2,001,089 research outputs found
Recommended from our members
The pupillary response of cephalopods
This paper provides the first detailed description of the time courses of light-evoked pupillary constriction for two species of cephalopods, Sepia officinalis (a cuttlefish) and Eledone cirrhosa (an octopus). The responses are much faster than hitherto reported, full contraction in Sepia taking less than 1 s, indicating it is among the most rapid pupillary responses in the animal kingdom. We also describe the dependence of the degree of pupil constriction on the level of ambient illumination and show considerable variability between animals. Furthermore, both Sepia and Eledone lack a consensual light-evoked pupil response. Pupil dilation following darkness in Sepia is shown to be very variable, often occurring within a second but at other times taking considerably longer. This may be the result of extensive light-independent variations in pupil diameter in low levels of illumination
Theory of size-dependent resonance Raman intensities in InP nanocrystals
The resonance Raman spectrum of InP nanocrystals is characterized by features ascribable to both longitudinal (LO) and transverse (TO) optical modes. The intensity ratio of these modes exhibits a strong size dependence. To calculate the size dependence of the LO and TO Raman cross sections, we combine existing models of Raman scattering, the size dependence of electronic and vibrational structure, and electron vibration coupling in solids. For nanocrystals with a radius >10 Ã…, both the LO and TO coupling strengths increase with increasing radius. This, together with an experimentally observed increase in the electronic dephasing rate with decreasing size, allows us to account for the observed ratio of LO/TO Raman intensities
On the theory of complex rays
The article surveys the application of complex-ray theory to the scalar Helmholtz equation in two dimensions.
The first objective is to motivate a framework within which complex rays may be used to make predictions about wavefields in a wide variety of geometrical configurations. A crucial ingredient in this framework is the role played by Sp{} in determining the regions of existence of complex rays. The identification of the Stokes surfaces emerges as a key step in the approximation procedure, and this leads to the consideration of the many characterizations of Stokes surfaces, including the adaptation and application of recent developments in exponential asymptotics to the complex Wentzel--Kramers--Brilbuin expansion of these wavefields
Mutants and SU(3)_q invariants
Details of quantum knot invariant calculations using a specific
SU(3)_q-module are given which distinguish the Conway and Kinoshita-Teresaka
pair of mutant knots. Features of Kuperberg's skein-theoretic techniques for
SU(3)_q invariants in the context of mutant knots are also discussed.Comment: 17 pages. Published copy, also available at
http://www.maths.warwick.ac.uk/gt/GTMon1/paper18.abs.htm
Computer program for thermal analysis of shadow shields in a vacuum
Computer program determines temperature profiles and heat transfer rates for shadow shielded cryogenic tank. Tank, shields, and thermal radiation heat source are all axisymmetric. Thermal analysis considers varying shield and tank temperatures, surface properties, and geometric arrangements. Similar heat source properties are also considered
Apparatus for aiding a pilot in avoiding a midair collision between aircraft
An apparatus for aiding a pilot in avoiding a midair collision between aircraft is described. A protected aircraft carries a transmitter, a transponder, a receiver, and a data processor; and an intruding cooperating aircraft carries a transponder. The transmitter of the protected aircraft continuously transmits a signal to the transponders of all intruding aircraft. The transponder of each of the intruding aircraft adds the altitude of the intruding aircraft to the signal and transmits it back to the receiver of the protected aircraft. The receiver selects only the signal from the most hazardous intruding aircraft and applies it to the data processor. From this selected signal the data processor determines the closing velocity between the protected and intruding aircraft, the range between the two aircraft, their altitude difference and the time to a possible collision
Surface enhancement of oxygen exchange and diffusion in the ionic conductor La2Mo2O9
Isotopic surface oxygen exchange and its subsequent diffusion have been measured using secondary ion mass spectrometry in the fast ionic conductor La2Mo2O9. A silver coating was applied to the sample surface to enhance the surface exchange process for dry oxygen. Contrary to previous studies performed using a wet atmosphere, no grain boundary diffusion tail was observed under these optimized dry exchange conditions. The activation energy for oxygen diffusion was found to be 0.66(+/- 0.09) eV at high temperature (>570 degrees C), and 1.25(+/- 0.01)eV at low temperature (<570 degrees C). Time-of-Flight secondary ion mass spectrometry was employed to investigate the correlation between the silver coating and the O-18 concentration on the sample surface. A close correlation between the presence of silver and oxygen incorporation on the surface was observed. (C) 2010 Elsevier B.V. All rights reserved
Quantifying Shannon's Work Function for Cryptanalytic Attacks
Attacks on cryptographic systems are limited by the available computational
resources. A theoretical understanding of these resource limitations is needed
to evaluate the security of cryptographic primitives and procedures. This study
uses an Attacker versus Environment game formalism based on computability logic
to quantify Shannon's work function and evaluate resource use in cryptanalysis.
A simple cost function is defined which allows to quantify a wide range of
theoretical and real computational resources. With this approach the use of
custom hardware, e.g., FPGA boards, in cryptanalysis can be analyzed. Applied
to real cryptanalytic problems, it raises, for instance, the expectation that
the computer time needed to break some simple 90 bit strong cryptographic
primitives might theoretically be less than two years.Comment: 19 page
An effective method to read out large scintillator areas with precise timing
Using scintillator tile technology several square meters of plastic
scintillator are read out by only two photomultiplier with a time precision of
about 1.5 nsec.
Two examples are discussed to build a detector based on this technology to
search for cosmic muons and neutrinos.Comment: 8 pages, 9 figures. Contributed to Workshop on Scintillating Fiber
Detectors (SCIFI97), Notre Dame, IN, 2-6 Nov 199
- …