21,374 research outputs found

    Multipole Gravitational Lensing and High-order Perturbations on the Quadrupole Lens

    Full text link
    An arbitrary surface mass density of gravitational lens can be decomposed into multipole components. We simulate the ray-tracing for the multipolar mass distribution of generalized SIS (Singular Isothermal Sphere) model, based on the deflection angles which are analytically calculated. The magnification patterns in the source plane are then derived from inverse shooting technique. As have been found, the caustics of odd mode lenses are composed of two overlapping layers for some lens models. When a point source traverses such kind of overlapping caustics, the image numbers change by \pm 4, rather than \pm 2. There are two kinds of images for the caustics. One is the critical curve and the other is the transition locus. It is found that the image number of the fold is exactly the average value of image numbers on two sides of the fold, while the image number of the cusp is equal to the smaller one. We also focus on the magnification patterns of the quadrupole (m = 2) lenses under the perturbations of m = 3, 4 and 5 mode components, and found that one, two, and three butterfly or swallowtail singularities can be produced respectively. With the increasing intensity of the high-order perturbations, the singularities grow up to bring sixfold image regions. If these perturbations are large enough to let two or three of the butterflies or swallowtails contact, eightfold or tenfold image regions can be produced as well. The possible astronomical applications are discussed.Comment: 24 pages, 6 figure

    Inflight estimation of gyro noise

    Get PDF
    A method is described and demonstrated for estimating single-axis gyro noise levels in terms of the Farrenkopf model parameters. This is accomplished for the Cosmic Background Explorer (COBE) by comparing gyro-propagated attitudes with less accurate single-frame solutions and fitting the squared differences to a third-order polynomial in time. Initial results are consistent with the gyro specifications, and these results are used to determine limits on the duration of batches used to determine attitude. Sources of error are discussed, and guidelines for a more elegant implementation, as part of a batch estimator or filter, are included for future work

    On the influence of social bots in online protests. Preliminary findings of a Mexican case study

    Full text link
    Social bots can affect online communication among humans. We study this phenomenon by focusing on #YaMeCanse, the most active protest hashtag in the history of Twitter in Mexico. Accounts using the hashtag are classified using the BotOrNot bot detection tool. Our preliminary analysis suggests that bots played a critical role in disrupting online communication about the protest movement.Comment: 10 page

    Game theory-based resource allocation for secure WPCN multiantenna multicasting systems

    Get PDF
    This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PBs due to the shortage of embedded power supply before establishing its secure com- munication. We exploit a novel and practical scenario that the PBs and the transmitter may belong to different operators and a hierarchical energy interaction between the PBs and the transmitter is considered. Specifically, the monetary incentives are required for the PBs to assist the transmitter for secure communications. This leads to the formulation of a Stackelberg game for the secure wireless-powered multiantenna multicasting system, where the transmitter and the PB are modelled as leader and follower, respectively, each maximizing their own utility function. The closed-form Stackelberg equilibrium of the formulated game is then derived where we study various scenarios of eavesdroppers and legitimate users that can have impact on the optimality of the derived solutions. Finally, numerical results are provided to validate our proposed schemes
    • …
    corecore