3,684 research outputs found
HAVE WE REACHED PEAK DESIGN THINKING? Are we entering a new paradigm for how it is used within practice and business?
Design Thinking has gained recognition as an acclaimed process for generating innovative, human centred solutions at a social and business level. It has also gained notoriety amongst many designers, who claim that its success as an exported element of the design process has resulted in its commodification, and led to it becoming a diluted series of processes that lack criticality. As design disciplines and the role of designers continue to evolve, we should reflect on design thinking’s original context and understand its progression into a non-design world. Our hypothesis is that design thinking has reached a ‘peak’ in contemporary practice, and as the term 'design' is further adapted and conformed to suit a business function, this conversational will elicit a constructive debate on the future of design thinking and its positioning within design and non-design industries. Has Design Thinking’s commodification and consumption as a step by step road map to innovation reduced it to a mainstream approach? Can we use the undoubted successes of design thinking as a catalyst for future design research? It is anticipated that through analysis and discussion, this conversation will inform the conceptualisation of enhanced methodological frameworks that aim to support innovation across divergent industry practices
F-Theorem without Supersymmetry
The conjectured F-theorem for three-dimensional field theories states that
the finite part of the free energy on S^3 decreases along RG trajectories and
is stationary at the fixed points. In previous work various successful tests of
this proposal were carried out for theories with {\cal N}=2 supersymmetry. In
this paper we perform more general tests that do not rely on supersymmetry. We
study perturbatively the RG flows produced by weakly relevant operators and
show that the free energy decreases monotonically. We also consider large N
field theories perturbed by relevant double trace operators, free massive field
theories, and some Chern-Simons gauge theories. In all cases the free energy in
the IR is smaller than in the UV, consistent with the F-theorem. We discuss
other odd-dimensional Euclidean theories on S^d and provide evidence that
(-1)^{(d-1)/2} \log |Z| decreases along RG flow; in the particular case d=1
this is the well-known g-theorem.Comment: 34 pages, 2 figures; v2 refs added, minor improvements; v3 refs
added, improved section 4.3; v4 minor improvement
Unified force law for granular impact cratering
Experiments on the low-speed impact of solid objects into granular media have
been used both to mimic geophysical events and to probe the unusual nature of
the granular state of matter. Observations have been interpreted in terms of
conflicting stopping forces: product of powers of projectile depth and speed;
linear in speed; constant, proportional to the initial impact speed; and
proportional to depth. This is reminiscent of high-speed ballistics impact in
the 19th and 20th centuries, when a plethora of empirical rules were proposed.
To make progress, we developed a means to measure projectile dynamics with 100
nm and 20 us precision. For a 1-inch diameter steel sphere dropped from a wide
range of heights into non-cohesive glass beads, we reproduce prior observations
either as reasonable approximations or as limiting behaviours. Furthermore, we
demonstrate that the interaction between projectile and medium can be
decomposed into the sum of velocity-dependent inertial drag plus
depth-dependent friction. Thus we achieve a unified description of low-speed
impact phenomena and show that the complex response of granular materials to
impact, while fundamentally different from that of liquids and solids, can be
simply understood
Breast MRI and tumour biology predict axillary lymph node response to neoadjuvant chemotherapy for breast cancer
Background: In patients who have had axillary nodal metastasis diagnosed prior to neoadjuvant chemotherapy for breast cancer, there is little consensus on how to manage the axilla subsequently. The aim of this study was to explore whether a combination of breast magnetic resonance imaging (MRI) assessed response and primary tumour pathology factors could identify a subset of patients that might be spared axillary node clearance.Methods: A retrospective data analysis was performed of patients with core biopsy-proven axillary nodal metastasis prior to commencement of neoadjuvant chemotherapy (NAC) who had subsequent axillary node clearance (ANC) at definitive breast surgery. Breast tumour and axillary response at MRI before, during and on completion of NAC, core biopsy tumour grade, tumour type and immunophenotype were correlated with pathological response in the breast and the number of metastatic nodes in the ANC specimens.Results: Of 87 consecutive patients with MRI at baseline, interim and after neoadjuvant chemotherapy who underwent ANC at time of breast surgery, 33 (38%) had no residual macrometastatic axillary disease, 28 (32%) had 1–2 metastatic nodes and 26 (30%) had more than 2 metastatic nodes. Factors that predicted axillary nodal complete response were MRI complete response in the breast (p < 0.0001), HER2 positivity (p = 0.02) and non-lobular tumour type (p = 0.015).Conclusion: MRI assessment of breast tumour response to NAC and core biopsy factors are predictive of response in axillary nodes, and can be used to guide decision making regarding appropriate axillary surgery
A Stochastic Approach to Shortcut Bridging in Programmable Matter
In a self-organizing particle system, an abstraction of programmable matter,
simple computational elements called particles with limited memory and
communication self-organize to solve system-wide problems of movement,
coordination, and configuration. In this paper, we consider a stochastic,
distributed, local, asynchronous algorithm for "shortcut bridging", in which
particles self-assemble bridges over gaps that simultaneously balance
minimizing the length and cost of the bridge. Army ants of the genus Eciton
have been observed exhibiting a similar behavior in their foraging trails,
dynamically adjusting their bridges to satisfy an efficiency trade-off using
local interactions. Using techniques from Markov chain analysis, we rigorously
analyze our algorithm, show it achieves a near-optimal balance between the
competing factors of path length and bridge cost, and prove that it exhibits a
dependence on the angle of the gap being "shortcut" similar to that of the ant
bridges. We also present simulation results that qualitatively compare our
algorithm with the army ant bridging behavior. Our work gives a plausible
explanation of how convergence to globally optimal configurations can be
achieved via local interactions by simple organisms (e.g., ants) with some
limited computational power and access to random bits. The proposed algorithm
also demonstrates the robustness of the stochastic approach to algorithms for
programmable matter, as it is a surprisingly simple extension of our previous
stochastic algorithm for compression.Comment: Published in Proc. of DNA23: DNA Computing and Molecular Programming
- 23rd International Conference, 2017. An updated journal version will appear
in the DNA23 Special Issue of Natural Computin
Fermionic Coset, Critical Level W^(2)_4-Algebra and Higher Spins
The fermionic coset is a limit of the pure spinor formulation of the AdS5xS5
sigma model as well as a limit of a nonlinear topological A-model, introduced
by Berkovits. We study the latter, especially its symmetries, and map them to
higher spin algebras.
