-
On the use of quantality in nuclei and many-body systems
Authors:
J. -P. Ebran,
L. Heitz,
E. Khan
Abstract:
The use of quantality is discussed in the case of nuclei and other many-body systems such as atomic electrons. This dimensionless quantity is known to indicate when a many-body system behaves like a crystal or a quantum liquid. Its role is further analyzed, showing the emergence of a fundamental lengthscale, the limit radius, which corresponds to the hard-core of the nucleon-nucleon interaction in…
▽ More
The use of quantality is discussed in the case of nuclei and other many-body systems such as atomic electrons. This dimensionless quantity is known to indicate when a many-body system behaves like a crystal or a quantum liquid. Its role is further analyzed, showing the emergence of a fundamental lengthscale, the limit radius, which corresponds to the hard-core of the nucleon-nucleon interaction in the case of nucleons, and to a value close to the Bohr radius in the case of atomic electrons. The occurrence of a cluster phase in nuclei is analyzed using the quantality through its relation to the localization parameter, allowing for the identification of both the number of nucleons and the density as control parameters for the occurrence of this phase. The relation of the quantality to the magnitude of the interaction also exhibits a third dimensionless parameter, monitoring the magnitude of the spin-orbit effect in finite systems, through the realization of the pseudo-spin symmetry. The impact of quantality on the spin-orbit effect is compared in various many-body systems. The role of quantality in the relative effect of the binding energy and the shell one is also analyzed in nuclei. Finally, additional dimensionless quantities are proposed from the generalization of the quantality. Nuclei are found to be exceptional systems because all their dimensionless quantities are close to the order of unity, at variance with other many-body systems.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
Evaluation of the Programming Skills of Large Language Models
Authors:
Luc Bryan Heitz,
Joun Chamas,
Christopher Scherb
Abstract:
The advent of Large Language Models (LLM) has revolutionized the efficiency and speed with which tasks are completed, marking a significant leap in productivity through technological innovation. As these chatbots tackle increasingly complex tasks, the challenge of assessing the quality of their outputs has become paramount. This paper critically examines the output quality of two leading LLMs, Ope…
▽ More
The advent of Large Language Models (LLM) has revolutionized the efficiency and speed with which tasks are completed, marking a significant leap in productivity through technological innovation. As these chatbots tackle increasingly complex tasks, the challenge of assessing the quality of their outputs has become paramount. This paper critically examines the output quality of two leading LLMs, OpenAI's ChatGPT and Google's Gemini AI, by comparing the quality of programming code generated in both their free versions. Through the lens of a real-world example coupled with a systematic dataset, we investigate the code quality produced by these LLMs. Given their notable proficiency in code generation, this aspect of chatbot capability presents a particularly compelling area for analysis. Furthermore, the complexity of programming code often escalates to levels where its verification becomes a formidable task, underscoring the importance of our study. This research aims to shed light on the efficacy and reliability of LLMs in generating high-quality programming code, an endeavor that has significant implications for the field of software development and beyond.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
Divide, Conquer and Verify: Improving Symbolic Execution Performance
Authors:
Christopher Scherb,
Luc Bryan Heitz,
Hermann Grieder,
Olivier Mattmann
Abstract:
Symbolic Execution is a formal method that can be used to verify the behavior of computer programs and detect software vulnerabilities. Compared to other testing methods such as fuzzing, Symbolic Execution has the advantage of providing formal guarantees about the program. However, despite advances in performance in recent years, Symbolic Execution is too slow to be applied to real-world software.…
▽ More
Symbolic Execution is a formal method that can be used to verify the behavior of computer programs and detect software vulnerabilities. Compared to other testing methods such as fuzzing, Symbolic Execution has the advantage of providing formal guarantees about the program. However, despite advances in performance in recent years, Symbolic Execution is too slow to be applied to real-world software. This is primarily caused by the \emph{path explosion problem} as well as by the computational complexity of SMT solving. In this paper, we present a divide-and-conquer approach for symbolic execution by executing individual slices and later combining the side effects. This way, the overall problem size is kept small, reducing the impact of computational complexity on large problems.
△ Less
Submitted 7 November, 2023; v1 submitted 5 October, 2023;
originally announced October 2023.
