82,644 research outputs found
Evolution of binary stars and its implications for evolutionary population synthesis
Most stars are members of binaries, and the evolution of a star in a close
binary system differs from that of an ioslated star due to the proximity of its
companion star. The components in a binary system interact in many ways and
binary evolution leads to the formation of many peculiar stars, including blue
stragglers and hot subdwarfs. We will discuss binary evolution and the
formation of blue stragglers and hot subdwarfs, and show that those hot objects
are important in the study of evolutionary population synthesis (EPS), and
conclude that binary interactions should be included in the study of EPS.
Indeed, binary interactions make a stellar population younger (hotter), and the
far-ultraviolet (UV) excess in elliptical galaxies is shown to be most likely
resulted from binary interactions. This has major implications for
understanding the evolution of the far-UV excess and elliptical galaxies in
general. In particular, it implies that the far-UV excess is not a sign of age,
as had been postulated prviously and predicts that it should not be strongly
dependent on the metallicity of the population, but exists universally from
dwarf ellipticals to giant ellipticals.Comment: Oral talk on IAUS 262, Brazi
A note on modular forms and generalized anomaly cancellation formulas
By studying modular invariance properties of some characteristic forms, we
prove some new anomaly cancellation formulas which generalize the Han-Zhang and
Han-Liu-Zhang anomaly cancellation formula
Binary Stellar Population Synthesis Model
Using Yunnan evolutionary population synthesis (EPS) models, we present
integrated colours, integrated spectral energy distributions (ISEDs) and
absorption-line indices defined by the Lick Observatory image dissector scanner
(Lick/IDS) system, for an extensive set of instantaneous-burst binary stellar
populations (BSPs) with interactions. By comparing the results for populations
with and without interactions we show that the inclusion of binary interactions
makes the appearance of the population substantially bluer. This effect raises
the derived age and metallicity of the population.
To be used in the studies of modern spectroscopic galaxy surveys at
intermediate/high spectral resolution, we also present intermediate- (3A) and
high-resolution (~0.3A) ISEDs and Lick/IDS absorption-line indices for BSPs. To
directly compare with observations the Lick/IDS absorption indices are also
presented by measuring them directly from the ISEDs.Comment: 2 pages 2 figure
On the mathematical form of CVA in Basel III.
Credit valuation adjustment in Basel III is studied from the perspective of the mathematics involved. A bank covers mark-to-market losses for expected counterparty risk with a CVA capital charge. The CVA is known as credit valuation adjustments. In this paper it will be argued that CVA and conditioned value at risk (CVaR) have a common mathematical ancestor. The question is raised why the Basel committee, from the perspective of CVaR, has selected a specific parameterization. It is argued that a fine-tuned supervision, on the longer run, will be beneficial for counterparties with a better control over their spread.CVA, CVaR, statistical methodology.
Password Cracking and Countermeasures in Computer Security: A Survey
With the rapid development of internet technologies, social networks, and
other related areas, user authentication becomes more and more important to
protect the data of the users. Password authentication is one of the widely
used methods to achieve authentication for legal users and defense against
intruders. There have been many password cracking methods developed during the
past years, and people have been designing the countermeasures against password
cracking all the time. However, we find that the survey work on the password
cracking research has not been done very much. This paper is mainly to give a
brief review of the password cracking methods, import technologies of password
cracking, and the countermeasures against password cracking that are usually
designed at two stages including the password design stage (e.g. user
education, dynamic password, use of tokens, computer generations) and after the
design (e.g. reactive password checking, proactive password checking, password
encryption, access control). The main objective of this work is offering the
abecedarian IT security professionals and the common audiences with some
knowledge about the computer security and password cracking, and promoting the
development of this area.Comment: add copyright to the tables to the original authors, add
acknowledgement to helpe
The Effect of Binary Interactions in Infrared Passbands
We present the integrated J, H, K, L, M and N magnitudes and the colours
involving infrared bands, for an extensive set of instantaneous-burst binary
stellar populations (BSPs) by using evolutionary population synthesis (EPS). By
comparing the results for BSPs WITH and WITHOUT binary interactions we show
that the inclusion of binary interactions makes the magnitudes of populations
larger (fainter) and the integrated colours smaller (bluer) for t > 1Gyr. Also,
we compare our model magnitudes and colours with those of Bruzual & Charlot
(2003, hereafter BC03) and Maraston (2005, hereafter M05). At last, we compare
these model broad colours with Magellanic Clouds globular clusters (GCs) and
Milky Way GCs. In (V-R)-[Fe/H] and (V-I)-[Fe/H] diagrams it seems that our
models match the observations better than those of BC03 and M05.Comment: 2 page 3 figure
Collision-free trajectory planning algorthm for manipulators
Collision-free trajectory planning for robotic manipulators is investigated. The task of the manipulator is to move its end-effector from one point to another point in an environment with polyhedral obstacles. An on-line algorithm is developed based on finding the required joint angles of the manipulator, according to goals with different priorities. The highest priority is to avoid collisions, the second priority is to plan the shortest path for the end effector, and the lowest priority is to minimize the joint velocity for smooth motion. The pseudo-inverse of the Jacobian matrix is applied for inverse kinematics. When a possible collision is detected, a constrained inverse kinematic problem is solved such that the collision is avoided. This algorithm can also be applied to a time-variant environment
The benefit of high-conductivity materials in film cooled turbine nozzles
This study presents an experimental and numerical investigation of the beneficial effect of higher conductivity materials in HP turbine nozzles. Most of the literature studies focus on the maximum temperature that a nozzle can withstand, whereas the effect of thermal gradients is often neglected. However thermal gradients have higher influence on the life of the components and they have to be given careful consideration. In this work it is shown that thermal gradients are reduced by using high conductivity materials and, as a consequence, the nozzles life is appreciably increased. A representative film cooled leading edge with an internal impingement plate was studied experimentally at Texas AM University. Two materials were used, namely polycarbonate and stainless steel, in order to highlight the impact of conduction on coolant effectiveness. Numerically conjugate heat transfer simulations have been carried out with an in house solver to analyse in detail the impact of conduction and internal convection. Both experimental and numerical results show that by increasing the conductivity in the solid region, the thermal gradients are strongly reduced. Numerically it is shown that using inserts of nickel-aluminide alloys in nozzles may reduce the thermal gradients from 3 to 4 times if compared to nowadays design. © 2012 Elsevier Inc
- …