16,182 research outputs found

    Modified evolution of stellar binaries from supermassive black hole binaries

    Full text link
    The evolution of main sequence binaries resided in the galactic centre is influenced a lot by the central super massive black hole (SMBH). Due to this perturbation, the stars in a dense environment are likely to experience mergers or collisions through secular or non-secular interactions. In this work, we study the dynamics of the stellar binaries at galactic center, perturbed by another distant SMBH. Geometrically, such a four-body system is supposed to be decomposed into the inner triple (SMBH-star-star) and the outer triple (SMBH-stellar binary-SMBH). We survey the parameter space and determine the criteria analytically for the stellar mergers and the tidal disruption events (TDEs). For a relative distant and equal masses SMBH binary, the stars have more opportunities to merge as a result from the Lidov-Kozai(LK) oscillations in the inner triple. With a sample of tight stellar binaries, our numerical experiments reveal that a significant fraction of the binaries, ~70 per cent, experience merger eventually. Whereas the majority of the stellar TDEs are likely to occur at a close periapses to the SMBH, induced by the outer Kozai effect. The tidal disruptions are found numerically as many as ~10 per cent for a close SMBH binary that is enhanced significantly than the one without the external SMBH. These effects require the outer perturber to have an inclined orbit (>=40 degree) relatively to the inner orbital plane and may lead to a burst of the extremely astronomical events associated with the detection of the SMBH binary.Comment: 12 pages, 9 figures, MNRAS in pres

    Multi-dimensional key generation of ICMetrics for cloud computing

    Get PDF
    Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service. This paper explores an approach to assure trust and provenance in cloud based services via the generation of digital signatures using properties or features derived from their own construction and software behaviour. The resulting system removes the need for a server to store a private key in a typical Public/Private-Key Infrastructure for data sources. Rather, keys are generated at run-time by features obtained as service execution proceeds. In this paper we investigate several potential software features for suitability during the employment of a cloud service identification system. The generation of stable and unique digital identity from features in Cloud computing is challenging because of the unstable operation environments that implies the features employed are likely to vary under normal operating conditions. To address this, we introduce a multi-dimensional key generation technology which maps from multi-dimensional feature space directly to a key space. Subsequently, a smooth entropy algorithm is developed to evaluate the entropy of key space

    Mirroring Mobile Phone in the Clouds

    Get PDF
    This paper presents a framework of Mirroring Mobile Phone in the Clouds (MMPC) to speed up data/computing intensive applications on a mobile phone by taking full advantage of the super computing power of the clouds. An application on the mobile phone is dynamically partitioned in such a way that the heavy-weighted part is always running on a mirrored server in the clouds while the light-weighted part remains on the mobile phone. A performance improvement (an energy consumption reduction of 70% and a speed-up of 15x) is achieved at the cost of the communication overhead between the mobile phone and the clouds (to transfer the application codes and intermediate results) of a desired application. Our original contributions include a dynamic profiler and a dynamic partitioning algorithm compared with traditional approaches of either statically partitioning a mobile application or modifying a mobile application to support the required partitioning

    Rosen-Zener interferometry with Ultracold Atoms

    Full text link
    We propose a time-domain "interferometer" based on ultracold Bose atoms loaded on a double well potential. By the adiabatic Rosen-Zener process, the barrier between two wells is ramped down slowly, held for a while, then ramped back. Starting with a coherent state of double well system, the final occupations on one well show interesting interference fringes in the time-domain. The fringe pattern is sensitive to the initial state, the interatomic interaction, and the external forces such as gravity which can change the shape of the double well. In this sense, this interferometric scheme has the potentials for precision measurements with ultracold atoms. The underlying mechanism is revealed and possible applications are discussed.Comment: 4 pages, 5 figure

    Spatial spectrum and energy efficiency of random cellular networks

    Get PDF
    It is a great challenge to evaluate the network performance of cellular mobile communication systems. In this paper, we propose new spatial spectrum and energy efficiency models for Poisson-Voronoi tessellation (PVT) random cellular networks. To evaluate the user access the network, a Markov chain based wireless channel access model is first proposed for PVT random cellular networks. On that basis, the outage probability and blocking probability of PVT random cellular networks are derived, which can be computed numerically. Furthermore, taking into account the call arrival rate, the path loss exponent and the base station (BS) density in random cellular networks, spatial spectrum and energy efficiency models are proposed and analyzed for PVT random cellular networks. Numerical simulations are conducted to evaluate the network spectrum and energy efficiency in PVT random cellular networks.Comment: appears in IEEE Transactions on Communications, April, 201
    corecore