71 research outputs found
Structure and morphology of X-ray selected AGN hosts at 1<z<3 in CANDELS-COSMOS field
We analyze morphologies of the host galaxies of 35 X-ray selected active
galactic nucleus (AGNs) at in the Cosmic Evolution Survey (COSMOS)
field using Hubble Space Telescope/WFC3 imaging taken from the Cosmic Assembly
Near-infrared Deep Extragalactic Legacy Survey (CANDELS). We build a control
sample of 350 galaxies in total, by selecting ten non-active galaxies drawn
from the same field with the similar stellar mass and redshift for each AGN
host. By performing two dimensional fitting with GALFIT on the surface
brightness profile, we find that the distribution of Srsic index (n) of
AGN hosts does not show a statistical difference from that of the control
sample. We measure the nonparametric morphological parameters (the asymmetry
index A, the Gini coefficient G, the concentration index C and the M20 index)
based on point source subtracted images. All the distributions of these
morphological parameters of AGN hosts are consistent with those of the control
sample. We finally investigate the fraction of distorted morphologies in both
samples by visual classification. Only 15% of the AGN hosts have highly
distorted morphologies, possibly due to a major merger or interaction. We find
there is no significant difference in the distortion fractions between the AGN
host sample and control sample. We conclude that the morphologies of X-ray
selected AGN hosts are similar to those of nonactive galaxies and most AGN
activity is not triggered by major merger.Comment: 5 pages, 3 figures, accepted for publication in The Astrophysical
Journal Letter
Switch between critical percolation modes in city traffic dynamics
Percolation transition is widely observed in networks ranging from biology to
engineering. While much attention has been paid to network topologies, studies
rarely focus on critical percolation phenomena driven by network dynamics.
Using extensive real data, we study the critical percolation properties in city
traffic dynamics. Our results suggest that two modes of different critical
percolation behaviors are switching in the same network topology under
different traffic dynamics. One mode of city traffic (during nonrush hours or
days off) has similar critical percolation characteristics as small world
networks, while the other mode (during rush hours on working days) tends to
behave as a 2D lattice. This switching behavior can be understood by the fact
that the high-speed urban roads during nonrush hours or days off (that are
congested during rush hours) represent effective long-range connections, like
in small world networks. Our results might be useful for understanding and
improving traffic resilience.Comment: 8 pages, 4 figures, Daqing Li, Ziyou Gao and H. Eugene Stanley are
the corresponding authors ([email protected], [email protected],
[email protected]
(E)-N′-[4-(DimethylÂamino)ÂbenzylÂidene]-4-methylÂbenzohydrazide methanol monosolvate
In the title compound, C17H19N3O·CH3OH, the hydrazone molÂecule exists in a trans geometry with respect to the methylÂidene unit and the dihedral angle between the two substituted benzene rings is 42.6 (2)°. In the crystal, the components are linked through N—H⋯O and O—H⋯O hydrogen bonds, forming [100] chains of alternating hydrazone and methanol molÂecules
Scale-free resilience of real traffic jams
The concept of resilience can be realized in natural and engineering systems, representing the ability of system to adapt and recover from various disturbances. Although resilience is a critical property needed for understanding and managing the risks and collapses of transportation system, an accepted and useful definition of resilience for urban traffic as well as its statistical property under perturbations is still missing. Here we define city traffic resilience based on the spatio-temporal clusters of congestion in real traffic, and find that the resilience follows a scale free distribution in two-dimensional city road networks and one-dimensional highways, with different exponents, but similar exponents in different days and different cities. The traffic resilience is also revealed to have a novel scaling relation between the cluster size of the spatio-temporal jam and its recovery duration, independent of microscopic details. Our findings of universal traffic resilience can provide indication towards better understanding and designing these complex engineering systems under internal and external disturbances.
