4,905 research outputs found

    Triggering Active Galactic Nuclei in Hierarchical Galaxy Formation: Disk instability vs. Interactions

    Full text link
    Using a semi analytic model for galaxy formation we investigate the effects of Black Hole accretion triggered by disk instabilities (DI) in isolated galaxies on the evolution of AGN. Specifically, we took on, developed and expanded the Hopkins & Quataert (2011) model for the mass inflow following disk perturbations, and compare the corresponding evolution of the AGN population with that arising in a scenario where galaxy interactions trigger AGN (IT mode). We extended and developed the DI model by including different disk surface density profiles, to study the maximal contribution of DI to the evolution of the AGN population. We obtained the following results: i) for luminosities corresponding to M1450≳−26M_{1450}\gtrsim -26 the DI mode can provide the BH accretion needed to match the observed AGN luminosity functions up to z≈4.5z \approx 4.5; in such a luminosity range and redshift, it can compete with the IT scenario as the main driver of cosmological evolution of AGN; ii) The DI scenario cannot provide the observed abundance of high-luminosity QSO with M1450≲−26M_{1450}\lesssim -26 AGN, as well as the abundance of high-redhshift z≈4.5z \approx 4.5 QSOs with M1450≲−24M_{1450}\lesssim -24, while the IT scenario provides an acceptable match up to z≈6z \approx 6, as found in our earliest works; iii) The dispersion of the distributions of Eddington ratio for low- and intermediate-luminosity AGN (bolometric LAGNL_{AGN} = 104310^{43} - 104510^{45} erg/s) is predicted to be much smaller in the DI scenario compared to the IT mode; iv) The above conclusions are robust with respect to the explored variants of the Hopkins & Quataert (2011) model. We discuss the physical origin of our findings, and how it is possible to pin down the dominant fueling mechanism in the low-intermediate luminosity range M1450≳−26M_{1450}\gtrsim -26 where both the DI and the IT modes are viable candidates as drivers for the AGN evolution.Comment: Accepted for publication in Astronomy & Astrophysics, 24 pages, 8 figures; updated reference

    The role of non-local exchange in the electronic structure of correlated oxides

    Full text link
    We present a systematic study of the electronic structure of several prototypical correlated transition-metal oxides: VO2, V2O3, Ti2O3, LaTiO3, and YTiO3. In all these materials, in the low-temperature insulating phases the local and semilocal density approximations (LDA and GGA) of density-functional theory yield a metallic Kohn-Sham band structure. Here we show that, without invoking strong-correlation effects, the role of non-local exchange is essential to cure the LDA/GGA delocalization error and provide a band-structure description of the electronic properties in qualitative agreement with the experimental photoemission results. To this end, we make use of hybrid functionals that mix a portion of non-local Fock exchange with the local LDA exchange-correlation potential. Finally, we discuss the advantages and the shortcomings of using hybrid functionals for correlated transition-metal oxides.Comment: submitte

    Hydrothermal stability of Ru/SiO2-C: A promising catalyst for biomass processing through liquid-phase reactions

    Get PDF
    In this work, structural and morphological properties of SiO2-C composite material to be used as support for catalysts in the conversion of biomass-derived oxygenated hydrocarbons, such as glycerol, were investigated in liquid water under various temperatures conditions. The results show that this material does not lose surface area, and the hot liquid water does not generate changes in the structure. Neither change in relative concentrations of oxygen functional groups nor in Si/C ratio due to hydrothermal treatment was revealed by X-ray photoelectron spectroscopy (XPS) analysis. Raman analysis showed that the material is made of a disordered graphitic structure in an amorphous silica matrix, which remains stable after hydrothermal treatment. Results of the hydrogenolysis of glycerol using a Ru/SiO2-C catalyst indicate that the support gives more stability to the active phase than a Ru/SiO2 consisting of commercial silica

    Coherent imaging of a pure phase object with classical incoherent light

    Get PDF
    By using the ghost imaging technique, we experimentally demonstrate the reconstruction of the diffraction pattern of a {\em pure phase} object by using the classical correlation of incoherent thermal light split on a beam splitter. The results once again underline that entanglement is not a necessary feature of ghost imaging. The light we use is spatially highly incoherent with respect to the object (≈2μ\approx 2 \mum speckle size) and is produced by a pseudo-thermal source relying on the principle of near-field scattering. We show that in these conditions no information on the phase object can be retrieved by only measuring the light that passed through it, neither in a direct measurement nor in a Hanbury Brown-Twiss (HBT) scheme. In general, we show a remarkable complementarity between ghost imaging and the HBT scheme when dealing with a phase object.Comment: 13 pages, 11 figures. Published in Physical Review A. Replaced version fixes some problems with Figs. 1, 4 and 1

