6,980 research outputs found

    Distorted HI Gas in the Widely Separated LIRG Arp 256

    Get PDF
    We present new interferometric HI and CO (1-0) observations of the luminous infrared source, Arp 256. Arp 256 consists of two spiral galaxies in an early stage of merging, with a projected nuclear separation of 29 kpc (54") and an infrared luminosity of 2.0E11 L_sun. Despite the large separation of the galaxies' nuclei and mildly disrupted stellar components, the HI disks are found to be strongly disrupted, and the southern galaxy in Arp 256 shows an elevated star formation efficiency, which is consistent with a nuclear starburst. Both of these results run contrary to expectations, posing interesting questions on the physical mechanisms involved in stimulating star formation during an interaction.Comment: 19 pages, 7 figures. Accepted for publication in AJ. Author added. Full resolution figures available at http://astro.uchicago.edu/home/web/jchen/arp25

    Field test of a practical secure communication network with decoy-state quantum cryptography

    Full text link
    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.Comment: 10 pages, 2 figures, 2 tables, typos correcte

    Probing onset of strong localization and electron-electron interactions with the presence of direct insulator-quantum Hall transition

    Full text link
    We have performed low-temperature transport measurements on a disordered two-dimensional electron system (2DES). Features of the strong localization leading to the quantum Hall effect are observed after the 2DES undergoes a direct insulator-quantum Hall transition with increasing the perpendicular magnetic field. However, such a transition does not correspond to the onset of strong localization. The temperature dependences of the Hall resistivity and Hall conductivity reveal the importance of the electron-electron interaction effects to the observed transition in our study.Comment: 9 pages, 4 figure

    Indosinian high-strain deformation for the Yunkaidashan tectonic belt, south China : Kinematics and 40Ar/39Ar geochronological constraints

    Get PDF
    Structural and 40Ar/39Ar data from the Yunkaidashan Belt document kinematic and tectonothermal characteristics of early Mesozoic Indosinian orogenesis in the southern part of the South China Block. The Yunkaidashan Belt is tectonically divided from east to west into the Wuchuang-Sihui shear zone, Xinyi-Gaozhou block, and the Fengshan-Qinxi shear zone. Indosinian structural elements ascribed to the Indosinian orogeny include D2 and D3 deformation. The early D2 phase is characterized by folding and thrusting with associated foliation and lineation development, related to NW-SE transpression under amphibolite- to greenschist-facies conditions. This event is heterogeneously overprinted by D3 deformation characterized by a gentle-dipping S-3 foliation, subhorizontally to shallowly plunging L3 lineation, some reactived-D2 folds and low-angle normal faults. The D3 fabrics suggest a sinistral transtensional regime under greenschist-facies metamorphism. The timing of the D2 and D3 events have been constrained to the early to middle Triassic (similar to 248-220 Ma) and late Triassic (similar to 220-200 Ma) respectively on the basis of 40Ar/39Ar geochronology and regional geological relations. The change from oblique thrusting (D2) to sinistral transtension (D3) may reflect oblique convergence and crustal thickening followed by relaxation of the overthickened crust. In combination with the regional relations from Xuefengshan to Yunkaidashan and on to Wuyishan, the early phase of the Indosinian orogeny constituted a large-scale positive flower structure and is related to the intracontinental convergence during the assembly of Pangea in which the less competent South China Orogen was squeezed between the more competent North China and Indosinian Blocks.Peer reviewe

    Metropolitan all-pass and inter-city quantum communication network

    Full text link
    We have demonstrated a metropolitan all-pass quantum communication network in field fiber for four nodes. Any two nodes of them can be connected in the network to perform quantum key distribution (QKD). An optical switching module is presented that enables arbitrary 2-connectivity among output ports. Integrated QKD terminals are worked out, which can operate either as a transmitter, a receiver, or even both at the same time. Furthermore, an additional link in another city of 60 km fiber (up to 130 km) is seamless integrated into this network based on a trusted relay architecture. On all the links, we have implemented protocol of decoy state scheme. All of necessary electrical hardware, synchronization, feedback control, network software, execution of QKD protocols are made by tailored designing, which allow a completely automatical and stable running. Our system has been put into operation in Hefei in August 2009, and publicly demonstrated during an evaluation conference on quantum network organized by the Chinese Academy of Sciences on August 29, 2009. Real-time voice telephone with one-time pad encoding between any two of the five nodes (four all-pass nodes plus one additional node through relay) is successfully established in the network within 60km.Comment: 9 pages, 2 figures, 2 table

