551 research outputs found

    Simultaneous Doppler maps of IP Peg in outburst

    Get PDF
    IP Pegasi is an eclipsing dwarf nova lying above the period gap with an orbital period of 3.8h. It is the first cataclysmic variable to show evidence of spiral arms in its accretion disc. We present new time-resolved echelle spectroscopic observations of IP Peg, covering the 3900-7700 Angstrom range. This allows us to produce simultaneous Doppler Maps in 9 emission lines

    IP Pegasi in outburst: Echelle spectroscopy & Modulation Doppler Tomography

    Get PDF
    We analyse a unique set of time-resolved echelle spectra of the dwarf nova IP Peg, obtained at ESO's NTT with EMMI. The dataset covers the wavelength range of 4000-7500A and shows Balmer, HeI, HeII and heavier elements in emission. IP Peg was observed one day after the peak of an outburst. The trailed spectra, spectrograms and Doppler maps show characteristics typical of IP Pegasi during the early stages of its outburst. The high-ionisation line of HeII 4686A is the most centrally located line and has the greatest radial extension compared to the HeI lines. The Balmer lines extend from close to the white dwarf up to approximately 0.45 times R_L, with the outer radius gradually increasing when moving from H delta to H alpha. The application, for the first time, of the modulation Doppler tomography technique, maps any harmonically varying components present in the system configuration. We find, as expected, that part of the strong secondary star emission in Balmer and HeI lines is modulated predominantly with the cosine term, consistent with the emission originating from the irradiated front side of the mass-donor star, facing the accreting white dwarf. For the Balmer lines the level of the modulation, compared to the average emission, decreases when moving to higher series. Emission from the extended accretion disk appears to be only weakly modulated, with amplitudes of at most a few percent of the non-varying disk emission. We find no evidence of modulated emission in the spiral arms, which if present, is relatively weak at that our signal-to-noise ratio was good enough to put a lower detection limit of any modulated emission at 5--6%. Only in one arm of the HeII 4686A line, is there a possibility of modulated emission, but again, we cannot be sure this is not caused by blending with the nearby Bowen complex of lines.Comment: 20 pages, 8 figures, submitted to Journal of Astronomical Dat

    Photometric study of selected cataclysmic variables II. Time-series photometry of nine systems

    Full text link
    We present time-series photometry of nine cataclysmic variables: EI UMa, V844Her, V751 Cyg, V516 Cyg, GZ Cnc, TY Psc, V1315 Aql, ASAS J002511+1217.12, V1315 Aql and LN UMa. The observations were conducted at various observatories, covering 170 hours and comprising 7,850 data points in total. For the majority of targets we confirm previously reported periodicities and for some of them we give, for the first time, their spectroscopic orbital periods. For those dwarf-nova systems which we observed during both quiescence and outburst, the increase in brightness was followed by a decrease in the amount of flickering. Quasi-periodic oscillations have either been discovered, or were confirmed. For the eclipsing system V1315 Aql we have covered 9 eclipses, and obtained a refined orbital ephemeris. We find that, during its long baseline of observations, no change in the orbital period of this system has occurred. V1315 Aql also shows eclipses of variable depth.Comment: 30 pages, 16 figures, 4 tables. Submitted to JA

    Optimal power allocation in block fading Gaussian channels with causal CSI and secrecy constraints

    Get PDF
    The optimal power allocation that maximizes the secrecy capacity (SC) of block fading Gaussian (BF-Gaussian) networks with causal channel state information (CSI), M-block delay tolerance and a frame based power constraint is examined. In particular, the SC maximization is formulated as a dynamic program. First, the SC maximization without any information on the CSI is studied; in this case the SC is maximized by equidistribution of the power budget, denoted as the 'blind policy'. Next, extending earlier results on the capacity maximization of BF-Gaussian channels without secrecy constraints, transmission policies for the low SNR and the high SNR regimes are proposed. When the available power resources are very low the optimal strategy is a 'threshold policy'. On the other hand when the available power budget is very large a 'constant power policy' maximizes the frame secrecy capacity. Subsequently, a novel universal transmission policy is introduced, denoted in the following as the 'blind horizon approximation' (BHA), by imposing a blind policy in the horizon of unknown events. Through numerical results, the novel BHA policy is shown to outperform both the threshold and constant power policies as long as the mean channel gain of the legitimate user is distinctively greater than the mean channel gain of the eavesdropper. Furthermore, the secrecy rates achieved by the BHA compare well with the secrecy rates of the secure waterfilling policy in the case of acausal CSI feedback to the transmitter

