6,358 research outputs found
Signature of Inverse Compton emission from blazars
Blazars are classified into high, intermediate and low energy peaked sources
based on the location of their synchrotron peak. This lies in infra-red/optical
to ultra-violet bands for low and intermediate peaked blazars. The transition
from synchrotron to inverse Compton emission falls in the X-ray bands for such
sources. We present the spectral and timing analysis of 14 low and intermediate
energy peaked blazars ob- served with XMMNewton spanning 31 epochs. Parametric
fits to X-ray spectra helps constrain the possible location of transition from
the high energy end of the syn- chrotron to the low energy end of the inverse
Compton emission. In seven sources in our sample, we infer such a transition
and constrain the break energy in the range 0.6 10 keV. The Lomb-Scargle
periodogram is used to estimate the power spectral density (PSD) shape. It is
well described by a power law in a majority of light curves, the index being
flatter compared to general expectation from AGN, ranging here between 0.01 and
1.12, possibly due to short observation durations resulting in an absence of
long term trends. A toy model involving synchrotron self-Compton (SSC) and
exter- nal Compton (EC; disk, broad line region, torus) mechanisms are used to
estimate magnetic field strength 6 0.03 - 0.88 G in sources displaying the
energy break and infer a prominent EC contribution. The timescale for
variability being shorter than synchrotron cooling implies steeper PSD slopes
which are inferred in these sources.Comment: 24 pages, 6 Tables, 13 figures, Accepted for MNRA
Temperature Dependent Raman Studies and Thermal Conductivity of Few Layer MoS2
We report on the temperature dependence of in-plane E2g and out of plane A1g
Raman modes in high quality few layers MoS2 (FLMS) prepared using a high
temperature vapor-phase method. The materials obtained were investigated using
transmission electron microscopy. The frequencies of these two phonon modes
were found to vary linearly with temperature. The first order temperature
coefficients for E2g and A1g modes were found to be 1.32*10-2 and 1.23*10-2
cm-1/K, respectively. The thermal conductivity of the suspended FLMS at room
temperature was estimated to be about 52 W/mK
The Hard X-ray emission of the blazar PKS 2155--304
The synchrotron peak of the X-ray bright High Energy Peaked Blazar (HBL) PKS
2155304 occurs in the UV-EUV region and hence its X-ray emission (0.6--10
keV) lies mostly in the falling part of the synchrotron hump. We aim to study
the X-ray emission of PKS 2155304 during different intensity states in
20092014 using XMMNewton satellite. We studied the spectral curvature of
all of the observations to provide crucial information on the energy
distribution of the non-thermal particles. Most of the observations show
curvature or deviation from a single power-law and can be well modeled by a log
parabola model. In some of the observations, we find spectral flattening after
6 keV. In order to find the possible origin of the X-ray excess, we built the
Multi-band Spectral Energy distribution (SED). We find that the X-ray excess in
PKS 2155--304 is difficult to fit in the one zone model but, could be easily
reconciled in the spine/layer jet structure. The hard X-ray excess can be
explained by the inverse Comptonization of the synchrotron photons (from the
layer) by the spine electrons.Comment: 14 pages, 7 Figures, Accepted for publication in Ap
Recommended from our members
Android Security: A Survey of Issues, Malware Penetration, and Defenses
Smartphones have become pervasive due to the availability of office applications, Internet, games, vehicle guidance using location-based services apart from conventional services such as voice calls, SMSes, and multimedia services. Android devices have gained huge market share due to the open architecture of Android and the popularity of its application programming interface (APIs) in the developer community. Increased popularity of the Android devices and associated monetary benefits attracted the malware developers, resulting in big rise of the Android malware apps between 2010 and 2014. Academic researchers and commercial antimalware companies have realized that the conventional signature-based and static analysis methods are vulnerable. In particular, the prevalent stealth techniques, such as encryption, code transformation, and environment-aware approaches, are capable of generating variants of known malware. This has led to the use of behavior-, anomaly-, and dynamic-analysis-based methods. Since a single approach may be ineffective against the advanced techniques, multiple complementary approaches can be used in tandem for effective malware detection. The existing reviews extensively cover the smartphone OS security. However, we believe that the security of Android, with particular focus on malware growth, study of antianalysis techniques, and existing detection methodologies, needs an extensive coverage. In this survey, we discuss the Android security enforcement mechanisms, threats to the existing security enforcements and related issues, malware growth timeline between 2010 and 2014, and stealth techniques employed by the malware authors, in addition to the existing detection methods. This review gives an insight into the strengths and shortcomings of the known research methodologies and provides a platform, to the researchers and practitioners, toward proposing the next-generation Android security, analysis, and malware detection techniques
- …
