79,664 research outputs found

    Evolution of binary stars and its implications for evolutionary population synthesis

    Full text link
    Most stars are members of binaries, and the evolution of a star in a close binary system differs from that of an ioslated star due to the proximity of its companion star. The components in a binary system interact in many ways and binary evolution leads to the formation of many peculiar stars, including blue stragglers and hot subdwarfs. We will discuss binary evolution and the formation of blue stragglers and hot subdwarfs, and show that those hot objects are important in the study of evolutionary population synthesis (EPS), and conclude that binary interactions should be included in the study of EPS. Indeed, binary interactions make a stellar population younger (hotter), and the far-ultraviolet (UV) excess in elliptical galaxies is shown to be most likely resulted from binary interactions. This has major implications for understanding the evolution of the far-UV excess and elliptical galaxies in general. In particular, it implies that the far-UV excess is not a sign of age, as had been postulated prviously and predicts that it should not be strongly dependent on the metallicity of the population, but exists universally from dwarf ellipticals to giant ellipticals.Comment: Oral talk on IAUS 262, Brazi

    A note on modular forms and generalized anomaly cancellation formulas

    Full text link
    By studying modular invariance properties of some characteristic forms, we prove some new anomaly cancellation formulas which generalize the Han-Zhang and Han-Liu-Zhang anomaly cancellation formula

    Binary Stellar Population Synthesis Model

    Full text link
    Using Yunnan evolutionary population synthesis (EPS) models, we present integrated colours, integrated spectral energy distributions (ISEDs) and absorption-line indices defined by the Lick Observatory image dissector scanner (Lick/IDS) system, for an extensive set of instantaneous-burst binary stellar populations (BSPs) with interactions. By comparing the results for populations with and without interactions we show that the inclusion of binary interactions makes the appearance of the population substantially bluer. This effect raises the derived age and metallicity of the population. To be used in the studies of modern spectroscopic galaxy surveys at intermediate/high spectral resolution, we also present intermediate- (3A) and high-resolution (~0.3A) ISEDs and Lick/IDS absorption-line indices for BSPs. To directly compare with observations the Lick/IDS absorption indices are also presented by measuring them directly from the ISEDs.Comment: 2 pages 2 figure

    On the mathematical form of CVA in Basel III.

    Get PDF
    Credit valuation adjustment in Basel III is studied from the perspective of the mathematics involved. A bank covers mark-to-market losses for expected counterparty risk with a CVA capital charge. The CVA is known as credit valuation adjustments. In this paper it will be argued that CVA and conditioned value at risk (CVaR) have a common mathematical ancestor. The question is raised why the Basel committee, from the perspective of CVaR, has selected a specific parameterization. It is argued that a fine-tuned supervision, on the longer run, will be beneficial for counterparties with a better control over their spread.CVA, CVaR, statistical methodology.

    Password Cracking and Countermeasures in Computer Security: A Survey

    Full text link
    With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users. Password authentication is one of the widely used methods to achieve authentication for legal users and defense against intruders. There have been many password cracking methods developed during the past years, and people have been designing the countermeasures against password cracking all the time. However, we find that the survey work on the password cracking research has not been done very much. This paper is mainly to give a brief review of the password cracking methods, import technologies of password cracking, and the countermeasures against password cracking that are usually designed at two stages including the password design stage (e.g. user education, dynamic password, use of tokens, computer generations) and after the design (e.g. reactive password checking, proactive password checking, password encryption, access control). The main objective of this work is offering the abecedarian IT security professionals and the common audiences with some knowledge about the computer security and password cracking, and promoting the development of this area.Comment: add copyright to the tables to the original authors, add acknowledgement to helpe

    The Effect of Binary Interactions in Infrared Passbands

    Full text link
    We present the integrated J, H, K, L, M and N magnitudes and the colours involving infrared bands, for an extensive set of instantaneous-burst binary stellar populations (BSPs) by using evolutionary population synthesis (EPS). By comparing the results for BSPs WITH and WITHOUT binary interactions we show that the inclusion of binary interactions makes the magnitudes of populations larger (fainter) and the integrated colours smaller (bluer) for t > 1Gyr. Also, we compare our model magnitudes and colours with those of Bruzual & Charlot (2003, hereafter BC03) and Maraston (2005, hereafter M05). At last, we compare these model broad colours with Magellanic Clouds globular clusters (GCs) and Milky Way GCs. In (V-R)-[Fe/H] and (V-I)-[Fe/H] diagrams it seems that our models match the observations better than those of BC03 and M05.Comment: 2 page 3 figure

    Collision-free trajectory planning algorthm for manipulators

    Get PDF
    Collision-free trajectory planning for robotic manipulators is investigated. The task of the manipulator is to move its end-effector from one point to another point in an environment with polyhedral obstacles. An on-line algorithm is developed based on finding the required joint angles of the manipulator, according to goals with different priorities. The highest priority is to avoid collisions, the second priority is to plan the shortest path for the end effector, and the lowest priority is to minimize the joint velocity for smooth motion. The pseudo-inverse of the Jacobian matrix is applied for inverse kinematics. When a possible collision is detected, a constrained inverse kinematic problem is solved such that the collision is avoided. This algorithm can also be applied to a time-variant environment

    The benefit of high-conductivity materials in film cooled turbine nozzles

    Get PDF
    This study presents an experimental and numerical investigation of the beneficial effect of higher conductivity materials in HP turbine nozzles. Most of the literature studies focus on the maximum temperature that a nozzle can withstand, whereas the effect of thermal gradients is often neglected. However thermal gradients have higher influence on the life of the components and they have to be given careful consideration. In this work it is shown that thermal gradients are reduced by using high conductivity materials and, as a consequence, the nozzles life is appreciably increased. A representative film cooled leading edge with an internal impingement plate was studied experimentally at Texas AM University. Two materials were used, namely polycarbonate and stainless steel, in order to highlight the impact of conduction on coolant effectiveness. Numerically conjugate heat transfer simulations have been carried out with an in house solver to analyse in detail the impact of conduction and internal convection. Both experimental and numerical results show that by increasing the conductivity in the solid region, the thermal gradients are strongly reduced. Numerically it is shown that using inserts of nickel-aluminide alloys in nozzles may reduce the thermal gradients from 3 to 4 times if compared to nowadays design. © 2012 Elsevier Inc
    corecore