26,040 research outputs found
GRB000301C with peculiar afterglow emission
The CCD magnitudes in Johnson V and Cousins R and I photometric passbands are
determined for GRB 000301C afterglow starting ~ 1.5 day after the gamma-ray
burst. In fact we provide the earliest optical observations for this burst.
Light curves of the afterglow emissions in U, B, V, R, I, J and K' passbands
are obtained by combining the present measurements with the published data.
Flux decay shows a very uncommon variation relative to other well observed
GRBs. Overall, there is a steepening of the optical and near-infrared flux
decay caused by a geometric and sideways expanding jet. This is superimposed by
a short term variability especially during early time (Delta t < 8 days). The
cause of variability is not well understood, though it has occurred
simultaneously with similar amplitude in all the filters. We derive the early
and late time flux decay constants using jet model. The late time flux decay is
the steepest amongst the GRB OTs observed so far with alpha ~ 3. Steepening in
the flux decay seems to have started simultaneously around Delta t ~ 7.6 day in
all passbands. The value of spectral index in the optical-near IR region is ~
-1.0. Redshift determination with z=2.0335 indicates cosmological origin of the
GRB having a luminosity distance of 16.6 Gpc. Thus it becomes the second
farthest amongst the GRBs with known distances. An indirect estimate of the
fluence > 20 keV indicates, if isotropic,> =10^53 ergs of release of energy.
The enormous amount of released energy will be reduced, if the radiation is
beamed which is the case for this event. Using a jet break time of 7.6 days, we
infer a jet opening angle of ~ 0.15 radian. This means the energy released is
reduced by a factor of ~ 90 relative to the isotropic value.Comment: LaTeX file, 11 pages including 4 figures, uses psfig.sty, Bull.
Astron. Society of India(accepted, Sept, 2000 issue
Inversion of diffraction data for amorphous materials
The general and practical inversion of diffraction data-producing a computer
model correctly representing the material explored - is an important unsolved
problem for disordered materials. Such modeling should proceed by using our
full knowledge base, both from experiment and theory. In this paper, we
describe a robust method to jointly exploit the power of ab initio atomistic
simulation along with the information carried by diffraction data. The method
is applied to two very different systems: amorphous silicon and two
compositions of a solid electrolyte memory material silver-doped GeSe3 . The
technique is easy to implement, is faster and yields results much improved over
conventional simulation methods for the materials explored. By direct
calculation, we show that the method works for both poor and excellent glass
forming materials. It offers a means to add a priori information in first
principles modeling of materials, and represents a significant step toward the
computational design of non-crystalline materials using accurate interatomic
interactions and experimental information
Security Policy Specification Using a Graphical Approach
A security policy states the acceptable actions of an information system, as
the actions bear on security. There is a pressing need for organizations to
declare their security policies, even informal statements would be better than
the current practice. But, formal policy statements are preferable to support
(1) reasoning about policies, e.g., for consistency and completeness, (2)
automated enforcement of the policy, e.g., using wrappers around legacy systems
or after the fact with an intrusion detection system, and (3) other formal
manipulation of policies, e.g., the composition of policies. We present LaSCO,
the Language for Security Constraints on Objects, in which a policy consists of
two parts: the domain (assumptions about the system) and the requirement (what
is allowed assuming the domain is satisfied). Thus policies defined in LaSCO
have the appearance of conditional access control statements. LaSCO policies
are specified as expressions in logic and as directed graphs, giving a visual
view of policy. LaSCO has a simple semantics in first order logic (which we
provide), thus permitting policies we write, even for complex policies, to be
very perspicuous. LaSCO has syntax to express many of the situations we have
found to be useful on policies or, more interesting, the composition of
policies. LaSCO has an object-oriented structure, permitting it to be useful to
describe policies on the objects and methods of an application written in an
object-oriented language, in addition to the traditional policies on operating
system objects. A LaSCO specification can be automatically translated into
executable code that checks an invocation of a program with respect to a
policy. The implementation of LaSCO is in Java, and generates wrappers to check
Java programs with respect to a policy.Comment: 28 pages, 22 figures, in color (but color is not essential for
viewing); UC Davis CS department technical report (July 22, 1998
- …