747 research outputs found
Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation
This paper studies the performance and resilience of a cyber-physical control
system (CPCS) with attack detection and reactive attack mitigation. It
addresses the problem of deriving an optimal sequence of false data injection
attacks that maximizes the state estimation error of the system. The results
provide basic understanding about the limit of the attack impact. The design of
the optimal attack is based on a Markov decision process (MDP) formulation,
which is solved efficiently using the value iteration method. Using the
proposed framework, we quantify the effect of false positives and
mis-detections on the system performance, which can help the joint design of
the attack detection and mitigation. To demonstrate the use of the proposed
framework in a real-world CPCS, we consider the voltage control system of power
grids, and run extensive simulations using PowerWorld, a high-fidelity power
system simulator, to validate our analysis. The results show that by carefully
designing the attack sequence using our proposed approach, the attacker can
cause a large deviation of the bus voltages from the desired setpoint. Further,
the results verify the optimality of the derived attack sequence and show that,
to cause maximum impact, the attacker must carefully craft his attack to strike
a balance between the attack magnitude and stealthiness, due to the
simultaneous presence of attack detection and mitigation
Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems
Modern urban railways extensively use computerized sensing and control
technologies to achieve safe, reliable, and well-timed operations. However, the
use of these technologies may provide a convenient leverage to cyber-attackers
who have bypassed the air gaps and aim at causing safety incidents and service
disruptions. In this paper, we study false data injection (FDI) attacks against
railways' traction power systems (TPSes). Specifically, we analyze two types of
FDI attacks on the train-borne voltage, current, and position sensor
measurements - which we call efficiency attack and safety attack -- that (i)
maximize the system's total power consumption and (ii) mislead trains' local
voltages to exceed given safety-critical thresholds, respectively. To
counteract, we develop a global attack detection (GAD) system that serializes a
bad data detector and a novel secondary attack detector designed based on
unique TPS characteristics. With intact position data of trains, our detection
system can effectively detect the FDI attacks on trains' voltage and current
measurements even if the attacker has full and accurate knowledge of the TPS,
attack detection, and real-time system state. In particular, the GAD system
features an adaptive mechanism that ensures low false positive and negative
rates in detecting the attacks under noisy system measurements. Extensive
simulations driven by realistic running profiles of trains verify that a TPS
setup is vulnerable to the FDI attacks, but these attacks can be detected
effectively by the proposed GAD while ensuring a low false positive rate.Comment: IEEE/IFIP DSN-2016 and ACM Trans. on Cyber-Physical System
Dilaton and Second-Rank Tensor Fields as Supersymmetric Compensators
We formulate a supersymmetric theory in which both a dilaton and a
second-rank tensor play roles of compensators. The basic off-shell multiplets
are a linear multiplet (B_{\mu\nu}, \chi, \phi) and a vector multiplet (A_\mu,
\l; C_{\mu\nu\rho}), where \phi and B_{\m\n} are respectively a dilaton and a
second-rank tensor. The third-rank tensor C_{\mu\nu\rho} in the vector
multiplet is 'dual' to the conventional D-field with 0 on-shell or 1 off-shell
degree of freedom. The dilaton \phi is absorbed into one longitudinal component
of A_\mu, making it massive. Initially, B_{\mu\nu} has 1 on-shell or 3
off-shell degrees of freedom, but it is absorbed into the longitudinal
components of C_{\mu\nu\rho}. Eventually, C_{\mu\nu\rho} with 0 on-shell or 1
off-shell degree of freedom acquires in total 1 on-shell or 4 off-shell degrees
of freedom, turning into a propagating massive field. These basic multiplets
are also coupled to chiral multiplets and a supersymmetric Dirac-Born-Infeld
action. Some of these results are also reformulated in superspace. The proposed
mechanism may well provide a solution to the long-standing puzzle of massless
dilatons and second-rank tensors in supersymmetric models inspired by string
theory.Comment: 15 pages, no figure
ASASSN-18tb: A Most Unusual Type Ia Supernova Observed by TESS and SALT
We present photometric and spectroscopic observations of the unusual Type Ia
supernova ASASSN-18tb, including a series of SALT spectra obtained over the
course of nearly six months and the first observations of a supernova by the
Transiting Exoplanet Survey Satellite (TESS). We confirm a previous observation
by Kollmeier et al. (2019) showing that ASASSN-18tb is the first relatively
normal Type Ia supernova to exhibit clear broad ( km s)
H emission in its nebular phase spectra. We find that this event is
best explained as a sub-Chandrasekhar mass explosion with . Despite the strong H signature at late times, we find
that the early rise of the supernova shows no evidence for deviations from a
single-component power-law and is best fit with a moderately shallow power-law
of index . We find that the H luminosity remains
approximately constant after its initial detection at phase +37 d, and that the
H velocity evolution does not trace that of the Fe~III
emission. These suggest that the H emission arises from circumstellar
medium (CSM) rather than swept up material from a non-degenerate companion.
However, ASASSN-18tb is strikingly different from other known CSM-interacting
Type Ia supernovae in a number of significant ways. Those objects typically
show an H luminosity two orders of magnitude higher than what is seen
in ASASSN-18tb, pushing them away from the empirical light-curve relations that
define "normal" Type Ia supernovae. Conversely, ASASSN-18tb exhibits a fairly
typical light curve and luminosity for an underluminous or transitional SN Ia,
with mag. Moreover, ASASSN-18tb is the only SN Ia showing
H from CSM interaction to be discovered in an early-type galaxy.Comment: 13 pages, 8 figure
Noncommutative Supersymmetric Yang-Mills Theory in Ten-Dimensions with Higher-Derivative Terms
We present an action for noncommutative supersymmetric Yang-Mills theory in
ten-dimensions, and confirm its invariance under supersymmetry. We next add
higher-order derivative terms to such a noncommutative supersymmetric action.
