340 research outputs found

    Intensity of Brillouin light scattering from spin waves in magnetic multilayers with noncollinear spin configurations: Theory and experiment

    Full text link
    The scattering of photons from spin waves (Brillouin light scattering -- BLS) is a well-established technique for the study of layered magnetic systems. The information about the magnetic state and properties of the sample is contained in the frequency position, width, and intensity of the BLS peaks. Previously [Phys. Rev. B 67, 184404 (2003)], we have shown that spin wave frequencies can be conveniently calculated within the ultrathin film approach, treating the intralayer exchange as an effective bilinear interlayer coupling between thin virtual sheets of the ferromagnetic layers. Here we give the consequent extension of this approach to the calculation of the Brillouin light scattering (BLS) peak intensities. Given the very close relation of the BLS cross-section to the magneto-optic Kerr effect (MOKE), the depth-resolved longitudinal and polar MOKE coefficients calculated numerically via the usual magneto-optic formalism can be employed in combination with the spin wave precessional amplitudes to calculate full BLS spectra for a given magnetic system. This approach allows an easy calculation of BLS intensities even for noncollinear spin configurations including the exchange modes. The formalism is applied to a Fe/Cr/Fe/Ag/Fe trilayer system with one antiferromagnetically coupling spacer (Cr). Good agreement with the experimental spectra is found for a wide variety of spin configurations.Comment: 19 pages, 5 figure

    Deterministic soliton automata with at most one cycle

    Get PDF
    AbstractSoliton valves have been proposed as molecular switching elements. Their mathematical model is the soliton graph and the soliton automaton (Dassow and Jürgensen, J. Comput. System Sci.40 (1990), 154–181). In this paper we continue the study of the logic aspects of soliton switching. There are two cases of special importance: those of deterministic and those of strongly deterministic soliton automata. The former have deterministic state transitions in the usual sense of automaton theory. The latter do not only have deterministic state transitions, but also deterministic soliton paths—a much stronger property, as it turns out. In op cit. a characterization of indecomposable, strongly deterministic soliton automata was proved and it was shown that their transition monoids are primitive groups of permutations. Roughly speaking, the main difference between deterministic and strongly deterministic soliton automata is that in the former the underlying soliton graphs may contain cycles of odd lengths while such cycles are not permitted in the soliton graphs belonging to strongly deterministic soliton automata. In the present paper, we focus on a special class of deterministic soliton automata, that of deterministic soliton automata whose underlying graphs contain at most one cycle. For this class we derive structural descriptions. Our main results concern the elimination of certain types of loops, the treatment of soliton paths with repeated edges, the structure of cycles of odd length, and the transition monoid. As an application we show that the memory element proposed in the literature (Carter, in Bioelectronics, edited by Aizawa, Research and Development Report 50, CMC Press, Denver, CO, 1984) can be transformed in into a soliton tree, thus turning a deterministic device into a logically equivalent strongly deterministic device

    An approach to computing downward closures

    Full text link
    The downward closure of a word language is the set of all (not necessarily contiguous) subwords of its members. It is well-known that the downward closure of any language is regular. While the downward closure appears to be a powerful abstraction, algorithms for computing a finite automaton for the downward closure of a given language have been established only for few language classes. This work presents a simple general method for computing downward closures. For language classes that are closed under rational transductions, it is shown that the computation of downward closures can be reduced to checking a certain unboundedness property. This result is used to prove that downward closures are computable for (i) every language class with effectively semilinear Parikh images that are closed under rational transductions, (ii) matrix languages, and (iii) indexed languages (equivalently, languages accepted by higher-order pushdown automata of order 2).Comment: Full version of contribution to ICALP 2015. Comments welcom

    Effective Theories for Circuits and Automata

    Full text link
    Abstracting an effective theory from a complicated process is central to the study of complexity. Even when the underlying mechanisms are understood, or at least measurable, the presence of dissipation and irreversibility in biological, computational and social systems makes the problem harder. Here we demonstrate the construction of effective theories in the presence of both irreversibility and noise, in a dynamical model with underlying feedback. We use the Krohn-Rhodes theorem to show how the composition of underlying mechanisms can lead to innovations in the emergent effective theory. We show how dissipation and irreversibility fundamentally limit the lifetimes of these emergent structures, even though, on short timescales, the group properties may be enriched compared to their noiseless counterparts.Comment: 11 pages, 9 figure

    On Languages Accepted by P/T Systems Composed of joins

    Full text link
    Recently, some studies linked the computational power of abstract computing systems based on multiset rewriting to models of Petri nets and the computation power of these nets to their topology. In turn, the computational power of these abstract computing devices can be understood by just looking at their topology, that is, information flow. Here we continue this line of research introducing J languages and proving that they can be accepted by place/transition systems whose underlying net is composed only of joins. Moreover, we investigate how J languages relate to other families of formal languages. In particular, we show that every J language can be accepted by a log n space-bounded non-deterministic Turing machine with a one-way read-only input. We also show that every J language has a semilinear Parikh map and that J languages and context-free languages (CFLs) are incomparable

