Filename
stringlengths
22
64
Paragraph
stringlengths
8
5.57k
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
Using the actual incidence data and simulated scenarios which varied the extent of SD-adoption across time, we “retrodictively” determined the dynamically fluctuating SD-adoption profile that produced the incidence curves matching the observations. The resultant incidence curves were further contrasted with the curves produced by alternative scenarios defined by static SD-adoption. The comparison clearly demonstrated that, unlike the dynamic SD-adoption, the static alternatives failed to reproduce key non-linear features of the incidence trajectories. This indicated that the fraction of individuals adopting (or complying with) social distancing requirements may greatly vary over time, especially during a long pandemic. Hence, public health policies must adequately account for this variability, acknowledging and addressing possible fatigue and complacency within the population. Timely, rapidly designed and focused communication campaigns may be needed to reinforce the importance of continuing social distancing in controlling persistent spread and reducing the public health burden.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
The study also suggested, albeit indirectly, that the increased incidence observed during the last wave induced by sub-variants BA.4 and BA.5 (Fig. 1: phase 7) was mostly driven by re-infections or new infections in vaccinated individuals with low or waning vaccine effectiveness, rather than new infections of the epidemiologically or immunologically “naïve” population. Testing for anti-spike antibodies in Australia between 9 and 18 June 2022 provided an indication of the extent of cumulative exposure in the community to vaccination and/or natural infection: the prevalence of anti-spike antibodies, elicited by both vaccination and natural infection, was found to be very high (99%) across all jurisdictions, while the prevalence of anti-nucleocapsid antibodies, elicited by natural infection, reached 46% 46. The finding of our study, which emphasised re-infections and low or diminishing vaccine efficacy as key factors during phase 7, pointed to the need for agile “booster” vaccination campaigns, to raise immunity levels within the population during protracted pandemic stages.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
We estimated the corresponding disease burden (the hospitalisations, ICU occupancy, and daily and cumulative deaths), and compared it with the actual data. A good agreement between the simulated and actual disease burden data reinforced the point that the observed nonlinear dynamics are produced not simply by transitions across sub-variants of Omicron, but also in response to varying adoption of social distancing behaviour. The analysis also quantified and emphasised indirect effects of COVID-19 on the disease burden in Australia, differentiating between ICU cases directly attributable to COVID-19 versus those occurring with COVID-19. This distinction highlighted the need for a precise attribution of underlying conditions associated with ICU admissions during a long pandemic.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
Several limitations of the study have to be acknowledged. Firstly, the simulated population was generated using the latest available Australian Census data from 2016 (23.4M individuals) and may not be precisely representative of 2021–2022 period of time. However, the generated curves were scaled by 10% to reflect the current Australian population (25.8M). Secondly, the ABM does not simulate transmissions within healthcare facilities. However, health care professionals were vaccinated over several priority phases carried out in Australia in 2021 and 2022 and mask mandates were in place in health care facilities in these time periods, reducing the effect of this limitation. Furthermore, while vaccine efficacy is known to diminish over time, we did not model this explicitly, and considered this effect to be balanced by third vaccination doses administered in Australia during the studied period (e.g., 71.6% of Australian adults had received 3 doses by August 2022). In contrast to the greatly fluctuating SD-adoption, a decline in the vaccine efficacy is known to be monotonic 47, while our focus was on modelling multiple peaks of distinct waves within a single pandemic stage.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
SLC, QDN and MP designed computational experiments and re-calibrated the agent-based model. QDN and MP designed and simulated dynamic social distancing. SLC and MP modelled disease burden. SLC and QDN carried out computational experiments and verified the underlying data. SLC carried out the sensitivity analysis and prepared all figures. SLC, QDN and MP had full access to the data in the study. MP supervised the study. All authors contributed to drafting and editing of the Article and read and approved the final Article.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
This work was supported by the Australian Research Council grant DP220101688 (MP, VS, TCS, SLC and QDN). AM is salary funded by an NHMRC Investigator Grant. AMTraC-19 is registered under The University of Sydney’s invention disclosure CDIP Ref. 2020-018.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
We used anonymised data from the 2016 Australian Census obtained from the Australian Bureau of Statistics (ABS) and the Australian Curriculum and Assessment and Reporting Authority (ACARA). These datasets can be obtained publicly, with the exception of the work travel data which can be obtained from the ABS on request. It should be noted that some of the data needs to be processed using the TableBuilder: https://www.abs.gov.au/websitedbs/censushome.nsf/home/tablebuilder. The actual incidence data are available from the health departments across Australia (state, territories, and national), and at: https://www.covid19data.com.au/. Other source and supplementary data are available at Zenodo 48. The source code of AMTraC-19 is also available at Zenodo 24.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
In simulating the transmission and control of the COVID-19 pandemic on the scale of Australia, we follow the agent-based modeling (ABM) approach, with more than 23.4M agents generated using data from Australian Census and other data provided by the Australian Bureau of Statistics (ABS) and the Australian Curriculum and Assessment and Reporting Authority (ACARA) 24,49.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
During a “seeding” phase, new daily infections are generated using a binomial probability distribution and the international air traffic data from the Australian Bureau of Infrastructure, Transport, and Regional Economics (BITRE). These infections are then assigned to agents residing in randomly selected areas within a certain radius from an airport 50. For example, newly generated daily infections within Greater Sydney’s boundaries are distributed within a 50 km radius of Sydney’s international airport.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
