551 research outputs found
Simultaneous Doppler maps of IP Peg in outburst
IP Pegasi is an eclipsing dwarf nova lying above the period gap with an orbital period of 3.8h. It is the first cataclysmic variable to show evidence of spiral arms in its accretion disc. We present new time-resolved echelle spectroscopic observations of IP Peg, covering the 3900-7700 Angstrom range. This allows us to produce simultaneous Doppler Maps in 9 emission lines
IP Pegasi in outburst: Echelle spectroscopy & Modulation Doppler Tomography
We analyse a unique set of time-resolved echelle spectra of the dwarf nova IP
Peg, obtained at ESO's NTT with EMMI. The dataset covers the wavelength range
of 4000-7500A and shows Balmer, HeI, HeII and heavier elements in emission. IP
Peg was observed one day after the peak of an outburst. The trailed spectra,
spectrograms and Doppler maps show characteristics typical of IP Pegasi during
the early stages of its outburst. The high-ionisation line of HeII 4686A is the
most centrally located line and has the greatest radial extension compared to
the HeI lines. The Balmer lines extend from close to the white dwarf up to
approximately 0.45 times R_L, with the outer radius gradually increasing when
moving from H delta to H alpha. The application, for the first time, of the
modulation Doppler tomography technique, maps any harmonically varying
components present in the system configuration. We find, as expected, that part
of the strong secondary star emission in Balmer and HeI lines is modulated
predominantly with the cosine term, consistent with the emission originating
from the irradiated front side of the mass-donor star, facing the accreting
white dwarf. For the Balmer lines the level of the modulation, compared to the
average emission, decreases when moving to higher series. Emission from the
extended accretion disk appears to be only weakly modulated, with amplitudes of
at most a few percent of the non-varying disk emission. We find no evidence of
modulated emission in the spiral arms, which if present, is relatively weak at
that our signal-to-noise ratio was good enough to put a lower detection limit
of any modulated emission at 5--6%. Only in one arm of the HeII 4686A line, is
there a possibility of modulated emission, but again, we cannot be sure this is
not caused by blending with the nearby Bowen complex of lines.Comment: 20 pages, 8 figures, submitted to Journal of Astronomical Dat
Photometric study of selected cataclysmic variables II. Time-series photometry of nine systems
We present time-series photometry of nine cataclysmic variables: EI UMa,
V844Her, V751 Cyg, V516 Cyg, GZ Cnc, TY Psc, V1315 Aql, ASAS J002511+1217.12,
V1315 Aql and LN UMa. The observations were conducted at various observatories,
covering 170 hours and comprising 7,850 data points in total.
For the majority of targets we confirm previously reported periodicities and
for some of them we give, for the first time, their spectroscopic orbital
periods. For those dwarf-nova systems which we observed during both quiescence
and outburst, the increase in brightness was followed by a decrease in the
amount of flickering. Quasi-periodic oscillations have either been discovered,
or were confirmed. For the eclipsing system V1315 Aql we have covered 9
eclipses, and obtained a refined orbital ephemeris. We find that, during its
long baseline of observations, no change in the orbital period of this system
has occurred. V1315 Aql also shows eclipses of variable depth.Comment: 30 pages, 16 figures, 4 tables. Submitted to JA
Optimal power allocation in block fading Gaussian channels with causal CSI and secrecy constraints
The optimal power allocation that maximizes the secrecy capacity (SC) of block fading Gaussian (BF-Gaussian) networks with causal channel state information (CSI), M-block delay tolerance and a frame based power constraint is examined. In particular, the SC maximization is formulated as a dynamic program. First, the SC maximization without any information on the CSI is studied; in this case the SC is maximized by equidistribution of the power budget, denoted as the 'blind policy'. Next, extending earlier results on the capacity maximization of BF-Gaussian channels without secrecy constraints, transmission policies for the low SNR and the high SNR regimes are proposed. When the available power resources are very low the optimal strategy is a 'threshold policy'. On the other hand when the available power budget is very large a 'constant power policy' maximizes the frame secrecy capacity. Subsequently, a novel universal transmission policy is introduced, denoted in the following as the 'blind horizon approximation' (BHA), by imposing a blind policy in the horizon of unknown events. Through numerical results, the novel BHA policy is shown to outperform both the threshold and constant power policies as long as the mean channel gain of the legitimate user is distinctively greater than the mean channel gain of the eavesdropper. Furthermore, the secrecy rates achieved by the BHA compare well with the secrecy rates of the secure waterfilling policy in the case of acausal CSI feedback to the transmitter
