599 research outputs found
The Exclusivity of Ultrafast Communication Networks
Efforts are being made to develop a new generation of communication networks,based on ultrafast optical communication. This is likely to result in a significant increase in thespeed and volume of information transfer on communication networks such as the Internet.However, the introduction of these new types of networks also requires more from its users. Becausethese new networks are more sophisticated, there are likely to be more costs involved and users haveto be more knowledgeable about the new technologies in order to be able to use them. Suchrequirements in both costs and knowledge may prevent groups of people from access to thenetworks. If larger groups of people are excluded from the networks, social polarization may result.Another effect of exclusive networks may be the limited number of providers of structure andcontent, which might lead to manipulation of the information provided. In this contribution, theeffects of exclusive ultrafast communication networks are discussed and some suggestions are madeon how to deal with this
Tapping and Data Retention in Ultrafast Communication Networks
In the fight against crime and terrorism, many governments are gatheringcommunication data in order to gain insight into methods and activities of suspects and potentialsuspects. Tapping, or wiretapping, has been used for a long time and nowadays most countries areextending this to data retention, i.e., large-scale storage of various kinds of data available oncommunications. At the same time, however, efforts are being made in the field of technology todevelop a new generation of communication networks, based on ultrafast optical and wirelesscommunication. This is likely to result in a significant increase in the speed and volume ofinformation transfer on communication networks such as the Internet. These increasing amounts ofinformation require increasing storage and analysis capacity, for which automated solutions arebeing developed. In this contribution, the way in which these technological developments influencethe possibilities of tapping and data retention is discussed and some suggestions are made on how todeal with this
Physics of Polymorphic Transitions in CeRuSn
We report a detailed study of the polymorphic transitions in ternary stannide
CeRuSn on high quality single crystals through a combination of X-ray
diffraction experiments conducted at 300, 275 and 120 K, and measurements of
the thermal expansion, magnetization, and resistivity, along main
crystallographic axes. In addition, the transition was followed as a function
of pressure up to 0.8 GPa. The present X-ray diffraction data show that the
room temperature polymorph consists of the lattice doubled along the c axis
with respect to the CeCoAl-type structure consistent with previous reports.
Upon cooling, the compound undergoes two successive transitions, first to a
quintuple (290 K) and than to a triple CeCoAl superstructure at 225 K. The
transitions are accompanied by a tremendous volume change due to a strong
shrinking of the lattice along the c axis, which is clearly observed in thermal
expansion. We advance arguments that the volume collapse originates from an
increasing number of crystallographically inequivalent Ce sites and the change
of ratio between the short and long Ce-Ru bonds. The observed properties of the
polymorphic transition in CeRuSn are reminiscent of the transition in
elementary Cerium, suggesting that similar physics, i.e., a Kondo influenced
transition and strong lattice vibrations might be the driving forces
When is giving an impulse? An ERP investigation of intuitive prosocial behavior
Human prosociality is often assumed to emerge from exerting reflective control over initial, selfish impulses. However, recent
findings suggest that prosocial actions can also stem from processes that are fast, automatic and intuitive. Here, we attempt
to clarify when prosocial behavior may be intuitive by examining prosociality as a form of reward seeking. Using
event-related potentials (ERPs), we explored whether a neural signature that rapidly encodes the motivational salience of
an event\u2014the P300\u2014can predict intuitive prosocial motivation. Participants allocated varying amounts of money between
themselves and charities they initially labelled as high- or low-empathy targets under conditions that promoted intuitive or
reflective decision making. Consistent with our predictions, P300 amplitude over centroparietal regions was greater when
giving involved high-empathy targets than low-empathy targets, but only when deciding under intuitive conditions.
