1,470 research outputs found

    Optimized Confinement of Fermions in Two Dimensions

    Full text link
    One of the challenging features of studying model Hamiltonians with cold atoms in optical lattices is the presence of spatial inhomogeneities induced by the confining potential, which results in the coexistence of different phases. This paper presents Quantum Monte Carlo results comparing meth- ods for confining fermions in two dimensions, including conventional diagonal confinement (DC), a recently proposed 'off-diagonal confinement' (ODC), as well as a trap which produces uniform den- sity in the lattice. At constant entropy and for currently accessible temperatures, we show that the current DC method results in the strongest magnetic signature, primarily because of its judicious use of entropy sinks at the lattice edge. For d-wave pairing, we show that a constant density trap has the more robust signal and that ODC can implement a constant density profile. This feature is important to any prospective search for superconductivity in optical lattices

    Isentropic Curves at Magnetic Phase Transitions

    Full text link
    Experiments on cold atom systems in which a lattice potential is ramped up on a confined cloud have raised intriguing questions about how the temperature varies along isentropic curves, and how these curves intersect features in the phase diagram. In this paper, we study the isentropic curves of two models of magnetic phase transitions- the classical Blume-Capel Model (BCM) and the Fermi Hubbard Model (FHM). Both Mean Field Theory (MFT) and Monte Carlo (MC) methods are used. The isentropic curves of the BCM generally run parallel to the phase boundary in the Ising regime of low vacancy density, but intersect the phase boundary when the magnetic transition is mainly driven by a proliferation of vacancies. Adiabatic heating occurs in moving away from the phase boundary. The isentropes of the half-filled FHM have a relatively simple structure, running parallel to the temperature axis in the paramagnetic phase, and then curving upwards as the antiferromagnetic transition occurs. However, in the doped case, where two magnetic phase boundaries are crossed, the isentrope topology is considerably more complex

    A direct path to dependable software

    Get PDF
    What would it take to make software more dependable? Until now, most approaches have been indirect: some practices – processes, tools or techniques – are used that are believed to yield dependable software, and the argument for dependability rests on the extent to which the developers have adhered to them. This article argues instead that developers should produce direct evidence that the software satisfies its dependability claims. The potential advantages of this approach are greater credibility (since the argument is not contingent on the effectiveness of the practices) and reduced cost (since development resources can be focused where they have the most impact)

    Affordances, constraints and information flows as ‘leverage points’ in design for sustainable behaviour

    Get PDF
    Copyright @ 2012 Social Science Electronic PublishingTwo of Donella Meadows' 'leverage points' for intervening in systems (1999) seem particularly pertinent to design for sustainable behaviour, in the sense that designers may have the scope to implement them in (re-)designing everyday products and services. The 'rules of the system' -- interpreted here to refer to affordances and constraints -- and the structure of information flows both offer a range of opportunities for design interventions to in fluence behaviour change, and in this paper, some of the implications and possibilities are discussed with reference to parallel concepts from within design, HCI and relevant areas of psychology

    Prospects for radical emissions reduction through behaviour and lifestyle change

    Get PDF
    Over the past two decades, scholars and practitioners across the social sciences, in policy and beyond have proposed, trialled and developed a wide range of theoretical and practical approaches designed to bring about changes in behaviours and lifestyles that contribute to climate change. With the exception of the establishment of a small number of iconic behaviours such as recycling, it has however proved extremely difficult to bring about meaningful transformations in personal greenhouse gas emissions at either the individual or societal level, with multiple reviews now pointing to the limited efficacy of current approaches. We argue that the majority of approaches designed to achieve mitigation have been constrained by the need to operate within prevailing social scientific, economic and political orthodoxies which have precluded the possibility of non-marginal change. In this paper we ask what a truly radical approach to reducing personal emissions would look like from social science perspectives which challenge the unstated assumptions severely limiting action to date, and which explore new alternatives for change. We emphasise the difficulties likely to impede the instituting of genuinely radical societal change regarding climate change mitigation, whilst proposing ways that the ground could be prepared for such a transformation to take place

    Device-independent quantum key distribution secure against collective attacks

    Full text link
    Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual QKD, it does not rely on any assumptions about the internal working of the quantum devices used in the protocol. We present here in detail the security proof for a DIQKD protocol introduced in [Phys. Rev. Lett. 98, 230501 (2008)]. This proof exploits the full structure of quantum theory (as opposed to other proofs that exploit the no-signalling principle only), but only holds again collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically at each round of the protocol (although she can act coherently on her systems at any time). The security of any DIQKD protocol necessarily relies on the violation of a Bell inequality. We discuss the issue of loopholes in Bell experiments in this context.Comment: 25 pages, 3 figure