-
CyMed: A Framework for Testing Cybersecurity of Connected Medical Devices
Authors:
Christopher Scherb,
Adrian Hadayah,
Luc Bryan Heitz
Abstract:
Connected Medical Devices (CMDs) have a large impact on patients as they allow them to lead a more normal life. Any malfunction could not only remove the health benefits the CMDs provide, they could also cause further harm to the patient. Due to this, there are many safety regulations which must be adhered to prior to a CMD entering the market. However, while many detailed safety regulations exist…
▽ More
Connected Medical Devices (CMDs) have a large impact on patients as they allow them to lead a more normal life. Any malfunction could not only remove the health benefits the CMDs provide, they could also cause further harm to the patient. Due to this, there are many safety regulations which must be adhered to prior to a CMD entering the market. However, while many detailed safety regulations exist, there are a fundamental lack of cybersecurity frameworks applicable to CMDs. While there are recent regulations which aim to enforce cybersecurity practices, they are vague and do not contain the concrete steps necessary to implement cybersecurity. This paper aims to fill that gap by describing a framework, CyMed, to be used by vendors and ens-users, which contains concrete measures to improve the resilience of CMDs against cyber attack. The CyMed framework is subsequently evaluated based on practical tests as well as expert interviews.
△ Less
Submitted 5 October, 2023;
originally announced October 2023.
-
A Serious Game for Simulating Cyberattacks to Teach Cybersecurity
Authors:
Christopher Scherb,
Luc Bryan Heitz,
Frank Grimberg,
Hermann Grieder,
Marcel Maurer
Abstract:
With the rising number of cyberattacks, such as ransomware attacks and cyber espionage, educating non-cybersecurity professionals to recognize threats has become more important than ever before. However, traditional training methods, such as phishing awareness campaigns, training videos and assessments have proven to be less effective over time. Therefore, it is time to rethink the approach on how…
▽ More
With the rising number of cyberattacks, such as ransomware attacks and cyber espionage, educating non-cybersecurity professionals to recognize threats has become more important than ever before. However, traditional training methods, such as phishing awareness campaigns, training videos and assessments have proven to be less effective over time. Therefore, it is time to rethink the approach on how to train cyber awareness. In this paper we suggest an alternative approach -- a serious game -- to educate awareness for common cyberattacks. While many serious games for cybersecurity education exist, all follow a very similar approach: showing people the effects of a cyber attack on their own system or company network. For example, one of the main tasks in these games is to sort out phishing mails. We developed and evaluated a new type of cybersecurity game: an attack simulator, which shows the entire setting from a different perspective. Instead of sorting out phishing mails the players should write phishing mails to trick potential victims and use other forms of cyberattacks. Our game explains the intention of each attack and shows the consequences of a successful attack. This way, we hope, players will get a better understanding on how to detect cyberattacks.
△ Less
Submitted 4 May, 2023;
originally announced May 2023.
-
Instability of the cosmological DBI-Galileon in the non-relativistic limit
Authors:
C. Leloup,
L. Heitz,
J. Neveu
Abstract:
The DBI-Galileon model is a scalar-tensor theory of gravity which is defined as the most general theory of the dynamics of a 4D brane embedded in a 5D bulk. It is of particular interest as it introduces only a few free parameters, all with a clear physical meaning, such as the brane tension which is related to the cosmological constant. From the tight constraints on the gravitational waves speed,…
▽ More
The DBI-Galileon model is a scalar-tensor theory of gravity which is defined as the most general theory of the dynamics of a 4D brane embedded in a 5D bulk. It is of particular interest as it introduces only a few free parameters, all with a clear physical meaning, such as the brane tension which is related to the cosmological constant. From the tight constraints on the gravitational waves speed, we are naturally led to consider the non-relativistic limit of the model where the kinetic energy of the brane is small compared to its tension, that we study in the context of late-time cosmology. We show that the DBI-Galileon in the non-relativistic limit is an expansion around General Relativity (GR) which can be expressed as a shift-symmetric Horndeski theory. We develop the description of this theory at the background and perturbation level. However, by studying the scalar and tensor perturbations around a flat FLRW background, we find that they contain a ghost degree of freedom leading to a fatal instability of the vacuum for every combination of the free parameters. In order to avoid it in the more general cases of shift-symmetric Horndeski theories, we emphasize which of the Horndeski terms are in competition to produce this instability.
△ Less
Submitted 4 August, 2023; v1 submitted 4 January, 2023;
originally announced January 2023.