    Metabolite essentiality elucidates robustness of Escherichia coli metabolism

    Full text link
    Complex biological systems are very robust to genetic and environmental changes at all levels of organization. Many biological functions of Escherichia coli metabolism can be sustained against single-gene or even multiple-gene mutations by using redundant or alternative pathways. Thus, only a limited number of genes have been identified to be lethal to the cell. In this regard, the reaction-centric gene deletion study has a limitation in understanding the metabolic robustness. Here, we report the use of flux-sum, which is the summation of all incoming or outgoing fluxes around a particular metabolite under pseudo-steady state conditions, as a good conserved property for elucidating such robustness of E. coli from the metabolite point of view. The functional behavior, as well as the structural and evolutionary properties of metabolites essential to the cell survival, was investigated by means of a constraints-based flux analysis under perturbed conditions. The essential metabolites are capable of maintaining a steady flux-sum even against severe perturbation by actively redistributing the relevant fluxes. Disrupting the flux-sum maintenance was found to suppress cell growth. This approach of analyzing metabolite essentiality provides insight into cellular robustness and concomitant fragility, which can be used for several applications, including the development of new drugs for treating pathogens.Comment: Supplements available at http://stat.kaist.ac.kr/publication/2007/PJKim_pnas_supplement.pd

    Bounded Languages Meet Cellular Automata with Sparse Communication

    Full text link
    Cellular automata are one-dimensional arrays of interconnected interacting finite automata. We investigate one of the weakest classes, the real-time one-way cellular automata, and impose an additional restriction on their inter-cell communication by bounding the number of allowed uses of the links between cells. Moreover, we consider the devices as acceptors for bounded languages in order to explore the borderline at which non-trivial decidability problems of cellular automata classes become decidable. It is shown that even devices with drastically reduced communication, that is, each two neighboring cells may communicate only constantly often, accept bounded languages that are not semilinear. If the number of communications is at least logarithmic in the length of the input, several problems are undecidable. The same result is obtained for classes where the total number of communications during a computation is linearly bounded

    Acoustic localisation of wildlife with low-cost equipment: Lower sensitivity, but no loss of precision

    Get PDF
    Abstract Context Synchronised acoustic recorders can be used as a non-invasive tool to detect and localise sounds of interest, including vocal wildlife and anthropogenic sounds. Due to the high cost of commercial synchronised recorders, acoustic localisation has typically been restricted to small or well funded surveys. Recently, low-cost acoustic recorders have been developed, but until now their efficacy has not been compared with higher specification recorders. Aims The present study aimed to compare the efficacy of a newly developed low-cost recorder, the Conservation at Range through Audio Classification and Localisation (CARACAL), with an established, high-end recorder, the Wildlife Acoustics Song Meter (SM). Methods Four recorders of each type were deployed in a paired set-up across five nights in Wisconsin, USA. The recordings allowed for manual identification of domestic dog (Canis familiaris), grey wolf (Canis lupus), coyote (Canis latrans) and barred owl (Strix varia) calls, and then the ability of each recorder type to detect and localise the vocalising animals was compared. Key results The CARACALs were less sensitive, detecting only 47.5% of wolf, 55% of coyote, 65% of barred owl and 82.5% of dog vocalisations detected by the paired SMs. However, when the same vocalisations were detected on both recorders, localisation was comparable, with no significant difference in the precision or maximum detection ranges. Conclusions Low-cost recording equipment can be used effectively for acoustic localisation of both wild and domestic animals. However, the lower sensitivity of the CARACALs means that a denser network of these recorders would be needed to achieve the same efficacy as the SMs. Deploying a greater number of cheaper recorders increases the labour time in the field and the quantity of data to process and store. Thus, there is a trade-off between cost and time to be considered. Implications The ability to use low-cost recorders for acoustic localisation provides new avenues for tracking, managing and researching a wide range of wildlife species. Presently, CARACALs are more suited to monitoring species that have small home ranges and high amplitude vocalisations, and for when a large time investment for in situ equipment checks and data processing is feasible.Christine Stevens Wildlife Award from the Animal Welfare Institut

    Small Universal Accepting Networks of Evolutionary Processors with Filtered Connections

    Full text link
    In this paper, we present some results regarding the size complexity of Accepting Networks of Evolutionary Processors with Filtered Connections (ANEPFCs). We show that there are universal ANEPFCs of size 10, by devising a method for simulating 2-Tag Systems. This result significantly improves the known upper bound for the size of universal ANEPFCs which is 18. We also propose a new, computationally and descriptionally efficient simulation of nondeterministic Turing machines by ANEPFCs. More precisely, we describe (informally, due to space limitations) how ANEPFCs with 16 nodes can simulate in O(f(n)) time any nondeterministic Turing machine of time complexity f(n). Thus the known upper bound for the number of nodes in a network simulating an arbitrary Turing machine is decreased from 26 to 16
    corecore