382 research outputs found
K\"ahlerian Effective Potentials for Chern-Simons-Matter Theories
In this paper, we will calculate the effective potential for a theory of
multiple M2-branes. As the theory of multiple M2-branes can be described by a
Chern-Simons-matter theory, this will be done by calculating the K\"ahlerian
effective potential for a Chern-Simons-matter theory. This calculation will be
performed in superspace formalism. We will initially study an
Abelian Chern-Simons-matter theory, and then generalize those results to the
full non-Abelian Chern-Simons-matter theory. We will obtain explicit
expressions for the superpropagators for this theory. These superpropagators
will be used to calculate the one-loop effective potential.Comment: 15 page
Advanced Virus Monitoring and Analysis System
This research proposed an architecture and a system
which able to monitor the virus behavior and classify them as a traditional or polymorphic virus. Preliminary research was conducted to get the current virus behavior and to find the certain parameters which usually used by virus to attack then computer target. Finally, “test bed environment” is used to test our system by releasing the virus in a real environment, and try to capture their behavior, and followed by generating the conclusion that the tested or monitored virus is classified as a traditional or polymorphic virus
Threshold Verification Technique for Network Intrusion Detection System
Internet has played a vital role in this modern world, the possibilities and
opportunities offered are limitless. Despite all the hype, Internet services
are liable to intrusion attack that could tamper the confidentiality and
integrity of important information. An attack started with gathering the
information of the attack target, this gathering of information activity can be
done as either fast or slow attack. The defensive measure network administrator
can take to overcome this liability is by introducing Intrusion Detection
Systems (IDSs) in their network. IDS have the capabilities to analyze the
network traffic and recognize incoming and on-going intrusion. Unfortunately
the combination of both modules in real time network traffic slowed down the
detection process. In real time network, early detection of fast attack can
prevent any further attack and reduce the unauthorized access on the targeted
machine. The suitable set of feature selection and the correct threshold value,
add an extra advantage for IDS to detect anomalies in the network. Therefore
this paper discusses a new technique for selecting static threshold value from
a minimum standard features in detecting fast attack from the victim
perspective. In order to increase the confidence of the threshold value the
result is verified using Statistical Process Control (SPC). The implementation
of this approach shows that the threshold selected is suitable for identifying
the fast attack in real time.Comment: 8 Pages, International Journal of Computer Science and Information
Securit
Three State Logic Probe
Created a logic level detection circuit of a digital circuit. This circuit has the ability to3 (three) logic level digital signal is typically defined as follows: Level of highvoltage (High), low voltage level (Low) and the threshold voltage level (Theresehold).The ability of this series allows a digital circuit analysis to help level the better. Inthis series of tests in particular applied to the gates of the base
Super-Group Field Cosmology
In this paper we construct a model for group field cosmology. The classical
equations of motion for the non-interactive part of this model generate the
Hamiltonian constraint of loop quantum gravity for a homogeneous isotropic
universe filled with a scalar matter field. The interactions represent topology
changing processes that occurs due to joining and splitting of universes. These
universes in the multiverse are assumed to obey both bosonic and fermionic
statistics, and so a supersymmetric multiverse is constructed using superspace
formalism. We also introduce gauge symmetry in this model. The supersymmetry
and gauge symmetry are introduced at the level of third quantized fields, and
not the second quantized ones. This is the first time that supersymmetry has
been discussed at the level of third quantized fields.Comment: 14 pages, 0 figures, accepted for publication in Class. Quant. Gra
- …