5,153 research outputs found

    “It Takes All Kinds”: A Simulation Modeling Perspective on Motivation and Coordination in Libre Software Development Projects

    Get PDF
    This paper presents a stochastic simulation model to study implications of the mechanisms by which individual software developers’ efforts are allocated within large and complex open source software projects. It illuminates the role of different forms of “motivations-at-the-margin” in the micro-level resource allocation process of distributed and decentralized multi-agent engineering undertakings of this kind. We parameterize the model by isolating the parameter ranges in which it generates structures of code that share certain empirical regularities found to characterize actual projects. We find that, in this range, a variety of different motivations are represented within the community of developers. There is a correspondence between the indicated mixture of motivations and the distribution of avowed motivations for engaging in FLOSS development, found in the survey responses of developers who were participants in large projects.free and open source software (FLOSS), libre software engineering, maintainability, reliability, functional diversity, modularity, developers’ motivations, user-innovation, peer-esteem, reputational reward systems, agent-based modeling, stochastic simulation, stigmergy, morphogenesis.

    Photon-Mediated Quantum Gate between Two Trapped Neutral Atoms in an Optical Cavity

    Full text link
    Quantum logic gates are fundamental building blocks of quantum computers. Their integration into quantum networks requires strong qubit coupling to network channels, as can be realized with neutral atoms and optical photons in cavity quantum electrodynamics. Here we demonstrate that the long-range interaction mediated by a flying photon performs a gate between two stationary atoms inside an optical cavity from which the photon is reflected. This single step executes the gate in 2 Όs2\,\mathrm{\mu s}. We show an entangling operation between the two atoms by generating a Bell state with 76(2)% fidelity. The gate also operates as a CNOT. We demonstrate 74.1(1.6)% overlap between the observed and the ideal gate output, limited by the state preparation fidelity of 80.2(0.8)%. As the atoms are efficiently connected to a photonic channel, our gate paves the way towards quantum networking with multiqubit nodes and the distribution of entanglement in repeater-based long-distance quantum networks.Comment: 10 pages including appendix, 5 figure

    IMAGES 2.1 : an Integrated Model of an Arid Grazing System

    Get PDF
    The name IMAGES stands for An Integrated Model of an Arid Grazing Ecological System. The model was initiated by Dr R. Hacker in 1987-8 as an activity to (1) evaluate alternative management strategies and (2) identify key ecological processes and research priorities in shrub rangelands of Western Australia. Version 1 of the model was published in Agriculture Systems in 1991 (Hacker et al. 1991) and here after will be referred to as IMAGES 1. IMAGES 1 is a vegetation model, capable of predicting the prob ility of recruitment and mortality of the desirable species in a given vegetation type under different types of grazing managements

    Farming Systems in the Pastoral Zone of NSW: An Economic Analysis

    Get PDF
    A ‘broad brush’ picture of farming in the pastoral zone of NSW is presented in this report. The pastoral zone of NSW is characterised by wide variations in climatic conditions, soil type and vegetation species. Hence representative faming system analysis was conducted for three sub-regions - the Upper Darling, the Murray-Darling and Far West. The regions were defined and described in terms of their resources, climate and the nature of agriculture. The main enterprises that farmers choose between were described and whole farm budgets and statements of assets and liabilities for the representative farms were developed. The representative farm models were used to compare traditional Merino based sheep enterprises with alternative sheep enterprises where meat was an important source of income. We found that the farming systems that have evolved in these areas are well suited to their respective environments and that the economic incentives to switch to more meat focussed sheep enterprises were not strong.Western Division, farming systems, economic, analysis, New South Wales, Farm Management, Land Economics/Use, Livestock Production/Industries, Production Economics, Research and Development/Tech Change/Emerging Technologies, Q160,

