315 research outputs found
Magnetic Vortex Core Dynamics in a Ferromagnetic Dot
We report direct imaging by means of x-ray photoemission electron microscopy
of the dynamics of magnetic vortices confined in micron-size circular Permalloy
dots that are 30 nm thick. The vortex core positions oscillate on a 10-ns
timescale in a self-induced magnetostatic potential well after the in-plane
magnetic field is turned off. The measured oscillation frequencies as a
function of the aspect ratio (thickness/radius) of the dots are in agreement
with theoretical calculations presented for the same geometry.Comment: 18 pages including 4 figure
Fundamental Parameters of He-Weak and He-Strong Stars
We carried out low resolution spectroscopic observations in the wavelength
range 3400-4700 A of 20 He-weak and 8 He-strong stars to determine their
fundamental parameters by means of the Divan-Chalonge-Barbier (BCD)
spectrophotometric system. For a few He-weak stars we also estimate the
effective temperatures and the angular diameters by integrating absolute fluxes
observed over a wide spectral range. Non-LTE model calculations are carried out
to study the influence of the He/H abundance ratio on the emergent radiation of
He-strong stars and on their Teff determination. We find that the effective
temperatures, surface gravities and bolometric absolute magnitudes of He-weak
stars estimated with the BCD system and the integrated flux method are in good
agreement between each other, and they also agree with previous determinations
based on several different methods. The mean discrepancy between the visual
absolute magnitudes derived using the Hipparcos parallaxes and the BCD values
is on average 0.3 mag for He-weak stars, while it is 0.5 mag for He-strong
stars. For He-strong stars, we note that the BCD calibration, based on stars in
the solar environment, leads to overestimated values of Teff. By means of model
atmosphere calculations with enhanced He/H abundance ratios we show that larger
He/H ratios produce smaller BD which naturally explains the Teff
overestimation. We take advantage of these calculations to introduce a method
to estimate the He/H abundance ratio in He-strong stars. The BD of HD 37479
suggests that the Teff of this star remains fairly constant as the star
spectrum undergoes changes in the intensity of H and He absorption lines. Data
for the He-strong star HD 66765 are reported for the first time.Comment: Accepted for publication in A&
Global prevalence of autism and other pervasive developmental disorders
We provide a systematic review of epidemiological surveys of autistic disorder and pervasive developmental disorders (PDDs) worldwide. A secondary aim was to consider the possible impact of geographic, cultural/ethnic, and socioeconomic factors on prevalence estimates and on clinical presentation of PDD. Based on the evidence reviewed, the median of prevalence estimates of autism spectrum disorders was 62/10 000. While existing estimates are variable, the evidence reviewed does not support differences in PDD prevalence by geographic region nor of a strong impact of ethnic/cultural or socioeconomic factors. However, power to detect such effects is seriously limited in existing data sets, particularly in low-income countries. While it is clear that prevalence estimates have increased over time and these vary in different neighboring and distant regions, these findings most likely represent broadening of the diagnostic concets, diagnostic switching from other developmental disabilities to PDD, service availability, and awareness of autistic spectrum disorders in both the lay and professional public. The lack of evidence from the majority of the world's population suggests a critical need for further research and capacity building in low- and middle-income countries
‘It Takes Two Hands to Clap’: How Gaddi Shepherds in the Indian Himalayas Negotiate Access to Grazing
This article examines the effects of state intervention on the workings of informal institutions that coordinate the communal use and management of natural resources. Specifically it focuses on the case of the nomadic Gaddi
shepherds and official attempts to regulate their access to grazing pastures in the Indian Himalayas. It is often predicted that the increased presence of the modern state critically undermines locally appropriate and community-based resource management arrangements. Drawing on the work of Pauline Peters and Francis Cleaver, I identify key instances of socially embedded ‘common’ management institutions and explain the evolution of these arrangements
through dynamic interactions between individuals, communities and the agents of the state. Through describing the ‘living space’ of Gaddi shepherds across the annual cycle of nomadic migration with their flocks I explore the
ways in which they have been able to creatively reinterpret external interventions, and suggest how contemporary arrangements for accessing pasture at different moments of the annual cycle involve complex combinations of the
formal and the informal, the ‘traditional’ and the ‘modern’
Load Balance: Energy Efficient Routing Protocol in Wireless Sensor Network
Energy consumption is one of the major issue in Wireless Sensor Network (WSN) which reduces the lifetime of the network. In this developed work an Cluster based Energy Efficient Routing Protocol (CBEERP) , which is gathering the sensor hubs in the system into clusters, in this manner it productively decreased the flooding traffic during discover the routing. The proposed CBEERP will balance the Energy in the Group by using some second order nodes. The reinforcement High effective hubs replace the cluster head after the cluster reaches to its threshold energy level. This CBEERP will help the effectiveness and lifetime of the system
Incursion Recognition Mechanism Based on Secure Network System
Internet based computing dissimilar services such as server storage and applications are shared on the internet. This makes cloud computing one of the most promising and rapidly growing technologies. As it relies on sharing computer resources, it is prone to various security risks. Individual such security issue is Distributed Denial of Services attack on cloud. A DDos assault can begin from anyplace in the system and normally overpowers the casualty server by sending countless. This paper deals with the prevention of DDos attacks and how honey pot approach can be used in cloud computing to counter DDos attacks
- …