j→i(n) = κ f (n − nj|j) qg pg A global transmission scalar κ calibrates the reproductive number R0 (see sensitivity analysis in section Appendix A.6.1.). The step nj marks the time when agent j becomes infected, and a function f (n − nj|j) represents the natural history of the disease, i.e., the infectivity of agent j over time. For an uninfected agent j, n < nj and f (n − nj|j) = 0. For an infected agent j, n ≥ nj and f (n − nj|j) ≥ 0. The infectivity increases exponentially until its peak, f (n − nj|j) = 1.0. After the peak, during the recovery period, the infectivity decreases linearly to 0.0, when the agent state changes to Removed. The age- and context-dependent daily probabilities of transmission from agent j to agent i, denoted by qg j→i, are specified in Table A.1, following prior studies 6,25.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
Asymptomatic agents are modeled to be less infectious than symptomatic agents, with their infectivity scaled down by factor αasymp. The sensitivity of the model to changes in this factor is explored in section Appendix A.6.2.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
At the end of each time step, the probability pi(n) is used by Bernoulli sampling to determine whether a susceptible agent i becomes infected.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
The fraction σ(i) is specified for adults (age ≥ 18), σa = 0.67, and children (age < 18), σc = 0.268, following prior studies 6, and is varied in sensitivity analysis, see section Appendix A.6.3. The main parameters of the ABM are summarised in Tables A.2 and A.3.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
where Fg(j) 6= 1 is the strength of the interaction between agent j and other agents in the mixing context g. For non-adopting agents j, the interaction strength is unchanged: Fg(j) = 1.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
Table A.1: Daily transmission probabilities qg mixing contexts and interaction types. Numbers in brackets show age groups.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
For each agent j adopting multiple NPIs, the value of Fg(j) is preferentially assigned to only one NPI in accordance with the following order: CI, HQ, SD, SC. At each time step and for each NPI, the NPI-adopting and non-adopting agents are randomly selected according to Bernoulli process. The NPI-adoption fractions for CI, HQ, and SC are fixed during the simulation. The SD-adoption fraction, however, is chosen according to an optimised assignment profile, presented in Table A.5.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
The resultant profile of SD-adoption is produced as a result of: (i) partitioning the simulated timeline with a number h of change-points, limited by the number of the modelled pandemic phases, h < 6; (ii) varying these change-points in increments of 5 days; (iii) varying the fractions within each partitioned period, in increments of 0.1 between SDmin = 0 and SDmax = 0.7, with fractions SDmax > 0.7 assumed to be infeasible.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
Table A.4: The macro-distancing parameters and interaction strengths of NPIs in the studied scenarios. The micro-duration of CI is limited by the disease progression in the affected agent i, D(i).
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
Table A.5: Macro-distancing dynamic SD-adoption fractions optimised for (left): approximately 23.4M population (2016 census), and (right): approximately 25.8M population (scaled by 10% relative to the 2016 census). The scaling-induced differences in best-fit SD-adoption fractions and simulation periods are highlighted in bold. Micro-distancing interaction strengths are the same as in Table A.4. Note that the initial SD-adoption of 0.3 is triggered when cumulative incidence reaches 400 around day 18 (specific days vary between different runs).
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
coverage nationwide. The coverage included 3.4M agents under 18 years of age (age < 18), 14.3M agents between 18 and 65 years of age (18 ≤ age < 65), and 3.4M agents at or over 65 years of age (age ≥ 65), see Table A.6. In each simulation, the agents were immunised prior to the start of the Omicron stage.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
where V Ed = V Es = 0.452 for priority vaccine, and V Ed = V Es = 0.293 for general vaccine. Compared to the Delta variant, a lesser efficacy against transmission (V Et) against Omicron has been reported 52, and we set V Et = 0.4 for both types of vaccines considered in this study. A sensitivity analysis testing a range of V Et and V Ec values was performed in prior studies 22,6, showing that the model is robust to changes in the efficacy components.
Processed_Persistence_of_the_Omicron_variant_of_SARS-CoV-2_i.txt
i ): i ) σa|c pi(n), given the fractions σa and σc of symptomatic adults and children, respectively.
Processed_The_black_hole_transient_MAXI_J1348-630:_evolution.txt
ABSTRACT We present the radio and X-ray monitoring campaign of the 2019/2020 outburst of MAXI J1348–630, a new black hole X-ray binary (XRB) discovered in 2019 January. We 14 months in the radio band with MeerKAT and the Aus- observed MAXI J1348–630 for tralia Telescope Compact Array (ATCA), and in the X-rays with MAXI and Swift/XRT. Throughout the outburst we detected and tracked the evolution of the compact and transient jets. Following the main outburst, the system underwent at least 4 hard-state-only re-flares, during which compact jets were again detected. For the major outburst, we observed the rise, quenching, and re-activation of the compact jets, as well as two single-sided discrete ejecta, launched 2 months apart and travelling away from the black hole. These ejecta displayed the highest proper motion ((cid:38)100 mas day−1) ever measured for an accreting black hole binary. 0.69 c, From the jet motion, we constrain the ejecta inclination and speed to be 46°and 6°and and the opening angle and transverse expansion speed of the first component to be 0.05 c. We also infer that the first ejection happened at the hard-to-soft state transition, ≤ before a strong radio flare, while the second ejection was launched during a short excursion from the soft to the intermediate state. After traveling with constant speed, the first component underwent a strong deceleration, which was covered with unprecedented detail and suggested that MAXI J1348–630 could be located inside a low-density cavity in the interstellar medium, as already proposed for XTE J1550–564 and H1743–322.
Processed_The_black_hole_transient_MAXI_J1348-630:_evolution.txt
Relativistic jets are outflows powered by accreting compact objects over a wide range of physical scales, including stellar-mass black holes (BHs) and their supermassive counterparts. In black hole low mass X-ray binaries (BH LMXBs), the companion star fills its Roche lobe and feeds a hot accretion disk that surrounds the compact object. In this configuration, the system is able to channel a fraction of the accreted mass and energy into powerful jets that can have different forms on very different scales: from compact jets at small scales ( tens of AU), to moving, discrete plasmons or hot-spots and persistent radio lobes at pc scales (e.g. Fender 2006). While BH LMXBs spend most of their existence in a low-luminosity quiescent state, they occasionally enter outburst phases that typically last from months to years (e.g. Remillard & McClintock 2006; Tetarenko et al. 2016; Fender & Muñoz-Darias 2016). Sharing many similarities with active galactic nuclei (AGN), BH LMXBs provide suitable laboratories to study scale-invariant properties of black holes, specifically those linked to the connection between accretion and ejection, as they evolve through different regimes of accretion on human timescales (e.g. Körding & Falcke 2005).
