56 research outputs found

    Shear induced rigidity in athermal materials: a unified statistical framework

    Full text link
    Recent studies of athermal systems such as dry grains and dense, non-Brownian suspensions have shown that shear can lead to solidification through the process of shear jamming in grains and discontinuous shear thickening in suspensions. The similarities observed between these two distinct phenomena suggest that the physical processes leading to shear-induced rigidity in athermal materials are universal. We present a non-equilibrium statistical mechanics model, which exhibits the phenomenology of these shear-driven transitions: shear jamming and discontinuous shear thickening in different regions of the predicted phase diagram. Our analysis identifies the crucial physical processes underlying shear-driven rigidity transitions, and clarifies the distinct roles played by shearing forces and the density of grains.Comment: Comments welcom

    Design of conditions for emergence of self-replicators

    Full text link
    A self-replicator is usually understood to be an object of definite form that promotes the conversion of materials in its environment into a nearly identical copy of itself. The challenge of engineering novel, micro- or nano-scale self-replicators has attracted keen interest in recent years, both because exponential amplification is an attractive method for generating high yields of specific products, and also because self-reproducing entities have the potential to be optimized or adapted through rounds of iterative selection. Substantial steps forward have been achieved both in the engineering of particular self-replicating molecules, and also in characterizing the physical basis for possible mechanisms of self-replication. At present, however, there is need for a theoretical treatment of what physical conditions are most conducive to the emergence of novel self-replicating structures from a reservoir of building blocks on a desired time-scale. Here we report progress in addressing this need. By analyzing the dynamics of a generic class of heterogeneous particle mixtures whose reaction rates emerge from basic physical interactions, we demonstrate that the spontaneous discovery of self-replication is controlled by relatively generic features of the chemical space, namely: the dispersion in the distribution of reaction timescales and bound-state energies. Based on this analysis, we provide quantitative criteria that may aid experimentalists in designing a system capable of producing self-replicators, and in estimating the likely timescale for exponential growth to start.Comment: Supplementary Information is under the Ancillary Files ---

    New Perspectives on Implementing Health Information Technology

    Get PDF
    The importance of studying challenges in implementing information technology solutions in health care organizations is highlighted by the huge investments in health care information technology (HIT) which has been spurred by recent government mandates. Information technology can help improve health care delivery cost by facilitating the standardization of work processes or routines and reducing variations among them. Set in a premier 950+ bed hospital in the south eastern part of US, this dissertation consists of two studies examining the challenges involved in implementing HIT solutions. In the first study, we seek to gain deep insights into how the process of creating a patient’s chart evolves over time in a health care institution. The second study focuses on the users of Electronic Health Records (EHR) system, investigating the compliance behavior of various providers with respect to patient records in the system. In the first study, through the lens of Activity theory our results show that the charting routine is implicated by the following environmental factors: (1) Tools, (2) Rules, (3) Community, and (4) Roles, and by individual factors: (5) Computer Self-Efficacy and (6) Risk Propensity. In the second study, our results indicate that there is a substantial effect of subculture of the different occupational groups on IT security compliance intent and behavior in a health care institution

    THE DYNAMICS OF INFORMATION SECURITY POLICY ADOPTION

    Get PDF
    We argue that most organizations fail to internalize information security policies (ISPs) and only ceremonially adopt them because the adoption decision is generally driven by external legitimization purposes rather than efficiency gains. Based on the data collected from semi structured interviews of senior executives, our preliminary findings reveal that ISPs are not integrated to the existing organizational routines until there is an external jolt such as a security breach. However, given the sudden nature of these jolts, ISPs do not gain internal legitimacy. We propose that after the implementation and before the internalization of ISPs, organizations need to actively integrate ISPs into their existing routines, with the aim of internal legitimization in the eyes of the organizational members

    Coarsening of topological defects in 2D polar active matter

    Full text link
    We numerically study the coarsening of topological defects in 2D polar active matter and make several interesting observations and predictions. (i) The long time state is characterized by nonzero density of defects, in stark contrast to theoretical expectations. (ii) The kinetics of defect coarsening shows power law decay to steady state, as opposed to exponential decay in thermal equilibrium. (iii) Observations (i) and (ii) together suggest emergent screening of topological charges due to activity. (iv) Nontrivial defect coarsening in the active model leads to nontrivial steady state patterns. We investigate, characterize, and validate these patterns and discuss their biological significance.Comment: Movies are available in the ancillary folde

    Patient Generated Health Data: Framework for Decision Making

    Get PDF
    Patient information is a major part of healthcare decision making. Although currently scattered due to multiple sources and diverse formats, decision making can be improved if the patient information is readily available in a unified manner. Mobile technologies can improve decision making by integrating patient information from multiple sources. This study explores how patient generated health data (PGHD) from multiple sources can lead to improved healthcare decision making. A semi-systematic review is conducted to analyze research articles for transparency, clarity, and complete reporting. We conceptualize the data generated by healthcare professional as primarily from EHR/EMR and the data generated by patient as primarily from mobile apps and wearables. Eight themes led to the development of Convergence Model for Patient Data (CMPD). A framework was developed to illustrate several scenarios, to identify quality and timeliness requirements in mobile healthcare environment, and to provide necessary decision support

    Using Secondary Data to Tell a New Story: A Cautionary Tale in Health Information Technology Research

    Get PDF
    Through the growth of big data and open data, new opportunities have presented themselves for information systems (IS) researchers who want to investigate phenomena they cannot easily study using primary data. As a result, many scholars have “retooled” their skills to leverage the large amount of readily available secondary data for analysis. In this confessional account, we share the story about how the first and second authors faced challenges when using secondary data for a research project in the health information technology domain. Through additional analysis of studies on health information technology that have used secondary data, we identified several themes of potential pitfalls that can occur when collecting, appropriating, and analyzing secondary data for a research project. We share these themes and relevant exemplars to help IS researchers avoid mistakes when using secondary data

    The Short, Medium, and Long-Term Effects of ICT Use on Corruption: A Panel Data Model

    Get PDF
    While prior studies provide mixed evidence on whether ICT can help fight corruption, this study disaggregates the effect of ICT (specifically ICT penetration and regulation) on corruption over the short, medium, and long term to examine how this effect unfolds over time. Using a 11-year panel of secondary data (2010-2021) constructed from multiple sources (Transparency International, Global IT Report, World Economic Forum, and World Bank), we employ random-effects panel data models to examine how long it takes (in years) to realize the anti-corruption effects of ICT penetration and regulation, and how long those effects last. Our analysis shows that ICT penetration has an immediate significant effect on corruption; this effect is small between years 0 and 2 and strengthens between years 3 and 8. In contrast, ICT regulation has no significant immediate effect on corruption, a small but significant effect from year 1 through 7, and a stronger effect in year 8. Implications for these findings for corruption research and policy are discussed
    corecore