Search results for "MAC"

showing 10 items of 24950 documents

PolyACO+: a multi-level polygon-based ant colony optimisation classifier

2017

Ant Colony Optimisation for classification has mostly been limited to rule based approaches where artificial ants walk on datasets in order to extract rules from the trends in the data, and hybrid approaches which attempt to boost the performance of existing classifiers through guided feature reductions or parameter optimisations. A recent notable example that is distinct from the mainstream approaches is PolyACO, which is a proof of concept polygon-based classifier that resorts to ant colony optimisation as a technique to create multi-edged polygons as class separators. Despite possessing some promise, PolyACO has some significant limitations, most notably, the fact of supporting classific…

021103 operations researchArtificial neural networkComputer sciencebusiness.industryPolygonsTraining timeMulti-levelling0211 other engineering and technologiesPattern recognition02 engineering and technologyAnt colonySupport vector machineArtificial IntelligenceMultiple time dimensionsPolygonAnt colony optimisation0202 electrical engineering electronic engineering information engineeringArtificial Ants020201 artificial intelligence & image processingArtificial intelligenceClassificationsbusinessClassifier (UML)
researchProduct

A flexible robotic cell for in-process inspection of multi-pass welds

2020

Welds are currently only inspected after all the passes are complete and after allowing sufficient time for any hydrogen cracking to develop, typically over several days. Any defects introduced between passes are therefore unreported until fully buried, greatly complicating rework and also delaying early corrections to the weld process parameters. In-process inspection can provide early intervention but involves many challenges, including operation at high temperatures with significant gradients affecting acoustic velocities and, hence, beam directions. Reflections from the incomplete parts of the weld would also be flagged as lack-of-fusion defects, requiring the region of interest (ROI) t…

021103 operations researchComputer scienceTKMechanical EngineeringGas tungsten arc welding0211 other engineering and technologiesMetals and AlloysReworkProcess (computing)Mechanical engineering02 engineering and technologyWeldingWork in process01 natural scienceslaw.inventionSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchineMechanics of MaterialslawRegion of interest0103 physical sciencesMaterials ChemistryRobotUltrasonic sensorRobotics In-process inspection Multi-pass welds010301 acoustics
researchProduct

A Novel Border Identification Algorithm Based on an “Anti-Bayesian” Paradigm

2013

Published version of a chapter in the book: Computer Analysis of Images and Patterns. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-40261-6_23 Border Identification (BI) algorithms, a subset of Prototype Reduction Schemes (PRS) aim to reduce the number of training vectors so that the reduced set (the border set) contains only those patterns which lie near the border of the classes, and have sufficient information to perform a meaningful classification. However, one can see that the true border patterns (“near” border) are not able to perform the task independently as they are not able to always distinguish the testing samples. Thus, researchers have worked on thi…

021103 operations researchComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 4220211 other engineering and technologiesClass (philosophy)02 engineering and technologyField (computer science)Term (time)Support vector machineSet (abstract data type)Identification (information)Bayes' theoremCardinality0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingVDP::Mathematics and natural science: 400::Mathematics: 410::Algebra/algebraic analysis: 414InformationSystems_MISCELLANEOUSAlgorithm
researchProduct

Grading investment diversification options in presence of non-historical financial information

2021

Modern portfolio theory deals with the problem of selecting a portfolio of financial assets such that the expected return is maximized for a given level of risk. The forecast of the expected individual assets’ returns and risk is usually based on their historical returns. In this work, we consider a situation in which the investor has non-historical additional information that is used for the forecast of the expected returns. This implies that there is no obvious statistical risk measure any more, and it poses the problem of selecting an adequate set of diversification constraints to mitigate the risk of the selected portfolio without losing the value of the non-statistical information owne…

021103 operations researchIndex (economics)diversificationGeneral MathematicsRisk measurelcsh:Mathematics0211 other engineering and technologiesDiversification (finance)UNESCO::CIENCIAS ECONÓMICAS02 engineering and technologyInvestment (macroeconomics)lcsh:QA1-939:CIENCIAS ECONÓMICAS [UNESCO]value of informationValue of information0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)EconomicsEconometricsPortfolioExpected returnportfolio selection020201 artificial intelligence & image processingEngineering (miscellaneous)Modern portfolio theory
researchProduct

Variable neighborhood descent for the incremental graph drawing

2017

Abstract Graphs are used to represent reality in several areas of knowledge. Drawings of graphs have many applications, from project scheduling to software diagrams. The main quality desired for drawings of graphs is readability, and crossing reduction is a fundamental aesthetic criterion for a good representation of a graph. In this paper we target the edge crossing reduction in the context of incremental graph drawing, in which we want to preserve the layout of a graph over successive drawings. We propose a hybrid method based on the GRASP (Greedy Randomized Adaptive Search Procedure) and VND (Variable Neighborhood Descent) methodologies and compare it with previous methods via simulation.