    Security Games for Node Localization through Verifiable Multilateration

    Get PDF
    Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor nodes, which are not necessarily known beforehand. Several localization approaches have been proposed but most of them omit to consider that WSNs could be deployed in adversarial settings, where hostile nodes under the control of an attacker coexist with faithful ones. Verifiable multilateration (VM) was proposed to cope with this problem by leveraging on a set of trusted landmark nodes that act as verifiers. Although VM is able to recognize reliable localization measures, it allows for regions of undecided positions that can amount to the 40 percent of the monitored area. We studied the properties of VM as a noncooperative two-player game where the first player employs a number of verifiers to do VM computations and the second player controls a malicious node. The verifiers aim at securely localizing malicious nodes, while malicious nodes strive to masquerade as unknown and to pretend false positions. Thanks to game theory, the potentialities of VM are analyzed with the aim of improving the defender's strategy. We found that the best placement for verifiers is an equilateral triangle with edge equal to the power range R, and maximum deception in the undecided region is approximately 0.27R. Moreover, we characterized-in terms of the probability of choosing an unknown node to examine further-the strategies of the players

    Network Selection and Resource Allocation Games for Wireless Access Networks

    Get PDF
    Wireless access networks are often characterized by the interaction of different end users, communication technologies, and network operators. This paper analyzes the dynamics among these "actors" by focusing on the processes of wireless network selection, where end users may choose among multiple available access networks to get connectivity, and resource allocation, where network operators may set their radio resources to provide connectivity. The interaction among end users is modeled as a non-cooperative congestion game where players (end users) selfishly select the access network that minimizes their perceived selection cost. A method based on mathematical programming is proposed to find Nash equilibria and characterize their optimality under three cost functions, which are representative of different technological scenarios. System level simulations are then used to evaluate the actual throughput and fairness of the equilibrium points. The interaction among end users and network operators is then assessed through a two-stage multi-leader/multi-follower game, where network operators (leaders) play in the first stage by properly setting the radio resources to maximize their users, and end users (followers) play in the second stage the aforementioned network selection game. The existence of exact and approximated subgame perfect Nash equilibria of the two-stage game is thoroughly assessed and numerical results are provided on the "quality" of such equilibria

    Getting Closer or Falling Apart? Euro Area Countries After the Sovereign Debt Crisis

    Get PDF
    We study convergence and divergence dynamics in a sample of euro area countries by assembling an extensive dataset that contains information on public spending and policy outcomes in a variety of areas of government intervention including education, health, and civil justice from the early 1990s. We also focus on other important determinants of a country's economic performance such as the level of regulation of product and labor markets, as well as the trust in political institutions, quality of governance, and inequality. Results show that despite divergent economic growth in the euro periphery countries after the 2010-2012 sovereign debt crisis, the quality of services and level of regulation did not deteriorate or indeed improved, increasing convergence with the core euro countries. However, the euro area sovereign debt crisis dramatically worsened citizens' perceptions of quality of governance, as well as the level of social trust. This calls in question the future political viability of the EMU project and asks for reform

    Team-maxmin equilibrium: Efficiency bounds and algorithms

    Get PDF
    The Team-maxmin equilibrium prescribes the optimal strategies for a team of rational players sharing the same goal and without the capability of correlating their strategies in strategic games against an adversary. This solution concept can capture situations in which an agent controls multiple resources-corresponding to the team members-that cannot communicate. It is known that such equilibrium always exists and it is unique (except degenerate cases) and these properties make it a credible solution concept to be used in real-world applications, especially in security scenarios. Nevertheless, to the best of our knowledge, the Team-maxmin equilibrium is almost completely unexplored in the literature. In this paper, we investigate bounds of (in) efficiency of the Team-maxmin equilibrium w.r.t. the Nash equilibria and w.r.t. the Maxmin equilibrium when the team members can play correlated strategies. Furthermore, we study a number of algorithms to find and/or approximate an equilibrium, discussing their theoretical guarantees and evaluating their performance by using a standard testbed of game instances
    • …
    corecore