    Diffusion entropy analysis on the scaling behavior of financial markets

    Full text link
    In this paper the diffusion entropy technique is applied to investigate the scaling behavior of financial markets. The scaling behaviors of four representative stock markets, Dow Jones Industrial Average, Standard&Poor 500, Heng Seng Index, and Shang Hai Stock Synthetic Index, are almost the same; with the scale-invariance exponents all in the interval [0.92,0.95][0.92, 0.95]. These results provide a strong evidence of the existence of long-rang correlation in financial time series, thus several variance-based methods are restricted for detecting the scale-invariance properties of financial markets. In addition, a parsimonious percolation model for stock markets is proposed, of which the scaling behavior agrees with the real-life markets well.Comment: 5 pages, 3 figure

    Grape skin extracts from winemaking by-products as a source of trapping agents for reactive carbonyl species

    Get PDF
    BACKGROUND Clinical evidence supports the relationship between carbonyl stress and type II diabetes and its related pathologies. Methylglyoxal (MGO) is the major dicarbonyl compound involved in carbonyl stress. Efforts are therefore being made to find dietary compounds from natural sources that could exert an MGO trapping response. RESULTS The in vitro MGO trapping capacity of six red and seven white grape skin extracts (GSE) obtained from winemaking by-products was investigated. Methanolic GSE exhibited a promising MGO trapping capacity that was higher in red GSE (IC50 2.8 mg mL−1) when compared with white GSE (IC50 3.2 mg mL−1). The trapping ability for red GSE correlated significantly with total phenolic content and antioxidant capacity. However, no correlations were observed for white GSE, which suggests that other compounds were involved in the trapping activity. CONCLUSION GSE may be considered a natural source of carbonyl stress inhibitors, thus opening up its possible utilization as a nutraceutical ingredient. Further investigations are required to understand the mechanism involved in the carbonyl trapping ability of red and white grape skin samples and their relationship with glycation. © 2015 Society of Chemical Industry.PSC Sri Harsha would like to thank the University of Milan for providing additional funding through the ERASMUS student network program. This work was partly funded by projects CSIC-201370E027, AGER (project number 2010–2222) and S2013/ABI-3028-AVANSECAL.Peer reviewe

    Obliquity pacing of the western Pacific Intertropical Convergence Zone over the past 282,000 years

    Get PDF
    The Intertropical Convergence Zone (ITCZ) encompasses the heaviest rain belt on the Earth. Few direct long-term records, especially in the Pacific, limit our understanding of long-term natural variability for predicting future ITCZ migration. Here we present a tropical precipitation record from the Southern Hemisphere covering the past 282,000 years, inferred from a marine sedimentary sequence collected off the eastern coast of Papua New Guinea. Unlike the precession paradigm expressed in its East Asian counterpart, our record shows that the western Pacific ITCZ migration was influenced by combined precession and obliquity changes. The obliquity forcing could be primarily delivered by a cross-hemispherical thermal/pressure contrast, resulting from the asymmetric continental configuration between Asia and Australia in a coupled East Asian-Australian circulation system. Our finding suggests that the obliquity forcing may play a more important role in global hydroclimate cycles than previously thought

    Malware in the Future? Forecasting of Analyst Detection of Cyber Events

    Full text link
    There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated intrusion detection/prevention systems. This research has uncovered key insights such as systematicity in cyber attacks. Here, we propose an alternate perspective of this problem by performing forecasting of attacks that are analyst-detected and -verified occurrences of malware. We call these instances of malware cyber event data. Specifically, our dataset was analyst-detected incidents from a large operational Computer Security Service Provider (CSSP) for the U.S. Department of Defense, which rarely relies only on automated systems. Our data set consists of weekly counts of cyber events over approximately seven years. Since all cyber events were validated by analysts, our dataset is unlikely to have false positives which are often endemic in other sources of data. Further, the higher-quality data could be used for a number for resource allocation, estimation of security resources, and the development of effective risk-management strategies. We used a Bayesian State Space Model for forecasting and found that events one week ahead could be predicted. To quantify bursts, we used a Markov model. Our findings of systematicity in analyst-detected cyber attacks are consistent with previous work using other sources. The advanced information provided by a forecast may help with threat awareness by providing a probable value and range for future cyber events one week ahead. Other potential applications for cyber event forecasting include proactive allocation of resources and capabilities for cyber defense (e.g., analyst staffing and sensor configuration) in CSSPs. Enhanced threat awareness may improve cybersecurity.Comment: Revised version resubmitted to journa
    corecore