705 research outputs found
The Resonating-Valence-Bond Ground State of Li Nanoclusters
We have performed Diffusion Quantum Monte Carlo simulations of Li clusters
showing that Resonating-Valence-Bond (RVB) pairing correlations between
electrons provide a substantial contribution to the cohesive energy. The RVB
effects are identified in terms of electron transfers from s- to p-like
character, constituting a possible explanation for the breakdown of the Fermi
liquid picture observed in recent high resolution Compton scattering
experiments for bulk Li.Comment: 4 pages, 2 figures, 3 table
Monitoring early stage lung disease in cystic fibrosis
PURPOSE OF REVIEW: Early stage lung disease has long been synonymous with infancy and childhood. As diagnosis happens earlier and conventional management improves, we are seeing larger proportions of people with cystic fibrosis (CF) in adolescence and even adulthood with well preserved lung health. The availability of highly effective cystic fibrosis transmembrane conductance regulator modulator drugs for a large proportion of the CF population will impact even further. Transitioning into adult care with 'normal' lung function will become more common. However, it is crucial that we are not blasé about this phase, which sets the scene for future lung health. It is well recognized that lung function assessed by spirometry is insensitive to 'early' changes occurring in the distal, small airways. Much of our learning has come from studies in infants and young children, which have allowed assessment and optimization of alternative forms of monitoring. RECENT FINDINGS: Here, as a group of paediatric and adult CF specialists, we review the evidence base for sensitive physiological testing based on multibreath washout, lung imaging, exercise and activity monitoring, assessment of infection and quality of life measures. SUMMARY: We seek to emphasise the importance of further work in these areas, as outcome measures become widely applicable to a growing CF population
In Things We Trust? Towards trustability in the Internet of Things
This essay discusses the main privacy, security and trustability issues with
the Internet of Things
Electron correlations, spontaneous magnetization and momentum density in quantum dots
The magnetization of quantum dots is discussed in terms of a relatively
simple but exactly solvable model Hamiltonian. The model predicts oscillations
in spin polarization as a function of dot radius for a fixed electron density.
These oscillations in magnetization are shown to yield distinct signature in
the momentum density of the electron gas, suggesting the usefulness of momentum
resolved spectroscopies for investigating the magnetization of dot systems. We
also present variational quantum Monte Carlo calculations on a square dot
containing 12 electrons in order to gain insight into correlation effects on
the interactions between like and unlike spins in a quantum dot.Comment: 6 pages, 4 figure
Recommended from our members
"The dearest of our possessions": applying Floridi's information privacy concept in models of information behavior and information literacy
This conceptual paper argues for the value of an approach to privacy in the digital information environment informed by Luciano Floridi's philosophy of information and information ethics. This approach involves achieving informational privacy, through the features of anonymity and obscurity, through an optimal balance of ontological frictions. This approach may be used to modify models for information behavior and for information literacy, giving them a fuller and more effective coverage of privacy issues in the infosphere. For information behavior, the Information Seeking and Communication Model, and the Information Grounds conception, are most appropriate for this purpose. For information literacy, the metaliteracy model, using a modification a privacy literacy framework, is most suitable
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse
Privacy is a concept with real life ties and implications. Privacy infringement has the potential to lead to serious consequences for the stakeholders involved, hence researchers and organisations have developed various privacy enhancing techniques and tools. However, there is no solution that fits all, and there are instances where privacy solutions could be misused, for example to hide nefarious activities. Therefore, it is important to provide suitable measures and to make necessary design tradeoffs in order to avoid such misuse. This short paper aims to make a case for the need of careful consideration when designing a privacy solution, such that the design effectively addresses the user requirements while at the same time minimises the risk of inadvertently assisting potential offenders. In other words, this paper strives to promote “sensible privacy” design, which deals with the complex challenges in balancing privacy, usability and accountability. We illustrate this idea through a case study involving the design of privacy solutions for domestic violence survivors. This is the main contribution of the paper. The case study presents specific user requirements and operating conditions, which coupled with the attacker model, provide a complex yet interesting scenario to explore. One example of our solutions is described in detail to demonstrate the feasibility of our approach
Big data, method and the ethics of location : a case study of a hookup app for men who have sex with men
With the rise of geo-social media, location is emerging as a particularly sensitive data point for big data and digital media research. To explore this area, we reflect on our ethics for a study in which we analyze data generated via an app that facilitates public sex among men who have sex with men. The ethical sensitivities around location are further heightened in the context of research into such digital sexual cultures. Public sexual cultures involving men who have sex with men operate both in spaces “meant” for public sex (e.g., gay saunas and dark rooms) and spaces “not meant” for public sex (e.g., shopping centers and public toilets). The app in question facilitates this activity. We developed a web scraper that carefully collected selected data from the app and that data were then analyzed to help identify ethical issues. We used a mixture of content analysis using Python scripts, geovisualisation software and manual qualitative coding techniques. Our findings, which are methodological rather than theoretical in nature, center on the ethics associated with generating, processing, presenting, archiving and deleting big data in a context where harassment, imprisonment, physical harm and even death occur. We find a tension in normal standards of ethical conduct where humans are involved in research. We found that location came to the fore as a key - though not the only - actor requiring attention when considering ethics in a big data context
A qualitative study of stakeholders' perspectives on the social network service environment
Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information. There are, however, ethical issues due to the monitoring-and-surveillance, data mining and autonomous nature of software agents. Considering the context, this study aims to comprehend stakeholders' perspectives on the social network service environment in order to identify the main considerations for the design of software agents in social network services in the near future. Twenty-one stakeholders, belonging to three key stakeholder groups, were recruited using a purposive sampling strategy for unstandardised semi-structured e-mail interviews. The interview data were analysed using a qualitative content analysis method. It was possible to identify three main considerations for the design of software agents in social network services, which were classified into the following categories: comprehensive understanding of users' perception of privacy, user type recognition algorithms for software agent development and existing software agents enhancement
Recent advances in the application of stable isotope ratio analysis in forensic chemistry
This review paper updates the previous literature in relation to the continued and developing use of stable isotope ratio analysis in samples which are relevant to forensic science. Recent advances in the analysis of drug samples, explosive materials, and samples derived from human and animal samples are discussed. The paper also aims to put the use of isotope ratio mass spectrometry into a forensic context and discuss its evidential potential
Distilling Privacy Requirements for Mobile Applications
As mobile computing applications have become commonplace, it is increasingly important for them to address end-users’ privacy requirements. Privacy requirements depend on a number of contextual socio-cultural factors to which mobility adds another level of contextual variation. However, traditional requirements elicitation methods do not sufficiently account for contextual factors and therefore cannot be used effectively to represent and analyse the privacy requirements of mobile end users. On the other hand, methods that do investigate contextual factors tend to produce data that does not lend itself to the process of requirements extraction. To address this problem we have developed a Privacy Requirements Distillation approach that employs a problem analysis framework to extract and refine privacy requirements for mobile applications from raw data gathered through empirical studies involving end users. Our approach introduces privacy facets that capture patterns of privacy concerns which are matched against the raw data. We demonstrate and evaluate our approach using qualitative data from an empirical study of a mobile social networking application
- …