2,813 research outputs found

    Luminous Infrared Galaxies in the Local Universe

    Full text link
    We study the morphology and star formation properties of 159 local luminous infrared galaxy (LIRG) using multi-color images from Data Release 2 (DR2) of the Sloan Digital Sky Survey (SDSS). The LIRGs are selected from a cross-correlation analysis between the IRAS survey and SDSS. They are all brighter than 15.9 mag in the r-band and below redshift ~ 0.1, and so can be reliably classified morphologically. We find that the fractions of interacting/merging and spiral galaxies are ~ 48% and ~ 40% respectively. Our results complement and confirm the decline (increase) in the fraction of spiral (interacting/merging) galaxies from z ~1 to z ~ 0.1, as found by Melbourne, Koo & Le Floc'h (2005). About 75% of spiral galaxies in the local LIRGs are barred, indicating that bars may play an important role in triggering star formation rates > 20 M_{sun}/yr in the local universe. Compared with high redshift LIRGs, local LIRGs have lower specific star formation rates, smaller cold gas fractions and a narrower range of stellar masses. Local LIRGs appear to be either merging galaxies forming intermediate mass ellipticals or spiral galaxies undergoing high star formation activities regulated by bars.Comment: 22 pages, 5 figures, accepted for publication in ApJ, title changed, typos corrected,major revisions following referee's comments,updated reference

    The statistical properties of galaxy morphological types in compact groups of Main galaxies from the SDSS Data Release 4

    Get PDF
    In order to explore the statistical properties of galaxy morphological types in compact groups (CGs), we construct a random group sample which has the same distributions of redshift and number of member galaxies as those of the CG sample. It turns out that the proportion of early-type galaxies in different redshift bins for the CG sample is statistically higher than that for random group sample, and with growing redshift z this kind of difference becomes more significant. This may be due to the existence of interactions and mergers within a significant fraction of SDSS CGs. We also compare statistical results of CGs with those of more compact groups and pairs, but do not observe as large statistical difference as Hickson (1982)'results.Comment: 12 pages, 9 figure

    Ultrasound Imaging Techniques for Spatiotemporal Characterization of Composition, Microstructure, and Mechanical Properties in Tissue Engineering

    Full text link
    Ultrasound techniques are increasingly being used to quantitatively characterize both native and engineered tissues. This review provides an overview and selected examples of the main techniques used in these applications. Grayscale imaging has been used to characterize extracellular matrix deposition, and quantitative ultrasound imaging based on the integrated backscatter coefficient has been applied to estimating cell concentrations and matrix morphology in tissue engineering. Spectral analysis has been employed to characterize the concentration and spatial distribution of mineral particles in a construct, as well as to monitor mineral deposition by cells over time. Ultrasound techniques have also been used to measure the mechanical properties of native and engineered tissues. Conventional ultrasound elasticity imaging and acoustic radiation force imaging have been applied to detect regions of altered stiffness within tissues. Sonorheometry and monitoring of steady-state excitation and recovery have been used to characterize viscoelastic properties of tissue using a single transducer to both deform and image the sample. Dual-mode ultrasound elastography uses separate ultrasound transducers to produce a more potent deformation force to microscale characterization of viscoelasticity of hydrogel constructs. These ultrasound-based techniques have high potential to impact the field of tissue engineering as they are further developed and their range of applications expands.Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/140238/1/ten.teb.2015.0453.pd

    Improving the security of secure direct communication based on secret transmitting order of particles

    Get PDF
    We analyzed the security of the secure direct communication protocol based on secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang [Phys. Rev. A 73, 022338 (2006)], and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.Comment: 4 pages, no figur

    Acoustic Tweezing Cytometry Induces Rapid Initiation of Human Embryonic Stem Cell Differentiation.

