5,047 research outputs found
Triggering Active Galactic Nuclei in Hierarchical Galaxy Formation: Disk instability vs. Interactions
Using a semi analytic model for galaxy formation we investigate the effects
of Black Hole accretion triggered by disk instabilities (DI) in isolated
galaxies on the evolution of AGN. Specifically, we took on, developed and
expanded the Hopkins & Quataert (2011) model for the mass inflow following disk
perturbations, and compare the corresponding evolution of the AGN population
with that arising in a scenario where galaxy interactions trigger AGN (IT
mode). We extended and developed the DI model by including different disk
surface density profiles, to study the maximal contribution of DI to the
evolution of the AGN population. We obtained the following results: i) for
luminosities corresponding to the DI mode can provide the
BH accretion needed to match the observed AGN luminosity functions up to ; in such a luminosity range and redshift, it can compete with the
IT scenario as the main driver of cosmological evolution of AGN; ii) The DI
scenario cannot provide the observed abundance of high-luminosity QSO with
AGN, as well as the abundance of high-redhshift QSOs with , while the IT scenario provides
an acceptable match up to , as found in our earliest works; iii)
The dispersion of the distributions of Eddington ratio for low- and
intermediate-luminosity AGN (bolometric = -
erg/s) is predicted to be much smaller in the DI scenario compared to the IT
mode; iv) The above conclusions are robust with respect to the explored
variants of the Hopkins & Quataert (2011) model. We discuss the physical origin
of our findings, and how it is possible to pin down the dominant fueling
mechanism in the low-intermediate luminosity range where
both the DI and the IT modes are viable candidates as drivers for the AGN
evolution.Comment: Accepted for publication in Astronomy & Astrophysics, 24 pages, 8
figures; updated reference
The role of non-local exchange in the electronic structure of correlated oxides
We present a systematic study of the electronic structure of several
prototypical correlated transition-metal oxides: VO2, V2O3, Ti2O3, LaTiO3, and
YTiO3. In all these materials, in the low-temperature insulating phases the
local and semilocal density approximations (LDA and GGA) of density-functional
theory yield a metallic Kohn-Sham band structure. Here we show that, without
invoking strong-correlation effects, the role of non-local exchange is
essential to cure the LDA/GGA delocalization error and provide a band-structure
description of the electronic properties in qualitative agreement with the
experimental photoemission results. To this end, we make use of hybrid
functionals that mix a portion of non-local Fock exchange with the local LDA
exchange-correlation potential. Finally, we discuss the advantages and the
shortcomings of using hybrid functionals for correlated transition-metal
oxides.Comment: submitte
Hydrothermal stability of Ru/SiO2-C: A promising catalyst for biomass processing through liquid-phase reactions
In this work, structural and morphological properties of SiO2-C composite material to be used as support for catalysts in the conversion of biomass-derived oxygenated hydrocarbons, such as glycerol, were investigated in liquid water under various temperatures conditions. The results show that this material does not lose surface area, and the hot liquid water does not generate changes in the structure. Neither change in relative concentrations of oxygen functional groups nor in Si/C ratio due to hydrothermal treatment was revealed by X-ray photoelectron spectroscopy (XPS) analysis. Raman analysis showed that the material is made of a disordered graphitic structure in an amorphous silica matrix, which remains stable after hydrothermal treatment. Results of the hydrogenolysis of glycerol using a Ru/SiO2-C catalyst indicate that the support gives more stability to the active phase than a Ru/SiO2 consisting of commercial silica
Coherent imaging of a pure phase object with classical incoherent light
By using the ghost imaging technique, we experimentally demonstrate the
reconstruction of the diffraction pattern of a {\em pure phase} object by using
the classical correlation of incoherent thermal light split on a beam splitter.
