45,173 research outputs found

    A comprehensive set of simulations of high-velocity collisions between main sequence stars

    Get PDF
    We report on a very large set of simulations of collisions between two main sequence (MS) stars. These computations were done with the ``Smoothed Particle Hydrodynamics'' method. Realistic stellar structure models for evolved MS stars were used. In order to sample an extended domain of initial parameters space (masses of the stars, relative velocity and impact parameter), more than 15000 simulations were carried out. We considered stellar masses ranging between 0.1 and 75 Msun and relative velocities up to a few thousands km/s. To limit the computational burden, a resolution of 2000-30000 particles per star was used. The primary goal of this study was to build a complete database from which the result of any collision can be interpolated. This allows us to incorporate the effects of stellar collisions with an unprecedented level of realism into dynamical simulations of galactic nuclei and other dense stellar clusters. We make the data describing the initial condition and outcome (mass and energy loss, angle of deflection) of all our simulations freely available on the Internet. We find that the outcome of collisions depends sensitively on the stellar structure and that, in most cases, using polytropic models is inappropriate. Published fitting formulas for the collision outcomes, established from a limited set of collisions, prove of limited use because they do not allow robust extrapolation to other stellar structures or relative velocities.Comment: 45 pages, 44 figures. Modified to reflect the changes in the published version (MNRAS). PDF version with high-res figures at http://obswww.unige.ch/~freitag/papers/article_collisions.pdf, simulation data at http://obswww.unige.ch/~freitag/MODEST_WG4/FB_Collision_Data/, movies at http://obswww.unige.ch/~freitag/collisions/animations/index.htm

    LPDQ: a self-scheduled TDMA MAC protocol for one-hop dynamic lowpower wireless networks

    Get PDF
    Current Medium Access Control (MAC) protocols for data collection scenarios with a large number of nodes that generate bursty traffic are based on Low-Power Listening (LPL) for network synchronization and Frame Slotted ALOHA (FSA) as the channel access mechanism. However, FSA has an efficiency bounded to 36.8% due to contention effects, which reduces packet throughput and increases energy consumption. In this paper, we target such scenarios by presenting Low-Power Distributed Queuing (LPDQ), a highly efficient and low-power MAC protocol. LPDQ is able to self-schedule data transmissions, acting as a FSA MAC under light traffic and seamlessly converging to a Time Division Multiple Access (TDMA) MAC under congestion. The paper presents the design principles and the implementation details of LPDQ using low-power commercial radio transceivers. Experiments demonstrate an efficiency close to 99% that is independent of the number of nodes and is fair in terms of resource allocation.Peer ReviewedPostprint (author’s final draft

    Predicting Risk for Deer-Vehicle Collisions Using a Social Media Based Geographic Information System

    Get PDF
    As an experiment investigating social media as a data source for making management decisions, photo sharing websites were searched for data on deer sightings. Data about deer density and location are important factors in decisions related to herd management and transportation safety, but such data are often limited or not available. Results indicate that when combined with simple rules, data from photo sharing websites reliably predicted the location of road segments with high risk for deer-vehicle collisions as reported by volunteers to an internet site tracking roadkill. Use of Google Maps as the GIS platform was helpful in plotting and sharing data, measuring road segments and other distances, and overlaying geographical data. The ability to view satellite images and panoramic street views proved to be a particularly useful. As a general conclusion, the two independently collected sets of data from social media provided consistent information, suggesting investigative value to this data source. Overlaying two independently collected data sets can be a useful step in evaluating or mitigating reporting bias and human error in data taken from social media

    An Analysis of Packet Fragmentation Impact in LPWAN

    Full text link
    Packet fragmentation has mostly been addressed in the literature when referring to splitting data that does not fit a frame. It has received attention in the IoT community after the 6LoWPAN working group of IETF started studying the fragmentation headers to allow IPv6 1280 B MTU to be sent over IEEE 802.15.4 networks supporting a 127 B MTU. In this paper, and following some of the recent directions taken by the IETF LPWAN WG, an analysis of packet fragmentation in LPWANs has been done. We aim to identify the impact of sending the data in smaller fragments considering the restrictions of industrial duty-cycled networks. The analyzed parameters were the energy consumption, throughput, goodput and end to end delay introduced by fragmentation. The results of our analysis show that packet fragmentation can increase the reliability of the communication in duty-cycle restricted networks. This is of especial relevance when densifying the network. We observed relevant impact in energy consumption and extra latency, and identified the need for acknowledgements from the gateway/sink to exploit some of the benefits raised by fragmentation.Comment: paper accepted and presented at IEEE Wireless Communications and Networking Conference, 15-18 April, Barcelona, Spai

    The Reliability and Effectiveness of a Radar-Based Animal Detection System

    Get PDF
    This document contains data on the reliability and effectiveness of an animal detection system along U.S. Hwy 95 near Bonners Ferry, Idaho. The system uses a Doppler radar to detect large mammals (e.g., deer and elk) when they approach the highway. The system met most of the suggested minimum norms for reliability. The total time the warning signs were activated was at most 90 seconds per hour, and likely substantially less. Animal detection systems are designed to detect an approaching animal. After an animal has been detected, warning signs are activated which allow drivers to respond. Results showed that 58.1–67.9% of deer were detected sufficiently early for northbound drivers, and 70.4–85% of deer were detected sufficiently early for southbound drivers. The effect of the activated warning signs on vehicle speed was greatest when road conditions were challenging (e.g., freezing temperatures and snow- and ice-covered road surface) and when visibility was low (night). In summer, there was no measurable benefit of activated warning signs, at least not as far as vehicle speed is concerned. Depending on the conditions in autumn and winter, the activated warning signs resulted in a speed reduction of 0.69 to 4.43 miles per hour. The report includes practical recommendations for operation and maintenance of the system and suggestions for potential future research

    Selective Jamming of LoRaWAN using Commodity Hardware

    Full text link
    Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life. LoRa is a key example of this new class of network and is being deployed at large scale in several countries worldwide. As these networks move out of the lab and into the real world, they expose a large cyber-physical attack surface. Securing these networks is therefore both critical and urgent. This paper highlights security issues in LoRa and LoRaWAN that arise due to the choice of a robust but slow modulation type in the protocol. We exploit these issues to develop a suite of practical attacks based around selective jamming. These attacks are conducted and evaluated using commodity hardware. The paper concludes by suggesting a range of countermeasures that can be used to mitigate the attacks.Comment: Mobiquitous 2017, November 7-10, 2017, Melbourne, VIC, Australi

    Thermal photon production in high-energy nuclear collisions

    Full text link
    We use a boost-invariant one-dimensional (cylindrically symmetric) fluid dynamics code to calculate thermal photon production in the central rapidity region of S+Au and Pb+Pb collisions at SPS energy (s=20\sqrt{s}=20 GeV/nucleon). We assume that the hot matter is in thermal equilibrium throughout the expansion, but consider deviations from chemical equilibrium in the high temperature (deconfined) phase. We use equations of state with a first-order phase transition between a massless pion gas and quark gluon plasma, with transition temperatures in the range 150≤Tc≤200150 \leq T_c \leq 200 MeV.Comment: revised, now includes a_1 contribution. revtex, 10 pages plus 4 figures (uuencoded postscript
    • …
    corecore