Processed_The_black_hole_transient_MAXI_J1348-630:_evolution.txt
During an outburst, the system cycles through different ac- cretion states that are characterized by distinct spectral and timing signatures (e.g. Homan & Belloni 2005; Remillard & McClintock 2006; Belloni 2010; Belloni & Motta 2016; Ingram & Motta 2019). As the outburst begins, these systems are typically observed in a rising hard X-ray state with high rms variability, during which the X-ray spectrum is dominated by a non-thermal power law that is thought to be the result of inverse-Compton scattering by a corona of hot electrons close to the compact object (e.g. Zdziarski & Gier- liński 2004; Poutanen et al. 2014). In addition, subdominant thermal emission, likely from a truncated, optically thin accretion disk, may also be present. The accretion rate increases as the outburst pro- gresses, and the system transitions to the intermediate state (IMS), which could be (conveniently) divided into the hard (HIMS) and soft (SIMS) intermediate states, during which the X-ray spectrum becomes progressively softer as the thermal emission from the ac- cretion disk increases and the rms variability decreases. The system subsequently enters the soft state, characterised by a drop in the rms variability and in which the X-ray spectrum is completely domi- nated by a kBT 1 keV thermal emission from an optically thick, geometrically thin accretion disk, whose inner radius is thought to reach the BH Innermost Stable Circular Orbit (ISCO, e.g. Steiner et al. 2010). Some weeks to months later, the luminosity decreases and, at some point, the system re-enters a lower luminosity IMS, before a transition back to the hard state, after which the outburst ends and the system slowly approaches quiescence.
Processed_The_black_hole_transient_MAXI_J1348-630:_evolution.txt
et al. 1999; Corbel et al. 2000), by at least 3.5 orders of magnitude (Russell et al. 2019a; Maccarone et al. 2020). Compact jets are then gradually re-activated as the systems transition back to the final hard state, which precedes quiescence (Miller-Jones et al. 2012; Kalemci et al. 2013; Corbel et al. 2013; Russell et al. 2014).
Processed_The_black_hole_transient_MAXI_J1348-630:_evolution.txt
One of the most interesting properties of BH LMXBs is the capability of launching transient jets, which are bipolar, discrete blobs of plasma ejected from the system in opposite directions. These transient jets have been observed so far in a small fraction of the known BH LMXB population (e.g. Mirabel & Rodríguez 1994; Hjellming & Rupen 1995; Fender et al. 1999; Mioduszewski et al. 2001; Gallo et al. 2004; Yang et al. 2010; Rushton et al. 2017; Rus- sell et al. 2019a; Miller-Jones et al. 2019; Bright et al. 2020). As the plasmons move away from the core at relativistic speeds, they often display apparent superluminal motion and emit optically thin radio emission (α 0.6, e.g. Corbel et al. 2002). The ejected compo- nents can travel unseen for months to years, before they are detected again at large ( pc) scales, with the emission coming from their in- teraction with the surrounding interstellar medium (ISM). Notably, discrete jets have been simultaneously detected at large scales in radio and X-rays for XTE J1550–564 (Corbel et al. 2002; Tomsick et al. 2003; Kaaret et al. 2003; Migliori et al. 2017), H1743–322 (Corbel et al. 2005) and MAXI J1820+070 (Espinasse et al. 2020), with a broadband power law spectrum suggesting the synchrotron nature of the emission coming from the shock region.
Processed_The_black_hole_transient_MAXI_J1348-630:_evolution.txt
Despite the progress made so far, the mechanism responsible for the jet launching has not yet been identified. In many systems, strong radio flares are observed to happen close to the transition be- tween the hard and the soft state and are believed to be the signature of the ejection of transient jets (Corbel et al. 2004; Fender et al. 2004), even in the cases for which the presence of extended jets cannot be confirmed by imaging. Discrete ejections could originate within compact jets due to internal shocks produced by a change in the accretion flow and a subsequent sharp increase in the Lorentz factor (Kaiser et al. 2000; Fender et al. 2004). In alternative, the transient jet could be the result of the ejection of the coronal mate- rial at state transitions (Rodriguez et al. 2003; Vadawale et al. 2003), although this scenario could imply an abrupt change in the coronal spectral properties that is not observed. It is of first importance to accurately model the jet motion. With such models, we can precisely infer its ejection date and possibly identify, along with other obser- vational features, the causal relation that leads to a discrete ejection. It was proposed that transient jets are associated with the change in the X-ray variability and with presence of Type-B Quasi Periodic Oscillations (QPOs; Soleri et al. 2008; Fender et al. 2009). While a possible connection has been identified in MAXI J1820+070 (Homan et al. 2020), there is no clear evidence of a causal relation for other sources (e.g. Fender et al. 2009; Miller-Jones et al. 2012; Russell et al. 2019a).
Processed_The_black_hole_transient_MAXI_J1348-630:_evolution.txt
et al. 2020; Carotenuto et al. 2020; Zhang et al. 2020b; Shimomukai et al. 2020). While currently no information is available on the black hole inclination, mass, spin and companion star, it has been pos- sible to measure a source distance D = 2.2+0.5 kpc (Chauhan −0.6 et al. 2021) from observations of Hi absorption carried out with the Australian Square Kilometre Array Pathfinder (ASKAP) and with MeerKAT. From the analysis of the MAXI data for the first part of the outburst, Tominaga et al. (2020) estimated a black hole mass MBH 16(D/5 kpc) M(cid:12), assuming a face-on system with a non-spinning BH (with the MBH estimate increasing with the BH spin and inclination). At the known distance of MAXI J1348–630, this corresponds to MBH 7 M(cid:12), which is fully consistent with measured mass values among the known population of Galactic BHs (e.g. Tetarenko et al. 2016).
Processed_The_black_hole_transient_MAXI_J1348-630:_evolution.txt
In this paper we present a dense and comprehensive radio and X-ray monitoring of MAXI J1348–630 during its discovery outburst. In Section 2 we describe the observations and the data processing. In Section 3 we present the results of the monitoring from the X-ray point of view and we describe the evolution of the compact jets and the motion of the discrete ejections from our radio observations, while in Section 4 we discuss our findings. Our conclusions are summarized in Section 5. The study of the radio/X- ray correlation will be presented in a forthcoming paper.