The results once again underline that entanglement is not a necessary feature
of ghost imaging. The light we use is spatially highly incoherent with respect
to the object (m speckle size) and is produced by a
pseudo-thermal source relying on the principle of near-field scattering. We
show that in these conditions no information on the phase object can be
retrieved by only measuring the light that passed through it, neither in a
direct measurement nor in a Hanbury Brown-Twiss (HBT) scheme. In general, we
show a remarkable complementarity between ghost imaging and the HBT scheme when
dealing with a phase object.Comment: 13 pages, 11 figures. Published in Physical Review A. Replaced
version fixes some problems with Figs. 1, 4 and 1
Security Games for Node Localization through Verifiable Multilateration
Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor nodes, which are not necessarily known beforehand. Several localization approaches have been proposed but most of them omit to consider that WSNs could be deployed in adversarial settings, where hostile nodes under the control of an attacker coexist with faithful ones. Verifiable multilateration (VM) was proposed to cope with this problem by leveraging on a set of trusted landmark nodes that act as verifiers. Although VM is able to recognize reliable localization measures, it allows for regions of undecided positions that can amount to the 40 percent of the monitored area. We studied the properties of VM as a noncooperative two-player game where the first player employs a number of verifiers to do VM computations and the second player controls a malicious node. The verifiers aim at securely localizing malicious nodes, while malicious nodes strive to masquerade as unknown and to pretend false positions. Thanks to game theory, the potentialities of VM are analyzed with the aim of improving the defender's strategy. We found that the best placement for verifiers is an equilateral triangle with edge equal to the power range R, and maximum deception in the undecided region is approximately 0.27R. Moreover, we characterized-in terms of the probability of choosing an unknown node to examine further-the strategies of the players
Network Selection and Resource Allocation Games for Wireless Access Networks
Wireless access networks are often characterized by the interaction of different end users, communication technologies, and network operators. This paper analyzes the dynamics among these "actors" by focusing on the processes of wireless network selection, where end users may choose among multiple available access networks to get connectivity, and resource allocation, where network operators may set their radio resources to provide connectivity. The interaction among end users is modeled as a non-cooperative congestion game where players (end users) selfishly select the access network that minimizes their perceived selection cost. A method based on mathematical programming is proposed to find Nash equilibria and characterize their optimality under three cost functions, which are representative of different technological scenarios. System level simulations are then used to evaluate the actual throughput and fairness of the equilibrium points. The interaction among end users and network operators is then assessed through a two-stage multi-leader/multi-follower game, where network operators (leaders) play in the first stage by properly setting the radio resources to maximize their users, and end users (followers) play in the second stage the aforementioned network selection game. The existence of exact and approximated subgame perfect Nash equilibria of the two-stage game is thoroughly assessed and numerical results are provided on the "quality" of such equilibria
Getting Closer or Falling Apart? Euro Area Countries After the Sovereign Debt Crisis
We study convergence and divergence dynamics in a sample of euro area countries by assembling an extensive dataset that contains information on public spending and policy outcomes in a variety of areas of government intervention including education, health, and civil justice from the early 1990s. We also focus on other important determinants of a country's economic performance such as the level of regulation of product and labor markets, as well as the trust in political institutions, quality of governance, and inequality. Results show that despite divergent economic growth in the euro periphery countries after the 2010-2012 sovereign debt crisis, the quality of services and level of regulation did not deteriorate or indeed improved, increasing convergence with the core euro countries. However, the euro area sovereign debt crisis dramatically worsened citizens' perceptions of quality of governance, as well as the level of social trust. This calls in question the future political viability of the EMU project and asks for reform
Team-maxmin equilibrium: Efficiency bounds and algorithms
The Team-maxmin equilibrium prescribes the optimal strategies for a team of rational players sharing the same goal and without the capability of correlating their strategies in strategic games against an adversary. This solution concept can capture situations in which an agent controls multiple resources-corresponding to the team members-that cannot communicate. It is known that such equilibrium always exists and it is unique (except degenerate cases) and these properties make it a credible solution concept to be used in real-world applications, especially in security scenarios. Nevertheless, to the best of our knowledge, the Team-maxmin equilibrium is almost completely unexplored in the literature. In this paper, we investigate bounds of (in) efficiency of the Team-maxmin equilibrium w.r.t. the Nash equilibria and w.r.t. the Maxmin equilibrium when the team members can play correlated strategies. Furthermore, we study a number of algorithms to find and/or approximate an equilibrium, discussing their theoretical guarantees and evaluating their performance by using a standard testbed of game instances
- …