26,045 research outputs found

    Hybrid On-Device Cloud Scheme for Re-Identification of Persons Based on Shared Embedding Gallery

    Get PDF
    Generally, the present disclosure is directed to a system of facial and/or person recognition via machine learning and Internet of Things (IoT). In particular, in some implementations, the systems and methods of the present disclosure can include or otherwise leverage a machine learning and IoT system or device to track and/or identify a person based on video images taken by one or more device(s). For example, a hybrid on-device and cloud scheme can enable locally-derived embeddings from multiple camera devices to be sent to a shared cloud space which can cluster the embeddings to generate a person model for a given person. Later, a camera device participating in the scheme can again detect a face and can match an embedding generated for the face against the shared gallery of person models to (potentially) re-identify the previously observed person

    Exploring hybridity in food supply chains

    Get PDF
    In recent years, a number of dynamic aspects of food supply chains have attracted great interest among social scientists investigating rural restructuring and change. These include: the expansion of organic agriculture; the development of new value added enterprises at farm level and the revitalisation of traditional and new-old artisanal production practices; the expansion from a low base of the market share of alternative short supply chains, such as farmers markets; and the so-called quality turn, riding on the heels of another turn in rural social research - the consumption turn. All of these changes come together in a vision of alternative agro food networks (AAFNs) that has been built around empirical and theoretical work from a number of predominantly European social researchers, centred on Wageningen, but conducted in a number of countries in Europe. These and other associated changes in the composition of farm-based economic activity are seen to be constitutive of a new paradigm of rural development comprising an alternative network of producers, consumers and other actors in relation to the mainstream agro-food system (Van der Ploeg et al. 2000; Van der Ploeg and Renting 2004; Renting et al. 2003). The theorisation surrounding this work on AAFNs has been sharply criticised by Goodman (2004). He challenges the vision of certain European social scientists of an alternative food sector rising like a phoenix from the ashes of the commodity-based food system to constitute a new paradigm of rural development. He notes their view of AAFNs as: innovative precursors of paradigm change, of a more endogenous, territorialized and ecologically embedded successor to the allegedly crisis-ridden modernisation model of conventional industrialised agriculture. (Goodman 2004:6) In particular, he challenges the binary categorisation into alternative and mainstream and is deeply sceptical as to the existence of a new paradigm while, at the same time, highly cognisant of dynamic changes within the agro-food sector. This paper is motivated by a desire to explore the extent to which different theories can help interpret and explain some of the most dynamic areas of agro-food systems that belong neither in the mainstream food supply chains and networks, nor in the alternative food supply networks. We review two areas where we argue that hybridity is evident in food supply chains and networks, and draw conclusions as to the research needs in a field where too often dualistic interpretations have prevailed.Agribusiness,

    Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities

    Full text link
    Robotics and Artificial Intelligence (AI) have been inextricably intertwined since their inception. Today, AI-Robotics systems have become an integral part of our daily lives, from robotic vacuum cleaners to semi-autonomous cars. These systems are built upon three fundamental architectural elements: perception, navigation and planning, and control. However, while the integration of AI-Robotics systems has enhanced the quality our lives, it has also presented a serious problem - these systems are vulnerable to security attacks. The physical components, algorithms, and data that make up AI-Robotics systems can be exploited by malicious actors, potentially leading to dire consequences. Motivated by the need to address the security concerns in AI-Robotics systems, this paper presents a comprehensive survey and taxonomy across three dimensions: attack surfaces, ethical and legal concerns, and Human-Robot Interaction (HRI) security. Our goal is to provide users, developers and other stakeholders with a holistic understanding of these areas to enhance the overall AI-Robotics system security. We begin by surveying potential attack surfaces and provide mitigating defensive strategies. We then delve into ethical issues, such as dependency and psychological impact, as well as the legal concerns regarding accountability for these systems. Besides, emerging trends such as HRI are discussed, considering privacy, integrity, safety, trustworthiness, and explainability concerns. Finally, we present our vision for future research directions in this dynamic and promising field

    International Taxation in an Era of Digital Disruption: Analyzing the Current Debate