Processed_The_black_hole_transient_MAXI_J1348-630:_evolution.txt
We observed MAXI J1348–630 with MeerKAT (Jonas & MeerKAT Team 2016; Camilo et al. 2018) as part of the ThunderKAT Large Survey Programme (Fender et al. 2017). MeerKAT is a new radio- interferometer and a precursor of the SKA, which is located in the Karoo desert in South Africa. MeerKAT consists of 64 antennas of 13.5 m diameter, currently equipped with L-band receivers (0.86– 1.71 GHz). Characterised by a dense core and with a longest baseline of 8 km, the array offers a very good snap-shot uv-coverage and a large field of view (1.69 deg2), achieving a resolution of 5 arcsec in L-band. MAXI J1348–630 was monitored with an approximately weekly cadence from 2019 January 29 (MJD 58512) to 2020 March 03 (MJD 58910) for a total of 48 epochs. Each observation consisted of a single 15 min long scan on source, except for the first observa- tion (MJD 58512), which was 20 mins of on-source time separated into two 10 min scans. The primary calibrator PKS 1934–638 was observed either at the beginning or at the end of each observing block, and it was used for flux, bandpass, and complex gain cali- bration. All observations were taken with 8 seconds of integration times, at a central frequency of 1.28 GHz and with a total bandwidth of 860 MHz, divided into 4096 equivalent 209 kHz channels.
Processed_A_Ranking_Approach_to_Fair_Classification.txt
CCS CONCEPTS • Computing methodologies → Machine learning; Philo- sophical/theoretical foundations of artificial intelligence; • Social and professional topics → Socio-technical systems; • Information systems → Decision support systems.
Processed_A_Ranking_Approach_to_Fair_Classification.txt
However, traditional classification algorithms require access to actual ground-truth labels, which are often unavailable [25]. In practice, we may only have access to imperfect labels, generally as the result of (potentially biased) historical human-made decisions. Inspired by the argumentation of Kilbertus et al. [23], we propose to not learn to predict imperfect labels. Instead, we introduce a meritocratically fair decision criterion based on an observation’s distance to what we call the North Star—a (potentially hypothetical) observation that is most qualified in a given scenario. Our approach induces both a ranking and an opportunity to classify observations, based on monotonic relationships between legitimate features and the outcome. We also put forward ideas to a) incorporate useful information from historical decisions (Section 3.2) and b) reduce the importance of features that are highly correlated with protected attributes (e.g., gender) in the decision-making process (Section 3.3).
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
In a two-dimensional version of the modified Hasegawa-Wakatani (HW) model, which describes electrostatic resistive drift wave turbulence, the resistive coupling between vorticity and density does not act on the zonal components (ky = 0). It is therefore necessary to modify the HW model to treat the zonal components properly. The modified equations are solved numerically, and visualization and analysis of the solutions show generation of stable zonal flows, through conversion of turbulent kinetic energy, and the consequent turbulence and transport suppres- sion. It is demonstrated by comparison that the modification is essential for generation of zonal flows.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
In quasi two-dimensional (2D) plasma and fluid flows the energy flux from small scale turbulent modes toward lower wavenumber modes can domi- nate the classical Kolmogorov cascade to dissipative scales, with the result that energy can accumulate in large scale coherent structures. Zonal flows in planetary atmospheres and in magnetically confined fusion plasmas are well-known examples of such coherent structures. Quasi two-dimensional fluid systems in which turbulent activities and coherent structures interact can undergo a spontaneous transition to a turbulence-suppressed regime. In plasmas such transitions dramatically enhance the confinement and are known as L–H or confinement transitions. From theoretical and experimen- tal works the importance of shear or zonal flows for suppression of cross-field transport and confinement improvement is now widely appreciated.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
ber of coupled ordinary differential equations, have been proposed to de- scribe and predict the L–H transition1,2,3. Ball et al. have analyzed a three-variable model using bifurcation and singularity theories3. The model is based on the reduced resistive magnetohydrodynamic equations with the electrostatic approximation, and describes the pressure-gradient-driven turbulence–shear flow energetics. This approach using low-dimensional modeling greatly simplifies the problem, and when validated against simu- lated or real experimental data, will provide an economical tool to predict transitions over the parameter space.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
In this work we report the results of numerical simulations that both complement the low-dimensional modeling results and raise some interest- ing issues in their own right. We focus on a model for electrostatic resistive drift wave turbulence, the Hasegawa-Wakatani (HW) model4, and solve the equations by direct numerical simulation in 2D slab geometry. The HW model has been widely used to investigate anomalous edge transport due to collisional drift waves5. Moreover, self-organization of a shear flow has been shown by numerical simulation of the HW model in cylindrical geometry6. Thus we consider the HW model is a good starting point for studying self-consistent turbulence–shear flow interactions, even though it does not describe physics that can be important in specific situations, such as magnetic curvature, magnetic shear, and electromagnetic effect.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
where f stands for ζ and n, and D stands for the corresponding dissipation coefficients.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
The HW model spans two limits with respect to the adiabaticity parameter. In the adiabatic limit α → ∞ (collisionless plasma), the non-zonal component of electron density obeys the Boltzmann relation ˜n = n0(x) exp( ˜ϕ), and the equations are reduced to the Hasegawa-Mima equation7. In the hydrodynamic limit α → 0 and the equations are decou- pled. Vorticity is determined by the 2D Navier-Stokes (NS) equation, and the density fluctuation is passively advected by the flow obtained from the NS equation.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
where dx = dxdy, which constrain the fluid motion. According to Kraich- nan’s theory of 2D turbulence9, the net flux of enstrophy is downscale while that of energy is upscale. This inverse energy cascade is behind the development of large scale, stable coherent structures in a HW flow.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
These quantities constitute sources and sinks. As will be seen in the simu- lation results, they are mostly positive (Γα and DE are positive definite), thus only Γn can act as a source. The energy absorbed from the background supplies the turbulent fluctuations through the drift wave instability.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
Note that the same conservation laws hold for the unmodified original HW (OHW) model except that Γα is defined by both zonal and non-zonal components; ΓOHW (n − ϕ)2dx. In the OHW model, the zonal modes as well as the non-zonal modes suffer the resistive dissipation.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
and is depicted in Fig. 1. The left panel shows the stability boundary in Dζ − κ plane. If we enhance the drive by increasing κ, the system becomes unstable. However, the instability is stabilized by increasing the dissipation. The stability threshold in kx − ky plane is shown in the right panel. We see that in a highly driven-dissipative system only low wavenumber modes are unstable. The stability boundary in parameter space is a region where interesting dynamics are expected to occur, such as bifurcations or sudden changes to a suppressed (or enhanced) turbulence regime.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
Figure 2 shows the dispersion relation for cases where Dζ = Dn = 0. To provide a test of the simulation code, we plot growth rates obtained from numerical simulations together with the analytic curves. We can see that the growth rates obtained numerically agree very well with that calculated analytically. We also note that, in the parameter range plotted in Fig. 2 (α = 1, κ = 1), the most unstable mode is kx ∼ 0, ky ∼ 1.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