Optimal Power Allocation in Block Fading Channels With Confidential Messages
The optimal power allocation for block fading (BF) networks with confidential messages is investigated under an -block delay and power constraint. First, we study networks without channel state information (CSI) feedback to the transmitter and demonstrate that the optimal power allocation is the equidistribution of the power budget, denoted as the 'blind policy.' In blind scenarios secrecy can be achieved through receiver diversity; the probability of secrecy outage (PSO) is shown to decay exponentially with the diversity order of the legitimate user. Then, we investigate networks with CSI feedback. For comparison purposes, we restate the acausal secure waterfilling algorithm with full CSI before moving to the causal feedback scenario. In the latter, an approximate 'threshold policy' for the low SNR and an approximate 'high power policy' for the high SNR regimes are derived. Furthermore, a novel universal transmission policy is proposed across all SNRs, denoted as the 'blind horizon approximation' (BHA). Through numerical results, the BHA policy is shown to outperform both the threshold and high power policies when the legitimate user has an SNR advantage with respect to the eavesdropper, while it also compares well with the secure waterfilling policy
Graphical One-Time Password (GOTPass): A usability evaluation
Journal has two ISSNs: 1939-3555 (Print), 1939-3547 (Online)Complying with a security policy often requires users to create long and complex passwords to protect their accounts. However, remembering such passwords is difficult for many and may lead to insecure practices, such as choosing weak passwords or writing them down. In addition, they are vulnerable to various types of attacks, such as shoulder surfing, replay, and keylogger attacks (Gupta, Sahni, Sabbu, Varma, & Gangashetty, 2012) One-Time Passwords (OTPs) aim to overcome such problems (Gupta et al., 2012); however, most implemented OTP techniques require special hardware, which not only adds cost, but there are also issues regarding its availability (Brostoff, Inglesant, & Sasse, 2010). In contrast, the use of graphical passwords is an alternative authentication mechanism designed to aid memorability and ease of use, often forming part of a multifactor authentication process. This article is complementary to the earlier work that introduced and evaluated the security of the new hybrid user-authentication approach: Graphical One-Time Password (GOTPass) (Alsaiari et al., 2015). The scheme aims to combine the usability of recognition-based and draw-based graphical passwords with the security of OTP. The article presents the results of an empirical user study that investigates the usability features of the proposed approach, as well as pretest and posttest questionnaires. The experiment was conducted during three separate sessions, which took place over five weeks, to measure the efficiency, effectiveness, memorability, and user satisfaction of the new scheme. The results showed that users were able to easily create and enter their credentials as well as remember them over time. Participants carried out a total of 1,302 login attempts with a 93% success rate and an average login time of 24.5s
Unsung heroes: who supports social work students on placement?
Since the introduction of the three year degree programme in 2003, social work education has undergone a number of significant changes. The time students spend on placement has been increased to two hundred days, and the range of placement opportunities and the way in which these placements have been configured has significantly diversified. A consistent feature over the years, however, has been the presence of a Practice Educator (PE) who has guided, assessed and taught the student whilst on placement. Unsurprisingly, the role of the PE and the pivotal relationship they have with the student has been explored in the past and features in social work literature.
This paper, however, concentrates on a range of other relationships which are of significance in providing support to students on placement. In particular it draws on research to discuss the role of the university contact tutor, the place of the wider team in which the student is sited, and the support offered by family, friends and others.
Placements and the work undertaken by PE’s will continue to be integral to the delivery of social work education. It is, however, essential to recognise and value the often over looked role of others in providing support to students on placement
- …