11,012 research outputs found
The Expulsion of Stellar Envelopes in Core-Collapse Supernovae
We examine the relation between presupernova stellar structure and the
distribution of ejecta in core-collapse supernovae, assuming adiabatic,
spherically symmetric flow. We develop a simple yet accurate formula for the
blastwave shock velocity, and demonstrate that the entire final density
distribution can be approximated with simple models for the final pressure
distribution, along with the approximate shock-deposited entropy, in a way that
matches the results of simulations. We find that the distribution of density in
a star's ejecta depends on whether its outer envelope is radiative or
convective, and if convective, on the composition structure of the star; simple
approximate forms are presented for red and blue supergiant ejecta. Our models
are most accurate for the high-velocity ejecta from the periphery of a star,
where the shock dynamics are predictable. We present formulae for the final
density distribution of this material, for both radiative and efficiently
convective envelopes. These formulae limit to the well-known planar,
self-similar solutions for mass shells approaching the stellar surface. But,
the assumption of adiabatic flow fails at low optical depth, so this planar
limit need not be attained. Formulae are given for the observable properties of
the X-ray burst accompanying shock emergence, and their dependence on the
parameters of the explosion. Motivated by the relativistic expansion recently
inferred by Kulkarni et al. (1998) for the synchrotron shell around SN1998bw,
we estimate the criterion for relativistic mass ejection and the rest mass of
relativistic ejecta.Comment: 57 pages, 10 eps figures, aaspp4, submitted to Ap
Dynamic performance of detuned ridge waveguide AlInGaAs distributed feedback laser diodes
The dynamic behavior of AlInGaAs ridge waveguide distributed feedback lasers is reported in this work covering five detuned wavelengths between 1291 nm and 1326 nm for a laser active layer optical peak gain design centered at 1310 nm at room temperature. The detuning is achieved by modifying the laser grating pitch that performs the mode selection within the laser cavity simultaneously across a single processed wafer. The dynamic behavior is evaluated using the resonance frequencies of the detuned lasers measured at a range of injection currents for heatsink temperatures of 25°C and 85°C. The results confirm that a speed improvement can be achieved at 25°C by detuning the laser to shorter wavelengths. However, the results also show that a lower direct modulation bandwidth at 85°C makes the shorter wavelength design less attractive. For communications applications such as 10 Gbps uncooled operation, this trade-off between detuning and modulation bandwidth imply an optimum around −2 nm to +8 nm detuning (measured at 25°C)
Strangeness contribution to the vector and axial form factors of the nucleon
The strangeness contribution to the vector and axial form factors of the
nucleon is presented for momentum transfers in the range 
GeV. The results are obtained via a combined analysis of forward-scattering
parity-violating elastic  asymmetry data from the  and HAPPEx
experiments at Jefferson Lab, and elastic  and  scattering
data from Experiment 734 at Brookhaven National Laboratory. The
parity-violating asymmetries measured in elastic  scattering at
forward angles establish a relationship between the strange vector form factors
 and , with little sensitivity to the strange axial form factor
. On the other hand, elastic neutrino scattering at low  is
dominated by the axial form factor, with still some significant sensitivity to
the vector form factors as well. The combination of the two data sets allows
the simultaneous extraction of , , and  over a significant
range of  for the very first time.Comment: 3 pages, 1 figure, will appear in AIP Conference Proceedings for
  PANIC 200
Bipolar molecular outflows driven by hydromagnetic protostellar winds
We demonstrate that magnetically-collimated protostellar winds will sweep
ambient material into thin, radiative, momentum-conserving shells whose
features reproduce those commonly observed in bipolar molecular outflows. We
find the typical position-velocity and mass-velocity relations to occur in
outflows in a wide variety of ambient density distributions, regardless of the
time histories of their driving winds.Comment: 4 pages, 1 figure, submitted to ApJ
Study of volatile contaminants in reclaimed water
Different methods were evaluated for reducing the volatile contaminants found in water recovered from urine by distillation. The use of activated carbon, addition of potassium permanganate, and the use of oxidation catalyst are described along with laboratory tests. It is concluded that catalytic decomposition appears to be feasible, and further investigation is recommended
A study of morphology, provenance, and movement of desert sand seas in Africa, Asia, and Australia
A description and classification of major types of sand seas on the basis of morphological pattern and lineation are discussed. The steps involved in analyzing the patterns of deposits on ERTS-1 imagery, where the visible forms are mostly dune complexes rather than individual dunes are outlined. After completion of thematic maps portraying the pattern and lineation of the sand bodies, data on directions and intensity of prevailing and other winds are plotted on corresponding bases, as a preliminary to determination of internal structures through ground truth
Guidelines for fabrication of hybrid microcircuits
Document is summary of approaches that may be taken in designing hybrid microcircuits similar to those for aerospace application
CONFLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code
We present an instrumenting compiler for enforcing data confidentiality in
low-level applications (e.g. those written in C) in the presence of an active
adversary. In our approach, the programmer marks secret data by writing
lightweight annotations on top-level definitions in the source code. The
compiler then uses a static flow analysis coupled with efficient runtime
instrumentation, a custom memory layout, and custom control-flow integrity
checks to prevent data leaks even in the presence of low-level attacks. We have
implemented our scheme as part of the LLVM compiler. We evaluate it on the SPEC
micro-benchmarks for performance, and on larger, real-world applications
(including OpenLDAP, which is around 300KLoC) for programmer overhead required
to restructure the application when protecting the sensitive data such as
passwords. We find that performance overheads introduced by our instrumentation
are moderate (average 12% on SPEC), and the programmer effort to port OpenLDAP
is only about 160 LoC.Comment: Technical report for CONFLLVM: A Compiler for Enforcing Data
  Confidentiality in Low-Level Code, appearing at EuroSys 201
- …
