3,730 research outputs found

    Anharmonicity-induced phonon broadening in aluminum at high temperatures

    Get PDF
    Thermal phonon broadening in aluminum was studied by theoretical and experimental methods. Using second-order perturbation theory, phonon linewidths from the third-order anharmonicity were calculated from first-principles density-functional theory (DFT) with the supercell finite-displacement method. The importance of all three-phonon processes were assessed and individual phonon broadenings are presented. The good agreement between calculations and prior measurements of phonon linewidths at 300 K and new measurements of the phonon density of states to 750 K indicates that the third-order phonon-phonon interactions calculated from DFT can account for the lifetime broadenings of phonons in aluminum to at least 80% of its melting temperature

    Making Research FAIR With a PID-centric Workflow

    Get PDF
    Persistent identifiers (PIDs) are unique, machine-readable codes assigned to research entities that allow them to be easily discoverable. PIDs, along with their accompanying metadata, are crucial enablers of the FAIR principles (Findable, Accessible, Interoperable, and Reusable). PIDs ensure that digital objects can be located, accessed, and reused by humans and machines alike, while metadata provides essential information about research objects, including their origin, content, and format. In the research ecosystem, each stakeholder has a role to play in integrating PIDs into their workflows. Publishers, for example, can assign DOIs (Digital Object Identifiers) to articles, books, and other publications, making them easily findable and citable. Repositories can assign PIDs to datasets, making them discoverable and accessible. Researchers can use PIDs to link their data to their publications, ensuring that their data is discoverable and can be reused in future research. Despite the importance of PIDs and metadata, it's not always clear to researchers how to take advantage of the existing infrastructure and make their outputs FAIR. Being aware of the available PIDs, such as DOIs, ORCIDs, and RORs, and how they can be used to identify, connect, and cite various types of outputs and resources can help researchers plan and execute sensible data management, sharing, and publishing decisions that are efficient and beneficial in the long term. In the Implementing FAIR Workflows Project, DataCite works with a team of researchers at the Max Planck Institute for Empirical Aesthetics to follow along a neuroscience PhD project from the beginning, to design and plan for a series of workflows that put the FAIR principles into practice, so that they become an inherent part of the research process, instead of an afterthought.  The FAIR workflows researcher is undertaking in the project include data management planning, experiment preregistration, domain-specific metadata capturing and archiving, data and code sharing, preprinting, and open access publishing. We have also been tracking the time spent on various types of FAIR and Open activities, hoping to shed a light on the actual time commitment expected for a FAIRly conducted research project. We share our experience so far implementing these workflows with the Edinburgh Open Science community - the approach we used, the steps we’ve taken, and the outcomes and challenges that surfaced during the process. We are also preparing a guide for researchers to take on FAIR research workflows in their day-to-day work based on the lessons learned in the project, we look forward to taking the opportunity to hear from the community whether it resonates, and how can we format it in a way that’s most useful

    Stochastic differential inclusions

    Get PDF

    Classification of Graded Left-symmetric Algebra Structures on Witt and Virasoro Algebras

    Full text link
    We find that a compatible graded left-symmetric algebra structure on the Witt algebra induces an indecomposable module of the Witt algebra with 1-dimensional weight spaces by its left multiplication operators. From the classification of such modules of the Witt algebra, the compatible graded left-symmetric algebra structures on the Witt algebra are classified. All of them are simple and they include the examples given by Chapoton and Kupershmidt. Furthermore, we classify the central extensions of these graded left-symmetric algebras which give the compatible graded left-symmetric algebra structures on the Virasoro algebra. They coincide with the examples given by Kupershmidt.Comment: 22 page

    Functional Magnetic Resonance Imaging for Imaging Neural Activity in the Human Brain: The Annual Progress

    Get PDF
    Functional magnetic resonance imaging (fMRI) is recently developed and applied to measure the hemodynamic response related to neural activity. The fMRI can not only noninvasively record brain signals without risks of ionising radiation inherent in other scanning methods, such as CT or PET scans, but also record signal from all regions of the brain, unlike EEG/MEG which are biased towards the cortical surface. This paper introduces the fundamental principles and summarizes the research progress of the last year for imaging neural activity in the human brain. Aims of functional analysis of neural activity from fMRI include biological findings, functional connectivity, vision and hearing research, emotional research, neurosurgical planning, pain management, and many others. Besides formulations and basic processing methods, models and strategies of processing technology are introduced, including general linear model, nonlinear model, generative model, spatial pattern analysis, statistical analysis, correlation analysis, and multimodal combination. This paper provides readers the most recent representative contributions in the area

    Personal Privacy Protection Problems in the Digital Age

    Full text link
    With the development of Internet technology, the issue of privacy leakage has attracted more and more attention from the public. In our daily life, mobile phone applications and identity documents that we use may bring the risk of privacy leakage, which had increasingly aroused public concern. The path of privacy protection in the digital age remains to be explored. To explore the source of this risk and how it can be reduced, we conducted this study by using personal experience, collecting data and applying the theory.Comment: 9 pages, 3 figure
    corecore