Please login to be able to save your searches and receive alerts for new content matching your search criteria.
In this paper, we review the calculation of suppression of Chiral Separational and Chiral Vortical Effects for strange quarks (which allegedly yield spin polarization of Λ∕ˉΛ-hyperons in peripheral Heavy-Ion Collisions) by the nonperturbative interactions in hot deconfined QCD with the Field Correlator Method. The parameter range in the temperature-baryon density plane is expected to cover LHC-ALICE and RHIC-STAR data.
Collaborative Virtual Environment (CVE) is a promising technology which provides an online shared virtual world to the geographically dispersed people to interact with each other. However, the scalability of existing CVE system is limited due to the constraints in processing power and network speed of each participating host. Large scale CVE (LCVE) that supports a large number of concurrent participants and a large amount of evolving virtual entities is not easy to achieve. In this paper, an autonomous decentralized grid based mobile agent framework for large scale CVE — MACVE is proposed. In MACVE, LCVE software system is decomposed into a group of collaborative mobile agents, each of which is responsible for an independent system task. Agents can migrate or clone dynamically at any suitable participating host (grid node) include traditional servers and qualified user hosts to avoid bottleneck, which can improve the scalability of LCVE. Therefore, MACVE is a logically multi-server architecture while the server workload is autonomously decentralized. Our system prototype and evaluation has demonstrated the feasibility of the proposed framework.
We present an empirical analysis of the source code of the Fluoride Bluetooth module, which is a part of standard Android OS distribution, by exhibiting a novel approach for classifying and scoring source code and vulnerability rating. Our workflow combines deep learning, combinatorial optimization, heuristics and machine learning. A combination of heuristics and deep learning is used to embed function (and method) labels into a low-dimensional Euclidean space. Because the corpus of the Fluoride source code is rather limited (containing approximately 12,000 functions), a straightforward embedding (using, e.g. code2vec) is untenable. To overcome the challenge of dearth of data, it is necessary to go through an intermediate step of Byte-Pair Encoding. Subsequently, we embed the tokens from which we assemble an embedding of function/method labels. Long short-term memory network (LSTM) is used to embed tokens. The next step is to form a distance matrix consisting of the cosines between every pairs of vectors (function embedding) which in turn is interpreted as a (combinatorial) graph whose vertices represent functions, and edges correspond to entries whose value exceed some given threshold. Cluster-Editing is then applied to partition the vertex set of the graph into subsets representing “dense graphs,” that are nearly complete subgraphs. Finally, the vectors representing the components, plus additional heuristic-based features are used as features to model the components for vulnerability risk.
The starting premise of this paper is that people are generally wired to accept information better when it is conveyed through metaphors. We tend to believe narratives when it is conveyed as stories and intersubjective myths that resonate with our beliefs and experiences. Hence, we are receptive to cultural codes and religious beliefs, which are shared stories and myths. Jihadism and other extremist ideologies similarly have shared stories and myths, which are used to transmit their master narrative in a form that an individual in a particular context can identify with. However, when the focus is on combating extremist ideologies, one can overlook the stories and myths used to convey this ideology. Defeating an idea sometimes requires dismantling the myth that supports it. This paper will demonstrate how an effective counter-narrative can do this. Furthermore, there is a wealth of available knowledge from narrative studies about creating persuasive arguments, ranging from philosophical ideas from antiquity to those advocated by prominent motivational speakers today, to explain what contributes to a persuasive argument that ‘hits home’. This paper will illustrate how some of these ideas can be adapted for use in countering violent extremism (CVE).