scholarly journals THE MICROSCOPIC PHENOMENOLOGICAL THEORY OF ANALYSIS FOR THE PROBLEM OF NONE-QUILIBRIUM FLUCTUATIONS (Ⅱ)——NONEQUILIBRIUM FLUCTUATIONS OF SOME PHYSICAL SYSTEMS AND COMPAR-ISON WITH EXACT RESULTS FOR HEAT CONDUCTIONS OBTAINED FROM AN INFORMATION-THEO

1989 ◽  
Vol 38 (10) ◽  
pp. 1642
Author(s):  
LI FU-BIN
2020 ◽  
Vol 8 (1) ◽  
Author(s):  
Jason Myers ◽  
Joe Bhaseen ◽  
Rosemary J. Harris ◽  
Benjamin Doyon

We propose exact results for the full counting statistics, or the scaled cumulant generating function, pertaining to the transfer of arbitrary conserved quantities across an interface in homogeneous integrable models out of equilibrium. We do this by combining insights from generalised hydrodynamics with a theory of large deviations in ballistic transport. The results are applicable to a wide variety of physical systems, including the Lieb-Liniger gas and the Heisenberg chain. We confirm the predictions in non-equilibrium steady states obtained by the partitioning protocol, by comparing with Monte Carlo simulations of this protocol in the classical hard rod gas. We verify numerically that the exact results obey the correct non-equilibrium fluctuation relations with the appropriate initial conditions.


1997 ◽  
Vol 7 (12) ◽  
pp. 1817-1828 ◽  
Author(s):  
P. Gisse ◽  
M. Sidir ◽  
V. L. Lorman ◽  
R. Farhi ◽  
J. Pavel ◽  
...  

1979 ◽  
Vol 40 (10) ◽  
pp. 1024-1024
Author(s):  
G. André ◽  
R. Bidaux ◽  
J.-P. Carton ◽  
R. Conte ◽  
L. de Seze

Author(s):  
Okolie S.O. ◽  
Kuyoro S.O. ◽  
Ohwo O. B

Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications which would affect societal and economic benefit. This paper looks into the concept of emerging Cyber-Physical system, applications and security issues in sustaining development in various economic sectors; outlining a set of strategic Research and Development opportunities that should be accosted, so as to allow upgraded CPS to attain their potential and provide a wide range of societal advantages in the future.


2003 ◽  
Vol 40 (3) ◽  
pp. 269-286 ◽  
Author(s):  
H. Nyklová

In this paper we study a problem related to the classical Erdos--Szekeres Theorem on finding points in convex position in planar point sets. We study for which n and k there exists a number h(n,k) such that in every planar point set X of size h(n,k) or larger, no three points on a line, we can find n points forming a vertex set of a convex n-gon with at most k points of X in its interior. Recall that h(n,0) does not exist for n = 7 by a result of Horton. In this paper we prove the following results. First, using Horton's construction with no empty 7-gon we obtain that h(n,k) does not exist for k = 2(n+6)/4-n-3. Then we give some exact results for convex hexagons: every point set containing a convex hexagon contains a convex hexagon with at most seven points inside it, and any such set of at least 19 points contains a convex hexagon with at most five points inside it.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document