These terms contain fields as high as the quartic order. This resulting action
can be regarded as supersymmetric generalization of noncommutative non-Abelian
Dirac-Born-Infeld action. Some ambiguities related to field redefinitions are
also clarified.Comment: 14 pages, late
ASSESSMENT OF SERUM PARATHYROID HORMONE FLUCTUATION DURING FRACTURE HEALING WITH ORAL ADMINISTRATION OF DRUG CISSUS QUADRANGULARIS IN PATIENTS OF BONE FRACTURE
This study gives an understanding about the PTH mode of action as it accelerates the natural fracture healing process by shrinking callus size and increasing degree of mineralization of the fracture callus; thereby restoring intrinsic material properties. But, in human beings very few clinical research studies has been conducted with help of Hormonal parameters and its fluctuation during fracture healing with use of Ayurvedic formulation. Based on this, a random controlled study was conducted and fracture healing was assessed in the patients with simple and single fracture with assessment parameter hormone PTH (parathyroid hormone) and resulting values were statistically evaluated during fracture healing. treated group shows elevation pattern of serum hPTH so early initiation of bone resorption with early initiation of osteoblastic activity and continuous up to bone maturation so hardening of callus at fractured site may also quicker and this may helps to reduction in healing period or immobilization period and so early rehabilitation is possible.
Cost-Benefit Analysis of Moving-Target Defense in Power Grids
We study moving-target defense (MTD) that actively perturbs transmission line
reactances to thwart stealthy false data injection (FDI) attacks against state
estimation in a power grid. Prior work on this topic has proposed MTD based on
randomly selected reactance perturbations, but these perturbations cannot
guarantee effective attack detection. To address the issue, we present formal
design criteria to select MTD reactance perturbations that are truly effective.
However, based on a key optimal power flow (OPF) formulation, we find that the
effective MTD may incur a non-trivial operational cost that has not hitherto
received attention. Accordingly, we characterize important tradeoffs between
the MTD's detection capability and its associated required cost. Extensive
simulations, using the MATPOWER simulator and benchmark IEEE bus systems,
verify and illustrate the proposed design approach that for the first time
addresses both key aspects of cost and effectiveness of the MTD.Comment: IEEE/IFIP International Conference on Dependable Systems and Networks
(DSN) - 201
ACE2 Deficiency Worsens Epicardial Adipose Tissue Inflammation and Cardiac Dysfunction in Response to Diet-Induced Obesity
Obesity is increasing in prevalence and is strongly associated with metabolic and cardiovascular disorders. The renin-angiotensin system (RAS) has emerged as a key pathogenic mechanism for these disorders; angiotensin (Ang)-converting enzyme 2 (ACE2) negatively regulates RAS by metabolizing Ang II into Ang 1-7. We studied the role of ACE2 in obesity-mediated cardiac dysfunction. ACE2 null (ACE2KO) and wild-type (WT) mice were fed a high-fat diet (HFD) or a control diet and studied at 6 months of age. Loss of ACE2 resulted in decreased weight gain but increased glucose intolerance, epicardial adipose tissue (EAT) inflammation, and polarization of macrophages into a proinflammatory phenotype in response to HFD. Similarly, human EAT in patients with obesity and heart failure displayed a proinflammatory macrophage phenotype. Exacerbated EAT inflammation in ACE2KO-HFD mice was associated with decreased myocardial adiponectin, decreased phosphorylation of AMPK, increased cardiac steatosis and lipotoxicity, and myocardial insulin resistance, which worsened heart function. Ang 1-7 (24 µg/kg/h) administered to ACE2KO-HFD mice resulted in ameliorated EAT inflammation and reduced cardiac steatosis and lipotoxicity, resulting in normalization of heart failure. In conclusion, ACE2 plays a novel role in heart disease associated with obesity wherein ACE2 negatively regulates obesity-induced EAT inflammation and cardiac insulin resistance
The impact of surveillance and control on highly pathogenic avian influenza outbreaks in poultry in Dhaka division, Bangladesh
In Bangladesh, the poultry industry is an economically and socially important sector, but it is persistently threatened by the effects of H5N1 highly pathogenic avian influenza. Thus, identifying the optimal control policy in response to an emerging disease outbreak is a key challenge for policy-makers. To inform this aim, a common approach is to carry out simulation studies comparing plausible strategies, while accounting for known capacity restrictions. In this study we perform simulations of a previously developed H5N1 influenza transmission model framework, fitted to two separate historical outbreaks, to assess specific control objectives related to the burden or duration of H5N1 outbreaks among poultry farms in the Dhaka division of Bangladesh. In particular, we explore the optimal implementation of ring culling, ring vaccination and active surveillance measures when presuming disease transmission predominately occurs from premises-to-premises, versus a setting requiring the inclusion of external factors. Additionally, we determine the sensitivity of the management actions under consideration to differing levels of capacity constraints and outbreaks with disparate transmission dynamics. While we find that reactive culling and vaccination policies should pay close attention to these factors to ensure intervention targeting is optimised, across multiple settings the top performing control action amongst those under consideration were targeted proactive surveillance schemes. Our findings may advise the type of control measure, plus its intensity, that could potentially be applied in the event of a developing outbreak of H5N1 amongst originally H5N1 virus-free commercially-reared poultry in the Dhaka division of Bangladesh
- …