Comment: 6 pages, 4 figure
Document type: Articl
Scale-free Resilience of Real Traffic Jams
The concept of resilience can be realized in natural and engineering systems,
representing the ability of system to adapt and recover from various
disturbances. Although resilience is a critical property needed for
understanding and managing the risks and collapses of transportation system, an
accepted and useful definition of resilience for urban traffic as well as its
statistical property under perturbations is still missing. Here we define city
traffic resilience based on the spatio-temporal clusters of congestion in real
traffic, and find that the resilience follows a scale free distribution in
two-dimensional city road networks and one-dimensional highways, with different
exponents, but similar exponents in different days and different cities. The
traffic resilience is also revealed to have a novel scaling relation between
the cluster size of the spatio-temporal jam and its recovery duration,
independent of microscopic details. Our findings of universal traffic
resilience can provide indication towards better understanding and designing
these complex engineering systems under internal and external disturbances.Comment: 6 pages, 4 figure
An Open Unified Addressing System for 6G Communication Networks
With the rapid and continuous development of the Internet, it is foreseeable that current addressing schemes and fixed-length IP addresses would create further bottlenecks and limitations in realizing future 6G networking requirements, such as massive connections, resource-constrained communication, and heterogeneous hyper interconnections and guaranteeing agreement-based services and KPIs. Moreover, the locator-based addressing semantic is unsuitable for mobile and content-oriented networks. Thus, this paper proposes the Open Unified Addressing (OUA) system, a novel, flexible, multi-semantic and hierarchical addressing architecture that better supports the flexibility and extensibility of the Internet protocol framework in the context of 6G Communications. The OUA addresses several limitations in the current IP protocol and improves communication efficiency. According to the evaluation with two typical forwarding models, the results show that the OUA system has almost no impact on forwarding delay. Moreover, it can provide scalable addressing spaces and shorten the route convergence time
Piercing through Highly Obscured and Compton-thick AGNs in the Chandra Deep Fields. II. Are Highly Obscured AGNs the Missing Link in the Merger-Triggered AGN-Galaxy Coevolution Models?
By using a large highly obscured () AGN
sample (294 sources at ) selected from detailed X-ray spectral
analyses in the deepest Chandra surveys, we explore distributions of these
X-ray sources in various optical/IR/X-ray color-color diagrams and their
host-galaxy properties, aiming at characterizing the nuclear obscuration
environment and the triggering mechanism of highly obscured AGNs. We find that
the refined IRAC color-color diagram fails to identify the majority of X-ray
selected highly obscured AGNs, even for the most luminous sources with . Over 80% of our sources will not be
selected as heavily obscured candidates using the flux ratio of and criteria, implying complex origins and
conditions for the obscuring materials that are responsible for the heavy X-ray
obscuration. The average star formation rate of highly obscured AGNs is similar
to that of stellar mass- (-) and -controlled normal galaxies, while the
lack of quiescent hosts is observed for the former. Partial correlation
analyses imply that highly obscured AGN activity (traced by )
appears to be more fundamentally related to , and no dependence of on either or SFR is detected. Morphology analyses reveal that 61% of
our sources have a significant disk component, while only 27% of them exhibit
irregular morphological signatures. These findings together point toward a
scenario where secular processes (e.g., galactic-disk instabilities), instead
of mergers, are most probable to be the leading mechanism that triggers
accretion activities of X-ray-selected highly obscured AGNs.Comment: 23 pages, 12 figures, 3 tables, resubmitted to ApJ after addressing
referee's comment
Application-aware and Dynamic Security Function Chaining for Mobile Networks
Mobile networks have urgent demands of fine-grained, cost-effective and flexible service provision for diversified user traffic. To cope with these demands, researchers have proposed various Service Function Chaining (SFC) solutions with the rise of Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies. However, most of them are performed based on MAC address and/or OpenFlow protocols without Network Service Header (NSH) support, having drawbacks in complexity, scalability and flexibility. NSH-based approaches are more promising for mobile networks, since they support metadata-based packet information sharing and policy enforcement. Moreover, a hierarchical SFC (hSFC) architecture is proposed to alleviate the scalability and management problems in large-scale networks. Nevertheless, how to realize application awareness and on-demand service provision has not been investigated thoroughly in the hSFC environment. Thus, in this paper, we propose a proactive-based branching approach for application-aware and dynamic security function chaining, where application features are analyzed at first, and then carried in the metadata of NSHs for subsequent processes by the relevant security functions. In this way, the data plane is able to redirect traffic based on metadata without the participation of control plane. Besides, we verify the proposed approach through our prototype system via two typical use cases, the application-aware traffic control and lawful interception, and the related experiment results confirm its feasibility and elasticity
- …