We show the following. The linear A-model possesses affine
\AKMSA{pgl}{4}{4}_0 symmetry at critical level and its \AKMSA{psl}{4}{4}_0
current-current perturbation is the nonlinear model. We find that the
perturbation preserves -algebra symmetry at critical
level. There is a topological algebra associated to \AKMSA{pgl}{4}{4}_0 with
the properties that the perturbation is BRST-exact. Further, the
BRST-cohomology contains world-sheet supersymmetric symplectic fermions and the
non-trivial generators of the -algebra. The Zhu functor
maps the linear model to a higher spin theory. We analyze its
\SLSA{psl}{4}{4} action and find finite dimensional short multiplets.Comment: 25 page
Competing biosecurity and risk rationalities in the Chittagong poultry commodity chain, Bangladesh
This paper anthropologically explores how key actors in the Chittagong live bird trading network perceive biosecurity and risk in relation to avian influenza between production sites, market maker scenes and outlets. They pay attention to the past and the present, rather than the future, downplaying the need for strict risk management, as outbreaks have not been reported frequently for a number of years. This is analysed as ‘temporalities of risk perception regarding biosecurity’, through Black Swan theory, the idea that unexpected events with major effects are often inappropriately rationalized (Taleb in The Black Swan. The impact of the highly improbable, Random House, New York, 2007). This incorporates a sociocultural perspective on risk, emphasizing the contexts in which risk is understood, lived, embodied and experienced. Their risk calculation is explained in terms of social consent, practical intelligibility and convergence of constraints and motivation. The pragmatic and practical orientation towards risk stands in contrast to how risk is calculated in the avian influenza preparedness paradigm. It is argued that disease risk on the ground has become a normalized part of everyday business, as implied in Black Swan theory. Risk which is calculated retrospectively is unlikely to encourage investment in biosecurity and, thereby, points to the danger of unpredictable outlier events
Long-Term Potentiation: One Kind or Many?
Do neurobiologists aim to discover natural kinds? I address this question in this chapter via a critical analysis of classification practices operative across the 43-year history of research on long-term potentiation (LTP). I argue that this 43-year history supports the idea that the structure of scientific practice surrounding LTP research has remained an obstacle to the discovery of natural kinds
Conical Defects in Higher Spin Theories
We study conical defect geometries in the SL(N) Chern-Simons formulation of
higher spin gauge theories in AdS_3. We argue that (for N\geq 4) there are
special values of the deficit angle for which these geometries are actually
smooth configurations of the underlying theory. We also exhibit a gauge in
which these geometries can be viewed as wormholes interpolating between two
distinct asymptotically AdS_3 spacetimes. Remarkably, the spectrum of smooth
SL(N,C) solutions, after an appropriate analytic continuation, exactly matches
that of the so-called "light primaries" in the minimal model W_N CFTs at finite
N. This gives a candidate bulk interpretation of the latter states in the
holographic duality proposed in [1].Comment: 38 page
Generalized Toda Theory from Six Dimensions and the Conifold
Recently, a physical derivation of the Alday-Gaiotto-Tachikawa correspondence
has been put forward. A crucial role is played by the complex Chern-Simons
theory arising in the 3d-3d correspondence, whose boundary modes lead to Toda
theory on a Riemann surface. We explore several features of this derivation and
subsequently argue that it can be extended to a generalization of the AGT
correspondence. The latter involves codimension two defects in six dimensions
that wrap the Riemann surface. We use a purely geometrical description of these
defects and find that the generalized AGT setup can be modeled in a pole region
using generalized conifolds. Furthermore, we argue that the ordinary conifold
clarifies several features of the derivation of the original AGT
correspondence.Comment: 27+2 pages, 3 figure
- …
