382 research outputs found

    K\"ahlerian Effective Potentials for Chern-Simons-Matter Theories

    Get PDF
    In this paper, we will calculate the effective potential for a theory of multiple M2-branes. As the theory of multiple M2-branes can be described by a Chern-Simons-matter theory, this will be done by calculating the K\"ahlerian effective potential for a Chern-Simons-matter theory. This calculation will be performed in N=1\mathcal{N} = 1 superspace formalism. We will initially study an Abelian Chern-Simons-matter theory, and then generalize those results to the full non-Abelian Chern-Simons-matter theory. We will obtain explicit expressions for the superpropagators for this theory. These superpropagators will be used to calculate the one-loop effective potential.Comment: 15 page

    Advanced Virus Monitoring and Analysis System

    Get PDF
    This research proposed an architecture and a system which able to monitor the virus behavior and classify them as a traditional or polymorphic virus. Preliminary research was conducted to get the current virus behavior and to find the certain parameters which usually used by virus to attack then computer target. Finally, “test bed environment” is used to test our system by releasing the virus in a real environment, and try to capture their behavior, and followed by generating the conclusion that the tested or monitored virus is classified as a traditional or polymorphic virus

    Threshold Verification Technique for Network Intrusion Detection System

    Get PDF
    Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fast or slow attack. The defensive measure network administrator can take to overcome this liability is by introducing Intrusion Detection Systems (IDSs) in their network. IDS have the capabilities to analyze the network traffic and recognize incoming and on-going intrusion. Unfortunately the combination of both modules in real time network traffic slowed down the detection process. In real time network, early detection of fast attack can prevent any further attack and reduce the unauthorized access on the targeted machine. The suitable set of feature selection and the correct threshold value, add an extra advantage for IDS to detect anomalies in the network. Therefore this paper discusses a new technique for selecting static threshold value from a minimum standard features in detecting fast attack from the victim perspective. In order to increase the confidence of the threshold value the result is verified using Statistical Process Control (SPC). The implementation of this approach shows that the threshold selected is suitable for identifying the fast attack in real time.Comment: 8 Pages, International Journal of Computer Science and Information Securit

    Three State Logic Probe

    Full text link
    Created a logic level detection circuit of a digital circuit. This circuit has the ability to3 (three) logic level digital signal is typically defined as follows: Level of highvoltage (High), low voltage level (Low) and the threshold voltage level (Theresehold).The ability of this series allows a digital circuit analysis to help level the better. Inthis series of tests in particular applied to the gates of the base

    Super-Group Field Cosmology

    Full text link
    In this paper we construct a model for group field cosmology. The classical equations of motion for the non-interactive part of this model generate the Hamiltonian constraint of loop quantum gravity for a homogeneous isotropic universe filled with a scalar matter field. The interactions represent topology changing processes that occurs due to joining and splitting of universes. These universes in the multiverse are assumed to obey both bosonic and fermionic statistics, and so a supersymmetric multiverse is constructed using superspace formalism. We also introduce gauge symmetry in this model. The supersymmetry and gauge symmetry are introduced at the level of third quantized fields, and not the second quantized ones. This is the first time that supersymmetry has been discussed at the level of third quantized fields.Comment: 14 pages, 0 figures, accepted for publication in Class. Quant. Gra
    • …
    corecore