The HW equations are solved in a double periodic slab domain with box size (2L)2 = (2π/∆k)2 where the lowest wavenumber ∆k = 0.15. The equations are discretized on 256 × 256 grid points by the finite difference method. Arakawa’s method is used for evaluation of the Poisson bracket10. Time stepping algorithm is the third order explicit linear multistep method11.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
Since we are focusing in this work on how the modification (9), (10) influences nonlinearly saturated states, we fix the parameters to κ = 1, Dζ = 10−6, α = 1, and Pr = 1, and compare the results obtained using the MHW model with those computed from the OHW model. For these parameters the system is unstable for most wavenumbers. During a typical evolution, initial small amplitude perturbations grow linearly until the non- linear terms begin to dominate. Then the system arrives at a nonlinearly saturated state where the energy input Γn and output due to the resistivity Γα and the dissipations DE,W balance.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
Fig. 1. Stability diagram of the MHW model. Left panel shows the stability thresholds in Dζ − κ plane. The drift wave instability can be stabilized by strong dissipation. In the right panel, stability thresholds are plotted in kx − ky plane. For certain parameters, only some low wavenumber modes are unstable.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
Fig. 2. Dispersion relation of the dissipationless MHW model. α = 1, κ = 1.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
to retain resistive action on them. Subtraction of the zonal components from the resistive coupling term is necessary to permit the generation of zonal flows.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
Fig. 3. Contour plots of saturated electrostatic potentials for the modified and the original HW models. Zonally elongated structure is clearly visible for MHW case.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
The density flux in x direction Γn (transport across the magnetic field), together with the energy partition to the kinetic energy EK and the po- tential energy EP = 1/2 n2dx, is plotted in Fig. 5. We observe that once the zonal flow is generated in the MHW model, the transport level is significantly suppressed. The transport suppression is mostly because the saturated potential energy (or amplitude of saturated density fluctuation) is reduced. The potential energy and the turbulence kinetic energy are con- verted into the zonal kinetic energy. By contrast the energy of the OHW model is almost equi-partitioned between the kinetic and potential energy.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
Fig. 4. Time evolution of the kinetic energy, and its partition to the zonal and the non- zonal components. In the modified HW model, the zonal mode contains most of kinetic energy, while non-zonal turbulence contains most of the kinetic energy in the original HW model.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
Fig. 5. Time evolutions of the radial density transport and the kinetic and the potential energies for the modified and the original HW models. Once zonal flow is generated in MHW model, the turbulent fluctuation level and transport are significantly reduced.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
region. The y averaged spectrum Ex(ky) shows the strong peak at the zonal wave number kx ∼ 0.45.
Processed_Nonlinear_Simulation_of_Drift_Wave_Turbulence.txt
We have performed nonlinear simulations of the 2D HW model. As sug- gested recently8, the electron response parallel to the background magnetic field must be treated carefully in the 2D model. The model should be mod- ified to exclude the zonal (ky = 0) contribution from the resistive coupling term. By comparing the numerical results of the modified and the unmod- ified original HW models, we have revealed that a remarkable zonal flow structure in the nonlinearly saturated state is only observed in the modified model. Thus, the modification is crucial to the generation of the zonal flow in this model. Time evolutions of the macroscopic quantities, such as the energies and fluxes show that, after the zonal flow is built up by turbulent interaction, the generated zonal flow significantly suppresses the turbulent fluctuation level and the cross-field density transport.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Abstract—The emergence of New Data Sources (NDS) in healthcare is revolutionising traditional electronic health records in terms of data availability, storage, and access. Increasingly, clinicians are using NDS to build a virtual holistic image of a patients health condition. This research is focused on a review and analysis of the current legislation and privacy rules available for healthcare professionals. NDS in this project refers to and includes patient-generated health data, consumer device data, wearable health and fitness data, and data from social media.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
This project reviewed legal and regulatory requirements for New Zealand, Australia, the European Union, and the United States to establish the ground reality of existing mechanisms in place concerning the use of NDS. The outcome of our research is to recommend changes and enhancements required to better prepare for the ’tsunami’ of NDS and applications in the currently evolving data-driven healthcare area and precision or personalised health initiatives such as Precision Driven Health (PDH) in New Zealand.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
New Data Sources (NDS) include health and medical- related patient information from smart sensors, advanced de- vices, social media, and genetic data. Aggregation of NDS in an Electronic Health Record (EHR) might support and provide precise and tailored healthcare outcomes. Although, gathering of multiple data sources (including NDS) enables clinicians to access and view detailed patient information at the point-of- care for precise and informed decision making, it also raises serious privacy concerns, in particular when a patient might not be aware of who is accessing their health data. It is predicted that a patient’s electronic health records in the near future will have non-traditional health information (including NDS). An initiative looking in to the future of healthcare is Precision Driven Health (PDH)1 - a New Zealand healthcare research partnership investing in the future of data-driven healthcare.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
for collecting NDS data. Second, how to obtain consent for regulating access to this collected data. This is technically known as access control. For example, a patient might want to allow the General Practitioner (GP) access to the data, but could decide not to provide access to any other healthcare professionals. In both cases, the challenging part is to get and manage consent in a flexible, usable, and transparent manner. The main problem is that consent management for NDS is fragile in nature, i.e., a patient can withdraw his/her consent to provide access to the NDS at any time. This is different from giving consent for providing access to an EHR that might be necessary for diagnosing health issues. Unfortunately, current healthcare systems are not capable of integrating NDS for legal and a number of reasons including technical regulatory requirements, and usability aspects, where patients should be kept in the loop but without too much intervention. In [1], Powles and Hodson discuss the case of the data shar- ing agreement between DeepMind and the Royal Free London NHS Foundation Trust. They point out unlawful transfer of patient data to third parties. The UK law requires “explicit consent from a patient when identifiable data is passed to a third party, when the third party is not in a direct care relationship with the patient”. However, there was no process of obtaining patient consent or giving notices to patients whose data were used. There is also concern that the data being used is broader than the original stated purpose of developing an app for Acute Kidney Injury (AKI). There is also no justification for the breadth of data transfer and the length of data retention. The main issue is that DeepMind is not open for public audit and scrutiny but rather is self-maintained by Google. This case strongly advocates that there is a need to come up with a transparent framework for obtaining and managing consent, where patients are empowered to provide access to their health information and view who is using their health information.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Section IV, we discuss opportunities and challenges. Finally, we conclude the paper in Section V.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
