Search results for "Main"

showing 10 items of 4384 documents

Identification of Objects Based on Generalized Amplitude-Phase Images Statistical Models

2017

The article presents the dynamical objects identification technology based on statistical models of amplitude-phase images (APIm) – multidimensional data arrays (semantic models) and statistical correlation analysis methods using the generalized discrete Hilbert transforms (DHT) – 2D Hilbert (Foucault) isotropic (HTI), anisotropic (HTA) and total transforms – AP-analysis (APA) to calculate the APIm. The identified objects are modeled with 3D airplanes templates rotated in space around the center of Cartesian coordinate system. The DHT domain system of coordinates displaying the plane projections (2D flat images) remains to be space-invariant. That causes the anisotropic properties of APIm a…

0209 industrial biotechnologyamplitude-phase imagesMatching (graph theory)Plane (geometry)Computer scienceIsotropydynamic object identificationStatistical model02 engineering and technologyResidualDomain (mathematical analysis)law.invention020901 industrial engineering & automationlawAdjacency listCartesian coordinate systemgeneralized Hilbert transformsAnisotropyAlgorithm
researchProduct

Abnormal Textures Identification Based on Digital Hilbert Optics Methods: Fundamental Transforms and Models

2017

The article presents the abnormal textures identification technology based on structural and statistical models of amplitude-phase images (APIm) – multidimensional data arrays (semantic models) and statistical correlation analysis methods using the generalized discrete Hilbert transforms (DHT) – 2D Hilbert (Foucault) isotropic (HTI), anisotropic (HTA) and total transforms – AP-analysis (APA) to calculate the APIm. The identified fragments of textures are obtained as examples of experimental observation of real mammograms contains areas of pathological tissues. The DHT based information technology as conceptual chart description is discussed and illustrated with DHO domain images. As additio…

0209 industrial biotechnologybusiness.industryComputer scienceIsotropyStatistical modelPattern recognition02 engineering and technologyBase (topology)Domain (mathematical analysis)030218 nuclear medicine & medical imaging03 medical and health sciencesIdentification (information)020901 industrial engineering & automation0302 clinical medicineComputer visionArtificial intelligenceAnomaly (physics)Anisotropybusiness
researchProduct

Types of Mimetics for the Design of Intelligent Technologies

2019

Mimetic design means using a source in the natural or artificial worlds as an inspiration for technological solutions. It is based around the abstraction of the relevant operating principles in a source domain. This means that one must be able to identify the correct level of analysis and extract the relevant patterns. How this should be done is based on the type of source. From a mimetic perspective, if the design goal is intelligent technology, an obvious source of inspiration is human information processing, which we have called cognitive mimetics. This article offers some conceptual clarification on the nature of cognitive mimetics by contrasting it with biomimetics in the context of in…

0209 industrial biotechnologydesign mimeticsComputer scienceContext (language use)02 engineering and technologyOntology (information science)tekoälyDomain (software engineering)intelligent technology020901 industrial engineering & automationHuman–computer interactionDesign mimeticsdesign methods0202 electrical engineering electronic engineering information engineeringDesign methodsAbstraction (linguistics)Intelligent technologyInformation processingCognitionDesign methodssuunnitteluAImimesisälytekniikka020201 artificial intelligence & image processingBiomimetics
researchProduct

Using Inverse Reinforcement Learning with Real Trajectories to Get More Trustworthy Pedestrian Simulations

2020

Reinforcement learning is one of the most promising machine learning techniques to get intelligent behaviors for embodied agents in simulations. The output of the classic Temporal Difference family of Reinforcement Learning algorithms adopts the form of a value function expressed as a numeric table or a function approximator. The learned behavior is then derived using a greedy policy with respect to this value function. Nevertheless, sometimes the learned policy does not meet expectations, and the task of authoring is difficult and unsafe because the modification of one value or parameter in the learned value function has unpredictable consequences in the space of the policies it represents…

0209 industrial biotechnologyreinforcement learningComputer scienceGeneral Mathematics02 engineering and technologypedestrian simulationTask (project management)learning by demonstration020901 industrial engineering & automationAprenentatgeInformàticaBellman equation0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Reinforcement learningEngineering (miscellaneous)business.industrycausal entropylcsh:MathematicsProcess (computing)020206 networking & telecommunicationsFunction (mathematics)inverse reinforcement learninglcsh:QA1-939Problem domainTable (database)Artificial intelligenceTemporal difference learningbusinessoptimizationMathematics
researchProduct

The ‘Open Garden of Politics’: The impact of open primaries for candidate selection in the British Conservative Party

2016

International audience; Since 2003, hundreds of open primaries for the selection of parliamentary candidates have been held by the British Conservative Party as a means of democratising party organisation and enhancing representativeness. In the run-up to the 2015 general election, only 26 primaries could be identified. This article will apply the analytical framework provided by Hazan and Rahat to demonstrate that the relative failure of the experiment in terms of intra-party competition, participation, representation and responsiveness is counterbalanced by the benefits brought by this procedure, both as a tool of party branding at the national level and as a strategy for raising the prof…

