3,259 research outputs found
Age and growth of spiny dogfish (Squalus acanthias) in the Gulf of Alaska: analysis of alternative growth models
Ten growth models were fitted to age and growth data for spiny dogfish (Squalus acanthias) in the Gulf of Alaska. Previous studies of spiny dogfish growth have all fitted
the t0 formulation of the von Bertalanffy model without examination of alternative models. Among the alternatives, we present a new two-phase von Bertalanffy growth model
formulation with a logistically scaled k parameter and which estimates L0. A total of 1602 dogfish were aged
from opportunistic collections with longline, rod and reel, set net, and trawling gear in the eastern and central
Gulf of Alaska between 2004 and 2007. Ages were estimated from the median band count of three independent readings of the second dorsal spine plus the estimated number of worn bands for worn spines. Owing to a lack of small dogfish in the samples, lengths at age of small individuals were back-calculated from a subsample of 153 dogfish with unworn spines. The von Bertalanffy, two-parameter von Bertalanffy, two-phase von Bertalanffy, Gompertz, two-parameter Gompertz, and logistic models were fitted to length-at-age data for each sex separately, both with and without back-calculated lengths at age. The two-phase von Bertalanffy growth model produced the statistically best fit for both sexes of Gulf of Alaska spiny dogfish, resulting in L∞ = 87.2 and 102.5 cm and k= 0.106 and 0.058 for males and females, respectively
Existence and Vanishing of the Breathing Mode in Strongly Correlated Finite Systems
One of the fundamental eigenmodes of finite interacting systems is the mode
of {\em uniform radial expansion and contraction} -- the ``breathing'' mode
(BM). Here we show in a general way that this mode exists only under special
conditions: i) for harmonically trapped systems with interaction potentials of
the form or , or ii) for
some systems with special symmetry such as single shell systems forming
platonic bodies. Deviations from the BM are demonstrated for two examples:
clusters interacting with a Lennard-Jones potential and parabolically trapped
systems with Yukawa repulsion. We also show that vanishing of the BM leads to
the occurence of multiple monopole oscillations which is of importance for
experiments
Moving embedded lattice solitons
It was recently proved that isolated unstable "embedded lattice solitons"
(ELS) may exist in discrete systems. The discovery of these ELS gives rise to
relevant questions such as the following: are there continuous families of
ELS?, can ELS be stable?, is it possible for ELS to move along the lattice?,
how do ELS interact?. The present work addresses these questions by showing
that a novel differential-difference equation (a discrete version of a complex
mKdV equation) has a two-parameter continuous family of exact ELS. The
numerical tests reveal that these solitons are stable and robust enough to
withstand collisions. The model may apply to the description of a Bose-Einstein
condensate with dipole-dipole interactions between the atoms, trapped in a deep
optical-lattice potential.Comment: 13 pages, 11 figure
A statistical model approximation for perovskite solid-solutions: a Raman study of lead-zirconate-titanate single crystal
Lead titanate (PbTiO3) is a classical example of a ferroelectric perovskite
oxide illustrating a displacive phase transition accompanied by a softening of
a symmetry-breaking mode. The underlying assumption justifying the soft-mode
theory is that the crystal is macroscopically sufficiently uniform so that a
meaningful free energy function can be formed. In contrast to PbTiO3,
experimental studies show that the phase transition behaviour of
lead-zirconate-titanate solid solution (PZT) is far more subtle. Most of the
studies on the PZT system have been dedicated to ceramic or powder samples, in
which case an unambiguous soft-mode study is not possible, as modes with
different symmetries appear together. Our Raman scattering study on
titanium-rich PZT single crystal shows that the phase transitions in PZT cannot
be described by a simple soft-mode theory. In strong contrast to PbTiO3,
splitting of transverse E-symmetry modes reveals that there are different
locally-ordered regions. The role of crystal defects, random distribution of Ti
and Zr at the B-cation site and Pb ions shifted away from their ideal
positions, dictates the phase transition mechanism. A statistical model
explaining the observed peak splitting and phase transformation to a complex
state with spatially varying local order in the vicinity of the morphotropic
phase boundary is given.Comment: Article contains four black-and-white figures, one colour figure and
one Table. Symmetry analysis and details of the model are given in Appendices
I and II, respectivel
Magnetic and orbital order in overdoped bilayer manganites
The magnetic and orbital orders for the bilayer manganites in the doping
region have been investigated from a model that incorporates the
two orbitals at each Mn site, the inter-orbital Coulomb interaction and
lattice distortions. The usual double exchange operates via the orbitals.
It is shown that such a model reproduces much of the phase diagram recently
obtained for the bilayer systems in this range of doping. The C-type phase with
() spin order seen by Ling et al. appears as a natural consequence
of the layered geometry and is stabilised by the static distortions of the
system. The orbital order is shown to drive the magnetic order while the
anisotropic hopping across the orbitals, layered nature of the underlying
structure and associated static distortions largely determine the orbital
arrangements.Comment: 8 pages, 5 figure
Information Security as Strategic (In)effectivity
Security of information flow is commonly understood as preventing any
information leakage, regardless of how grave or harmless consequences the
leakage can have. In this work, we suggest that information security is not a
goal in itself, but rather a means of preventing potential attackers from
compromising the correct behavior of the system. To formalize this, we first
show how two information flows can be compared by looking at the adversary's
ability to harm the system. Then, we propose that the information flow in a
system is effectively information-secure if it does not allow for more harm
than its idealized variant based on the classical notion of noninterference
A Feasiblility Study of Axial Injection Method for the CYRIC 680-Cyclotron
開始ページ、終了ページ: 冊子体のページ付
- …