This research reviews legal and regulatory requirements of countries that have an established electronic patient record in legislation and regulations in healthcare privacy, namely New Zealand (NZ), Australia (AU), the European Union (EU), and the United States (US). We identify the differences and similarities in legal requirements between these countries in terms of consent and healthcare privacy.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Rules 1-4: The purpose of collection must be speci- fied while collecting patient consent. Patients must be adequately informed about what information is being collected and the collection of information must be done in a lawful and fair manner.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Rule 5: covers security and storage of health informa- tion, where healthcare providers must ensure adequate protection against misuse, loss, and unauthorised access. • Rules 6-7: These rules state patient rights to request and gain access to their health information and enable them to request corrections.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Rule 8: It ensures that healthcare providers must ensure the information is up-to-date and relevant to the case. • Rule 9: It explains retention of healthcare information, where healthcare providers are required to retain infor- mation for a minimum of 10 years.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Rule 10: It requires the healthcare provider to only use the information for the purposes stated unless permitted by the patient, taken from a public source, or the infor- mation has been de-identified.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Rule 11: It limits healthcare providers from sharing infor- mation. It explains circumstances under which healthcare providers are allowed to disclose patient information, such as when patients are unable to exercise their rights or someone is acting on their behalf.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Rule 12: It governs the use of unique identifiers assigned to patients. These unique identifiers allow the patient to be anonymous.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
The regulations in Australia are unique, where each state has their own set of laws and regulations concerning pri- vacy [3]. We reviewed the New South Wales Health Records and Information Privacy Act 2002 (NSW HRIPA) [4] as it is the most recent legislation passed in Australia that relates to health information privacy. The basic HRIPA principles are similar to the NZ HPIC, which governs data collection, storage and security, data access and accuracy, limitation of use and data disclosure, and identifiers and anonymity.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
are processed. The purpose of the data collection must also be determined and further collection, if not specified in the original purpose, is not allowed. Under Article 2(h) of the DPD [5], consent is defined as “must be freely given, specific and informed”.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
HIPAA (Health Insurance Portability and Accountability Act) [6] governs with the US legislation for healthcare privacy by defining rules to ensure that personal health information that is stored by healthcare providers would not be disclosed or used in a way that would violate patient privacy. HIPAA covers all individually identifiable health information in any form or media and this is called Protected Health Information (ProHI) [6]. One of the central aspects of HIPAAs Privacy Act is minimum necessary disclosure and access for the intended purpose of the request. HIPAAs Privacy Act is one of the more extensive laws that cover different entities requiring policy, personnel, technical, administrative, and physical safeguards to prevent unintended or intended disclosure of data unless permitted or required. Individuals have general important rights under HIPAA, which include the right to request a copy of the ProHI that the covered entities hold, make amendments to the record, permit or deny use of their ProHI, and also an audit log of their ProHI disclosure. Individuals can also request to restrict use or disclosure of their ProHI for reasons of treatment, payment or healthcare; however, entities do not need a patients consent to share information when it is used for treatment, payment, or healthcare services.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Table I summarises healthcare legislation of countries in- clued in this study. It is important to highlight that none of the countries studied include a provision in legislation for NDS.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
The core security service that all EHR systems try to offer is Access Control for enabling access to only legitimate individu- als, controlled and determined by the patient. To enable access control in EHR databases, there are several proposals based on the Role-Based Access Control (RBAC) model, described in [7], [8]. RBAC models require a system administrator to create roles based on job functions and to assign those roles to individuals.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
One of the problems with RBAC is handling of a team in a multi-team environment, where roles might change and are more dynamic, as is the case in healthcare scenarios where different levels of access are required across a mul- tidisciplinary team. In Singapore, an implied consent model is implemented, giving any member of the health organisation unrestricted access to a patient’s medical data. Audit logs could deter unauthorised access but they are unavailable to the patient. With regards to consent revocation, Singapore assumes an implied consent model because “explicit consent is practically difficult, especially under emergency circum- stances” [9]. Although there is legislation that is supposed to assure the protection of personal data, authorised personnel are generalised, allowing access to one who is associated with a healthcare provider.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Rules 1-4 summarise purpose and source, informing indi- viduals of data use and how data is collected. Rules 10-12 limit the use and disclosure of health informa- tion to the stated purposes. Unique identifiers must be used to protect personal infor- mation. Rules 6-8 state the need to give patient rights to view EHR and correct if neces- sary, also data integrity and retention. Health data must be stored for 10 years Rules 5 and 11 cover dis- closure of confidential data to authorised individuals only and for consented purposes.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Health records can only be used for the purposes stated to the patient, any secondary use must be requested unless it is an emergency.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Disclosure of data is prohib- ited outside of consented pur- pose and authorised individ- ual.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Detailed information of how data is being used must be made available when identifi- able information is used. There are no specific rules bar- ring or requesting patient con- sent before sharing data, al- though the purpose for each collection must be stated ex- plicitly. Patients are given rights to view, erase, and correct their EHR data.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Patient has to specifically request to restrict EHR, but healthcare provider has no obligation to comply. No patient authorisation needed to share data if it is in regards to treatment. Patients are given the right to view and request for corrections but healthcare providers do not have to conform.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Access safeguards and breach no- tification specifications are ad- dressed. Audit logs must be stored for 6 years.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Other healthcare implementations, for example Summary Care Record (SCR) in the United Kingdom (UK), use a smart card based system. The card could only be used at terminals with card readers and by users with a valid login ID and password [10]. It is assumed a third party (i.e., Registration Authority) assigns roles to users and controls the keys that are assigned to the users [11].
