829 research outputs found
Sound propagation and Mach cone in anisotropic hydrodynamics
This letter is based on a kinetic theory approach to anisotropic
hydrodynamics. We derive the sound wave equation in anisotropic hydrodynamics
and show that a corresponding wave front is ellipsoidal. The phenomenon of Mach
cone emission in anisotropic hydrodynamics is studied. It is shown that Mach
cone in anisotropic case becomes asymmetric, i. e. in this limit they're two
different angles, left and right with respect to the ultrasonic particle
direction, which are determined by the direction of ultrasonic particle
propagation and the asymmetry coefficient.Comment: 9 pages, 4 figure
Critical Point from Shock Waves Solution in Relativistic Anisotropic Hydrodynamics
Solutions of shock waves in anisotropic relativistic hydrodynamics in the
absence of refraction of the flow passing through the shock wave are
considered. The existence of a critical value of the anisotropy parameter is
shown. This value is the upper limit below which an adequate description of
shock waves is possible. Shock wave solutions also provide a mechanism for
system isotropization.Comment: 7 pages, 2 figure
Linear Stability of Shock Waves in Ultrarelativistic Anisotropic Hydrodynamics
Linear stability of a plane shock waves in ultrarelativistic anisotropic
hydrodynamics is investigated. The properties of the amplitudes of
perturbations of physical quantities are studied depending on the components of
the wave vector of a small harmonic perturbation. Analytical calculationsfor
the longitudinal and transverse propagation of shock wave normal with respect
to the anisotropy axis (beam-axis) and numerical calculations for an arbitrary
polar angle are carried out.Comment: 26 pages, 3 figure
The Event Knowledge Test (EKT)
"In Lithuania polygraphs have been in use since 1992. Tests that are based
on a comparison-relevant question system are not popular. The results of
psychophysiological tests and their conclusions are difficult to prove in
courts. The results of tests have almost no use to the police and prosecutor’s
department in pre-trial investigation. Those results in criminal investigations
that were evaluated highest in court decisions were achieved using an event
knowledge test (EKT). "(...
Legal and practical aspects of using the polygraph in the Republic of Lithuania
"Up until 2000 Lithuania’s regulations on the polygraph were contained exclusively in the laws governing defence. In 2000, Lithuania passed a special law adopting the use of the polygraph. Yet, this special law applies more to government officials that deal with classified information."(...
Creating a vulnerable node based on the vulnerability MS17-010
The creation of a vulnerable node has been demonstrated through the analysis
and implementation of the MS17-010 (CVE-2017-0144) vulnerability, affecting the
SMBv1 protocol on various Windows operating systems. The principle and
methodology of exploiting the vulnerability are described, with a formalized
representation of the exploitation in the form of a Meta Attack Language (MAL)
graph. Additionally, the attacker's implementation is outlined as the execution
of an automated script in Python using the Metasploit Framework. Basic security
measures for systems utilizing the SMBv1 protocol are provided.Comment: 6 pages, 2 figure
The “Avos” phenomenon: a non-censured theatre in the Novosibirsk University, 1975-1976). In: Mosty (The Bridges), Frankfurt, Germany, 2012, 35: 269–301.] [Part 3]
РЕЗЮМЕ
В 1975-1976 гг. группа студентов Факультета Естественных Наук Новосибирского университета (Академгородок) умудрилась создать свой неподцензурный маленький театр «Феномен», который успел просуществовать целый сезон. В этих мемуарах бывших актеров, ныне разбросанных по всему миру, тщательно собранных 35 лет спустя, восстановлена подробная история театра. Центральным событием была (видимо, первая) постановка по поэме Андрея Вознесенского «Авось!» в декабре 1975, задолго до знаменитой рок-оперы.
ABSTRACT
In 1975-1976, a group of science students of the Novosibirsk University (Russia, Siberia) created a small theatre that managed to avoid the official censorship for the entire season. In this memoir, several former actors, now scattered across the world, reconstruct the detailed history of their “Phenomenon” theatre 35 years later. The central event was the (first) staging (December 1975) of Andrey Voznesensky’s long poem “Avos\u27!”, long before the famous rock opera appeared
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
Integrating machine learning into Automated Control Systems (ACS) enhances
decision-making in industrial process management. One of the limitations to the
widespread adoption of these technologies in industry is the vulnerability of
neural networks to adversarial attacks. This study explores the threats in
deploying deep learning models for fault diagnosis in ACS using the Tennessee
Eastman Process dataset. By evaluating three neural networks with different
architectures, we subject them to six types of adversarial attacks and explore
five different defense methods. Our results highlight the strong vulnerability
of models to adversarial samples and the varying effectiveness of defense
strategies. We also propose a novel protection approach by combining multiple
defense methods and demonstrate it's efficacy. This research contributes
several insights into securing machine learning within ACS, ensuring robust
fault diagnosis in industrial processes
- …
