27,848 research outputs found
The Origin of Gamma-Rays from Globular Clusters
Fermi has detected gamma-ray emission from eight globular clusters. We
suggest that the gamma-ray emission from globular clusters may result from the
inverse Compton scattering between relativistic electrons/positrons in the
pulsar wind of MSPs in the globular clusters and background soft photons
including cosmic microwave/relic photons, background star lights in the
clusters, the galactic infrared photons and the galactic star lights. We show
that the gamma-ray spectrum from 47 Tuc can be explained equally well by upward
scattering of either the relic photons, the galactic infrared photons or the
galactic star lights whereas the gamma-ray spectra from other seven globular
clusters are best fitted by the upward scattering of either the galactic
infrared photons or the galactic star lights. We also find that the observed
gamma-ray luminosity is correlated better with the combined factor of the
encounter rate and the background soft photon energy density. Therefore the
inverse Compton scattering may also contribute to the observed gamma-ray
emission from globular clusters detected by Fermi in addition to the standard
curvature radiation process. Furthermore, we find that the emission region of
high energy photons from globular cluster produced by inverse Compton
scattering is substantially larger than the core of globular cluster with a
radius >10pc. The diffuse radio and X-rays emitted from globular clusters can
also be produced by synchrotron radiation and inverse Compton scattering
respectively. We suggest that future observations including radio, X-rays, and
gamma-rays with energy higher than 10 GeV and better angular resolution can
provide better constraints for the models.Comment: Accepted by ApJ, Comments may send to Prof. K.S. Cheng:
[email protected]
Correlations and fluctuations of a confined electron gas
The grand potential and the response of a phase-coherent confined noninteracting electron gas depend
sensitively on chemical potential or external parameter . We compute
their autocorrelation as a function of , and temperature. The result
is related to the short-time dynamics of the corresponding classical system,
implying in general the absence of a universal regime. Chaotic, diffusive and
integrable motions are investigated, and illustrated numerically. The
autocorrelation of the persistent current of a disordered mesoscopic ring is
also computed.Comment: 12 pages, 1 figure, to appear in Phys. Rev.
Let Your CyberAlter Ego Share Information and Manage Spam
Almost all of us have multiple cyberspace identities, and these {\em
cyber}alter egos are networked together to form a vast cyberspace social
network. This network is distinct from the world-wide-web (WWW), which is being
queried and mined to the tune of billions of dollars everyday, and until
recently, has gone largely unexplored. Empirically, the cyberspace social
networks have been found to possess many of the same complex features that
characterize its real counterparts, including scale-free degree distributions,
low diameter, and extensive connectivity. We show that these topological
features make the latent networks particularly suitable for explorations and
management via local-only messaging protocols. {\em Cyber}alter egos can
communicate via their direct links (i.e., using only their own address books)
and set up a highly decentralized and scalable message passing network that can
allow large-scale sharing of information and data. As one particular example of
such collaborative systems, we provide a design of a spam filtering system, and
our large-scale simulations show that the system achieves a spam detection rate
close to 100%, while the false positive rate is kept around zero. This system
has several advantages over other recent proposals (i) It uses an already
existing network, created by the same social dynamics that govern our daily
lives, and no dedicated peer-to-peer (P2P) systems or centralized server-based
systems need be constructed; (ii) It utilizes a percolation search algorithm
that makes the query-generated traffic scalable; (iii) The network has a built
in trust system (just as in social networks) that can be used to thwart
malicious attacks; iv) It can be implemented right now as a plugin to popular
email programs, such as MS Outlook, Eudora, and Sendmail.Comment: 13 pages, 10 figure
- …