1,831 research outputs found

    Currency substitution: a test of its importance

    Get PDF
    Money ; Monetary theory

    KIC 4247791: A SB4 system with two eclipsing binaries (2EBs)

    Full text link
    KIC 4247791 is an eclipsing binary observed by the Kepler satellite mission. We wish to determine the nature of its components and in particular the origin of a shallow dip in its Kepler light curve that previous investigations have been unable to explain in a unique way. We analyze newly obtained high-resolution spectra of the star using synthetic spectra based on atmosphere models, derive the radial velocities of the stellar components from cross-correlation with a synthetic template, and calculate the orbital solution. We use the JKTEBOP program to model the Kepler light curve of KIC 4247791. We find KIC 4247791 to be a SB4 star. The radial velocity variations of its four components can be explained by two separate eclipsing binaries. In contradiction to previous photometric findings, we show that the observed composite spectrum as well as the derived masses of all four of its components correspond to spectral type F. The observed small dip in the light curve is not caused by a transit-like phenomenon but by the eclipses of the second binary system. We find evidence that KIC 4247791 might belong to the very rare hierarchical SB4 systems with two eclipsing binaries.Comment: 6 pages, 8 figures, 2 table

    Function length as a tool for malware classification

    Full text link
    The proliferation of malware is a serious threat to computer and information systems throughout the world. Antimalware companies are continually challenged to identify and counter new malware as it is released into the wild. In attempts to speed up this identification and response, many researchers have examined ways to efficiently automate classification of malware as it appears in the environment. In this paper, we present a fast, simple and scalable method of classifying Trojans based only on the lengths of their functions. Our results indicate that function length may play a significant role in classifying malware, and, combined with other features, may result in a fast, inexpensive and scalable method of malware classification.<br /

    Spatial and temporal patterns of Pseudo-nitzschia genetic diversity in the North Pacific Ocean from the Continuous Plankton Recorder survey

    Get PDF
    Several species of the marine diatom Pseudo-nitzschia can produce the neurotoxin domoic acid that is responsible for the seafood-borne illness amnesic shellfish poisoning in humans, marine wildlife mortalities and prolonged closures of fisheries resulting in economic losses to coastal communities. Since the year 2000, Pseudo-nitzschia species have been monitored in the Pacific Ocean with the Continuous Plankton Recorder (CPR). We used a combination of scanning electron microscopy with high-throughput and Sanger sequencing of CPR survey samples to compare the diversity of phytoplankton, including Pseudo-nitzschia species, from the north-eastern Pacific Ocean over 3 climatically different years: 2002, 2005 and 2008. A Pseudo-nitzschia-specific primer set targeting a partial region of the large subunit ribosomal DNA (rDNA) revealed spatially separated communities of Pseudo-nitzschia. The coastal region was dominated by a diverse array of P. fraudulenta unique sequences (operational taxonomic units), whereas the offshore region was rich in P. multiseries and contained a wide range of other Pseudo-nitzschia taxa, many not previously observed in this region. In 2008, exceptionally cold sea surface temperatures were recorded, influenced by a strong negative Pacific Decadal Oscillation signal. In that year, a more diverse assemblage of species was present in a spring open water sample, whereas P. fraudulenta was unusually rare from a coastal autumn sample. This is the first application of high-throughput genetic methods to uncover patterns of Pseudo-nitzschia genetic diversity from archival CPR samples, demonstrating the value of using CPR for plankton community analysis in rarely sampled regions of the oceans

    Unusual magnetic-field dependence of partially frustrated triangular ordering in manganese tricyanomethanide

    Full text link
    Manganese tricyanomethanide, Mn[C(CN)3]2, consists of two interpenetrating three-dimensional rutile-like networks. In each network, the tridentate C(CN)3- anion gives rise to superexchange interactions between the Mn2+ ions (S=5/2) that can be mapped onto the "row model" for partially frustrated triangular magnets. We present heat capacity measurements that reveal a phase transition at T_N = 1.18K, indicative of magnetic ordering. The zero-field magnetically ordered structure was solved from neutron powder diffraction data taken between 0.04 and 1.2 K. It consists of an incommensurate spiral with a temperature independent propagation vector Q=(2Q 0 0)=(+/-0.622 0 0), where different signs relate to the two different networks. This corresponds to (+/-0.311 +/-0.311 0) in a quasi-hexagonal representation. The ordered moment mu=3.3mu_B is about 2/3 of the full Mn2+ moment. From the values of T_N and Q, the exchange parameters J/k = 0.15 K and J'/J = 0.749 are estimated. The magnetic-field dependence of the intensity of the Bragg reflection, measured for external fields H||Q, indicates the presence of three different magnetic phases. We associate them with the incommensurate spiral (H < 13.5 kOe), an intermediate phase (13.5 kOe 16 kOe) proposed for related compounds. For increasing fields, Q continuously approaches the value 1/3, corresponding to the commensurate magnetic structure of the fully frustrated triangular lattice. This value is reached at H_c = 19 kOe. At this point, the field-dependence reverses and Q adopts a value of 0.327 at 26 kOe, the highest field applied in the experiment. Except for H_c, the magnetic ordering is incommensurate in all three magnetic phases of Mn[C(CN)3]2.Comment: accepted for publication in J. Phys.: Condens. Matte
    • …
    corecore