1,271 research outputs found
Dealing with natural language interfaces in a geolocation context
In the geolocation field where high-level programs and low-level devices
coexist, it is often difficult to find a friendly user inter- face to configure
all the parameters. The challenge addressed in this paper is to propose
intuitive and simple, thus natural lan- guage interfaces to interact with
low-level devices. Such inter- faces contain natural language processing and
fuzzy represen- tations of words that facilitate the elicitation of
business-level objectives in our context
Nitrogen transfer between clover and wheat in an intercropping experiment
A novel approach to the problem of improving nitrogen supply in organic farming is to use intercropping of cereals with a legume to provide nitrogen transfer within a season and/or to following crops. The affects of intercropping were studied in a column experiment using mixtures of winter wheat (Triticum aestivum cv. Claire), with white clover (w.c.) (Trifolium repens cv. Barblanca) and with red clover (r.c.) (Trifolium pratense cv. Britta). The effects of cutting and removal above ground clover material with and without additional soil disturbance were compared to leaving clover plants in situ and intercropped with wheat in a split root design. Wheat and clover plants, as monocultures, were used for the controls. 15N ammonium nitrate solution was applied. The wheat seeds were sown into the column without nitrogen. We found that the cutting treatment produced the highest yield of wheat. Available ammonium-N in the soil was greatest in the clover control treatment for the column with only red clover roots and in the cutting+soil disturbance treatment for the column with only white clover roots. Available nitrate-N was greatest in the soil disturbance treatment in the column with clover and wheat roots for both red and white clover. The cutting treatment produced the highest yield of wheat
Multipartite entanglement verification resistant against dishonest parties
Future quantum information networks will likely consist of quantum and
classical agents, who have the ability to communicate in a variety of ways with
trusted and untrusted parties and securely delegate computational tasks to
untrusted large-scale quantum computing servers. Multipartite quantum
entanglement is a fundamental resource for such a network and hence it is
imperative to study the possibility of verifying a multipartite entanglement
source in a way that is efficient and provides strong guarantees even in the
presence of multiple dishonest parties. In this work, we show how an agent of a
quantum network can perform a distributed verification of a multipartite
entangled source with minimal resources, which is, nevertheless, resistant
against any number of dishonest parties. Moreover, we provide a tight tradeoff
between the level of security and the distance between the state produced by
the source and the ideal maximally entangled state. Last, by adding the
resource of a trusted common random source, we can further provide security
guarantees for all honest parties in the quantum network simultaneously.Comment: The statement of Theorem 2 has been revised and a new proof is given.
Other results unchange
Library and information resources and users of digital resources in the humanities
Purpose – The purpose of this article is to discuss the results of the Log Analysis of Internet Resources in the Arts and Humanities (LAIRAH) study. It aims to concentrate upon the use and importance of information resources, physical research centres and digital finding aids in scholarly research. Design/methodology/approach – Results are presented of web server log analysis of portals for humanities scholars: the arts and humanities data service (AHDS) website and Humbul Humanities Hub. These are used to determine which resources were accessed most often, or seldom. Questionnaire data about perceptions of digital resource use were also gathered. Findings – Information resources such as libraries, archives museums and research centres, and the web pages that provide information about them are vital for humanities scholars. The university library website was considered to be the most important resource, even compared to Google. Secondary finding aids and reference resources are considered more important than primary research resources, especially those produced by other scholars, whose output is less trusted than publications produced by commercial organisations, libraries, archives and museums. Practical implications – Digital resources have not replaced physical information resources and the people who staff them, thus both types of information continue to require funding. Scholars trust the judgment of information professionals, who therefore need to be trained to evaluate and recommend specialist digital research resources. Originality/value – LAIRAH was the first research project to use quantitative data to investigate resource use. Findings about the type of resources used are based on evidence rather than opinions alone. This gives a clearer picture of usage that may be used to plan future information services
PVD Coatings’ Strength Properties at Various Temperatures by Nanoindentations and FEM Calculations Determined
Nanoindentation is usually applied on thin films at ambient temperatures for hardness determination. Recently, instruments for conducting nanoindentation at elevated temperatures have been developed facilitating measurements up to 700 oC. Both indenter and specimen, if necessary, are heated in an inert atmosphere to avoid film oxidations. In the described investigations, nanoindentations were conducted on cemented carbides and high speed steel specimens, coated with various films, up to 400 oC. The obtained results were subjected to statistical analysis to estimate their reliability. Moreover, the results were evaluated by appropriate FEM (Finite Element Method) algorithms for determining the coatings’ elasticity modulus, yield and rupture stress as well as hardness at various temperatures. The results reveal a non-linear temperature dependence of the coating properties
Extracting GHZ states from linear cluster states
