1,993 research outputs found

    An updated stellar census of the Quintuplet cluster

    Get PDF
    Context. Found within the central molecular zone, the Quintuplet is one of the most massive young clusters in the Galaxy. As a consequence it offers the prospect of constraining stellar formation and evolution in extreme environments. However, current observations suggest that it comprises a remarkably diverse stellar population that is difficult to reconcile with an instantaneous formation event. Aims. To better understand the nature of the cluster our aim is to improve observational constraints on the constituent stars. Methods. In order to accomplish this goal we present Hubble Space Telescope/NICMOS+WFC3 photometry and Very Large Telescope/SINFONI+KMOS spectroscopy for ∼100 and 71 cluster members, respectively. Results. Spectroscopy of the cluster members reveals the Quintuplet to be far more homogeneous than previously expected. All supergiants are classified as either O7–8 Ia or O9–B0 Ia, with only one object of earlier (O5 I–III) spectral type. These stars form a smooth morphological sequence with a cohort of seven early-B hypergiants and six luminous blue variables and WN9-11h stars, which comprise the richest population of such stars of any stellar aggregate known. In parallel, we identify a smaller population of late-O hypergiants and spectroscopically similar WN8–9ha stars. No further H-free Wolf–Rayet (WR) stars are identified, leaving an unexpectedly extreme ratio of 13:1 for WC/WN stars. A subset of the O9–B0 supergiants are unexpectedly faint, suggesting they are both less massive and older than the greater cluster population. Finally, no main sequence objects were identifiable. Conclusions. Due to uncertainties over which extinction law to apply, it was not possible to quantitatively determine a cluster age via isochrone fitting. Nevertheless, we find an impressive coincidence between the properties of cluster members preceding the H-free WR phase and the evolutionary predictions for a single, non-rotating 60 M⊙ star; in turn this implies an age of ∼3.0–3.6 Myr for the Quintuplet. Neither the late O-hypergiants nor the low luminosity supergiants are predicted by such a path; we suggest that the former either result from rapid rotators or are the products of binary driven mass-stripping, while the latter may be interlopers. The H-free WRs must evolve from stars with an initial mass in excess of 60 M⊙ but it appears difficult to reconcile their observational properties with theoretical expectations. This is important since one would expect the most massive stars within the Quintuplet to be undergoing core-collapse/SNe at this time; since the WRs represent an evolutionary phase directly preceding this event,their physical properties are crucial to understanding both this process and the nature of the resultant relativistic remnant. As such, the Quintuplet provides unique observational constraints on the evolution and death of the most massive stars forming in the local, high metallicity Universe

    Flux through a hole from a shaken granular medium

    Full text link
    We have measured the flux of grains from a hole in the bottom of a shaken container of grains. We find that the peak velocity of the vibration, vmax, controls the flux, i.e., the flux is nearly independent of the frequency and acceleration amplitude for a given value of vmax. The flux decreases with increasing peak velocity and then becomes almost constant for the largest values of vmax. The data at low peak velocity can be quantitatively described by a simple model, but the crossover to nearly constant flux at larger peak velocity suggests a regime in which the granular density near the container bottom is independent of the energy input to the system.Comment: 14 pages, 4 figures. to appear in Physical Review

    Decision and function problems based on boson sampling

    Get PDF
    Boson sampling is a mathematical problem that is strongly believed to be intractable for classical computers, whereas passive linear interferometers can produce samples efficiently. So far, the problem remains a computational curiosity, and the possible usefulness of boson-sampling devices is mainly limited to the proof of quantum supremacy. The purpose of this work is to investigate whether boson sampling can be used as a resource of decision and function problems that are computationally hard, and may thus have cryptographic applications. After the definition of a rather general theoretical framework for the design of such problems, we discuss their solution by means of a brute-force numerical approach, as well as by means of non-boson samplers. Moreover, we estimate the sample sizes required for their solution by passive linear interferometers, and it is shown that they are independent of the size of the Hilbert space.Comment: Close to the version published in PR

    A particle-on-a-sphere model for C60

    Full text link
    A perimeter model for the [pi] electrons of C60 is developed and implemented within the independent particle approximation. Physically, the model gives the energy levels of a particle on a sphere pertubed by the icosahedral potential set up by the 60 carbon atomic cores. Computational techniques are adapted from well known crystal field formalisms. The molecular orbitals are represented by linear combinations of spherical harmonics. One or two adjustable parameters are used to give reasonable agreement with the observed UV-visible spectrum and with semi-empirical and ab initio calculations at a similar level of approximation. A closed-shell ground state, appreciable HOMO-LUMO gap, and electric dipole forbidden HOMO-LUMO transition are predictedPeer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/30843/1/0000505.pd

    An efficient approach based on trust and reputation for secured selection of grid resources

