367 research outputs found
Dipolar spin-misalignment correlations in inhomogeneous magnets: comparison between neutron scattering and micromagnetic approaches
In inhomogeneous bulk ferromagnets, the dominating sources of spin disorder
are related to spatial variations of (i) the magnitude of the local saturation
magnetization and of (ii) the magnitude and/or direction of the magnetic
anisotropy field. For the particular example of a porous ferromagnet, where the
magnetization inhomogeneity is at maximum, we demonstrate, by means of
experimental neutron scattering data and micromagnetic simulations, the
anisotropic character of magnetization fluctuations induced by the dipolar
interaction
Modeling of foundation slabs of buildings on complex foundations
The paper considers the problem of calculating the strength of foundation slabs under seismic and wind loads. As an example, a numerical model of a hotel building to be built on bulk islands is presented. The calculation of the foundation slab model is performed using the STARK ES software package. The results of the calculation are analyzed and recommendations for strengthening the foundation are given
Comment on "Origin of Surface Canting within Nanoparticles"
We comment on the Letter "Origin of surface canting within
nanoparticles" by K.L. Krycka et al. [Phys. Rev.
Lett. , 147203 (2014)]
Inhomogeneous creep equation for viscoelastic materials
The paper consider an inhomogeneous creep equation arising from a generalized Voigt model containing a Riemann-Liouville fractional derivative of the order 0 < β < 1. The Laplace transform is used for the numerical solution. The obtained solutions are compared with experimental data of polymer concrete samples. On the basis of this comparison the conclusion about the adequacy of the numerical solution method is made, and estimates of the model parameters are given
Critical Information Infrastructures Security Modeling
The paper discusses the modeling of various aspects of the security of critical information infrastructures (CII) in the assumption of creating a reference model of CII security in the future. The features of CII in terms of goals and safety criteria based on the analysis of various regulatory and methodically established definitions and descriptions of CII are established. The contradictions arising in the attempts to use the traditional methodology of information security in relation to CII are shown. The problems of using the methods and models of classical risk analysis are discussed, in particular, the impossibility of applying the concept of residual risk to the formation of CII safety objectives. The conclusion is made about the expediency of basing these goals on the exhaustion of possible protective measures (controls and activities), the concept of asymptotic safety management of CII , which guarantees the trend of security growth without its current assessment. Changes in the role and place of the threat model in ensuring the security of CII related to the lack of evidence of the completeness of this model are considered. The attractiveness of using the SDL technique for forming elements of the threat model in the conditions of a specific CII is indicated. The structure of the future reference model of safety of the CII including definition of the purposes and criteria of safety (including functional), multilevel static model of functioning of the CII (including security factors), a dynamic model of the spread of security incidents within the CII, the typology of the result of aggressive manifestations of the CII functioning environment (threat model) and the model (methodology) of the spread of protective activities within the information infrastructure
- …