Search results for "Main"
showing 10 items of 4384 documents
Identification of Objects Based on Generalized Amplitude-Phase Images Statistical Models
2017
The article presents the dynamical objects identification technology based on statistical models of amplitude-phase images (APIm) – multidimensional data arrays (semantic models) and statistical correlation analysis methods using the generalized discrete Hilbert transforms (DHT) – 2D Hilbert (Foucault) isotropic (HTI), anisotropic (HTA) and total transforms – AP-analysis (APA) to calculate the APIm. The identified objects are modeled with 3D airplanes templates rotated in space around the center of Cartesian coordinate system. The DHT domain system of coordinates displaying the plane projections (2D flat images) remains to be space-invariant. That causes the anisotropic properties of APIm a…
Abnormal Textures Identification Based on Digital Hilbert Optics Methods: Fundamental Transforms and Models
2017
The article presents the abnormal textures identification technology based on structural and statistical models of amplitude-phase images (APIm) – multidimensional data arrays (semantic models) and statistical correlation analysis methods using the generalized discrete Hilbert transforms (DHT) – 2D Hilbert (Foucault) isotropic (HTI), anisotropic (HTA) and total transforms – AP-analysis (APA) to calculate the APIm. The identified fragments of textures are obtained as examples of experimental observation of real mammograms contains areas of pathological tissues. The DHT based information technology as conceptual chart description is discussed and illustrated with DHO domain images. As additio…
Types of Mimetics for the Design of Intelligent Technologies
2019
Mimetic design means using a source in the natural or artificial worlds as an inspiration for technological solutions. It is based around the abstraction of the relevant operating principles in a source domain. This means that one must be able to identify the correct level of analysis and extract the relevant patterns. How this should be done is based on the type of source. From a mimetic perspective, if the design goal is intelligent technology, an obvious source of inspiration is human information processing, which we have called cognitive mimetics. This article offers some conceptual clarification on the nature of cognitive mimetics by contrasting it with biomimetics in the context of in…
Using Inverse Reinforcement Learning with Real Trajectories to Get More Trustworthy Pedestrian Simulations
2020
Reinforcement learning is one of the most promising machine learning techniques to get intelligent behaviors for embodied agents in simulations. The output of the classic Temporal Difference family of Reinforcement Learning algorithms adopts the form of a value function expressed as a numeric table or a function approximator. The learned behavior is then derived using a greedy policy with respect to this value function. Nevertheless, sometimes the learned policy does not meet expectations, and the task of authoring is difficult and unsafe because the modification of one value or parameter in the learned value function has unpredictable consequences in the space of the policies it represents…
The ‘Open Garden of Politics’: The impact of open primaries for candidate selection in the British Conservative Party
2016
International audience; Since 2003, hundreds of open primaries for the selection of parliamentary candidates have been held by the British Conservative Party as a means of democratising party organisation and enhancing representativeness. In the run-up to the 2015 general election, only 26 primaries could be identified. This article will apply the analytical framework provided by Hazan and Rahat to demonstrate that the relative failure of the experiment in terms of intra-party competition, participation, representation and responsiveness is counterbalanced by the benefits brought by this procedure, both as a tool of party branding at the national level and as a strategy for raising the prof…
The Role the Static Maximization Approach Plays in Neoclassical Analyses
1994
This is an article on the methodology of economic thought. The critical assessment of the neoclassical research programme contained here basically comes from the contributions of J.M. Buchanan, Nobel prize winner in Economics 1986. These comments are aimed at pointing out the role that the static maximization approach plays in neoclassical analyses since L. Robbins and P. Samuelson’s influential contributions came about after World War II. Just to complement this basic purpose, I present in section 4 the alternative methodological foundations J.M. Buchanan proposes and uses to replace the static maximization approach when building public choice analyses and I sketch in section 5 several pe…
Digital Volunteers in Disaster Response: Accessibility Challenges
2019
The emergence of the Digital Humanitarian Volunteer (DHV) movements when disaster strikes have drawn the attention of researchers and practitioners in the emergency management and humanitarian domain. While there are established players in this rapidly developing field, there are still unresolved challenges, including accessibility of their digital tools and platforms. The purposes of this paper are twofold. First, it describes the background, impact and future potential of the DHV movement, and discusses the importance of universal design for the digital tools and platforms used for crowdsourcing of crisis information. Second, this paper shows how lack of concern for universal design and a…
Preventive maintenance versus cost of repairs in asset management: An efficiency analysis in wastewater treatment plants
2020
Abstract The operation and management of Wastewater Treatment Plants (WWTPs) is of paramount importance to guarantee the sustainability of water resources. Just like any other production process, wastewater treatment process involves different costs, such as: energy, personnel, maintenance and reagents. Regarding maintenance costs, they have become an issue of great concern to many operators in the last years. Maintaining the facilities in good condition ensures the proper performance of these infrastructures and reduces the risk of failures. It should be known that equipment breakdowns imply an increase in operating costs, with a high risk of generating an environmental damage due to the m…
Understanding the Importance of Proper Incentives for Critical Infrastructures Management – How System Dynamics Can Help
2016
International audience; Computer and information systems are now at the core of numerous critical infrastructures. However, their security management is by far not a trivial issue. Further, these systems, by their very nature, belong to the domain of complex systems, where system dynamics (SD) is an established method, which aims at modelling such systems, their analysis and understanding. Further, on this basis it enables simulation of various policies to properly manage complex systems. More precisely, through understanding of the basic elements of the whole mosaic and their interplay, proper incentives can be tested. And this is important, because proper incentives can lead to the desire…
Finding Software Bugs in Embedded Devices
2021
AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…