    Get PDF
    The “taxation of the digital economy” is currently at the top of the global international tax policymaking agenda. A core claim some European governments are advancing is that user data or user participation in the digital economy justifies a gross tax on digital receipts, new profit attribution criteria, or a special formulary apportionment factor in a future formulary regime targeted specifically at the “digital economy.” Just a couple years ago the OECD undertook an evaluation of whether the digital economy can (or should) be “ring-fenced” as part of the BEPS project, and concluded that it neither can be nor should be. Importantly, concluding that there should be no special rules for the digital economy does not resolve the broader question of whether the international tax system requires reform. The practical reality appears to be that all the largest economies have come to agree either that a) there is something wrong with the taxation of the “digital economy,” or b) there is something more fundamentally wrong with the structure of the current international tax system given globalization and technological trends. This paper is intended as a limited exploration of the second (or third, or fourth) best. It analyzes three policy options that have been discussed in general terms in the current global debate. First, I consider whether “user participation” justifies changing profit allocation results in the digital economy alone. I conclude that applying the user participation concept in a manner that is limited to the digital economy is intellectually indefensible; at most it amounts to mercantilist ring-fencing. Moreover, at the technical level user participation faces all the same challenges as more comprehensive and principled proposals for reallocating excess returns among jurisdictions. Second, I consider one such comprehensive international tax reform idea, loosely referred to by the moniker “marketing intangibles.” This idea represents a compromise between the present transfer pricing system and sales or destination-based reforms to the transfer pricing regime. I conclude that splitting taxing rights over “excess” returns between the present transfer pricing system and a destination-based approach is complex, creates new sources of potential conflict, and requires relatively extensive tax harmonization. This conclusion applies equally to user participation and marketing intangibles. If such a mechanism were nevertheless pursued, I suggest that a formulary system for splitting the excess return is the most manageable approach. Third, I consider “minimum effective taxation” ideas. I conclude that, as compared to the other two policy options discussed herein, minimum effective taxation provides a preferable path for multilateral cooperation

    Design Of An Automatic Bell Warning System For Prayer Times In A Net Centric Computing Lab

    Get PDF
    The development of science and technology is now increasingly providing convenience in everyday life. Various household appliances to office work tools use electronic devices so that human work is much lighter and easier. As an example of the use of an Arduino microcontroller which is used as an automatic bell time warning bell control. This research wants to provide a solution to these problems by giving automatic prayer times. The formulation of the problem in research is. (i) How do you design and implement a set of prayer time warning bell system tools? (ii) How do you test the series of prayer bell alert system tools? There are several research objectives including the following. (i) Can design and implement a series of prayer time warning bell system tools. (ii) Can produce a test time series of prayer time bell alarm system tools. The method in this study includes (i) analysis consisting of needs analysis, and analysis of work methods, (ii) Design consisting of Hardware Design, and Network Design (iii) Implementation consists of Hardware Implementation, Software Implementation , (iv) Testing Consists of Real Time Clock (RTC) Testing, Dfplayer Testing, i2c LCD Testing, System Testing Results, Telegram Testing. This prayer time automatic alarm bell is equipped with a dfplayer module that can play mp3, or wav, sound file formats. So the call to prayer information can play well. And this warning bell system will provide a notification to the telegram when the call to prayer time has arrived

    Once in Orange Always in Orange? The Cognitive, Emotional and Material Elements of De-Identification and Logic Resilience

    Get PDF
    Individuals within society are shaped by the institutional logics that have come to shape their identities. In this dissertation I explore how actors de-identify with the identities prescribed by institutional logics during a transition that renders these identities unproductive and inappropriate. In particular I examine the types of identity work previously incarcerated men engage in during the transition from prison back into society as they attempt to shed and de-identify with “convict identities”. My findings reveal that institutional logics have a resilient, that is enduring, influence on identity in the face of transition even when the identities prescribed by these logics are unproductive and potentially harmful. I find that identity work can be constrained and constituted by institutional logics and disable processes of de-identification. However, my findings also reveal that institutional logics can be de-activated though reflexive identity work. This identity work involves opening up, talking critically, and self-regulating to envision a new sense of self. Sustained de-identification through reflexive identity work is enabled by the availability and accessibility of alternative logics that are meaningful and believable and by emotion work to foster feelings of acceptance and faith. However, sustained de-identification is constrained by identity regulation and the absence of institutional materials. This dissertation thus highlights the importance of cognition, emotion and materiality to the resilience of institutional logics and de-identification.

    Introduction: food relocalisation and knowledge dynamics for sustainability in rural areas

    Get PDF
    The chapter presents the literature on local food and local knowledge and introduces the case studies analysed in the volum
    • 

    corecore