Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Math

Insurgent Attacks Follow Mathematical Pattern 181

Hugh Pickens writes "Nature reports that data collected on the timing of attacks and number of casualties from more than 54,000 events across nine insurgent wars, including those fought in Iraq between 2003 and 2008 and in Sierra Leone between 1994 and 2003, suggest that insurgencies have a common underlying pattern that may allow the timing of attacks and the number of casualties to be predicted. By plotting the distribution of the frequency and size of events, the team found that insurgent wars follow an approximate power law, in which the frequency of attacks decreases with increasing attack size to the power of 2.5. This means that for any insurgent war, an attack with 10 casualties is 316 times more likely to occur than one with 100 casualties (316 is 10 to the power of 2.5). 'We found that the way in which humans do insurgent wars — that is, the number of casualties and the timing of events — is universal,' says team leader Neil Johnson, a physicist at the University of Miami in Florida. 'This changes the way we think insurgency works.' To explain what was driving this common pattern, the researchers created a mathematical model which assumes that insurgent groups form and fragment when they sense danger, and strike in well-timed bursts to maximize their media exposure. Johnson is now working to predict how the insurgency in Afghanistan might respond to the influx of foreign troops recently announced by US President Barack Obama. 'We do observe a complicated pattern that has to do with the way humans do violence in some collective way,' adds Johnson."
The Military

Computer Scientist Looks At ICBM Security 124

An anonymous reader writes "Computer security guru Matt Blaze takes a tour of a decommissioned ICBM complex in Arizona. Cool photos, insightful perspective on two man control, perimeter security, human factors and why we didn't blow ourselves up. From the article: 'The most prominent security mechanism at the Titan site, aside from the multiple layers of thick blast-proof entry doors and the fact that the entire complex is buried underground, was procedural: almost all activities required two person control. Everywhere outside of the kitchen, sleeping quarters and toilet were "no lone zones" where a second person had to be present at all times, even for on-duty members of the launch crews.'"
Biotech

Bacterial Prisoner's Dilemma and Game Theory 95

dumuzi writes "Scientists studying how bacteria under stress collectively weigh and initiate different survival strategies say they have gained new insights into how humans make strategic decisions that affect their health, wealth and the fate of others in society. The authors of the new study are theoretical physicists and chemists at the University of California, San Diego's Center for Theoretical Biological Physics. In nature, bacteria live in large colonies whose numbers may reach up to 100 times the number of people on earth. Many bacteria respond to extreme stress — such as starvation, poisoning and irradiation — by creating spores. Alternately the bacteria may 'choose' to enter a state called competence where they are able to absorb the nutrients from their newly deceased comrades. 'Each bacterium in the colony communicates via chemical messages and performs a sophisticated decision making process using a specialized network of genes and proteins. Modeling this complex interplay of genes and proteins by the bacteria enabled the scientists to assess the pros and cons of different choices in game theory. It pays for the individual cell to take the risk and escape into competence only if it notices that the majority of the cells decide to sporulate,' explained Onuchic. 'But if this is the case, it should not take this chance because most of the other cells might reach the same conclusion and escape from sporulation.'"
Image

NASA Tests Flying Airbag 118

coondoggie writes "NASA is looking to reduce the deadly impact of helicopter crashes on their pilots and passengers with what the agency calls a high-tech honeycomb airbag known as a deployable energy absorber. So in order to test out its technology NASA dropped a small helicopter from a height of 35 feet to see whether its deployable energy absorber, made up of an expandable honeycomb cushion, could handle the stress. The test crash hit the ground at about 54MPH at a 33 degree angle, what NASA called a relatively severe helicopter crash."
Microsoft

Microsoft Research Shows Off New Projects On College Recruiting Tour 62

In a recent college recruiting tour, Microsoft's Craig Mundie was able to showcase some of the experiments coming out of their Research division. Among some of the interesting projects were another pass at the Minority Report interface, eye-tracking, intelligent data sorting, a global carbon-climate model, and several other software and hardware experiments. A video and supporting slideshow are also available via Microsoft's press site. "Mundie also will discuss the kinds of computers students will soon be using – machines that will respond to gestures through new natural user interfaces; deploy the power of new microprocessors; migrate data to the cloud; and use live data to drive new simulations and visualizations. He’ll center on an environmental theme to show what it might be like to be a research scientist working on zero carbon energy in the future using new interactions with data and computers to increase insight."
The Military

Rise of the Robot Squadrons 245

Velcroman1 writes 'Taking a cue from the Terminator films, the US Navy is developing unmanned drones that network together and operate in 'swarms.' Predator drones have proven one of the most effective — and most controversial — weapons in the military arsenal. And now, these unmanned aircraft are talking to each other. Until now, each drone was controlled remotely by a single person over a satellite link. A new tech, demoed last week by NAVAIR, adds brains to those drones and allows one person to control a small squadron of them in an intelligent, semiautonomous network.'
Biotech

Scientists Build a Smarter Rat 302

destinyland writes "Scientists have engineered a more intelligent rat, with three times the memory length of today's smartest rats. Reseachers bred transgenic over-expression of the NR2B gene, which increased communication between the rat's memory synapses. Activating a crucial brain receptor for just a fraction of a second longer produces a dramatic effect on memory, as proven by the rat's longer memories of the path through a maze."

Comment Re:What I want (Score 3, Insightful) 554

Call me naive, but refusing to give up the keys does make you look guilty any which way you look at it.

Yes I do have locks on my doors too and they indeed come in useful to keep peeping toms out; however when the police knocks saying they suspect my basement to be a meth-lab, well I'll gladly let them in and go look for themselves

How about when the police knocks on your door asking to see your meth-lab, which is in fact your super-secret fantasy basement, complete with props for you sexual fetishes and evidence of your deviant fantasy of wanting to be your own mother?

The above is not against the law, but you might rather die than have your friends/relatives know about it. Also consider if the basement was the HQ of a (perfectly legal and moral, etc) secret anti-government organisation. While not illegal, I'm sure you would rather the police did not know of its existence.

Comment Re:Gold is the currency of the future (Score 1) 472

Then I'd say David Chaum's "digital cash" is not what will wind up being used.

Very possibly

And no, the tokens won't be useless unless payed into a bank. ... you simply stockpile them just like you would cash

With Chaum's protocol, the tokens are worthless unless they are repaid by the bank. Stockpiling them is worthless. That may or may not be good, but it's how the protocol works. Like you say, another protocol may be used.

Comment Re:Gold is the currency of the future (Score 1) 472

With digital cash*, one obtains a token from the bank, which they can then spend anonymously at stores. Obtaining the token is not anonymous, so criminals cannot make huge payoffs without the bank noticing that they're withdrawing £1,000,000 as a single token (or lots of little tokens at the same time). The tokens themselves are useless unless payed into the bank, and so if a gangsta receives £1,000,000 worth of tokens, it shall still be noticed by the bank. What will not be noticed by the bank is how they received the £1,000,000.

(The above is an argument against anonymous digital cash being worse than high-value bills; I'm not arguing against your other points)

* There are presumably many protocols for digital cash; I think I'm referring to the one introduced by David Chaum, but it was a while ago when I read about it.

Slashdot Top Deals

"Why can't we ever attempt to solve a problem in this country without having a 'War' on it?" -- Rich Thomson, talk.politics.misc

Working...