    A comparative study of Tam3 and Ac transposition in transgenic tobacco and petunia plants

    Get PDF
    Transposition of the Anthirrinum majus Tam3 element and the Zea mays Ac element has been monitored in petunia and tobacco plants. Plant vectors were constructed with the transposable elements cloned into the leader sequence of a marker gene. Agrobacterium tumefaciens-mediated leaf disc transformation was used to introduce the transposable element constructs into plant cells. In transgenic plants, excision of the transposable element restores gene expression and results in a clearly distinguishable phenotype. Based on restored expression of the hygromycin phosphotransferase II (HPTII) gene, we established that Tam3 excises in 30% of the transformed petunia plants and in 60% of the transformed tobacco plants. Ac excises from the HPTII gene with comparable frequencies (30%) in both plant species. When the β-glucuronidase (GUS) gene was used to detect transposition of Tam3, a significantly lower excision frequency (13%) was found in both plant species. It could be shown that deletion of parts of the transposable elements Tam3 and Ac, removing either one of the terminal inverted repeats (TIR) or part of the presumptive transposase coding region, abolished the excision from the marker genes. This demonstrates that excision of the transposable element Tam3 in heterologous plant species, as documented for the autonomous element Ac, also depends on both properties. Southern blot hybridization shows the expected excision pattern and the reintegration of Tam3 and Ac elements into the genome of tobacco plants.

    Post-COVID-19 assessment in a specialist clinical service: a 12-month, single-centre, prospective study in 1325 individuals

    Get PDF
    INTRODUCTION: Post-COVID-19 complications require simultaneous characterisation and management to plan policy and health system responses. We describe the 12-month experience of the first UK dedicated post-COVID-19 clinical service to include hospitalised and non-hospitalised patients. METHODS: In a single-centre, observational analysis, we report the demographics, symptoms, comorbidities, investigations, treatments, functional recovery, specialist referral and rehabilitation of 1325 individuals assessed at the University College London Hospitals post-COVID-19 service between April 2020 and April 2021, comparing by referral route: posthospitalised (PH), non-hospitalised (NH) and post emergency department (PED). Symptoms associated with poor recovery or inability to return to work full time were assessed using multivariable logistic regression. RESULTS: 1325 individuals were assessed (PH: 547, 41.3%; PED: 212, 16%; NH: 566, 42.7%). Compared with the PH and PED groups, the NH group were younger (median 44.6 (35.6-52.8) years vs 58.3 (47.0-67.7) years and 48.5 (39.4-55.7) years), more likely to be female (68.2%, 43.0% and 59.9%), less likely to be of ethnic minority (30.9%, 52.7% and 41.0%) or seen later after symptom onset (median (IQR): 194 (118-298) days, 69 (51-111) days and 76 (55-128) days; all p<0.0001). All groups had similar rates of onward specialist referral (NH 18.7%, PH 16.1% and PED 18.9%, p=0.452) and were more likely to require support for breathlessness (23.7%, 5.5% and 15.1%, p<0.001) and fatigue (17.8%, 4.8% and 8.0%, p<0.001). Hospitalised patients had higher rates of pulmonary emboli, persistent lung interstitial abnormalities and other organ impairment. 716 (54.0%) individuals reported <75% optimal health (median 70%, IQR 55%-85%). Less than half of employed individuals could return to work full time at first assessment. CONCLUSION: Post-COVID-19 symptoms were significant in PH and NH patients, with significant ongoing healthcare needs and utilisation. Trials of interventions and patient-centred pathways for diagnostic and treatment approaches are urgently required

    Tumor-derived exosomes confer antigen-specific immunosuppression in a murine delayed-type hypersensitivity model

    Get PDF
    Exosomes are endosome-derived small membrane vesicles that are secreted by most cell types including tumor cells. Tumor-derived exosomes usually contain tumor antigens and have been used as a source of tumor antigens to stimulate anti-tumor immune responses. However, many reports also suggest that tumor-derived exosomes can facilitate tumor immune evasion through different mechanisms, most of which are antigen-independent. In the present study we used a mouse model of delayed-type hypersensitivity (DTH) and demonstrated that local administration of tumor-derived exosomes carrying the model antigen chicken ovalbumin (OVA) resulted in the suppression of DTH response in an antigen-specific manner. Analysis of exosome trafficking demonstrated that following local injection, tumor-derived exosomes were internalized by CD11c+ cells and transported to the draining LN. Exosome-mediated DTH suppression is associated with increased mRNA levels of TGF-β1 and IL-4 in the draining LN. The tumor-derived exosomes examined were also found to inhibit DC maturation. Taken together, our results suggest a role for tumor-derived exosomes in inducing tumor antigen-specific immunosuppression, possibly by modulating the function of APCs. © 2011 Yang et al
    corecore