Reflective conditions, alternatively, elicited an earlier frontocentral positivity related to response inhibition, regardless of
target. Our findings suggest that during prosocial decision making, larger P300 amplitude could (i) signal intuitive prosocial
motivation and (ii) predict subsequent engagement in prosocial behavior. This work offers novel insight into when prosociality
may be driven by intuitive processes and the roots of such behaviors
Kondo engineering : from single Kondo impurity to the Kondo lattice
In the first step, experiments on a single cerium or ytterbium Kondo impurity
reveal the importance of the Kondo temperature by comparison to other type of
couplings like the hyperfine interaction, the crystal field and the intersite
coupling. The extension to a lattice is discussed. Emphasis is given on the
fact that the occupation number of the trivalent configuration may be the
implicit key variable even for the Kondo lattice. Three phase
diagrams are discussed: CeRuSi, CeRhIn and SmS
Reassessing values for emerging big data technologies: integrating design-based and application-based approaches
Through the exponential growth in digital devices and computational capabilities, big data technologies are putting pressure upon the boundaries of what can or cannot be considered acceptable from an ethical perspective. Much of the literature on ethical issues related to big data and big data technologies focuses on separate values such as privacy, human dignity, justice or autonomy. More holistic approaches, allowing a more comprehensive view and better balancing of values, usually focus on either a design-based approach, in which it is tried to implement values into the design of new technologies, or an application-based approach, in which it is tried to address the ways in which new technologies are used. Some integrated approaches do exist, but typically are more general in nature. This offers a broad scope of application, but may not always be tailored to the specific nature of big data related ethical issues. In this paper we distil a comprehensive set of ethical values from existing design-based and application-based ethical approaches for new technologies and further focus these values to the context of emerging big data technologies. A total of four value lists (from techno-moral values, value-sensitive design, anticipatory emerging technology ethics and biomedical ethics) were selected for this. The integrated list consists of a total of ten values: human welfare, autonomy, non-maleficence, justice, accountability, trustworthiness, privacy, dignity, solidarity and environmental welfare. Together, this set of values provides a comprehensive and in-depth overview of the values that are to be taken into account for emerging big data technologies.Horizon 2020(H2020)No 731873 (e-SIDES)Article / Letter to editorInstituut voor Metajuridic
Reassessing values for emerging big data technologies: integrating design-based and application-based approaches
Through the exponential growth in digital devices and computational capabilities, big data technologies are putting pressure upon the boundaries of what can or cannot be considered acceptable from an ethical perspective. Much of the literature on ethical issues related to big data and big data technologies focuses on separate values such as privacy, human dignity, justice or autonomy. More holistic approaches, allowing a more comprehensive view and better balancing of values, usually focus on either a design-based approach, in which it is tried to implement values into the design of new technologies, or an application-based approach, in which it is tried to address the ways in which new technologies are used. Some integrated approaches do exist, but typically are more general in nature. This offers a broad scope of application, but may not always be tailored to the specific nature of big data related ethical issues. In this paper we distil a comprehensive set of ethical values from existing design-based and application-based ethical approaches for new technologies and further focus these values to the context of emerging big data technologies. A total of four value lists (from techno-moral values, value-sensitive design, anticipatory emerging technology ethics and biomedical ethics) were selected for this. The integrated list consists of a total of ten values: human welfare, autonomy, non-maleficence, justice, accountability, trustworthiness, privacy, dignity, solidarity and environmental welfare. Together, this set of values provides a comprehensive and in-depth overview of the values that are to be taken into account for emerging big data technologies.Horizon 2020(H2020)No 731873 (e-SIDES)Article / Letter to editorInstituut voor Metajuridic
Behavior of the Quantum Critical Point and the Fermi-liquid Domain in the Heavy Fermion Superconductor CeCoIn5 studied by resistivity
We report detailed very low temperature resistivity measurements on the heavy
fermion compounds Ce_{1-x}La_{x}CoIn5 (x=0 and x=0.01), with current applied in
two crystallographic directions [100] (basal plane) and [001] (perpendicular to
the basal plane) under magnetic field applied in the [001] or [011] direction.
We found a Fermi liquid (\rho \propto T^{2}) ground state, in all cases, for
fields above the superconducting upper critical field. We discuss the possible
location of a field induced quantum critical point with respect to Hc2(0), and
compare our measurements with the previous reports in order to give a clear
picture of the experimental status on this long debated issue.Comment: 17 pages, 7 figures accepted for publication in JPS
To observe or not to observe peers when learning physical examination skills; That is the question
Background: Learning physical examination skills is an essential element of medical education. Teaching strategies include practicing the skills either alone or in-group. It is unclear whether students benefit more from training these skills individually or in a group, as the latter allows them to observing their peers. The present study, conducted in a naturalistic setting, investigated the effects of peer observation on mastering psychomotor skills necessary for physical examination. Methods. The study included 185 2§ssup§nd§esup§-year medical students, participating in a regular head-to-toe physical examination learning activity. Students were assigned either to a single-student condition (n = 65), in which participants practiced alone with a patient instructor, or to a multiple-student condition (n = 120), in which participants practiced in triads under patient instructor supervision. The students subsequently carried out a complete examination that was videotaped and subsequently evaluated. Student's performance was used as a measure of learning. Results: Students in the multiple-student condition learned more than those who practiced alone (8
Realising the right to data portability for the domestic Internet of Things
There is an increasing role for the IT design community to play in regulation
of emerging IT. Article 25 of the EU General Data Protection Regulation (GDPR)
2016 puts this on a strict legal basis by establishing the need for information
privacy by design and default (PbD) for personal data-driven technologies.
Against this backdrop, we examine legal, commercial and technical perspectives
around the newly created legal right to data portability (RTDP) in GDPR. We are
motivated by a pressing need to address regulatory challenges stemming from the
Internet of Things (IoT). We need to find channels to support the protection of
these new legal rights for users in practice. In Part I we introduce the
internet of things and information PbD in more detail. We briefly consider
regulatory challenges posed by the IoT and the nature and practical challenges
surrounding the regulatory response of information privacy by design. In Part
II, we look in depth at the legal nature of the RTDP, determining what it
requires from IT designers in practice but also limitations on the right and
how it relates to IoT. In Part III we focus on technical approaches that can
support the realisation of the right. We consider the state of the art in data
management architectures, tools and platforms that can provide portability,
increased transparency and user control over the data flows. In Part IV, we
bring our perspectives together to reflect on the technical, legal and business
barriers and opportunities that will shape the implementation of the RTDP in
practice, and how the relationships may shape emerging IoT innovation and
business models. We finish with brief conclusions about the future for the RTDP
and PbD in the IoT
- …
