2,911 research outputs found

    Observation of Hybrid Soliton Vortex-Ring Structures in Bose-Einstein Condensates

    Full text link
    We present the experimental discovery of compound structures comprising solitons and vortex rings in Bose-Einstein condensates (BECs). We examine both their creation via soliton-vortex collisions and their subsequent development, which is largely governed by the dynamics of interacting vortex rings. A theoretical model in three-dimensional (3D) cylindrical symmetry is also presented.Comment: 5 pages, 4 figures; submitted to PR

    Ultrahigh reflection from a medium with ultraslow group velocity

    Get PDF
    We show that an incident wavepacket at the boundary to a medium with extremely slow group velocity, experiences enhanced reflection and a substantial spatial and temporal distortion of the transmitted wave packet. In the limit of vanishing group velocity, light cannot be transferred into the medium due to its perfect reflectivity.Comment: 3 pages, 3 figure

    Ultrafast probing of the x-ray-induced lattice and electron dynamics in graphite at atomic-resolution

    Get PDF

    Reconfigurable Security: Edge Computing-based Framework for IoT

    Full text link
    In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security. We then introduce a new reconfigurable security framework based on edge computing, which utilizes a near-user edge device, i.e., security agent, to simplify key management and offload the computational costs of security algorithms at IoT devices. This framework is designed to overcome the challenges including high computation costs, low flexibility in key management, and low compatibility in deploying new security algorithms in IoT, especially when adopting advanced cryptographic primitives. We also provide the design principles of the reconfigurable security framework, the exemplary security protocols for anonymous authentication and secure data access control, and the performance analysis in terms of feasibility and usability. The reconfigurable security framework paves a new way to strength IoT security by edge computing.Comment: under submission to possible journal publication

    The puzzlingly large Ca II triplet absorption in dwarf elliptical galaxies

    Full text link
    We present central CaT, PaT, and CaT* indices for a sample of fifteen dwarf elliptical galaxies (dEs). Twelve of these have CaT* ~ 7 A and extend the negative correlation between the CaT* index and central velocity dispersion sigma, which was derived for bright ellipticals (Es), down to 20 < sigma < 55 km/s. For five dEs we have independent age and metallicity estimates. Four of these have CaT* ~ 7 A, much higher than expected from their low metallicities (-1.5 < [Z/H] < -0.5). The observed anti-correlation of CaT* as a function of sigma or Z is in flagrant disagreement with theory. We discuss some of the amendments that have been proposed to bring the theoretical predictions into agreement with the observed CaT*-values of bright Es and how they can be extended to incorporate also the observed CaT*-values of dEs. Moreover, 3 dEs in our sample have CaT* ~ 5 A, as would be expected for metal-poor stellar systems. Any theory for dE evolution will have to be able to explain the co-existence of low-CaT* and high-CaT* dEs at a given mean metallicity. This could be the first direct evidence that the dE population is not homogeneous, and that different evolutionary paths led to morphologically and kinematically similar but chemically distinct objects.Comment: 4 pages, 3 figures, accepted for publication in ApJ Letter
    corecore