16,182 research outputs found
Modified evolution of stellar binaries from supermassive black hole binaries
The evolution of main sequence binaries resided in the galactic centre is
influenced a lot by the central super massive black hole (SMBH). Due to this
perturbation, the stars in a dense environment are likely to experience mergers
or collisions through secular or non-secular interactions. In this work, we
study the dynamics of the stellar binaries at galactic center, perturbed by
another distant SMBH. Geometrically, such a four-body system is supposed to be
decomposed into the inner triple (SMBH-star-star) and the outer triple
(SMBH-stellar binary-SMBH). We survey the parameter space and determine the
criteria analytically for the stellar mergers and the tidal disruption events
(TDEs). For a relative distant and equal masses SMBH binary, the stars have
more opportunities to merge as a result from the Lidov-Kozai(LK) oscillations
in the inner triple. With a sample of tight stellar binaries, our numerical
experiments reveal that a significant fraction of the binaries, ~70 per cent,
experience merger eventually. Whereas the majority of the stellar TDEs are
likely to occur at a close periapses to the SMBH, induced by the outer Kozai
effect. The tidal disruptions are found numerically as many as ~10 per cent for
a close SMBH binary that is enhanced significantly than the one without the
external SMBH. These effects require the outer perturber to have an inclined
orbit (>=40 degree) relatively to the inner orbital plane and may lead to a
burst of the extremely astronomical events associated with the detection of the
SMBH binary.Comment: 12 pages, 9 figures, MNRAS in pres
Multi-dimensional key generation of ICMetrics for cloud computing
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service. This paper explores an approach to assure trust and provenance in cloud based services via the generation of digital signatures using properties or features derived from their own construction and software behaviour. The resulting system removes the need for a server to store a private key in a typical Public/Private-Key Infrastructure for data sources. Rather, keys are generated at run-time by features obtained as service execution proceeds. In this paper we investigate several potential software features for suitability during the employment of a cloud service identification system. The generation of stable and unique digital identity from features in Cloud computing is challenging because of the unstable operation environments that implies the features employed are likely to vary under normal operating conditions. To address this, we introduce a multi-dimensional key generation technology which maps from multi-dimensional feature space directly to a key space. Subsequently, a smooth entropy algorithm is developed to evaluate the entropy of key space
Mirroring Mobile Phone in the Clouds
This paper presents a framework of Mirroring Mobile Phone in the Clouds (MMPC) to speed up data/computing intensive applications on a mobile phone by taking full advantage of the super computing power of the clouds. An application on the mobile phone is dynamically partitioned in such a way that the heavy-weighted part is always running on a mirrored server in the clouds while the light-weighted part remains on the mobile phone. A performance improvement (an energy consumption reduction of 70% and a speed-up of 15x) is achieved at the cost of the communication overhead between the mobile phone and the clouds (to transfer the application codes and intermediate results) of a desired application. Our original contributions include a dynamic profiler and a dynamic partitioning algorithm compared with traditional approaches of either statically partitioning a mobile application or modifying a mobile application to support the required partitioning
Rosen-Zener interferometry with Ultracold Atoms
We propose a time-domain "interferometer" based on ultracold Bose atoms
loaded on a double well potential. By the adiabatic Rosen-Zener process, the
barrier between two wells is ramped down slowly, held for a while, then ramped
back. Starting with a coherent state of double well system, the final
occupations on one well show interesting interference fringes in the
time-domain. The fringe pattern is sensitive to the initial state, the
interatomic interaction, and the external forces such as gravity which can
change the shape of the double well. In this sense, this interferometric scheme
has the potentials for precision measurements with ultracold atoms. The
underlying mechanism is revealed and possible applications are discussed.Comment: 4 pages, 5 figure
Spatial spectrum and energy efficiency of random cellular networks
It is a great challenge to evaluate the network performance of cellular
mobile communication systems. In this paper, we propose new spatial spectrum
and energy efficiency models for Poisson-Voronoi tessellation (PVT) random
cellular networks. To evaluate the user access the network, a Markov chain
based wireless channel access model is first proposed for PVT random cellular
networks. On that basis, the outage probability and blocking probability of PVT
random cellular networks are derived, which can be computed numerically.
Furthermore, taking into account the call arrival rate, the path loss exponent
and the base station (BS) density in random cellular networks, spatial spectrum
and energy efficiency models are proposed and analyzed for PVT random cellular
networks. Numerical simulations are conducted to evaluate the network spectrum
and energy efficiency in PVT random cellular networks.Comment: appears in IEEE Transactions on Communications, April, 201
- …