-
Microscopic description of $α$, $2α$, and cluster decays of $^{216-220}$Rn and $^{220-224}$Ra
Authors:
J. Zhao,
J. -P. Ebran,
L. Heitz,
E. Khan,
F. Mercier,
T. Niksic,
D. Vretenar
Abstract:
Alpha and cluster decays are analyzed for heavy nuclei located above $^{208}$Pb on the chart of nuclides: $^{216-220}$Rn and $^{220-224}$Ra, that are also candidates for observing the $2 α$ decay mode. A microscopic theoretical approach based on relativistic Energy Density Functionals (EDF), is used to compute axially-symmetric deformation energy surfaces as functions of quadrupole, octupole and h…
▽ More
Alpha and cluster decays are analyzed for heavy nuclei located above $^{208}$Pb on the chart of nuclides: $^{216-220}$Rn and $^{220-224}$Ra, that are also candidates for observing the $2 α$ decay mode. A microscopic theoretical approach based on relativistic Energy Density Functionals (EDF), is used to compute axially-symmetric deformation energy surfaces as functions of quadrupole, octupole and hexadecupole collective coordinates. Dynamical least-action paths for specific decay modes are calculated on the corresponding potential energy surfaces. The effective collective inertia is determined using the perturbative cranking approximation, and zero-point and rotational energy corrections are included in the model. The predicted half-lives for $α$-decay are within one order of magnitude of the experimental values. In the case of single $α$ emission, the nuclei considered in the present study exhibit least-action paths that differ significantly up to the scission point. The differences in alpha-decay lifetimes are not only driven by Q values, but also by variances of the least-action paths prior to scission. In contrast, the $2 α$ decay mode presents very similar paths from equilibrium to scission, and the differences in lifetimes are mainly driven by the corresponding Q values. The predicted $^{14}$C cluster decay half-lives are within three orders of magnitudes of the empirical values, and point to a much more complex pattern compared to the alpha-decay mode.
△ Less
Submitted 6 March, 2023; v1 submitted 25 November, 2022;
originally announced November 2022.
-
Alpha-particle formation and clustering in nuclei
Authors:
E. Khan,
L. Heitz,
F. Mercier,
J. -P. Ebran
Abstract:
The nucleonic localization function has been used for a decade to study the formation of alpha-particles in nuclei, by providing a measure of having nucleons of a given spin in a single place. However, differences in interpretation remain, compared to the nucleonic density of the nucleus. In order to better understand the respective role of the nucleonic localization function and the densities in…
▽ More
The nucleonic localization function has been used for a decade to study the formation of alpha-particles in nuclei, by providing a measure of having nucleons of a given spin in a single place. However, differences in interpretation remain, compared to the nucleonic density of the nucleus. In order to better understand the respective role of the nucleonic localization function and the densities in the alpha-particle formation in cluster states or in alpha-decay mechanism, both an analytic approximation and microscopic calculations, using energy density functionals, are undertaken. The nucleonic localization function is shown to measure the anti-centrifugal effect, and is not sensitive to the level of compactness of the alpha-particle itself. It probes the purity of the spatial overlap of four nucleons in the four possible (spin, isospin) states. The density provides, in addition, information on the compactness of an alpha-particle cluster. The respective roles of the nucleonic localization function and the density are also analyzed in the case of alpha-particle emission. More generally, criteria to assess the prediction of alpha-cluster in nuclear states are provided.
△ Less
Submitted 24 November, 2022; v1 submitted 19 September, 2022;
originally announced September 2022.
-
Diversity in News Recommendations
Authors:
Abraham Bernstein,
Claes de Vreese,
Natali Helberger,
Wolfgang Schulz,
Katharina Zweig,
Christian Baden,
Michael A. Beam,
Marc P. Hauer,
Lucien Heitz,
Pascal Jürgens,
Christian Katzenbach,
Benjamin Kille,
Beate Klimkiewicz,
Wiebke Loosen,
Judith Moeller,
Goran Radanovic,
Guy Shani,
Nava Tintarev,
Suzanne Tolmeijer,
Wouter van Atteveldt,
Sanne Vrijenhoek,
Theresa Zueger
Abstract:
News diversity in the media has for a long time been a foundational and uncontested basis for ensuring that the communicative needs of individuals and society at large are met. Today, people increasingly rely on online content and recommender systems to consume information challenging the traditional concept of news diversity. In addition, the very concept of diversity, which differs between disci…
▽ More
News diversity in the media has for a long time been a foundational and uncontested basis for ensuring that the communicative needs of individuals and society at large are met. Today, people increasingly rely on online content and recommender systems to consume information challenging the traditional concept of news diversity. In addition, the very concept of diversity, which differs between disciplines, will need to be re-evaluated requiring a interdisciplinary investigation, which requires a new level of mutual cooperation between computer scientists, social scientists, and legal scholars. Based on the outcome of a multidisciplinary workshop, we have the following recommendations, directed at researchers, funders, legislators, regulators, and the media industry: 1. Do more research on news recommenders and diversity. 2. Create a safe harbor for academic research with industry data. 3. Optimize the role of public values in news recommenders. 4. Create a meaningful governance framework. 5. Fund a joint lab to spearhead the needed interdisciplinary research, boost practical innovation, develop. reference solutions, and transfer insights into practice.
△ Less
Submitted 25 May, 2021; v1 submitted 19 May, 2020;
originally announced May 2020.