021103 operations researchTheoretical computer sciencebusiness.industryApplied MathematicsGRASP0211 other engineering and technologies010103 numerical & computational mathematics02 engineering and technologyMachine learningcomputer.software_genre01 natural sciencesReadabilitySoftwareGraph drawingDiscrete Mathematics and CombinatoricsArtificial intelligenceForce-directed graph drawing0101 mathematicsbusinessGraph operationsMetaheuristiccomputerGreedy randomized adaptive search procedureMathematicsofComputing_DISCRETEMATHEMATICSMathematicsElectronic Notes in Discrete Mathematics
researchProduct

Evaluation of Coded Excitations for Autonomous Airborne Ultrasonic Inspection

2019

Unmanned Aerial Vehicles (UAVs) are receiving increasing attention for use in Non-Destructive Testing due to their ability to access areas where manual inspection is not practical. Contact-based UAV ultrasonic inspections grant the opportunity to remotely monitor the structural health of an industrial asset with enhanced internal integrity information. Ultrasonic inspection is a Non-Destructive Testing (NDT) method conventionally used in corrosion mapping. Surface contacting ultrasonic transducers provide enhanced structural integrity information. However, due to near-surface aerodynamic effects, angular sensitivity of the ultrasound probe and alignment error during autonomous inspections, …

021103 operations researchbusiness.industryComputer scienceTKUAVAcousticsUltrasonic testing0211 other engineering and technologies02 engineering and technology01 natural sciencesSignalCorrosionSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchineTransducerUltrasound probeSignal-to-noise ratioUltrasonic InspectionNondestructive testing0103 physical sciencesUltrasonic sensorCoded Excitationbusiness010301 acoustics2019 IEEE International Ultrasonics Symposium (IUS)
researchProduct

Rodzinna postpamięć Ślązaków

2017

Family Postmemory of the People of Silesia
 The author suggests a possible use of postmemory to analyse the contemporary family memory of the people of Silesia. Their memoirs about WW2 (such as working for the Wehrmacht, the Red Army invading Silesia, working in labour camps, nationality verification, displacements to Germany, and deportations to Siberia) bear signs of latent memory which is rarely revealed even to the next of kin. Present mainly within the family circle, within the local society, and among friends, these memoirs integrated Silesians and made them a unique community that considers itself a stigmatized minority. This contributed to mythologizing and stereotyping the who…

021110 strategic defence & security studies05 social sciencesWorld War II0211 other engineering and technologiesPharmaceutical Sciencepostpamięćpamięć rodzinna02 engineering and technologyAncient historyK0506 political scienceJII wojna światowapamięć utajniona ŚlązakówComplementary and alternative medicinePolitical science050602 political science & public administrationPharmacology (medical)LawPolitical sciencePoliteja
researchProduct

Connecting theories of cascading disasters and disaster diplomacy

2018

Abstract Disaster diplomacy examines how and why disaster-related activities (disaster risk reduction and post-disaster actions) do and do not influence peace and conflict processes, especially whether or not a causal chain can be established between dealing with disaster risk or a disaster and outcomes in peace or conflict. Cascading disasters might provide a useful theoretical framing for mapping out causal pathways for disaster diplomacy. In conceptually exploring the intersection between disaster diplomacy and cascading disasters, this paper concludes that both disaster diplomacy and cascading disasters have limitations because they try to develop focused causal chains which, when exami…

021110 strategic defence & security studiesDisaster risk reductionmedia_common.quotation_subject05 social sciences0211 other engineering and technologiesGeology02 engineering and technologyGeotechnical Engineering and Engineering Geology0506 political scienceFraming (social sciences)Political economyPolitical science050602 political science & public administrationCausal chainSafety ResearchDiplomacyCausal pathwaysmedia_commonInternational Journal of Disaster Risk Reduction
researchProduct

Sharing R&D investments in breakthrough technologies to control climate change

2017

This paper examines international cooperation on technological development as an alternative to international cooperation on GHG emission reductions. In order to analyze the scope of cooperation, a three-stage technology agreement formation game is solved. First, countries decide whether or not to sign up to the agreement. Then, in the second stage, the signatories (playing together) and the non-signatories (playing individually) select their investment in R&D. In this stage, it is assumed that the signatories not only coordinate their levels of R&D investment but also pool their R&D efforts to fully internalize the spillovers of their investment in innovation. Finally, in the third stage, …

021110 strategic defence & security studiesEconomics and EconometricsScope (project management)05 social sciencesControl (management)0211 other engineering and technologiesClimate change02 engineering and technologyInvestment (macroeconomics)MicroeconomicsOrder (exchange)Greenhouse gas0502 economics and businessDamagesEconomicsProduction (economics)050207 economicsIndustrial organizationOxford Economic Papers
researchProduct

2018

Abstract Disaster diplomacy investigates how and why disaster-related activities do and do not influence conflict and cooperation. Studies into the topic so far have tended to develop the theory, analyse a specific case study in space and time, or connect both. Explorations of disaster diplomacy case studies over the long-term are so far absent from the literature. This paper explores Jammu and Kashmir in the Himalaya as a long-term case study for disaster diplomacy. Jammu and Kashmir has a long history of conflicts, multiple environmental hazards, and significant vulnerabilities yielding major disasters, with each topic generally addressed separately in the literature. This paper explores …

021110 strategic defence & security studiesHistory010504 meteorology & atmospheric sciencesmedia_common.quotation_subject0211 other engineering and technologiesGeology02 engineering and technologyBuilding and ConstructionGeotechnical Engineering and Engineering Geology01 natural sciencesEnvironmental hazardEconomyIntersectionSafety ResearchDiplomacy0105 earth and related environmental sciencesmedia_commonInternational Journal of Disaster Risk Reduction
researchProduct