SKIRT: An advanced dust radiative transfer code with a user-friendly architecture
نویسندگان
چکیده
منابع مشابه
2-Dust: A Dust Radiative Transfer Code for an Axisymmetric System
We have developed a general purpose dust radiative transfer code for an axisymmetric system, 2-Dust, motivated by the recent increasing availability of high-resolution images of circumstellar dust shells at various wavelengths. This code solves the equation of radiative transfer following the principle of long characteristic in a 2-D polar grid while considering a 3-D radiation field at each gr...
متن کاملEfficient radiative transfer in dust grain mixtures
The influence of a dust grain mixture consisting of spherical dust grains with different radii and/or chemical composition on the resulting temperature structure and spectral energy distribution of a circumstellar shell is investigated. The comparison with the results based on an approximation of dust grain parameters representing the mean optical properties of the corresponding dust grain mixt...
متن کاملRadiative Transfer Modelling of Dust Devils
Copyright and Moral Rights for the articles on this site are retained by the individual authors and/or other copyright owners. For more information on Open Research Online's data policy on reuse of materials please consult the policies page. This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of t...
متن کاملDust Extinction and Emission in a Clumpy Galactic Disk An Application of the Radiative Transfer Code TRADING
Aims. I present the Monte Carlo radiative transfer code TRADING (Transfer of RAdiation through Dust In Galaxies). The code computes self-consistently the extinction of radiation in a dusty medium (including absorption and scattering) and the dust emission. Methods. A binary-tree adaptive grid is used for the description of the dust distribution. Dust radiation is computed at thermal equilibrium...
متن کاملUser-Friendly Grid Security Architecture and Protocols
We examine security protocols for the Grid Security Infrastructure (GSI) version 2 and identify a weakness of poor scalability as a result of GSI’s authentication framework requiring heavy interactions between a user-side client machine and resource suppliers. We improve the GSI architecture and protocols by proposing an alternative authentication framework for GSI, which uses dynamic public/pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Astronomy and Computing
سال: 2015
ISSN: 2213-1337
DOI: 10.1016/j.ascom.2014.10.004