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Smart card based solutions have been proposed in the literature. Neubauer and Heurix [12] proposed the use of microcontroller smart cards that can store user credentials, thus acting as a trusted platform. User data is encrypted in the database with the keys that are stored on the card.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
There are extensions of public key cryptography to ensure fine-grained access control, such as Key Policy Attribute- Based Encryption (KP-ABE) proposed by Goyal et al. [16], where encryption keys are distributed based on attributes assigned. Ciphertext Policy Attribute-Based Encryption (CP- ABE) [17] tries to improve on KP-ABE, reducing the need to trust the Trusted Authority (TA) to distribute the key correctly by attribute. CP-ABE embeds policies into the ciphertext to determine access. One of the problems that arises from KP- ABE and CP-ABE is a lack of support for attribute revocation, meaning there is no scalable solution to revoke revoked users from accessing the existing data.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Lee and Lee [13] also proposed a solution to use keys stored in the smart card, a patient-specific key, and also digital signatures to authenticate parties while maintaining the confidentiality of the data. Although such solutions manage cryptographic keys nicely, they do not consider problems such as losing the card or damage to the chip. These problems might make the database inaccessible unless there is an off the band backup of keys.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Hembroff and Muftic [14] used a system called SAMSON (Secure Access for Medical Smart Cards Over Networks) that uses smart cards and a combination of PIN and patient’s bio- metric fingerprint to access the EHR. It considers emergency features in which the patient is unable to give consent, by giving physicians a special privilege to “break the glass” and access the EHR. The main drawback of this approach is that it assumes a patients smart card is present and would serve as a base for the 3-factor authentication proposed.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Wu et al. [18] propose a private key generator, which in this case is a trusted third party i.e., a cloud infrastructure. The proposed idea uses symmetric key cryptography for providing fine-grained access control to specific data to a number of users. However, this framework does not consider consent revocation.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Zhang et al. [19] presented Consent Based Access Control (CBAC). To enable access to an EHR, a consent token will be sent to the server and then the data would be re-encrypted with a new key and sent to the requester. Consent tokens have a lifetime and can be revoked by sending a revocation notification, where the server would store it in a Consent Revocation List (CRL). However, the proposed system does not discuss which piece of data could be shared or how requesting parties could be authenticated.
Processed_A_Review_of_Privacy_and_Consent_Management_in_Heal.txt
Weitzel et al. [21] analysed the feasibility of using REST, OAuth, and OpenSocial to integrate social data into the EHR in the form of a gadget. The author considers the possibility of integrating a team-based environment as a social network de- fined using OpenSocial. A defined protocol using REST could use the gadget/dashboard to evaluate the patient condition and next treatment.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
We present Australia Telescope Compact Array observations towards 6 massive star formation regions which, from their strong 24 GHz continuum emission but no compact 8 GHz continuum emission, appeared good candidates for hyper-compact HII regions. However, the properties of the ionised gas derived from the 19 to 93 GHz continuum emission and H70α + H57α radio recombination line data show the major- ity of these sources are, in fact, regions of spatially-extended, optically-thin free-free emission. These extended sources were missed in the previous 8 GHz observations due to a combination of spatial-filtering, poor surface brightness sensitivity and primary beam attenuation.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
We consider the implications that a significant number of these extended HII regions may have been missed by previous surveys of massive star formation regions. If the original sample of 21 sources is representative of the population as a whole, the fact that 6 contain previously undetected extended free-free emission suggests a large number of regions have been mis-classified. Rather than being very young objects region formation, they are, in fact, associated with extended HII prior to UCHII regions and thus significantly older. In addition, inadvertently ignoring a potentially substantial flux contribution (up to ∼0.5Jy) from free-free emission has implications for dust masses derived from sub-mm flux densities. The large spatial scales probed by single-dish telescopes, which do not suffer from spatial filtering, are particularly susceptible and dust masses may be overestimated by up to a factor of ∼2.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
the gravitational potential, the HII region expands into ul- tra compact (UC), compact and finally diffuse HII regions. The spectral energy distribution (SED) at cm wavelengths falls into two distinct regimes with increasing frequency. As the free-free emission turns from optically thick to thin, the spectral index (Sν ∝ ν α, where Sν is the flux density at frequency ν) changes from α ∼ 2 to -0.1. The frequency at which the turnover occurs scales almost linearly with the electron density (Kurtz 2005) i.e., denser and presumably younger objects will exhibit the turn over at higher frequen- cies. At shorter wavelengths the SED quickly becomes dom- inated by thermal emission from dust in the surrounding natal cocoon, which has a spectral index, α ∼ 3 − 4.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
after WBHR98) to select objects in the relatively unex- plored southern sky with: (i) SED’s peaking in the far- infrared, (ii) sufficient luminosity to expect stars massive enough to ionise the surrounding material, (iii) no detectable cm free-free emission and (iv) class II methanol maser emission (Longmore et al. 2007a, hereafter L07). Class II methanol masers are generally found offset from cm contin- uum emission but always coincident with sub-mm cores (e.g. Walsh et al. 2003) which have sufficient luminosity to con- tain massive stars (WBHR98). These highly luminous cores with no detected cm emission are interpreted as massive star forming cores prior to the onset of UCHII formation. Subse- quent multi-wavelength studies have since derived the large- scale properties (mass, chemical composition, temperature etc.) of these star forming cores using the SEST, Mopra and ATCA telescopes (Hill et al. 2005; Purcell et al. 2006, 2009; Longmore et al. 2007b, 2008) and performed a census of the (proto-) stellar populations at infrared wavelengths (Longmore et al. 2006, 2007).