    Full text link
    Security is a principal concern in offering an infrastructure for the formation of general-purpose computational grids. A number of grid implementations have been devised to deal with the security concerns by authenticating the users, hosts and their interactions in an appropriate fashion. Resource management systems that are sophisticated and secured are inevitable for the efficient and beneficial deployment of grid computing services. The chief factors that can be problematic in the secured selection of grid resources are the wide range of selection and the high degree of strangeness. Moreover, the lack of a higher degree of confidence relationship is likely to prevent efficient resource allocation and utilisation. In this paper, we present an efficient approach for the secured selection of grid resources, so as to achieve secure execution of the jobs. This approach utilises trust and reputation for securely selecting the grid resources. To start with, the self-protection capability and reputation weightage of all the entities are computed, and based on those values, the trust factor (TF) of all the entities are determined. The reputation weightage of an entity is the measure of both the user’s feedback and other entities’ feedback. Those entities with higher TF values are selected for the secured execution of jobs. To make the proposed approach more comprehensive, a novel method is employed for evaluating the user’s feedback on the basis of the existing feedbacks available regarding the entities. This approach is proved to be scalable for an increased number of user jobs and grid entities. The experimentation portrays that this approach offers desirable efficiency in the secured selection of grid resources

    Standard survey methods for estimating colony losses and explanatory risk factors in Apis mellifera

    Get PDF
    This chapter addresses survey methodology and questionnaire design for the collection of data pertaining to estimation of honey bee colony loss rates and identification of risk factors for colony loss. Sources of error in surveys are described. Advantages and disadvantages of different random and non-random sampling strategies and different modes of data collection are presented to enable the researcher to make an informed choice. We discuss survey and questionnaire methodology in some detail, for the purpose of raising awareness of issues to be considered during the survey design stage in order to minimise error and bias in the results. Aspects of survey design are illustrated using surveys in Scotland. Part of a standardized questionnaire is given as a further example, developed by the COLOSS working group for Monitoring and Diagnosis. Approaches to data analysis are described, focussing on estimation of loss rates. Dutch monitoring data from 2012 were used for an example of a statistical analysis with the public domain R software. We demonstrate the estimation of the overall proportion of losses and corresponding confidence interval using a quasi-binomial model to account for extra-binomial variation. We also illustrate generalized linear model fitting when incorporating a single risk factor, and derivation of relevant confidence intervals

    An overview of a systems model of cassava and cassava pests in Africa

    Get PDF
    A systems model is described for cassava, Manihot esculenta Crantz, two of its introduced herbivores, the cassava green mite (CGM), Mononychellus tanajoa (Bondar), sensu lato, and the cassava mealybug (CM), Phenacoccus manihoti Mat.-Ferr., the introduced CM parasitoid, Epidinocarsis lopezi (DeSantis) and coccinellid predator of the genus Hyperaspis. The systems model includes the effects of weather, soil nitrogen and water levels on the interactions of the system's components. The model simulates the distribution of developmental times of cohorts initated at the same time, as well as the number and biomass (energy) dynamics of all populations over time. Biomass acquisition and allocation at the population and organism subunit levels (e.g. leaves, fruit, ova) were also simulated. A common acquisition (i.e. functional response) submodel was used to estimate daily photosynthetic as well as nitrogen and water uptake rates in cassava, in addition to herbivory, parasitism and predation rates for the arthropod species. This paper presents an overview of the systems model. Simulation results for the plant under pest free conditions were compared to field data. In addition, the model was used to estimate tuber yield losses due to CM and CGM feeding, and to examine the beneficial effects of introduced CM natural enemies as measured by reductions in tuber yield losse

    Disease-related p63 DBD mutations impair DNA binding by distinct mechanisms and varying degree

    Get PDF
    : The transcription factor p63 shares a high sequence identity with the tumour suppressor p53 which manifests itself in high structural similarity and preference for DNA sequences. Mutations in the DNA binding domain (DBD) of p53 have been studied in great detail, enabling a general mechanism-based classification. In this study we provide a detailed investigation of all currently known mutations in the p63 DBD, which are associated with developmental syndromes, by measuring their impact on transcriptional activity, DNA binding affinity, zinc binding capacity and thermodynamic stability. Some of the mutations we have further characterized with respect to their ability to convert human dermal fibroblasts into induced keratinocytes. Here we propose a classification of the p63 DBD mutations based on the four different mechanisms of DNA binding impairment which we identified: direct DNA contact, zinc finger region, H2 region, and dimer interface mutations. The data also demonstrate that, in contrast to p53 cancer mutations, no p63 mutation induces global unfolding and subsequent aggregation of the domain. The dimer interface mutations that affect the DNA binding affinity by disturbing the interaction between the individual DBDs retain partial DNA binding capacity which correlates with a milder patient phenotype
    • …
    corecore