829 research outputs found

    Sound propagation and Mach cone in anisotropic hydrodynamics

    Full text link
    This letter is based on a kinetic theory approach to anisotropic hydrodynamics. We derive the sound wave equation in anisotropic hydrodynamics and show that a corresponding wave front is ellipsoidal. The phenomenon of Mach cone emission in anisotropic hydrodynamics is studied. It is shown that Mach cone in anisotropic case becomes asymmetric, i. e. in this limit they're two different angles, left and right with respect to the ultrasonic particle direction, which are determined by the direction of ultrasonic particle propagation and the asymmetry coefficient.Comment: 9 pages, 4 figure

    Critical Point from Shock Waves Solution in Relativistic Anisotropic Hydrodynamics

    Full text link
    Solutions of shock waves in anisotropic relativistic hydrodynamics in the absence of refraction of the flow passing through the shock wave are considered. The existence of a critical value of the anisotropy parameter is shown. This value is the upper limit below which an adequate description of shock waves is possible. Shock wave solutions also provide a mechanism for system isotropization.Comment: 7 pages, 2 figure

    Linear Stability of Shock Waves in Ultrarelativistic Anisotropic Hydrodynamics

    Full text link
    Linear stability of a plane shock waves in ultrarelativistic anisotropic hydrodynamics is investigated. The properties of the amplitudes of perturbations of physical quantities are studied depending on the components of the wave vector of a small harmonic perturbation. Analytical calculationsfor the longitudinal and transverse propagation of shock wave normal with respect to the anisotropy axis (beam-axis) and numerical calculations for an arbitrary polar angle are carried out.Comment: 26 pages, 3 figure

    The Event Knowledge Test (EKT)

    Get PDF
    "In Lithuania polygraphs have been in use since 1992. Tests that are based on a comparison-relevant question system are not popular. The results of psychophysiological tests and their conclusions are difficult to prove in courts. The results of tests have almost no use to the police and prosecutor’s department in pre-trial investigation. Those results in criminal investigations that were evaluated highest in court decisions were achieved using an event knowledge test (EKT). "(...

    Legal and practical aspects of using the polygraph in the Republic of Lithuania

    Get PDF
    "Up until 2000 Lithuania’s regulations on the polygraph were contained exclusively in the laws governing defence. In 2000, Lithuania passed a special law adopting the use of the polygraph. Yet, this special law applies more to government officials that deal with classified information."(...

    Creating a vulnerable node based on the vulnerability MS17-010

    Full text link
    The creation of a vulnerable node has been demonstrated through the analysis and implementation of the MS17-010 (CVE-2017-0144) vulnerability, affecting the SMBv1 protocol on various Windows operating systems. The principle and methodology of exploiting the vulnerability are described, with a formalized representation of the exploitation in the form of a Meta Attack Language (MAL) graph. Additionally, the attacker's implementation is outlined as the execution of an automated script in Python using the Metasploit Framework. Basic security measures for systems utilizing the SMBv1 protocol are provided.Comment: 6 pages, 2 figure

    The “Avos” phenomenon: a non-censured theatre in the Novosibirsk University, 1975-1976). In: Mosty (The Bridges), Frankfurt, Germany, 2012, 35: 269–301.] [Part 3]

    Get PDF
    РЕЗЮМЕ В 1975-1976 гг. группа студентов Факультета Естественных Наук Новосибирского университета (Академгородок) умудрилась создать свой неподцензурный маленький театр «Феномен», который успел просуществовать целый сезон. В этих мемуарах бывших актеров, ныне разбросанных по всему миру, тщательно собранных 35 лет спустя, восстановлена подробная история театра. Центральным событием была (видимо, первая) постановка по поэме Андрея Вознесенского «Авось!» в декабре 1975, задолго до знаменитой рок-оперы. ABSTRACT In 1975-1976, a group of science students of the Novosibirsk University (Russia, Siberia) created a small theatre that managed to avoid the official censorship for the entire season. In this memoir, several former actors, now scattered across the world, reconstruct the detailed history of their “Phenomenon” theatre 35 years later. The central event was the (first) staging (December 1975) of Andrey Voznesensky’s long poem “Avos\u27!”, long before the famous rock opera appeared

    Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process

    Full text link
    Integrating machine learning into Automated Control Systems (ACS) enhances decision-making in industrial process management. One of the limitations to the widespread adoption of these technologies in industry is the vulnerability of neural networks to adversarial attacks. This study explores the threats in deploying deep learning models for fault diagnosis in ACS using the Tennessee Eastman Process dataset. By evaluating three neural networks with different architectures, we subject them to six types of adversarial attacks and explore five different defense methods. Our results highlight the strong vulnerability of models to adversarial samples and the varying effectiveness of defense strategies. We also propose a novel protection approach by combining multiple defense methods and demonstrate it's efficacy. This research contributes several insights into securing machine learning within ACS, ensuring robust fault diagnosis in industrial processes
    corecore