1,928 research outputs found

    Freshly ionized matter around the final Helium shell flash object V4334 Sgr (Sakurai's object)

    Get PDF
    We report on the discovery of recently ionized hydrogen-deficient gas in the immediate circumstellar environment of the final helium shell flash star V4334 Sgr (Sakurai's object). On spectra obtained with FORS2 multi-object spectroscopy we have found spatially extended (about 2") emission from [N II], [O I], [O II] and very faint Halpha and [S II]. In the [N II] (ll6548,83) lines we have identified two components located at velocities -350 +/-50 and +200 +/-50 km/s, relative to V4334 Sgr itself. The full width of the [N II] l6583 feature at zero intensity corresponds to a velocity spread of about 1500 km/s. Based on the available data it is not possible to conclusively determine the mechanism of ionization. Both photo-ionization, from a rapidly evolving central star, and shock excitation, as the result of the collision of the fast ouflows with slower circumstellar matter, could account for the observed lines. The central star is still hidden behind strong dust absorption, since only a faint highly reddened continuum is apparent in the spectra. Theory states that it will become hotter and will retrace its post-asymptotic giant branch evolution towards the planetary nebula domain. Our detection of the ionized ejecta from the very late helium shell flash marks the beginning of a new phase in this star's amazingly rapid evolution.Comment: 11 pages, 2 figures. Accepted by ApJ

    Investigating airplane safety and security against insider threats using logical modeling

    Get PDF
    In this paper we consider the limits of formal modeling of infrastructures and the application of social explanation for the analysis of insider threats in security and safety critical areas. As an area of study for the analysis we take examples from aviation, firstly since incidents are typically well-documented and secondly since it is an important area per se. In March 2015, a Germanwings flight crashed in the French Alps in what is quite firmly believed to have been intentionally caused by the copilot who locked the pilot out of the cockpit and programmed the autopilot on constant descent. We investigate the security controls and policies in airplanes against insider threats using logical modeling in Isabelle

    Applying the Isabelle insider framework to airplane security

    Get PDF
    Avionics is one of the fields in which verification methods have been pioneered and brought about a new level of reliability to systems used in safety-critical environments. Tragedies, like the 2015 insider attack on a German airplane, in which all 150 people on board died, show that safety and security crucially depend not only on the well-functioning of systems but also on the way humans interact with the systems. Policies are a way to describe how humans should behave in their interactions with technical systems. Formal reasoning about such policies requires integrating the human factor into the verification process. In this paper, we report on our work on using logical modelling and analysis of infrastructure models and policies with actors to scrutinize security policies in the presence of insiders. An insider is a user of a system who behaves like an attacker abusing privileges thereby bypassing security controls. We model insider attacks on airplanes in the Isabelle Insider framework. This application motivates the use of an extension of the framework with Kripke structures and the temporal logic CTL to enable reasoning on dynamic system states. Furthermore, we illustrate that Isabelle modelling and invariant reasoning reveal subtle security assumptions. This results in a methodology for the development of policies that satisfy stated properties. To contrast our approach to model checking, we provide an additional comparative analysis

    Towards formal analysis of insider threats for auctions

    Get PDF
    This paper brings together the world of insider threats and auctions. For online-auction systems, like eBay, but also for high-value one-off auction algorithms as they are used for selling radio wave frequencies, the use of rigorous machine supported modelling and verification techniques is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use the cocaine auction protocol that represents a nice combination of cryptographic techniques, protocols, and privacy goals suitable for highlighting insider threats for auctions

    Insider threats for auctions: formalization, mechanized proof, and code generation

    Get PDF
    This paper applies machine assisted formal methods to explore insider threats for auctions. Auction systems, like eBay, are an important problem domain for formal analysis because they challenge modelling concepts as well as analysis methods. We use machine assisted formal modelling and proof in Isabelle to demonstrate how security and privacy goals of auction protocols can be formally verified. Applying the costly scrutiny of formal methods is justified for auctions since privacy and trust are prominent issues and auctions are sometimes designed for one-off occasions where high bids are at stake. For example, when radio wave frequencies are on sale, auctions are especially created for just one occasion where fair and consistent behaviour is required. Investigating the threats in auctions and insider collusions, we model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. We use the existing example of a fictitious cocaine auction protocol from the literature to develop and illustrate our approach. Combining the Isabelle Insider framework with the inductive approach to verifying security protocols in Isabelle, we formalize the cocaine auction protocol, prove that this formal definition excludes sweetheart deals, and also that collusion attacks cannot generally be excluded. The practical implication of the formalization is demonstrated by code generation. Isabelle allows generating code from constructive specifications into the programming language Scala. We provide constructive test functions for cocaine auction traces, prove within Isabelle that these functions conform to the protocol definition, and apply code generation to produce an implementation of the executable test predicate for cocaine auction traces in Scala

