13,346 research outputs found
N-body Efimov states from two-particle noise
The ground state energies of universal N-body clusters tied to Efimov
trimers, for N even, are shown to be encapsulated in the statistical
distribution of two particles interacting with a background auxiliary field at
large Euclidean time when the interaction is tuned to the unitary point.
Numerical evidence that this distribution is log-normal is presented, allowing
one to predict the ground-state energies of the N-body system.Comment: Extended discussion of results; published versio
A Tidally-Disrupted Asteroid Around the White Dwarf G29-38
The infrared excess around the white dwarf G29-38 can be explained by
emission from an opaque flat ring of dust with an inner radius 0.14 of the
radius of the Sun and an outer radius approximately equal to the Sun's. This
ring lies within the Roche region of the white dwarf where an asteroid could
have been tidally destroyed, producing a system reminiscent of Saturn's rings.
Accretion onto the white dwarf from this circumstellar dust can explain the
observed calcium abundance in the atmosphere of G29-38. Either as a bombardment
by a series of asteroids or because of one large disruption, the total amount
of matter accreted onto the white dwarf may have been comparable to the total
mass of asteroids in the Solar System, or, equivalently, about 1% of the mass
in the asteroid belt around the main sequence star zeta Lep.Comment: ApJ Letters, in pres
A spatio-temporal entropy-based approach for the analysis of cyber attacks (demo paper)
Computer networks are ubiquitous systems growing exponentially with a predicted 50 billion devices connected by 2050. This dramatically increases the potential attack surface of Internet networks. A key issue in cyber defense is to detect, categorize and identify these attacks, the way they are propagated and their potential impacts on the systems affected. The research presented in this paper models cyber attacks at large by considering the Internet as a complex system in which attacks are propagated over a network. We model an attack as a path from a source to a target, and where each attack is categorized according to its intention. We setup an experimental testbed with the concept of honeypot that evaluates the spatiotemporal distribution of these Internet attacks. The preliminary results show a series of patterns in space and time that illustrate the potential of the approach, and how cyber attacks can be categorized according to the concept and measure of entropy
Radiation effects on silver and zinc battery electrodes, III Interim report, Oct. 1965 - Jan. 1966
Radiation effects on silver-zinc battery electrode
High Angular Resolution Stellar Imaging with Occultations from the Cassini Spacecraft II: Kronocyclic Tomography
We present an advance in the use of Cassini observations of stellar
occultations by the rings of Saturn for stellar studies. Stewart et al. (2013)
demonstrated the potential use of such observations for measuring stellar
angular diameters. Here, we use these same observations, and tomographic
imaging reconstruction techniques, to produce two dimensional images of complex
stellar systems. We detail the determination of the basic observational
reference frame. A technique for recovering model-independent brightness
profiles for data from each occulting edge is discussed, along with the
tomographic combination of these profiles to build an image of the source star.
Finally we demonstrate the technique with recovered images of the {\alpha}
Centauri binary system and the circumstellar environment of the evolved
late-type giant star, Mira.Comment: 8 pages, 8 figures, Accepted by MNRA
- …