165 research outputs found

    NEW APPROACH TO INFORMATION AGGREGATION

    Get PDF
    In this paper new types of aggregation operators, namely absorbing-norms and parametric type of operator families called distance-based or evolutionary operators are introduced. Absorbing- norms are commutative, associative binary operators having an absorbing element from the uni! interval. A detailed discussion of properties and structure of these operators is given in the paper. Two types of distance-based operators are defined. The maximum and minimum distance operators with respect to e have the value of the element, which is farther, or nearer to e, respectively, where e is an arbitrary element of the unit interval [0,1]. The special cases e = O and e = 1lead to the max and min operators. The new operators are evolutionary types in the sense that if e is increasing starting from zero till e = 1 the min operator is developing into the max operator, while on the other side the max is transformed into the min operator. It is shown that the evolutionary operators can be constructed by means of min and max operators, which are also special cases of the operators. The maximum distance operators are special operators called uninorms and the minimum distance ones are absorbing-norms

    From Concept to Market: Surgical Robot Development

    Get PDF
    Surgical robotics and supporting technologies have really become a prime example of modern applied information technology infiltrating our everyday lives. The development of these systems spans across four decades, and only the last few years brought the market value and saw the rising customer base imagined already by the early developers. This chapter guides through the historical development of the most important systems, and provide references and lessons learnt for current engineers facing similar challenges. A special emphasis is put on system validation, assessment and clearance, as the most commonly cited barrier hindering the wider deployment of a system

    Surgery from a Distance—Application of Intelligent Control for Telemedicine

    Get PDF

    Adaptive Optimal Dynamic Control for Nonholonomic Systems

    Get PDF
    In this paper two different control methods are combined for controlling a typical nonholonomic device (a bicycle) the dynamic model and parameters of which are only approximately known. Most of such devices suffer from the problem that the time-derivatives of the coordinates of their location and orientation cannot independently be set so an arbitrarily prescribed trajectory cannot precisely be traced by them. For tackling this difficulty Optimal Control is proposed that can find acceptable compromise between the tracking error of the various coordinates. Further problem is that the solution proposed by the optimal controller cannot exactly be implemented in the lack of precise information on the dynamic model of the system. Based on the decoupled nature of the dynamic model of the longitudinal and lateral behavior of the engine special fixed point transformations are proposed to achieve adaptive tracking. These transformations were formerly successfully applied for the control of holonomic systems. It is the first time that the combined method is checked for various trajectories and dynamic model errors via simulation. It yielded promising results

    Incomplete Kratzel function model of leaky aquifer and alike functions

    Get PDF
    In this note our aim is to derive certain important properties of a general mathematical model given in the form of an incomplete Kratzel function which contains as sub–models the generalized leaky aquifer function, the van't Hoff thermal analysis temperature integral and the so–called thermonuclear integral among others

    TOWARDS THE GENERALIZATION OF T-OPERATORS: A DISTANCE BASED APPROACH

    Get PDF
    Aggregation is one of the key issues in the development of intelligent systems, just like with neural networks, fuzzy knowledge based systems, vision systems, and decision-making systems. From the point of view of a particular application the choice of the most appropriate operator is an important part of system design. This paper gives a brief summary of the best known operatorst- such as t-norms, t-conorms, uninorms, averaging and compensative operators, and outlines their most important properties. Two new pairs of distances, based on binary operations and their generalizations, are introduced, based on the fuzzy entropy approach, and their properties are outlined

    Entropy and Hausdorff Dimension in Random Growing Trees

    Full text link
    We investigate the limiting behavior of random tree growth in preferential attachment models. The tree stems from a root, and we add vertices to the system one-by-one at random, according to a rule which depends on the degree distribution of the already existing tree. The so-called weight function, in terms of which the rule of attachment is formulated, is such that each vertex in the tree can have at most K children. We define the concept of a certain random measure mu on the leaves of the limiting tree, which captures a global property of the tree growth in a natural way. We prove that the Hausdorff and the packing dimension of this limiting measure is equal and constant with probability one. Moreover, the local dimension of mu equals the Hausdorff dimension at mu-almost every point. We give an explicit formula for the dimension, given the rule of attachment

    The International Division of Labor in Economists' Field: Academic Subordination in Exchange for Political Prerogatives in Argentina

    Get PDF
    Since the 1970s, economics has emerged as a global profession, with economists becoming main characters of the intellectual and political life in many countries. Inspired by Bourdieu, several analyses faced the challenge of “theorizing fields beyond the nation-state” (Buchholz 2016). Some scholars emphasized that internationalization entailed a growing asymmetry between dominant and dominated participants: the former acting as “exporters” and the latter as “importers” of ideas (Dezalay and Garth 2002). Others pointed out the process of “creative destruction” that accompanied the globalization of local fields (Fourcade 2006). Finally, still others noted the emergence of a new field of globalized experts and think tanks (Medvetz 2012). Through a socio-historical depiction of economists in Argentina, we problematize the subordinated role of peripheral economists. Rather than a dominant-dominated logic, we identify a new international division of labor. Based on more than 60 interviews with economists, archival research, and statistical analyses, this paper shows that while a dependent position in the global academic field reduced Argentinian economists’ theoretical autonomy, it gave them the scientific authority that in turn paved the road to access very well-paid work as consultants and high-level public servants

    New Medical Robotics Standards – Aiming for Autonomous Systems

    Get PDF
    Abstract—Autonomy is a fundamental attribute of robotics, yet it is one of the hardest terms to define, assess and regulate. Autonomy probably poses the greatest safety challenge within the medical field. AI methods and decision support systems are playing an increasing role in all domains of healthcare, and their breakthrough in medical robotics is just around the corner, assuming a safe regulatory framework can be developed. Supporting these trends, a new generation of robotics standards is emerging both in the IEEE and in the ISO/IEC domain, already focusing on the big challenge of the future medical systems: autonomy. This work provides a brief overview of the brand new standards targeting this complex area

    Overview of Some Security Aspectsof Smart Phones

    Get PDF
    Smart phones or mobile phones with advanced capabilities are used by more people. Their popularity and relatively weaker security level have made them attractive targets for attackers. Mobile phone security in the beginning has not kept pace with traditional computer security. Security methods, such as firewalls, antivirus software and encryption, were insufficiently represented on mobile phones, and mobile operating systems were not updated as frequently as those on personal computers. However, mobile security nowadays is a rapidly growing field in the security area. With the increase in the number of mobile devices and their applications, the need for mobile security has increased extremely over the past several years. This paper gives an overview of some of the security aspects that must be considered when choosing a particular model of a smart phone with a satisfactory level of security: biometrics, encryption, hardware-assisted security, sandboxed user data, VPN possibility etc. A special accent in the paper is placed on newer types of processors as one of the most important components of the mobile device and their security possibilities. A comparative analysis of the key technical characteristics of the most commonly used newer processors is also given. In addition, the paper also focuses on the use of mobile security software and Android browsers, pointing out its numerous useful features
    • 

    corecore