    Culture and generalized inattentional blindness

    Get PDF
    A recent mathematical treatment of Baars' Global Workspace consciousness model, much in the spirit of Dretske's communication theory analysis of high level mental function, is used to study the effects of embedding cultural heritage on a generalized form of inattentional blindness. Culture should express itself quite distinctly in this basic psychophysical phenomenon, acting across a variety of sensory and other modalities, because the limited syntactic and grammatical 'bandpass' of the topological rate distortion manifold characterizing conscious attention is itself strongly sculpted by the constraints of cultural context

    Perspectives on the Neuroscience of Cognition and Consciousness

    Get PDF
    The origin and current use of the concepts of computation, representation and information in Neuroscience are examined and conceptual flaws are identified which vitiate their usefulness for addressing problems of the neural basis of Cognition and Consciousness. In contrast, a convergence of views is presented to support the characterization of the Nervous System as a complex dynamical system operating in the metastable regime, and capable of evolving to configurations and transitions in phase space with potential relevance for Cognition and Consciousness

    Generalized inattentional blindness from a Global Workspace perspective

    Get PDF
    We apply Baars' Global Workspace model of consciousness to inattentional blindness, using the groupoid network method of Stewart et al. to explore modular structures defined by information measures associated with cognitive process. Internal cross-talk breaks the fundamental groupoid symmetry, and, if sufficiently strong, creates, in a highly punctuated manner, a linked, shifting, giant component which instantiates the global workspace of consciousness. Embedding, exterior, information sources act as an external field which breaks the groupoid symmetry in a somewhat different manner, definng the slowly-acting contexts of Baars' theory and providing topological constraints on the manifestations of consciousness. This analysis significantly extends recent mathematical treatments of the global workspace, and identifies a shifting, topologically-determined syntactical and grammatical 'bottleneck' as a tunable rate distortion manifold which constrains what sensory or other signals can be brought to conscious attention, typically in a punctuated manner. Sensations outside the limits of that filter's syntactic 'bandpass' have lower probability of detection, regardless of their structure, accounting for generalized forms of inattentional blindness

    Cyber Infrastructure Protection: Vol. II

    Get PDF
    View the Executive SummaryIncreased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation’s cyber infrastructure. The cyber infrastructure encompasses a number of sectors including: the nation’s mass transit and other transportation systems; banking and financial systems; factories; energy systems and the electric power grid; and telecommunications, which increasingly rely on a complex array of computer networks, including the public Internet. However, many of these systems and networks were not built and designed with security in mind. Therefore, our cyber infrastructure contains many holes, risks, and vulnerabilities that may enable an attacker to cause damage or disrupt cyber infrastructure operations. Threats to cyber infrastructure safety and security come from hackers, terrorists, criminal groups, and sophisticated organized crime groups; even nation-states and foreign intelligence services conduct cyber warfare. Cyber attackers can introduce new viruses, worms, and bots capable of defeating many of our efforts. Costs to the economy from these threats are huge and increasing. Government, business, and academia must therefore work together to understand the threat and develop various modes of fighting cyber attacks, and to establish and enhance a framework to assess the vulnerability of our cyber infrastructure and provide strategic policy directions for the protection of such an infrastructure. This book addresses such questions as: How serious is the cyber threat? What technical and policy-based approaches are best suited to securing telecommunications networks and information systems infrastructure security? What role will government and the private sector play in homeland defense against cyber attacks on critical civilian infrastructure, financial, and logistical systems? What legal impediments exist concerning efforts to defend the nation against cyber attacks, especially in preventive, preemptive, and retaliatory actions?https://press.armywarcollege.edu/monographs/1527/thumbnail.jp

    Categorical Ontology of Complex Systems, Meta-Systems and Theory of Levels: The Emergence of Life, Human Consciousness and Society