    Optimal Power Allocation in Block Fading Channels With Confidential Messages

    Get PDF
    The optimal power allocation for block fading (BF) networks with confidential messages is investigated under an MM-block delay and power constraint. First, we study networks without channel state information (CSI) feedback to the transmitter and demonstrate that the optimal power allocation is the equidistribution of the power budget, denoted as the 'blind policy.' In blind scenarios secrecy can be achieved through receiver diversity; the probability of secrecy outage (PSO) is shown to decay exponentially with the diversity order of the legitimate user. Then, we investigate networks with CSI feedback. For comparison purposes, we restate the acausal secure waterfilling algorithm with full CSI before moving to the causal feedback scenario. In the latter, an approximate 'threshold policy' for the low SNR and an approximate 'high power policy' for the high SNR regimes are derived. Furthermore, a novel universal transmission policy is proposed across all SNRs, denoted as the 'blind horizon approximation' (BHA). Through numerical results, the BHA policy is shown to outperform both the threshold and high power policies when the legitimate user has an SNR advantage with respect to the eavesdropper, while it also compares well with the secure waterfilling policy

    Graphical One-Time Password (GOTPass): A usability evaluation

    Get PDF
    Journal has two ISSNs: 1939-3555 (Print), 1939-3547 (Online)Complying with a security policy often requires users to create long and complex passwords to protect their accounts. However, remembering such passwords is difficult for many and may lead to insecure practices, such as choosing weak passwords or writing them down. In addition, they are vulnerable to various types of attacks, such as shoulder surfing, replay, and keylogger attacks (Gupta, Sahni, Sabbu, Varma, & Gangashetty, 2012) One-Time Passwords (OTPs) aim to overcome such problems (Gupta et al., 2012); however, most implemented OTP techniques require special hardware, which not only adds cost, but there are also issues regarding its availability (Brostoff, Inglesant, & Sasse, 2010). In contrast, the use of graphical passwords is an alternative authentication mechanism designed to aid memorability and ease of use, often forming part of a multifactor authentication process. This article is complementary to the earlier work that introduced and evaluated the security of the new hybrid user-authentication approach: Graphical One-Time Password (GOTPass) (Alsaiari et al., 2015). The scheme aims to combine the usability of recognition-based and draw-based graphical passwords with the security of OTP. The article presents the results of an empirical user study that investigates the usability features of the proposed approach, as well as pretest and posttest questionnaires. The experiment was conducted during three separate sessions, which took place over five weeks, to measure the efficiency, effectiveness, memorability, and user satisfaction of the new scheme. The results showed that users were able to easily create and enter their credentials as well as remember them over time. Participants carried out a total of 1,302 login attempts with a 93% success rate and an average login time of 24.5s

    A 32-year-old woman with fever, sore throat, jaundice and pulmonary infiltrates

    Get PDF

    Unsung heroes: who supports social work students on placement?

    Get PDF
    Since the introduction of the three year degree programme in 2003, social work education has undergone a number of significant changes. The time students spend on placement has been increased to two hundred days, and the range of placement opportunities and the way in which these placements have been configured has significantly diversified. A consistent feature over the years, however, has been the presence of a Practice Educator (PE) who has guided, assessed and taught the student whilst on placement. Unsurprisingly, the role of the PE and the pivotal relationship they have with the student has been explored in the past and features in social work literature. This paper, however, concentrates on a range of other relationships which are of significance in providing support to students on placement. In particular it draws on research to discuss the role of the university contact tutor, the place of the wider team in which the student is sited, and the support offered by family, friends and others. Placements and the work undertaken by PE’s will continue to be integral to the delivery of social work education. It is, however, essential to recognise and value the often over looked role of others in providing support to students on placement
    • …
    corecore