4 resultados para Gaussian and Lorentz spectral fitting
Resumo:
A modified UNIFAC–VISCO group contribution method was developed for the correlation and prediction of viscosity of ionic liquids as a function of temperature at 0.1 MPa. In this original approach, cations and anions were regarded as peculiar molecular groups. The significance of this approach comes from the ability to calculate the viscosity of mixtures of ionic liquids as well as pure ionic liquids. Binary interaction parameters for selected cations and anions were determined by fitting the experimental viscosity data available in literature for selected ionic liquids. The temperature dependence on the viscosity of the cations and anions were fitted to a Vogel–Fulcher–Tamman behavior. Binary interaction parameters and VFT type fitting parameters were then used to determine the viscosity of pure and mixtures of ionic liquids with different combinations of cations and anions to ensure the validity of the prediction method. Consequently, the viscosities of binary ionic liquid mixtures were then calculated by using this prediction method. In this work, the viscosity data of pure ionic liquids and of binary mixtures of ionic liquids are successfully calculated from 293.15 K to 363.15 K at 0.1 MPa. All calculated viscosity data showed excellent agreement with experimental data with a relative absolute average deviation lower than 1.7%.
Resumo:
Context. The 30 Doradus (30 Dor) region of the Large Magellanic Cloud, also known as the Tarantula nebula, is the nearest starburst region. It contains the richest population of massive stars in the Local Group, and it is thus the best possible laboratory to investigate open questions on the formation and evolution of massive stars. Aims. Using ground-based multi-object optical spectroscopy obtained in the framework of the VLT-FLAMES Tarantula Survey (VFTS), we aim to establish the (projected) rotational velocity distribution for a sample of 216 presumably single O-type stars in 30 Dor. The sample is large enough to obtain statistically significant information and to search for variations among subpopulations - in terms of spectral type, luminosity class, and spatial location - in the field of view. Methods. We measured projected rotational velocities, 3e sin i, by means of a Fourier transform method and a profile fitting method applied to a set of isolated spectral lines. We also used an iterative deconvolution procedure to infer the probability density, P(3e), of the equatorial rotational velocity, 3e. Results. The distribution of 3e sin i shows a two-component structure: a peak around 80 km s1 and a high-velocity tail extending up to 600 km s-1 This structure is also present in the inferred distribution P(3e) with around 80% of the sample having 0 <3e ≤ 300 km s-1 and the other 20% distributed in the high-velocity region. The presence of the low-velocity peak is consistent with what has been found in other studies for late O- and early B-type stars. Conclusions. Most of the stars in our sample rotate with a rate less than 20% of their break-up velocity. For the bulk of the sample, mass loss in a stellar wind and/or envelope expansion is not efficient enough to significantly spin down these stars within the first few Myr of evolution. If massive-star formation results in stars rotating at birth with a large portion of their break-up velocities, an alternative braking mechanism, possibly magnetic fields, is thus required to explain the present-day rotational properties of the O-type stars in 30 Dor. The presence of a sizeable population of fast rotators is compatible with recent population synthesis computations that investigate the influence of binary evolution on the rotation rate of massive stars. Even though we have excluded stars that show significant radial velocity variations, our sample may have remained contaminated by post-interaction binary products. That the highvelocity tail may be populated primarily (and perhaps exclusively) by post-binary interaction products has important implications for the evolutionary origin of systems that produce gamma-ray bursts. © 2013 Author(s).
Resumo:
In this paper, we consider the transmission of confidential information over a κ-μ fading channel in the presence of an eavesdropper who also experiences κ-μ fading. In particular, we obtain novel analytical solutions for the probability of strictly positive secrecy capacity (SPSC) and a lower bound of secure outage probability (SOPL) for independent and non-identically distributed channel coefficients without parameter constraints. We also provide a closed-form expression for the probability of SPSC when the μ parameter is assumed to take positive integer values. Monte-Carlo simulations are performed to verify the derived results. The versatility of the κ-μ fading model means that the results presented in this paper can be used to determine the probability of SPSC and SOPL for a large number of other fading scenarios, such as Rayleigh, Rice (Nakagamin), Nakagami-m, One-Sided Gaussian, and mixtures of these common fading models. In addition, due to the duality of the analysis of secrecy capacity and co-channel interference (CCI), the results presented here will have immediate applicability in the analysis of outage probability in wireless systems affected by CCI and background noise (BN). To demonstrate the efficacy of the novel formulations proposed here, we use the derived equations to provide a useful insight into the probability of SPSC and SOPL for a range of emerging wireless applications, such as cellular device-to-device, peer-to-peer, vehicle-to-vehicle, and body centric communications using data obtained from real channel measurements.
Resumo:
In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.