    Get PDF
    Single cell interactomics in simpler organisms, as well as somatic cell interactomics in multicellular organisms, involve biomolecular interactions in complex signalling pathways that were recently represented in modular terms by quantum automata with ‘reversible behavior’ representing normal cell cycling and division. Other implications of such quantum automata, modular modeling of signaling pathways and cell differentiation during development are in the fields of neural plasticity and brain development leading to quantum-weave dynamic patterns and specific molecular processes underlying extensive memory, learning, anticipation mechanisms and the emergence of human consciousness during the early brain development in children. Cell interactomics is here represented for the first time as a mixture of ‘classical’ states that determine molecular dynamics subject to Boltzmann statistics and ‘steady-state’, metabolic (multi-stable) manifolds, together with ‘configuration’ spaces of metastable quantum states emerging from complex quantum dynamics of interacting networks of biomolecules, such as proteins and nucleic acids that are now collectively defined as quantum interactomics. On the other hand, the time dependent evolution over several generations of cancer cells --that are generally known to undergo frequent and extensive genetic mutations and, indeed, suffer genomic transformations at the chromosome level (such as extensive chromosomal aberrations found in many colon cancers)-- cannot be correctly represented in the ‘standard’ terms of quantum automaton modules, as the normal somatic cells can. This significant difference at the cancer cell genomic level is therefore reflected in major changes in cancer cell interactomics often from one cancer cell ‘cycle’ to the next, and thus it requires substantial changes in the modeling strategies, mathematical tools and experimental designs aimed at understanding cancer mechanisms. Novel solutions to this important problem in carcinogenesis are proposed and experimental validation procedures are suggested. From a medical research and clinical standpoint, this approach has important consequences for addressing and preventing the development of cancer resistance to medical therapy in ongoing clinical trials involving stage III cancer patients, as well as improving the designs of future clinical trials for cancer treatments.\ud \ud \ud KEYWORDS: Emergence of Life and Human Consciousness;\ud Proteomics; Artificial Intelligence; Complex Systems Dynamics; Quantum Automata models and Quantum Interactomics; quantum-weave dynamic patterns underlying human consciousness; specific molecular processes underlying extensive memory, learning, anticipation mechanisms and human consciousness; emergence of human consciousness during the early brain development in children; Cancer cell ‘cycling’; interacting networks of proteins and nucleic acids; genetic mutations and chromosomal aberrations in cancers, such as colon cancer; development of cancer resistance to therapy; ongoing clinical trials involving stage III cancer patients’ possible improvements of the designs for future clinical trials and cancer treatments. \ud \u

    Evaluating non-indigenous species management in a bayesian networks derived framework, Padilla Bay, WA

    Get PDF
    Many coastal regions are encountering issues with the introduction and spread of non-indigenous species (NIS). There are many vectors that can transport NIS to coastal areas and estuaries. In this study, I conducted a regional risk assessment using a Bayesian networks relative risk model (BN-RRM) to analyze multiple vectors of NIS introduction to Padilla Bay, Washington, a National Estuarine Research Reserve. Bayesian networks models are advantageous because they are parameterized with quantitative data and knowledge, uncertainty can be incorporated into these models, and the calculated risk is described as a distribution of risk for the various endpoints of interest. The objectives of the study were to 1) determine if the BN-RRM could be used to calculate risk from NIS introductions; 2) determine which regions and endpoints were at greatest risk from NIS introductions and impacts; and 3) examine a management option and calculate the reduction of risk to the endpoints if it were to be implemented. Efforts to manage NIS colonization include eradication of the species. This can occur at different stages of NIS invasions, such as the elimination of these species before being introduced to the habitat, or removal of the species after settlement. A management option was easily incorporated into the model to observe the risk to the endpoints if the treatment were to be implemented. This risk could then be compared to the initial risk estimates. The results from this risk assessment indicate the southern portion of Padilla Bay, Regions 3 and 4 had the greatest risk associated with them and the changes in community composition, Dungeness crab, and eelgrass were the endpoints with the most risk due to NIS introductions. The Currents node, which controls the exposure of NIS to the bay, was the parameter that had the greatest influence on risk to the endpoints. The ballast water management treatment displayed one percent reduction in risk in this Padilla Bay case study. These models provide an adaptable template for decision makers interested in managing NIS and aquatic environments in other coastal regions and large bodies of water
    • 

    corecore