    Get PDF
    Mechanical forces play critical roles in influencing human embryonic stem cell (hESC) fate. However, it remains largely uncharacterized how local mechanical forces influence hESC behavior in vitro. Here, we used an ultrasound (US) technique, acoustic tweezing cytometry (ATC), to apply targeted cyclic subcellular forces to hESCs via integrin-bound microbubbles (MBs). We found that ATC-mediated cyclic forces applied for 30 min to hESCs near the edge of a colony induced immediate global responses throughout the colony, suggesting the importance of cell-cell connection in the mechanoresponsiveness of hESCs to ATC-applied forces. ATC application generated increased contractile force, enhanced calcium activity, as well as decreased expression of pluripotency transcription factors Oct4 and Nanog, leading to rapid initiation of hESC differentiation and characteristic epithelial-mesenchymal transition (EMT) events that depend on focal adhesion kinase (FAK) activation and cytoskeleton (CSK) tension. These results reveal a unique, rapid mechanoresponsiveness and community behavior of hESCs to integrin-targeted cyclic forces

    The Physical Connections Among IR QSOs, PG QSOs and Narrow-Line Seyfert 1 Galaxies

    Full text link
    We study the properties of infrared-selected QSOs (IR QSOs), optically-selected QSOs (PG QSOs) and Narrow Line Seyfert 1 galaxies (NLS1s). We compare their properties from the infrared to the optical and examine various correlations among the black hole mass, accretion rate, star formation rate and optical and infrared luminosities. We find that the infrared excess in IR QSOs is mostly in the far infrared, and their infrared spectral indices suggest that the excess emission is from low temperature dust heated by starbursts rather than AGNs. The infrared excess is therefore a useful criterion to separate the relative contributions of starbursts and AGNs. We further find a tight correlation between the star formation rate and the accretion rate of central AGNs for IR QSOs. The ratio of the star formation rate and the accretion rate is about several hundred for IR QSOs, but decreases with the central black hole mass. This shows that the tight correlation between the stellar mass and the central black hole mass is preserved in massive starbursts during violent mergers. We suggest that the higher Eddington ratios of NLS1s and IR QSOs imply that they are in the early stage of evolution toward classical Seyfert 1's and QSOs, respectively.Comment: 32 pages, 6 figures, accepted by Ap

    Efficient quantum cryptography network without entanglement and quantum memory

    Full text link
    An efficient quantum cryptography network protocol is proposed with d-dimension polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for preparing and measuring single photons whose initial state are |0>. The users code the information on the single photons with some unitary operations. For preventing the untrustworthy server Alice from eavesdropping the quantum lines, a nonorthogonal-coding technique (decoy-photon technique) is used in the process that the quantum signal is transmitted between the users. This protocol does not require the servers and the users to store the quantum state and almost all of the single photons can be used for carrying the information, which makes it more convenient for application than others with present technology. We also discuss the case with a faint laser pulse.Comment: 4 pages, 1 figures. It also presented a way for preparing decoy photons without a sinigle-photon sourc

    Quantum secure direct communication network with superdense coding and decoy photons

    Full text link
    A quantum secure direct communication network scheme is proposed with quantum superdense coding and decoy photons. The servers on a passive optical network prepare and measure the quantum signal, i.e., a sequence of the dd-dimensional Bell states. After confirming the security of the photons received from the receiver, the sender codes his secret message on them directly. For preventing a dishonest server from eavesdropping, some decoy photons prepared by measuring one photon in the Bell states are used to replace some original photons. One of the users on the network can communicate any other one. This scheme has the advantage of high capacity, and it is more convenient than others as only a sequence of photons is transmitted in quantum line.Comment: 6 pages, 2 figur

    Circular quantum secret sharing

    Full text link
    A circular quantum secret sharing protocol is proposed, which is useful and efficient when one of the parties of secret sharing is remote to the others who are in adjacent, especially the parties are more than three. We describe the process of this protocol and discuss its security when the quantum information carrying is polarized single photons running circularly. It will be shown that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as almost all the instances can be used for generating the private key, and each photon can carry one bit of information without quantum storage. It is straightforwardly to utilize this topological structure to complete quantum secret sharing with multi-level two-particle entanglement in high capacity securely.Comment: 7 pages, 2 figure
    • …
    corecore