814 research outputs found

    VHE gamma ray absorption by galactic interstellar radiation field

    Full text link
    Adopting a recent calculation of the Galactic interstellar radiation field, we calculate the attenuation of the very high energy gamma rays from the Galactic sources. The infra-red radiation background near the Galactic Center is very intense due to the new calculation and our result shows that a cutoff of high energy gamma ray spectrum begins at about 20 TeV and reaches about 10% for 50 TeV gamma rays.Comment: 6 pages, 1 figure, figure is changed, conclusion not change

    Detection of novel astroviruses in urban brown rats and previously known astroviruses in humans

    Get PDF
    Several novel astroviruses have been recently discovered in humans and in other animals. Here, we report results from our surveillance of astroviruses in human and rodent faecal samples in Hong Kong. Classical human astroviruses (n=9) and a human MLB1 astrovirus were detected in human faecal samples (n=622). Novel astroviruses were detected from 1.6 % of the faecal samples of urban brown rat (Rattus norvegicus) (n=441), indicating the prevalence of astrovirus infection in rats might be much lower than that recently observed in bats. These rat astroviruses were phylogenetically related to recently discovered human astroviruses MLB1 and MLB2, suggesting that the MLB viruses and these novel rat astroviruses may share a common ancestor

    Pseudo-Dipole Signal Removal from WMAP Data

    Full text link
    It is discovered in our previous work that different observational systematics, e.g., errors of antenna pointing directions, asynchronous between the attitude and science data, can generate pseudo-dipole signal in full-sky maps of the cosmic microwave background (CMB) anisotropy published by The Wilkinson Microwave Anisotropy Probe (WMAP) team. Now the antenna sidelobe response to the Doppler signal is found to be able to produce similar effect as well. In this work, independent to the sources, we uniformly model the pseudo-dipole signal and remove it from published WMAP7 CMB maps by model fitting. The result demonstrates that most of the released WMAP CMB quadrupole is artificial.Comment: V3: using WMAP7 dat

    Tree Buffers

    Get PDF
    In runtime verification, the central problem is to decide if a given program execution violates a given property. In online runtime verification, a monitor observes a program’s execution as it happens. If the program being observed has hard real-time constraints, then the monitor inherits them. In the presence of hard real-time constraints it becomes a challenge to maintain enough information to produce error traces, should a property violation be observed. In this paper we introduce a data structure, called tree buffer, that solves this problem in the context of automata-based monitors: If the monitor itself respects hard real-time constraints, then enriching it by tree buffers makes it possible to provide error traces, which are essential for diagnosing defects. We show that tree buffers are also useful in other application domains. For example, they can be used to implement functionality of capturing groups in regular expressions. We prove optimal asymptotic bounds for our data structure, and validate them using empirical data from two sources: regular expression searching through Wikipedia, and runtime verification of execution traces obtained from the DaCapo test suite

    Stellar SEDs from 0.3-2.5 Microns: Tracing the Stellar Locus and Searching for Color Outliers in SDSS and 2MASS

    Full text link
    The Sloan Digital Sky Survey (SDSS) and Two Micron All Sky Survey (2MASS) are rich resources for studying stellar astrophysics and the structure and formation history of the Galaxy. As new surveys and instruments adopt similar filter sets, it is increasingly important to understand the properties of the ugrizJHKs stellar locus, both to inform studies of `normal' main sequence stars as well as for robust searches for point sources with unusual colors. Using a sample of ~600,000 point sources detected by SDSS and 2MASS, we tabulate the position and width of the ugrizJHKs stellar locus as a function of g-i color, and provide accurate polynomial fits. We map the Morgan-Keenan spectral type sequence to the median stellar locus by using synthetic photometry of spectral standards and by analyzing 3000 SDSS stellar spectra with a custom spectral typing pipeline. We develop an algorithm to calculate a point source's minimum separation from the stellar locus in a seven-dimensional color space, and use it to robustly identify objects with unusual colors, as well as spurious SDSS/2MASS matches. Analysis of a final catalog of 2117 color outliers identifies 370 white-dwarf/M dwarf (WDMD) pairs, 93 QSOs, and 90 M giant/carbon star candidates, and demonstrates that WDMD pairs and QSOs can be distinguished on the basis of their J-Ks and r-z colors. We also identify a group of objects with correlated offsets in the u-g vs. g-r and g-r vs. r-i color-color spaces, but subsequent follow-up is required to reveal the nature of these objects. Future applications of this algorithm to a matched SDSS-UKIDSS catalog may well identify additional classes of objects with unusual colors by probing new areas of color-magnitude space.Comment: 23 pages in emulateapj format, 17 figures, 7 tables. Accepted for publication in the Astronomical Journal. To access a high-resolution version of this paper, as well as machine readable tables and an archive of 'The Hammer' spectral typing suite, see http://www.cfa.harvard.edu/~kcovey v2 -- fixed typos in Table 7 (mainly affecting lines for M8-M10 III stars