Quantum information processing architectures typically only allow for nearest-neighbor entanglement creation. In many cases, this prevents the direct generation of GHZ states, which are commonly used for many communication and computation tasks. Here, we show how to obtain GHZ states between nodes in a network that are connected in a straight line, naturally allowing them to initially share linear cluster states. We prove a strict upper bound of ⌊(n+3)/2⌋ on the size of the set of nodes sharing a GHZ state that can be obtained from a linear cluster state of n qubits, using local Clifford unitaries, local Pauli measurements, and classical communication. Furthermore, we completely characterize all selections of nodes below this threshold that can share a GHZ state obtained within this setting. Finally, we demonstrate these transformations on the IBMQ Montreal quantum device for linear cluster states of up to n=19 qubits
Profiles and trajectories of mental health service utilisation during early intervention in psychosis
Background: Early intervention in psychosis services (EIS) support individuals experiencing a first episode of psychosis. Support required will vary in response to the remittance and reoccurrence of symptoms, including relapses. Characterising individuals who will need more intensive support can inform care planning. This study explores service utilisation profiles and their trajectories of service use in a sample of individuals referred to EIS. Method: We analysed service utilisation during the 3 years following referral to EIS (n = 2363) in West London between 2011 and 2020. Mental health service utilisation data were submitted to model-based clustering. Latent growth models were then estimated for identified profiles. Profiles were compared regarding clinical and demographic characteristics and onward pathways of care. Results: Analyses revealed 5 profiles of individuals attending EIS based on their service utilisation over 3 years. 55.5% of the sample were members of a low utilisation and less clinically severe profile. The distinct service use patterns of these profiles were associated with Health of the Nations Outcome Scale scores at treatment initiation (at total, subscale, and individual item level), along with age and gender. These patterns of use were also associated with onward care and ethnicity. Conclusions: Profiles and trajectories of service utilisation call for development of integrated care pathways and use of more personalised interventions. Services should consider patient symptoms and characteristics when making clinical decisions informing the provision of care. The profiles represent typical patterns of service use, and identifying factors associated with these subgroups might help optimise EIS support
Recommended from our members
Harnessing the Neural Stem Cell Secretome for Regenerative Neuroimmunology.
Increasing evidence foresees the secretome of neural stem cells (NSCs) to confer superimposable beneficial properties as exogenous NSC transplants in experimental treatments of traumas and diseases of the central nervous system (CNS). Naturally produced secretome biologics include membrane-free signaling molecules and extracellular membrane vesicles (EVs) capable of regulating broad functional responses. The development of high-throughput screening pipelines for the identification and validation of NSC secretome targets is still in early development. Encouraging results from pre-clinical animal models of disease have highlighted secretome-based (acellular) therapeutics as providing significant improvements in biochemical and behavioral measurements. Most of these responses are being hypothesized to be the result of modulating and promoting the restoration of key inflammatory and regenerative programs in the CNS. Here, we will review the most recent findings regarding the identification of NSC-secreted factors capable of modulating the immune response to promote the regeneration of the CNS in animal models of CNS trauma and inflammatory disease and discuss the increased interest to refine the pro-regenerative features of the NSC secretome into a clinically available therapy in the emerging field of Regenerative Neuroimmunology
Recommended from our members
Young adults' perceptions of using wearables, social media and other technologies to detect worsening mental health: A qualitative study
BACKGROUND: Technological interventions may help support and improve mental health. However young peoples' perspectives on using different technologies to detect deteriorating mental health in those already diagnosed with a mental health condition is lacking. The study aim was to explore the perspectives of young patients on the feasibility and acceptability of using wearables, social media and technologies to detect mental health deterioration. METHODS: The study was co-produced with young adults with past mental health difficulties. Semi-structured interviews were conducted with young adults with a severe mental health condition in a private room at a community mental health site. Data was triangulated by comparing codes and ideas across the two co-researchers and two researchers over two virtual meetings. Themes were finalised and presented in a thematic map. RESULTS: Sixteen participants were interviewed (81% female). There were four main themes: dealing with mental health symptoms, signs of mental health deterioration, technology concerns and technological applications to identify worsening mental health. Wearables and mobile apps were considered acceptable and feasible to detect mental health deterioration in real-time if they could measure changes in sleep patterns, mood or activity levels as signs of deterioration. Getting help earlier was deemed essential particularly in reference to dissatisfaction with the current non-technological mental health services. However, patients identified issues to consider before implementation including practicality, safeguarding and patient preference. CONCLUSION: Wearables and mobile apps could be viable technological options to help detect deterioration in young people in order to intervene early and avoid delay in accessing mental health services. However, immediate action following detection is required for the patient to trust and use the intervention
- …