inhibitory RNA (siRNA) knockdown of Nox4 in 786-0 human renal tumor cells expressing empty vector (PRC) or wild-type VHL (WT) results in 50% decrease in intracellular reactive oxygen species as measured by a fluorescent 2\u27,7\u27-dichlorofluorescin diacetate assay, and \u3e85% reduction in HIF2-alpha mRNA and protein levels by quantitative reverse transcription-PCR and Western blot analysis. Furthermore, expression of the HIF target genes, vascular endothelial growth factor, transforming growth factor-alpha, and Glut-1 was abrogated by 93%, 74%, and 99%, respectively, after stable transfection with Nox4 siRNA relative to nontargeting siRNA, as determined by quantitative reverse transcription-PCR. Thus, renal Nox4 expression is essential for full HIF2-alpha expression and activity in 786-0 renal tumor cells, even in the absence of functional VHL. We propose the use of Nox4 as a target in the treatment of clear cell RCC
    • …
    corecore