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
In L07 we selected 21 regions for further study, all of which contained methanol maser emission detected by WBHR98. Six of these regions were reported as containing continuum emission by the simultaneously-observed 8 GHz observations of WHBR98, while the remaining 15 were re- ported as devoid of 8 GHz continuum emission by their 8 GHz observations. Using this selection criteria, we hoped to identify 15 young regions prior to UCHII formation and 6 older regions, post-UCHII formation. However, contrary to expectation, twelve rather than six of these regions were detected in the 24 GHz continuum by L07: the six detected in the 8 GHz continuum by WBHR98 and six reported as devoid of 8 GHz continuum by WBHR98.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
In this work we are seeking to find the nature of the sources detected at 24 GHz by L07 but not at 8 GHz by WBHR98. If these cores are indeed at an earlier evolution- ary stage as originally thought, this emission could be free- free emission in the optically-thick regime between 8 and 24 GHz. In this case their 24 GHz flux should be ∼10 times brighter than at 8 GHz and may explain the 8 GHz non- detections. However, both L07 and WBHR98 observations were made using an interferometer with significantly dif- ferent array configurations and so probed the source struc- ture at different spatial frequencies and with different sur- face brightness sensitivities. The other possibility discussed in L07 is that these sources could instead be much older, spatially extended, optically thin HII regions which were resolved out/not-detected due to the extended array con- figuration used by WBHR98. Kurtz et al. (1999) found just such extended continuum emission surrounding 12 out of 15 UCHII regions they observed, with important consequences for interpreting the nature of these regions. If such a result was found for many of the L07 sources, and these were repre- sentative of the WBHR98 sample as a whole, this would have ramifications regarding their currently assumed age and evo- lutionary state. Not only would this imply the sources are significantly older than originally thought, but it may also affect attempts to derive dust masses at shorter wavelengths ignoring the contribution from the extended free-free emis- sion. In this paper we aim to uncover the nature of these sources through continuum and radio recombination line ob- servations from 19 to 93GHz.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
Table 1. Pointing centre from the methanol maser position, VLSR & IRAS name (from WBHR98) and the adopted distance (from Purcell et al. 2006) of the observed regions.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
The sources were selected from L07 as those with 24 GHz continuum detections but no corresponding 8 GHz detec- tions reported in WBHR98. Table 1 lists the pointing cen- tres from the methanol maser position, VLSR and kinematic distances (from Purcell et al. 2006) for each of the regions.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
The Australia Telescope Compact Array (ATCA) observa- tions were undertaken between 2006 and 2008 as part of ATCA projects C1287 and C1751. The observing setups (array and correlator settings, approximate sensitivities and beam sizes, continuum frequencies and RRL transitions) are listed in Table 2. In order to mitigate problems constructing SEDs of extended sources with different beam sizes, three array configurations were used (H75, H168 and H214, with maximum baselines of 75m, 168m and 214m, respectively) in an attempt to match the beams at the different observing frequencies. These configurations contain both north-south plus east-west baselines to allow for snapshot imaging. Each source was observed in multiple 15 minute cuts, with a close phase calibrator observed for 3 minutes before and after each cut. PKS 1253-055 and PKS 1921-293 were used as the bandpass calibrators. The ATCA standard PKS 1934- 634 was used as the primary calibrator for observations be- low 30 GHz and Uranus was used at higher frequencies. The data were reduced in the standard way using the MIRIAD (Sault et al. 1995) package. Bad visibilities were flagged and the gains/bandpass solutions from the appropriate calibra- tor were applied to the visibilities. A zeroeth order polyno- mial was fit to the line-free channels and subtracted from the visibilities to separate the line and continuum emission. These separate visibilities were then Fourier transformed to form image cubes. Due to variation in system temperatures between the antennae, individual visibilities were weighted by their system temperature. The images were cleaned and convolved with a Gaussian synthesised beam to produce a final restored image.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
RRL spectra were extracted for each source at the peak of the continuum emission, baseline subtracted and fit with a Gaussian profile using the gauss method in CLASS1. Ta- ble 4 lists the velocity-integrated flux, VLSR, FWHM, peak flux and their corresponding uncertainties for each of the detected transitions and array configurations.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
As shown in Figure 1 (top-left), L07 detected three sources in the region: two 24 GHz continuum sources (core 2 at ′′ the methanol maser position, and core 3 offset ∼30 south- west from the maser) and an ammonia filament extending east from core 2 and the methanol maser position. Despite the strong (>0.5 Jy) continuum towards core 2 at 24 GHz, WBHR98 only reported a single 8 GHz detection towards this region at the position of core 3. To investigate this apparent discrepancy between the L07 and WBHR98 ob- servations, we first re-examined the WBHR98 8 GHz data. With poor uv-coverage, phase stability and strong sidelobe emission, the image fidelity was not sufficient to rule out an 8 GHz detection at the position of core 2. However, the si- multaneously observed WBHR98 6.7 GHz continuum images have much better image fidelity and show a non-detection to 5 mJy at the position of core 2 and a 40 mJy detection at core 3 with a similar morphology to the 24 GHz detection. The apparent discrepancy in the measured flux density of core 2 between the lower-frequency, very extended array ob- servations of WBHR98 and the higher-frequency, compact observations of L07 therefore appears to be related to the nature of the source emission. Based on the new observa- tions, we investigate the nature of core 2 below.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
As shown in Figure 1, we confirm the strong 24 GHz contin- uum L07 detection of G316.81-0.06 core 2. At higher reso- lution the cm-continuum emission is resolved into two com- ponents separated by ∼10′′ north-south. At 93 GHz we find unresolved continuum emission at the centre of the two cm- continuum components.
Processed_Too_large_and_overlooked?_Extended_free-free_emiss.txt
the more extended H168 array configuration 35 GHz obser- vations resolve the north-south elongation into at least two components, these only make up a small fraction of the flux compared to that measured at the same frequency in the more compact H75 array configuration.