1,255 research outputs found

    UV line diagnostics of accretion disk winds in cataclysmic variables

    Get PDF
    The IUE data base is used to analyze the UV line shapes of cataclysmic variables RW Sex, RW Tri, and V Sge. Observed lines are compared to synthetic line profiles computed using a model of rotating bi-conical winds from accretion disks. The wind model calculates the wind ionization structure self-consistently including photoionization from the disk and boundary layer and treats 3-D line radiation transfer in the Sobolev approximation. It is found that winds from accretion disks provide a good fit for reasonable parameters to the observed UV lines which include the P Cygni profiles for low inclination systems and pure emission at large inclination. Disk winds are preferable to spherical winds which originate on the white dwarf because they (1) require a much lower ratio of mass loss rate to accretion rate and are therefore more plausible energetically, (2) provide a natural source for a bi-conical distribution of mass outflow which produces strong scattering far above the disk leading to P Cygni profiles for low inclination systems, and pure line emission profiles at high inclination with the absence of eclipses in UV lines, and (3) produce rotation broadened pure emission lines at high inclination

    Rotating Winds from Accretion Disks in Cataclysmic Variables: Eclipse Modeling of V347 Puppis

    Full text link
    We study the eclipsing nova-like variable V347 Pup by matching its UV emission line profiles in and out of eclipse to synthetic lines using a 3D kinematic and radiation transfer model. Our results support the accretion disk origin of winds in non-magnetic CVs as opposite to the WD origin. Our main point concerns the importance of rotation for the UV emission line shapes in such systems. In particular, we show that the narrowing of the UV emission lines in V347 Pup during eclipse can be easily explained by the eclipse of the innermost part of the wind by the secondary and the resulting reduction in the contribution of rotational broadening to the width of the lines. During the eclipse, the residual line flux is very sensitive to the maximal temperature of disk radiation. Good fits for reasonable mass-loss rates have been obtained for maximum disk temperatures of 50,000 degrees. This constraint was imposed either by leveling off the inner disk temperature profiles, in agreement with recent observations of some nova-like objects, or by assuming that the accretion disk does not extend to the surface of the white dwarf, in which case V347 up would be an intermediate polar. In anticipation of high-speed spectrophotometry of CVs by the HST, we provide numerical model of a time-resolved eclipse of V347 Pup or similar such system to be verified by future observations.Comment: x pages, postscrip, compressed uuencoded. 11 figures available by anonymous ftp from ftp://asta.pa.uky.edu/shlosman/puppis/ (get *.PS.Z). To appear in Ap

    An Innovative Workspace for The Cherenkov Telescope Array

    Get PDF
    The Cherenkov Telescope Array (CTA) is an initiative to build the next generation, ground-based gamma-ray observatories. We present a prototype workspace developed at INAF that aims at providing innovative solutions for the CTA community. The workspace leverages open source technologies providing web access to a set of tools widely used by the CTA community. Two different user interaction models, connected to an authentication and authorization infrastructure, have been implemented in this workspace. The first one is a workflow management system accessed via a science gateway (based on the Liferay platform) and the second one is an interactive virtual desktop environment. The integrated workflow system allows to run applications used in astronomy and physics researches into distributed computing infrastructures (ranging from clusters to grids and clouds). The interactive desktop environment allows to use many software packages without any installation on local desktops exploiting their native graphical user interfaces. The science gateway and the interactive desktop environment are connected to the authentication and authorization infrastructure composed by a Shibboleth identity provider and a Grouper authorization solution. The Grouper released attributes are consumed by the science gateway to authorize the access to specific web resources and the role management mechanism in Liferay provides the attribute-role mapping

    Resolving Semantic Ambiguities in Sentences: Cognitive Processes and Brain Mechanisms

    Get PDF
    fMRI studies of how the brain processes sentences containing semantically ambiguous words have consistently implicated (i) the left inferior frontal gyrus (LIFG) and (ii) posterior regions of the left temporal lobe in processing high-ambiguity sentences. This article reviews recent findings on this topic and relates them to (i) psycholinguistic theories about the underlying cognitive processes and (ii) general neuro-cognitive accounts of the relevant brain regions. We suggest that the LIFG plays a general role in the cognitive control process that are necessary to select contextually relevant meanings and to reinterpret sentences that were initially misunderstood, but it is currently unclear whether these control processes should best be characterised in terms of specific processes such as conflict resolution and controlled retrieval that are required for high-ambiguity sentences, or whether its function is better characterised in terms of a more general set of ‘unification’ processes. In contrast to the relatively rapid progress that has been made in understanding the function of the LIFG, we suggest that the contribution of the posterior temporal lobe is less well understood and future work is needed to clarify its role in sentence comprehension

    An Advanced Technique for User Identification Using Partial Fingerprint

    Get PDF
    User identification is a very interesting and complex task. Invasive biometrics is based on traits uniqueness and immutability over time. In forensic field, fingerprints have always been considered an essential element for personal recognition. The traditional issue is focused on full fingerprint images matching. In this paper an advanced technique for personal recognition based on partial fingerprint is proposed. This system is based on fingerprint local analysis and micro-features, endpoints and bifurcations, extraction. The proposed approach starts from minutiae extraction from a partial fingerprint image and ends with the final matching score between fingerprint pairs. The computation of likelihood ratios in fingerprint identification is computed by trying every possible overlapping of the partial image with complete image. The first experimental results conducted on the PolyU (Hong Kong Polytechnic University) free database show an encouraging performance in terms of identification accuracy

    An Embedded Biometric Sensor for Ubiquitous Authentication

    Get PDF
    Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems represent a valid alternative to the conventional authentication systems providing a flexible einfrastructure towards an integrated solution supporting the requirement for improved inter-organizational functionality. In this work the study and the implementation of a fingerprintsbased embedded biometric system is proposed. Typical strategies implemented in Identity Management Systems could be useful to protect biometric information. The proposed sensor can be seen as a self-contained sensor: it performs the all elaboration steps on board, a necessary requisite to strengthen security, so that sensible data are securely managed and stored inside the sensor, without any data leaking out. The sensor has been prototyped via an FPGA-based platform achieving fast execution time and a good final throughput. Resources used, elaboration times of the sensor are reported. Finally, recognition rates of the proposed embedded biometric sensor have been evaluated considering three different databases: the FVC2002 reference database, the CSAI/Biometrika proprietary database, and the CSAI/Secugen proprietary database. The best achieved FAR and FRR indexes are respectively 1.07% and 8.33%, with an elaboration time of 183.32 ms and a working frequency of 22.5 MHz

    Modular Middleware for Gestural Data and Devices Management

    Get PDF
    In the last few years, the use of gestural data has become a key enabler for human-computer interaction (HCI) applications. The growing diffusion of low-cost acquisition devices has thus led to the development of a class of middleware aimed at ensuring a fast and easy integration of such devices within the actual HCI applications. The purpose of this paper is to present a modular middleware for gestural data and devices management. First, we describe a brief review of the state of the art of similar middleware. Then, we discuss the proposed architecture and the motivation behind its design choices. Finally, we present a use case aimed at demonstrating the potential uses as well as the limitations of our middleware
    corecore