817 research outputs found

    Extending higher dimensional quasi-cocycles

    Get PDF
    Let G be a group admitting a non-elementary acylindrical action on a Gromov hyperbolic space (for example, a non-elementary relatively hyperbolic group, or the mapping class group of a closed hyperbolic surface, or Out(F_n) for n>1). We prove that, in degree 3, the bounded cohomology of G with real coefficients is infinite-dimensional. Our proof is based on an extension to higher degrees of a recent result by Hull and Osin. Namely, we prove that, if H is a hyperbolically embedded subgroup of G and V is any G-module, then any n-quasi cocycle on H with values in V may be extended to G. Also, we show that our extensions detect the geometry of the embedding of hyperbolically embedded subgroups, in a suitable sense.Comment: Minor revisions. This version has been accepted for publication by the Journal of Topolog

    Dynamical evolution of escaped plutinos, another source of Centaurs

    Full text link
    It was shown in previous works the existence of weakly chaotic orbits in the plutino population that diffuse very slowly. These orbits correspond to long-term plutino escapers and then represent the plutinos that are escaping from the resonance at present. In this paper we perform numerical simulations in order to explore the dynamical evolution of plutinos recently escaped from the resonance. The numerical simulations were divided in two parts. In the first one we evolved 20,000 test particles in the resonance in order to detect and select the long-term escapers. In the second one, we numerically integrate the selected escaped plutinos in order to study their dynamical post escaped behavior. Our main results include the characterization of the routes of escape of plutinos and their evolution in the Centaur zone. We obtained a present rate of escape of plutinos between 1 and 10 every 10 years. The escaped plutinos have a mean lifetime in the Centaur zone of 108 Myr and their contribution to the Centaur population would be a fraction of less than 6 % of the total Centaur population. In this way, escaped plutinos would be a secondary source of Centaurs.Comment: Accepted for publication in A&

    Origin of craters on Phoebe: comparison with Cassini's data

    Get PDF
    Phoebe is one of the irregular satellites of Saturn; the images taken by Cassini-Huygens spacecraft allowed us to analyze its surface and the craters on it. We study the craters on Phoebe produced by Centaur objects from the Scattered Disk (SD) and plutinos escaped from the 3:2 mean motion resonance with Neptune and compare our results with the observations by Cassini. We use previous simulations on trans-Neptunian Objects and a method that allows us to obtain the number of craters and the cratering rate on Phoebe. We obtain the number of craters and the greatest crater on Phoebe produced by Centaurs in the present configuration of the Solar System. Moreover, we obtain a present normalized rate of encounters of Centaurs with Saturn of F˙=7.1×10−11\dot F = 7.1 \times 10^{-11} per year, from which we can infer the current cratering rate on Phoebe for each crater diameter. Our study and the comparison with the observations suggest that the main crater features on Phoebe are unlikely to have been produced in the present configuration of the Solar System and that they must have been acquired when the SD were depleted in the early Solar System. If this is what happened and the craters were produced when Phoebe was a satellite of Saturn, then it had to be captured, very early in the evolution of the Solar System.Comment: Accepted for publication in Astronomy & Astrophysic

    A VNF modeling approach for verification purposes

    Get PDF
    Network Function Virtualization (NFV) architectures are emerging to increase networks flexibility. However, this renewed scenario poses new challenges, because virtualized networks, need to be carefully verified before being actually deployed in production environments in order to preserve network coherency (e.g., absence of forwarding loops, preservation of security on network traffic, etc.). Nowadays, model checking tools, SAT solvers, and Theorem Provers are available for formal verification of such properties in virtualized networks. Unfortunately, most of those verification tools accept input descriptions written in specification languages that are difficult to use for people not experienced in formal methods. Also, in order to enable the use of formal verification tools in real scenarios, vendors of Virtual Network Functions (VNFs) should provide abstract mathematical models of their functions, coded in the specific input languages of the verification tools. This process is error-prone, time-consuming, and often outside the VNF developers’ expertise. This paper presents a framework that we designed for automatically extracting verification models starting from a Java-based representation of a given VNF. It comprises a Java library of classes to define VNFs in a more developer-friendly way, and a tool to translate VNF definitions into formal verification models of different verification tools

    A novel approach for security function graph configuration and deployment

    Get PDF
    Network virtualization increased the versatility in enforcing security protection, by easing the development of new security function implementations. However, the drawback of this opportunity is that a security provider, in charge of configuring and deploying a security function graph, has to choose the best virtual security functions among a pool so large that makes manual decisions unfeasible. In light of this problem, the paper proposes a novel approach for synthesizing virtual security services by introducing the functionality abstraction. This new level of abstraction allows to work in the virtual level without considering the different function implementations, with the objective to postpone the function selection jointly with the deployment, after the configuration of the virtual graph. This novelty enables to optimize the function selection when the pool of available functions is very large. A framework supporting this approach has been implemented and it showed adequate scalability for the requirements of modern virtual networks

    Design of a miniature hydrogen fueled gas turbine engine

    Get PDF
    The design, development, and delivery of a miniature hydrogen-fueled gas turbine engine are discussed. The engine was to be sized to approximate a scaled-down lift engine such as the teledyne CAE model 376. As a result, the engine design emerged as a 445N(100 lb.)-thrust engine flowing 0.86 kg (1.9 lbs.) air/sec. A 4-stage compressor was designed at a 4.0 to 1 pressure ratio for the above conditions. The compressor tip diameter was 9.14 cm (3.60 in.). To improve overall engine performance, another compressor with a 4.75 to 1 pressure ratio at the same tip diameter was designed. A matching turbine for each compressor was also designed. The turbine tip diameter was 10.16 cm (4.0 in.). A combustion chamber was designed, built, and tested for this engine. A preliminary design of the mechanical rotating parts also was completed and is discussed. Three exhaust nozzle designs are presented

    Automated optimal firewall orchestration and configuration in virtualized networks

    Get PDF
    Emerging technologies such as Software-Defined Networking and Network Functions Virtualization are making the definition and configuration of network services more dynamic, thus making automatic approaches that can replace manual and error-prone tasks more feasible. In view of these considerations, this paper proposes a novel methodology to automatically compute the optimal allocation scheme and configuration of virtual firewalls within a user-defined network service graph subject to a corresponding set of security requirements. The presented framework adopts a formal approach based on the solution of a weighted partial MaxSMT problem, which also provides good confidence about the solution correctness. A prototype implementation of the proposed approach based on the z3 solver has been used for validation, showing the feasibility of the approach for problem instances requiring tens of virtual firewalls and similar numbers of security requirements
    • …
    corecore