711 research outputs found

    A new Manifestation of Atomic Parity Violation in Cesium: a Chiral Optical Gain induced by linearly polarized 6S-7S Excitation

    Full text link
    We have detected, by using stimulated emission, an Atomic Parity Violation (APV) in the form of a chiral optical gain of a cesium vapor on the 7S - 6P3/2_{3/2} transition,consecutive to linearly polarized 6S-7S excitation. We demonstrate the validity of this detection method of APV, by presenting a 9% accurate measurement of expected sign and magnitude. We underline several advantages of this entirely new approach in which the cylindrical symmetry of the set-up can be fully exploited. Future measurements at the percent level will provide an important cross-check of an existing more precise result obtained by a different method.Comment: 4 pages, 2 figure

    Atomic Parity Violation : Principles, Recent Results, Present Motivations

    Full text link
    We review the progress made in the determination of the weak charge, Q\_w, of the cesium nucleus which raises the status of Atomic Parity Violation measurements to that of a precision electroweak test. Not only is it necessary to have a precision measurement of the electroweak asymmetry in the highly forbidden 6S-7S transition, but one also needs a precise calibration procedure. The 1999 precision measurement by the Boulder group implied a 2.5 sigma deviation of Q\_w from the theoretical prediction. This triggered many particle physicist suggestions as well as examination by atomic theoretical physicists of several sources of corrections. After about three years the disagreement was removed without appealing to "New Physics". Concurrently, an original experimental approach was developed in our group for more than a decade. It is based on detection by stimulated emission with amplification of the left- right asymmetry. We present our decisive, recent progress together with our latest results. We emphasize the important impact for electroweak theory, of future measurements in cesium possibly pushed to the 0.1% level. Other possible approaches are currently explored in several atoms

    Understanding, Analysis, and Handling of Software Architecture Erosion

    Get PDF
    Architecture erosion occurs when a software system's implemented architecture diverges from the intended architecture over time. Studies show erosion impacts development, maintenance, and evolution since it accumulates imperceptibly. Identifying early symptoms like architectural smells enables managing erosion through refactoring. However, research lacks comprehensive understanding of erosion, unclear which symptoms are most common, and lacks detection methods. This thesis establishes an erosion landscape, investigates symptoms, and proposes identification approaches. A mapping study covers erosion definitions, symptoms, causes, and consequences. Key findings: 1) "Architecture erosion" is the most used term, with four perspectives on definitions and respective symptom types. 2) Technical and non-technical reasons contribute to erosion, negatively impacting quality attributes. Practitioners can advocate addressing erosion to prevent failures. 3) Detection and correction approaches are categorized, with consistency and evolution-based approaches commonly mentioned.An empirical study explores practitioner perspectives through communities, surveys, and interviews. Findings reveal associated practices like code review and tools identify symptoms, while collected measures address erosion during implementation. Studying code review comments analyzes erosion in practice. One study reveals architectural violations, duplicate functionality, and cyclic dependencies are most frequent. Symptoms decreased over time, indicating increased stability. Most were addressed after review. A second study explores violation symptoms in four projects, identifying 10 categories. Refactoring and removing code address most violations, while some are disregarded.Machine learning classifiers using pre-trained word embeddings identify violation symptoms from code reviews. Key findings: 1) SVM with word2vec achieved highest performance. 2) fastText embeddings worked well. 3) 200-dimensional embeddings outperformed 100/300-dimensional. 4) Ensemble classifier improved performance. 5) Practitioners found results valuable, confirming potential.An automated recommendation system identifies qualified reviewers for violations using similarity detection on file paths and comments. Experiments show common methods perform well, outperforming a baseline approach. Sampling techniques impact recommendation performance

    Real-Time Reflexion Modelling in architecture reconciliation: A multi case study

    Get PDF
    Context Reflexion Modelling is considered one of the more successful approaches to architecture reconciliation. Empirical studies strongly suggest that professional developers involved in real-life industrial projects find the information provided by variants of this approach useful and insightful, but the degree to which it resolves architecture conformance issues is still unclear. Objective This paper aims to assess the level of architecture conformance achieved by professional architects using Reflexion Modelling, and to determine how the approach could be extended to improve its suitability for this task. Method An in vivo, multi-case-study protocol was adopted across five software systems, from four different financial services organizations. Think-aloud, video-tape and interview data from professional architects involved in Reflexion Modelling sessions were analysed qualitatively. Results This study showed that (at least) four months after the Reflexion Modelling sessions less than 50% of the architectural violations identified were removed. The majority of participants who did remove violations favoured changes to the architectural model rather than to the code. Participants seemed to work off two specific architectural templates, and interactively explored their architectural model to focus in on the causes of violations, and to assess the ramifications of potential code changes. They expressed a desire for dependency analysis beyond static-source-code analysis and scalable visualizations. Conclusion The findings support several interesting usage-in-practice traits, previously hinted at in the literature. These include (1) the iterative analysis of systems through Reflexion models, as a precursor to possible code change or as a focusing mechanism to identify the location of architecture conformance issues, (2) the extension of the approach with respect to dependency analysis of software systems and architectural modelling templates, (3) improved visualization support and (4) the insight that identification of architectural violations in itself does not lead to their removal in the majority of instances.This work was supported, in part, by Science Foundation Ireland Grants 12/IP/1351 and 10/CE/I1855 to Lero – the Irish Software Engineering Research Centre (www.lero.ie) and by the University of Brighton under the Rising Star Scheme awarded to Nour Ali

