PADDLEFISH BUCCAL FLOW VELOCITY DURING RAM SUSPENSION FEEDING AND RAM VENTILATION
نویسندگان
چکیده
منابع مشابه
Paddlefish Buccal Flow Velocity during Ram Suspension Feeding and Ram Ventilation
A micro-thermistor probe was inserted into the buccal cavity of freely swimming paddlefish to measure flow velocity during ram ventilation, ram suspension feeding and prey processing. Swimming speed was measured from videotapes recorded simultaneously with the buccal flow velocity measurements. Both swimming velocity and buccal flow velocity were significantly higher during suspension feeding t...
متن کاملThe Motility of Ram and Bull Spermatozoa in Dilute Suspension
1. Ram and bull spermatozoa suspended in a glucose-sodium chloride solution rapidly lose motility at relatively high dilutions. The substitution of chloride-free diluents does not alter the phenomenon. 2. The rapid immobilization of ram and bull spermatozoa due to high dilution may be partially prevented by the addition of supernatants of either ram or bull semen, although motility is not maint...
متن کاملPhysical modeling of vortical cross-step flow in the American paddlefish, Polyodon spathula
Vortical cross-step filtration in suspension-feeding fish has been reported recently as a novel mechanism, distinct from other biological and industrial filtration processes. Although crossflow passing over backward-facing steps generates vortices that can suspend, concentrate, and transport particles, the morphological factors affecting this vortical flow have not been identified previously. I...
متن کاملAnonymous RAM
We define the concept of and present provably secure constructions for Anonymous RAM (AnonRAM), a novel multi-user storage primitive that offers strong privacy and integrity guarantees. AnonRAM combines privacy features of anonymous communication and oblivious RAM (ORAM) schemes, allowing it to protect, simultaneously, the privacy of content, access patterns and user’s identity, from curious se...
متن کاملEfficient RAM and control flow in verifiable outsourced computation
Recent work on proof-based verifiable computation has resulted in built systems that employ tools from complexity theory and cryptography to address a basic problem in systems security: allowing a local computer to outsource the execution of a program while providing the local computer with a guarantee of integrity and the remote computer with a guarantee of privacy. However, support for progra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Experimental Biology
سال: 1994
ISSN: 1477-9145,0022-0949
DOI: 10.1242/jeb.186.1.145