27,848 research outputs found

    Evaluating the antenna performance of 802.11n wireless routers in an indoor environment

    Get PDF

    The Origin of Gamma-Rays from Globular Clusters

    Get PDF
    Fermi has detected gamma-ray emission from eight globular clusters. We suggest that the gamma-ray emission from globular clusters may result from the inverse Compton scattering between relativistic electrons/positrons in the pulsar wind of MSPs in the globular clusters and background soft photons including cosmic microwave/relic photons, background star lights in the clusters, the galactic infrared photons and the galactic star lights. We show that the gamma-ray spectrum from 47 Tuc can be explained equally well by upward scattering of either the relic photons, the galactic infrared photons or the galactic star lights whereas the gamma-ray spectra from other seven globular clusters are best fitted by the upward scattering of either the galactic infrared photons or the galactic star lights. We also find that the observed gamma-ray luminosity is correlated better with the combined factor of the encounter rate and the background soft photon energy density. Therefore the inverse Compton scattering may also contribute to the observed gamma-ray emission from globular clusters detected by Fermi in addition to the standard curvature radiation process. Furthermore, we find that the emission region of high energy photons from globular cluster produced by inverse Compton scattering is substantially larger than the core of globular cluster with a radius >10pc. The diffuse radio and X-rays emitted from globular clusters can also be produced by synchrotron radiation and inverse Compton scattering respectively. We suggest that future observations including radio, X-rays, and gamma-rays with energy higher than 10 GeV and better angular resolution can provide better constraints for the models.Comment: Accepted by ApJ, Comments may send to Prof. K.S. Cheng: [email protected]

    Correlations and fluctuations of a confined electron gas

    Full text link
    The grand potential Ω\Omega and the response R=−∂Ω/∂xR = - \partial \Omega /\partial x of a phase-coherent confined noninteracting electron gas depend sensitively on chemical potential μ\mu or external parameter xx. We compute their autocorrelation as a function of μ\mu, xx and temperature. The result is related to the short-time dynamics of the corresponding classical system, implying in general the absence of a universal regime. Chaotic, diffusive and integrable motions are investigated, and illustrated numerically. The autocorrelation of the persistent current of a disordered mesoscopic ring is also computed.Comment: 12 pages, 1 figure, to appear in Phys. Rev.

    Let Your CyberAlter Ego Share Information and Manage Spam

    Full text link
    Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of billions of dollars everyday, and until recently, has gone largely unexplored. Empirically, the cyberspace social networks have been found to possess many of the same complex features that characterize its real counterparts, including scale-free degree distributions, low diameter, and extensive connectivity. We show that these topological features make the latent networks particularly suitable for explorations and management via local-only messaging protocols. {\em Cyber}alter egos can communicate via their direct links (i.e., using only their own address books) and set up a highly decentralized and scalable message passing network that can allow large-scale sharing of information and data. As one particular example of such collaborative systems, we provide a design of a spam filtering system, and our large-scale simulations show that the system achieves a spam detection rate close to 100%, while the false positive rate is kept around zero. This system has several advantages over other recent proposals (i) It uses an already existing network, created by the same social dynamics that govern our daily lives, and no dedicated peer-to-peer (P2P) systems or centralized server-based systems need be constructed; (ii) It utilizes a percolation search algorithm that makes the query-generated traffic scalable; (iii) The network has a built in trust system (just as in social networks) that can be used to thwart malicious attacks; iv) It can be implemented right now as a plugin to popular email programs, such as MS Outlook, Eudora, and Sendmail.Comment: 13 pages, 10 figure
    • …
    corecore