6,409 research outputs found

    Numerical modelling of the lobes of radio galaxies in cluster environments -- IV. Remnant radio galaxies

    Get PDF
    © 2019 The Author(s) Published by Oxford University Press on behalf of the Royal Astronomical Society.We examine the remnant phase of radio galaxies using three-dimensional hydrodynamical simulations of relativistic jets propagating through cluster environments. By switching the jets off once the lobes have reached a certain length we can study how the energy distribution between the lobes and shocked intra-cluster medium compares to that of an active source, as well as calculate synchrotron emission properties of the remnant sources. We see that as a result of disturbed cluster gas beginning to settle back into the initial cluster potential, streams of dense gas are pushed along the jet axis behind the remnant lobes, causing them to rise out of the cluster faster than they would due to buoyancy. This leads to increased adiabatic losses and a rapid dimming. The rapid decay of total flux density and surface brightness may explain the small number of remnant sources found in samples with a high flux density limit and may cause analytic models to overestimate the remnant fraction expected in sensitive surveys such as those now being carried out with LOFAR.Peer reviewedFinal Accepted Versio

    Dynamic trust models for ubiquitous computing environments

    Get PDF
    A significant characteristic of ubiquitous computing is the need for interactions of highly mobile entities to be secure: secure both for the entity and the environment in which the entity operates. Moreover, ubiquitous computing is also characterised by partial views over the state of the global environment, implying that we cannot guarantee that an environment can always verify the properties of the mobile entity that it has just received. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. an entity might encrypt a deliberately incorrect answer to a legitimate request). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two entities during an interaction in a ubiquitous environment

    Pioneer Lawmakers Honored

    Get PDF

    Ora Williams—An Appreciation

    Full text link

    Desperate Battles Survived By Youth

    Get PDF

    Safeguarding Insurance in Iowa

    Get PDF

    Gen. Eastin Morris Served Iowa

    Get PDF

    Iowa Bank Law a Bulwark of Safety

    Full text link

    Evolution in Iowa Voting Practices

    Get PDF

    Gen. Eastin Morris Served Iowa

    Full text link
    • …
    corecore