    The Flexibility of Nonconsciously Deployed Cognitive Processes: Evidence from Masked Congruence Priming

    Get PDF
    Background: It is well accepted in the subliminal priming literature that task-level properties modulate nonconscious processes. For example, in tasks with a limited number of targets, subliminal priming effects are limited to primes that are physically similar to the targets. In contrast, when a large number of targets are used, subliminal priming effects are observed for primes that share a semantic (but not necessarily physical) relationship with the target. Findings such as these have led researchers to conclude that task-level properties can direct nonconscious processes to be deployed exclusively over central (semantic) or peripheral (physically specified) representations. Principal Findings: We find distinct patterns of masked priming for "novel" and "repeated" primes within a single task context. Novel primes never appear as targets and thus are not seen consciously in the experiment. Repeated primes do appear as targets, thereby lending themselves to the establishment of peripheral stimulus-response mappings. If the source of the masked priming effect were exclusively central or peripheral, then both novel and repeated primes should yield similar patterns of priming. In contrast, we find that both novel and repeated primes produce robust, yet distinct, patterns of priming. Conclusions: Our findings indicate that nonconsciously elicited cognitive processes can be flexibly deployed over both central and peripheral representations within a single task context. While we agree that task-level properties can influence nonconscious processes, our findings sharply constrain the extent of this influence. Specifically, our findings are inconsistent with extant accounts which hold that the influence of task-level properties is strong enough to restrict the deployment of nonconsciously elicited cognitive processes to a single type of representation (i.e. central or peripheral).13 page(s

    A Cryptographic Moving-Knife Cake-Cutting Protocol

    Full text link
    This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.Comment: In Proceedings IWIGP 2012, arXiv:1202.422

    Determining Foreground Contamination in CMB Observations: Diffuse Galactic Emission in the MAXIMA-I Field

    Full text link
    Observations of the CMB can be contaminated by diffuse foreground emission from sources such as Galactic dust and synchrotron radiation. In these cases, the morphology of the contaminating source is known from observations at different frequencies, but not its amplitude at the frequency of interest for the CMB. We develop a technique for accounting for the effects of such emission in this case, and for simultaneously estimating the foreground amplitude in the CMB observations. We apply the technique to CMB data from the MAXIMA-1 experiment, using maps of Galactic dust emission from combinations of IRAS and DIRBE observations, as well as compilations of Galactic synchrotron emission observations. The spectrum of the dust emission over the 150--450 GHz observed by MAXIMA is consistent with preferred models but the effect on CMB power spectrum observations is negligible.Comment: 19 pages, 8 figures, accepted for publication in the Astrophysical Journal. Monor changes to match the published versio

    Sommerfeld Enhancement from Multiple Mediators

    Full text link
    We study the Sommerfeld enhancement experienced by a scattering object that couples to a tower of mediators. This can occur in, e.g., models of secluded dark matter when the mediator scale is generated naturally by hidden-sector confinement. Specializing to the case of a confining CFT, we show that off-resonant values of the enhancement can be increased by ~ 20% for cases of interest when (i) the (strongly-coupled) CFT admits a weakly-coupled dual description and (ii) the conformal symmetry holds up to the Planck scale. Larger enhancements are possible for lower UV scales due to an increase in the coupling strength of the tower.Comment: 17p, 2 figures; v2 JHEP version (inconsequential typo fixed, references added

    Foreground removal from WMAP 7yr polarization maps using an MLP neural network

    Get PDF
    One of the fundamental problems in extracting the cosmic microwave background signal (CMB) from millimeter/submillimeter observations is the pollution by emission from the Milky Way: synchrotron, free-free, and thermal dust emission. To extract the fundamental cosmological parameters from CMB signal, it is mandatory to minimize this pollution since it will create systematic errors in the CMB power spectra. In previous investigations, it has been demonstrated that the neural network method provide high quality CMB maps from temperature data. Here the analysis is extended to polarization maps. As a concrete example, the WMAP 7-year polarization data, the most reliable determination of the polarization properties of the CMB, has been analysed. The analysis has adopted the frequency maps, noise models, window functions and the foreground models as provided by the WMAP Team, and no auxiliary data is included. Within this framework it is demonstrated that the network can extract the CMB polarization signal with no sign of pollution by the polarized foregrounds. The errors in the derived polarization power spectra are improved compared to the errors derived by the WMAP Team.Comment: Accepted for publication in Astrophysics & Space Scienc
    • …
    corecore