    Towards Automatic Identification of Violation Symptoms of Architecture Erosion

    Full text link
    Architecture erosion has a detrimental effect on maintenance and evolution, as the implementation drifts away from the intended architecture. To prevent this, development teams need to understand early enough the symptoms of erosion, and particularly violations of the intended architecture. One way to achieve this, is through the automatic identification of architecture violations from textual artifacts, and particularly code reviews. In this paper, we developed 15 machine learning-based and 4 deep learning-based classifiers with three pre-trained word embeddings to identify violation symptoms of architecture erosion from developer discussions in code reviews. Specifically, we looked at code review comments from four large open-source projects from the OpenStack (Nova and Neutron) and Qt (Qt Base and Qt Creator) communities. We then conducted a survey to acquire feedback from the involved participants who discussed architecture violations in code reviews, to validate the usefulness of our trained classifiers. The results show that the SVM classifier based on word2vec pre-trained word embedding performs the best with an F1-score of 0.779. In most cases, classifiers with the fastText pre-trained word embedding model can achieve relatively good performance. Furthermore, 200-dimensional pre-trained word embedding models outperform classifiers that use 100 and 300-dimensional models. In addition, an ensemble classifier based on the majority voting strategy can further enhance the classifier and outperforms the individual classifiers. Finally, an online survey of the involved developers reveals that the violation symptoms identified by our approaches have practical value and can provide early warnings for impending architecture erosion.Comment: 20 pages, 4 images, 7 tables, Revision submitted to TSE (2023

    Preparing Software Re-Engineering via Freehand Sketches in Virtual Reality

    Get PDF
    Re-architecting a software system requires significant preparation, e.g., to scope and design new modules with their boundaries and constituent classes. When planning an intended future state of a system as a re-engineering goal, engineers often fall recur to mechanisms such as freehand sketching (using a whiteboard). While this ensures flexibility and expressiveness, the sketches remain disconnected from the source code. The alternative, tool-supported diagramming on the other hand considerably restricts flexibility and impedes free-form communication.We present a method for preparing the architectural software re-engineering via freehand sketches in virtual reality (VR) that can be seamlessly integrated with the model structure of a software visualization and, thus, also the code of a system, for productive use: Engineers explore a subject system in the immersive visualization, while freehand sketching their insights and plans. Our concept automatically interprets sketched shapes and connects them to the system’s source code, and superimposes code-level references into a sketch to support engineers in reflecting on their sketches.We evaluated our method in an iterative interview-based case study with software developers from four different companies, where they planned a hypothetical re-engineering of an opensource software system.Video Demonstration — https://youtu.be/NKC5YpH3n4

    High-Energy gamma-ray Astronomy and String Theory

    Full text link
    There have been observations, first from the MAGIC Telescope (July 2005) and quite recently (September 2008) from the FERMI Satellite Telescope, on non-simultaneous arrival of high-energy photons from distant celestial sources. In each case, the highest energy photons were delayed, as compared to their lower-energy counterparts. Although the astrophysics at the source of these energetic photons is still not understood, and such non simultaneous arrival might be due to non simultaneous emission as a result of conventional physics effects, nevertheless, rather surprisingly, the observed time delays can also fit excellently some scenarios in quantum gravity, predicting Lorentz violating space-time "foam" backgrounds with a non-trivial subluminal vacuum refractive index suppressed linearly by a quantum gravity scale of the order of the reduced Planck mass. In this pedagogical talk, I discuss the MAGIC and FERMI findings in this context and I argue on a theoretical model of space-time foam in string/brane theory that can accommodate the findings of those experiments in agreement with all other stringent tests of Lorentz invariance. However, I stress the current ambiguities/uncertainties on the source mechanisms, which need to be resolved first before definite conclusions are reached regarding quantum gravity foam scenarios.Comment: 34 pages latex, 12 eps figures incorporated, uses special macros. Based on invited plenary talk at DICE 2008 Conference (Castiglioncello, Italy), September 22-26 200
    corecore