    Local Doubling Dimension of Point Sets

    No full text
    We introduce the notion of t-restricted doubling dimension of a point set in Euclidean space as the local intrinsic dimension up to scale t. In many applications information is only relevant for a fixed range of scales. We present an algorithm to construct a hierarchical net-tree up to scale t which we denote as the net-forest. We present a method based on Locality Sensitive Hashing to compute all near neighbours of points within a certain distance. Our construction of the net-forest is probabilistic, and we guarantee that with high probability, the net-forest is supplemented with the correct neighbouring information. We apply our net-forest construction scheme to create an approximate Cech complex up to a fixed scale; and its complexity depends on the local intrinsic dimension up to that scale

    Spatial electron density and electric field strength measurements in microwave cavity experiments

    Get PDF
    Measurements of electron density and electric field strength have been made in an argon plasma contained in a resonant microwave cavity at 2.45 GHz. Spatial measurements of electron density, n sub e, are correlated with fluorescence observations of the discharge. Measurements of n sub e were made with Stark broadening and compared with n sub 3 calculated from measured plasma conductivity. Additional measurements of n sub 3 as a function of pressure and in mixtures of argon and oxygen are presented for pressures from 10 Torr to 1 atm. Measurements in flowing gases and in static systems are presented. In addition, limitations of these measurements are identified

    Probing the LMC age gap at intermediate cluster masses

    Full text link
    The LMC has a rich star cluster system spanning a wide range of ages and masses. One striking feature of the LMC cluster system is the existence of an age gap between 3-10 Gyrs. But this feature is not as clearly seen among field stars. Three LMC fields containing relatively poor and sparse clusters whose integrated colours are consistent with those of intermediate age simple stellar populations have been imaged in BVI with the Optical Imager (SOI) at the Southern Telescope for Astrophysical Research (SOAR). A total of 6 clusters, 5 of them with estimated initial masses M < 10^4M_sun, were studied in these fields. Photometry was performed and Colour-Magnitude Diagrams (CMD) were built using standard point spread function fitting methods. The faintest stars measured reach V ~ 23. The CMD was cleaned from field contamination by making use of the three-dimensional colour and magnitude space available in order to select stars in excess relative to the field. A statistical CMD comparison method was developed for this purpose. The subtraction method has proven to be successful, yielding cleaned CMDs consistent with a simple stellar population. The intermediate age candidates were found to be the oldest in our sample, with ages between 1-2 Gyrs. The remaining clusters found in the SOAR/SOI have ages ranging from 100 to 200 Myrs. Our analysis has conclusively shown that none of the relatively low-mass clusters studied by us belongs to the LMC age-gap.Comment: 9 pages, 8 figures. Accepted to MNRA

    Self-consistent physical parameters for MC clusters from CMD modelling: application to SMC clusters observed with the SOAR telescope

    Full text link
    The Magellanic Clouds (MCs) present a rich system of stellar clusters that can be used to probe the dynamical and chemical evolution of these neighboring and interacting irregular galaxies. In particular, these stellar clusters (SCs) present combinations of age and metallicity that are not found for this class of objects in the Milky Way, being therefore very useful templates to test and to calibrate integrated light simple stellar population (SSP) models applied to unresolved distance galaxies. On its turn, the age and metallicity for a cluster can be determined spatially resolving its stars, by means of analysis of its colour-magnitude diagrams (CMDs). In this work we present our method to determine self-consistent physical parameters (age, metallicity, distance modulus and reddening) for a stellar cluster, from CMDs modelling of relatively unstudied SCs in the Small Magellanic Cloud (SMC) imaged in the BVI filters with the 4.1 m SOAR telescope. Our preliminary results confirm our expectations that come from a previous integrated spectra and colour analysis: at least one of them (Lindsay 2) is an intermediate-age stellar cluster with ~ 2.6 Gyr and [Fe/H] ~ -1.3, being therefore a new interesting witness regarding the reactivation of the star formation in the MCs in the last 4 Gyr.Comment: 4 pages, 2 figures. To be published in the proceedings of IAUS256: The Magellanic System: Stars, Gas, and Galaxie

    Engaging Movement(s) In and As Pedagogy

    Get PDF
    • …
    corecore