486 research outputs found

    What is the Truth of Simulation?

    Get PDF
    To understand the epistemological meaning of simulation, it does not suffice to interpret simulation practice and theory in the framework of philosophy of science alone. Theory, experiment, measurement and observation are important activities of the scientific method. But what regards an epistemological interpretation of simulation, philosophical truth theories allow gaining additional insights. This paper discusses philosophical truth theories – e.g. the correspondence, coherence and consensus theory – and relates them to simulation practice and methodology, focussing on validation.Epistemology, Simulation, Truth Theories, Validation

    Terrorism - The Definitional Problem

    Get PDF

    Terrorism - The Definitional Problem

    Get PDF

    Immigration Law

    Get PDF

    The Way Forward on Counter-Terrorism: Global Perspectives

    Get PDF
    There have been thousands of public conferences and closed-door meetings on terrorism and counter-terrorism since 11 September 2001. They usually end up with recommendations and then everybody goes home after the group photo has been taken. This article will deal with the following questions: what happened to all these recommendations? Who has acted upon them and actually implemented them? Who has evaluated them? Were they any good? Specifically, it will analyze five critical issues: (i) the definition problem; (ii) the communication problem; (iii) the political problem; (iv) the religious problem; (v) the radicalization problem. Finally, it will be provided twelve rules for preventing and combating terrorism

    Distributed readout detectors using superconducting tunnel junctions

    Full text link
    Superconducting tunnel junctions (STJs) are able to measure the energy of single photons in the range from near infrared to X-rays. They provide simultaneous information of the impact time and wavelength of an absorbed photon. The main difficulty of these detectors compared with conventional imaging detectors lies in their limited pixel number. Each STJ has to be connected independently and therefore the wiring becomes technologically more demanding as the number of STJs increases. One approach to solving this problem is to use a single large absorber and to distribute STJs for position sensitive signal readout. This configuration is able to detect single optical photons with an energy resolution close to that of a single STJ pixel. We have produced a Ta absorber strip with Ta/Al/AlOx/Al/Nb/Ta junctions at either end. The energy and position of single photons were measured simultaneously. The energy resolving power approaches the theoretical limit. We will present a simple Monte Carlo simulation which reproduces the measurement exactly.Comment: 3 pages, 2 figure

    Understanding the Roots of Radicalisation on Twitter

    Get PDF
    In an increasingly digital world, identifying signs of online extremism sits at the top of the priority list for counter-extremist agencies. Researchers and governments are investing in the creation of advanced information technologies to identify and counter extremism through intelligent large-scale analysis of online data. However, to the best of our knowledge, these technologies are neither based on, nor do they take advantage of, the existing theories and studies of radicalisation. In this paper we propose a computational approach for detecting and predicting the radicalisation influence a user is exposed to, grounded on the notion of ’roots of radicalisation’ from social science models. This approach has been applied to analyse and compare the radicalisation level of 112 pro-ISIS vs.112 “general" Twitter users. Our results show the effectiveness of our proposed algorithms in detecting and predicting radicalisation influence, obtaining up to 0.9 F-1 measure for detection and between 0.7 and 0.8 precision for prediction. While this is an initial attempt towards the effective combination of social and computational perspectives, more work is needed to bridge these disciplines, and to build on their strengths to target the problem of online radicalisation

    Silicon-Organic Hybrid (SOH) Mach-Zehnder Modulators for 100 Gbit/s On-Off Keying

    Get PDF
    Electro-optic modulators for high-speed on-off keying (OOK) are key components of short- and mediumreach interconnects in data-center networks. Besides small footprint and cost-efficient large-scale production, small drive voltages and ultra-low power consumption are of paramount importance for such devices. Here we demonstrate that the concept of silicon-organic hybrid (SOH) integration is perfectly suited for meeting these challenges. The approach combines the unique processing advantages of large-scale silicon photonics with unrivalled electro-optic (EO) coefficients obtained by molecular engineering of organic materials. In our proof-of-concept experiments, we demonstrate generation and transmission of OOK signals with line rates of up to 100 Gbit/s using a 1.1 mm-long SOH Mach-Zehnder modulator (MZM) which features a {\pi}-voltage of only 0.9 V. This experiment represents not only the first demonstration of 100 Gbit/s OOK on the silicon photonic platform, but also leads to the lowest drive voltage and energy consumption ever demonstrated at this data rate for a semiconductor-based device. We support our experimental results by a theoretical analysis and show that the nonlinear transfer characteristic of the MZM can be exploited to overcome bandwidth limitations of the modulator and of the electric driver circuitry. The devices are fabricated in a commercial silicon photonics line and can hence be combined with the full portfolio of standard silicon photonic devices. We expect that high-speed power-efficient SOH modulators may have transformative impact on short-reach optical networks, enabling compact transceivers with unprecedented energy efficiency that will be at the heart of future Ethernet interfaces at Tbit/s data rates

    Code wars: steganography, signals intelligence, and terrorism

    Get PDF
    This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null ciphers instead
    corecore