021110 strategic defence & security studies05 social sciences"open primaries"0211 other engineering and technologies"general election"02 engineering and technologyManagement Monitoring Policy and LawPublic administration"Conservative Party"[SHS.SCIPO]Humanities and Social Sciences/Political science0506 political scienceRepresentation (politics)Competition (economics)PopulismPoliticsGeneral electionPolitical sciencePolitical economy"candidate selection"Political Science and International Relations050602 political science & public administrationMainstreamDemocratizationBlanket primary[ SHS.SCIPO ] Humanities and Social Sciences/Political science
researchProduct

The Role the Static Maximization Approach Plays in Neoclassical Analyses

1994

This is an article on the methodology of economic thought. The critical assessment of the neoclassical research programme contained here basically comes from the contributions of J.M. Buchanan, Nobel prize winner in Economics 1986. These comments are aimed at pointing out the role that the static maximization approach plays in neoclassical analyses since L. Robbins and P. Samuelson’s influential contributions came about after World War II. Just to complement this basic purpose, I present in section 4 the alternative methodological foundations J.M. Buchanan proposes and uses to replace the static maximization approach when building public choice analyses and I sketch in section 5 several pe…

021110 strategic defence & security studiesEconomics and Econometrics05 social sciences0211 other engineering and technologiesMainstream economics02 engineering and technologyMaximizationPublic choiceSketch0506 political sciencePower (social and political)Section (archaeology)050602 political science & public administrationEconomicsCritical assessmentPositive economicsMathematical economicsComplement (set theory)Journal of Interdisciplinary Economics
researchProduct

Digital Volunteers in Disaster Response: Accessibility Challenges

2019

The emergence of the Digital Humanitarian Volunteer (DHV) movements when disaster strikes have drawn the attention of researchers and practitioners in the emergency management and humanitarian domain. While there are established players in this rapidly developing field, there are still unresolved challenges, including accessibility of their digital tools and platforms. The purposes of this paper are twofold. First, it describes the background, impact and future potential of the DHV movement, and discusses the importance of universal design for the digital tools and platforms used for crowdsourcing of crisis information. Second, this paper shows how lack of concern for universal design and a…

021110 strategic defence & security studiesEmergency managementCrisis mappingbusiness.industryComputer scienceInternet privacy0211 other engineering and technologies02 engineering and technologyAccessibilityDisaster responseCrisis mappingCrowdsourcingField (computer science)Digital humanitarian volunteersDomain (software engineering)020204 information systems0202 electrical engineering electronic engineering information engineeringCrowdsourcingSituational ethicsbusiness
researchProduct

Preventive maintenance versus cost of repairs in asset management: An efficiency analysis in wastewater treatment plants

2020

Abstract The operation and management of Wastewater Treatment Plants (WWTPs) is of paramount importance to guarantee the sustainability of water resources. Just like any other production process, wastewater treatment process involves different costs, such as: energy, personnel, maintenance and reagents. Regarding maintenance costs, they have become an issue of great concern to many operators in the last years. Maintaining the facilities in good condition ensures the proper performance of these infrastructures and reduces the risk of failures. It should be known that equipment breakdowns imply an increase in operating costs, with a high risk of generating an environmental damage due to the m…

021110 strategic defence & security studiesEnvironmental Engineeringbusiness.industryProcess (engineering)General Chemical Engineering0211 other engineering and technologies02 engineering and technology010501 environmental sciences01 natural sciencesPreventive maintenanceWater resourcesEmpirical researchRisk analysis (engineering)Order (business)SustainabilityEnvironmental ChemistryAsset managementSewage treatmentSafety Risk Reliability and Qualitybusiness0105 earth and related environmental sciencesProcess Safety and Environmental Protection
researchProduct

Understanding the Importance of Proper Incentives for Critical Infrastructures Management – How System Dynamics Can Help

2016

International audience; Computer and information systems are now at the core of numerous critical infrastructures. However, their security management is by far not a trivial issue. Further, these systems, by their very nature, belong to the domain of complex systems, where system dynamics (SD) is an established method, which aims at modelling such systems, their analysis and understanding. Further, on this basis it enables simulation of various policies to properly manage complex systems. More precisely, through understanding of the basic elements of the whole mosaic and their interplay, proper incentives can be tested. And this is important, because proper incentives can lead to the desire…

021110 strategic defence & security studiesManagement sciencebusiness.industry020209 energy0211 other engineering and technologiesComplex systemModeling and simulation02 engineering and technologyDomain (software engineering)System dynamicsManagementModeling and simulationCritical infrastructuresIncentiveRisk analysis (engineering)0202 electrical engineering electronic engineering information engineeringInformation systemSecurity managementThe Internet[INFO]Computer Science [cs]BusinessPolicies
researchProduct

Finding Software Bugs in Embedded Devices

2021

AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…

021110 strategic defence & security studiessulautettu tietotekniikkaComputer sciencebusiness.industryembedded devices0211 other engineering and technologies020207 software engineering02 engineering and technologysecurityField (computer science)Domain (software engineering)Embedded softwareSoftwareSoftware bugohjelmointivirheetSoftware deploymentEmbedded systemsoftware bugs0202 electrical engineering electronic engineering information engineeringtietoturvabusinessInternet of ThingsGeneral purpose software
researchProduct