Search results for "MAC"
showing 10 items of 24950 documents
PolyACO+: a multi-level polygon-based ant colony optimisation classifier
2017
Ant Colony Optimisation for classification has mostly been limited to rule based approaches where artificial ants walk on datasets in order to extract rules from the trends in the data, and hybrid approaches which attempt to boost the performance of existing classifiers through guided feature reductions or parameter optimisations. A recent notable example that is distinct from the mainstream approaches is PolyACO, which is a proof of concept polygon-based classifier that resorts to ant colony optimisation as a technique to create multi-edged polygons as class separators. Despite possessing some promise, PolyACO has some significant limitations, most notably, the fact of supporting classific…
A flexible robotic cell for in-process inspection of multi-pass welds
2020
Welds are currently only inspected after all the passes are complete and after allowing sufficient time for any hydrogen cracking to develop, typically over several days. Any defects introduced between passes are therefore unreported until fully buried, greatly complicating rework and also delaying early corrections to the weld process parameters. In-process inspection can provide early intervention but involves many challenges, including operation at high temperatures with significant gradients affecting acoustic velocities and, hence, beam directions. Reflections from the incomplete parts of the weld would also be flagged as lack-of-fusion defects, requiring the region of interest (ROI) t…
A Novel Border Identification Algorithm Based on an “Anti-Bayesian” Paradigm
2013
Published version of a chapter in the book: Computer Analysis of Images and Patterns. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-40261-6_23 Border Identification (BI) algorithms, a subset of Prototype Reduction Schemes (PRS) aim to reduce the number of training vectors so that the reduced set (the border set) contains only those patterns which lie near the border of the classes, and have sufficient information to perform a meaningful classification. However, one can see that the true border patterns (“near” border) are not able to perform the task independently as they are not able to always distinguish the testing samples. Thus, researchers have worked on thi…
Grading investment diversification options in presence of non-historical financial information
2021
Modern portfolio theory deals with the problem of selecting a portfolio of financial assets such that the expected return is maximized for a given level of risk. The forecast of the expected individual assets’ returns and risk is usually based on their historical returns. In this work, we consider a situation in which the investor has non-historical additional information that is used for the forecast of the expected returns. This implies that there is no obvious statistical risk measure any more, and it poses the problem of selecting an adequate set of diversification constraints to mitigate the risk of the selected portfolio without losing the value of the non-statistical information owne…
Variable neighborhood descent for the incremental graph drawing
2017
Abstract Graphs are used to represent reality in several areas of knowledge. Drawings of graphs have many applications, from project scheduling to software diagrams. The main quality desired for drawings of graphs is readability, and crossing reduction is a fundamental aesthetic criterion for a good representation of a graph. In this paper we target the edge crossing reduction in the context of incremental graph drawing, in which we want to preserve the layout of a graph over successive drawings. We propose a hybrid method based on the GRASP (Greedy Randomized Adaptive Search Procedure) and VND (Variable Neighborhood Descent) methodologies and compare it with previous methods via simulation.
Evaluation of Coded Excitations for Autonomous Airborne Ultrasonic Inspection
2019
Unmanned Aerial Vehicles (UAVs) are receiving increasing attention for use in Non-Destructive Testing due to their ability to access areas where manual inspection is not practical. Contact-based UAV ultrasonic inspections grant the opportunity to remotely monitor the structural health of an industrial asset with enhanced internal integrity information. Ultrasonic inspection is a Non-Destructive Testing (NDT) method conventionally used in corrosion mapping. Surface contacting ultrasonic transducers provide enhanced structural integrity information. However, due to near-surface aerodynamic effects, angular sensitivity of the ultrasound probe and alignment error during autonomous inspections, …
Rodzinna postpamięć Ślązaków
2017
Family Postmemory of the People of Silesia
 The author suggests a possible use of postmemory to analyse the contemporary family memory of the people of Silesia. Their memoirs about WW2 (such as working for the Wehrmacht, the Red Army invading Silesia, working in labour camps, nationality verification, displacements to Germany, and deportations to Siberia) bear signs of latent memory which is rarely revealed even to the next of kin. Present mainly within the family circle, within the local society, and among friends, these memoirs integrated Silesians and made them a unique community that considers itself a stigmatized minority. This contributed to mythologizing and stereotyping the who…
Connecting theories of cascading disasters and disaster diplomacy
2018
Abstract Disaster diplomacy examines how and why disaster-related activities (disaster risk reduction and post-disaster actions) do and do not influence peace and conflict processes, especially whether or not a causal chain can be established between dealing with disaster risk or a disaster and outcomes in peace or conflict. Cascading disasters might provide a useful theoretical framing for mapping out causal pathways for disaster diplomacy. In conceptually exploring the intersection between disaster diplomacy and cascading disasters, this paper concludes that both disaster diplomacy and cascading disasters have limitations because they try to develop focused causal chains which, when exami…
Sharing R&D investments in breakthrough technologies to control climate change
2017
This paper examines international cooperation on technological development as an alternative to international cooperation on GHG emission reductions. In order to analyze the scope of cooperation, a three-stage technology agreement formation game is solved. First, countries decide whether or not to sign up to the agreement. Then, in the second stage, the signatories (playing together) and the non-signatories (playing individually) select their investment in R&D. In this stage, it is assumed that the signatories not only coordinate their levels of R&D investment but also pool their R&D efforts to fully internalize the spillovers of their investment in innovation. Finally, in the third stage, …
2018
Abstract Disaster diplomacy investigates how and why disaster-related activities do and do not influence conflict and cooperation. Studies into the topic so far have tended to develop the theory, analyse a specific case study in space and time, or connect both. Explorations of disaster diplomacy case studies over the long-term are so far absent from the literature. This paper explores Jammu and Kashmir in the Himalaya as a long-term case study for disaster diplomacy. Jammu and Kashmir has a long history of conflicts, multiple environmental hazards, and significant vulnerabilities yielding major disasters, with each topic generally addressed separately in the literature. This paper explores …