165 research outputs found
NEW APPROACH TO INFORMATION AGGREGATION
In this paper new types of aggregation operators, namely absorbing-norms and parametric type of operator families called distance-based or evolutionary operators are introduced. Absorbing- norms are commutative, associative binary operators having an absorbing element from the uni! interval. A detailed discussion of properties and structure of these operators is given in the paper. Two types of distance-based operators are defined. The maximum and minimum distance operators with respect to e have the value of the element, which is farther, or nearer to e, respectively, where e is an arbitrary element of the unit interval [0,1]. The special cases e = O and e = 1lead to the max and min operators. The new operators are evolutionary types in the sense that if e is increasing starting from zero till e = 1 the min operator is developing into the max operator, while on the other side the max is transformed into the min operator. It is shown that the evolutionary operators can be constructed by means of min and max operators, which are also special cases of the operators. The maximum distance operators are special operators called uninorms and the minimum distance ones are absorbing-norms
From Concept to Market: Surgical Robot Development
Surgical robotics and supporting technologies have really become a prime example of modern applied
information technology infiltrating our everyday lives. The development of these systems spans across
four decades, and only the last few years brought the market value and saw the rising customer base
imagined already by the early developers. This chapter guides through the historical development of the
most important systems, and provide references and lessons learnt for current engineers facing similar
challenges. A special emphasis is put on system validation, assessment and clearance, as the most
commonly cited barrier hindering the wider deployment of a system
Adaptive Optimal Dynamic Control for Nonholonomic Systems
In this paper two different control methods are combined for controlling a typical nonholonomic device (a bicycle) the dynamic model and parameters of which are only approximately known. Most of such devices suffer from the problem that the time-derivatives of the coordinates of their location and orientation cannot independently be set so an arbitrarily prescribed trajectory cannot precisely be traced by them. For tackling this difficulty Optimal Control is proposed that can find acceptable compromise between the tracking error of the various coordinates. Further problem is that the solution proposed by the optimal controller cannot exactly be implemented in the lack of precise information on the dynamic model of the system. Based on the decoupled nature of the dynamic model of the longitudinal and lateral behavior of the engine special fixed point transformations are proposed to achieve adaptive tracking. These transformations were formerly successfully applied for the control of holonomic systems. It is the first time that the combined method is checked for various trajectories and dynamic model errors via simulation. It yielded promising results
Incomplete Kratzel function model of leaky aquifer and alike functions
In this note our aim is to derive certain important
properties of a general mathematical model given in the form of an incomplete Kratzel function which contains as subâmodels the generalized leaky aquifer function, the van't Hoff thermal analysis temperature integral and the soâcalled thermonuclear integral among others
TOWARDS THE GENERALIZATION OF T-OPERATORS: A DISTANCE BASED APPROACH
Aggregation is one of the key issues in the development of intelligent systems, just like with neural networks, fuzzy knowledge based systems, vision systems, and decision-making systems. From the point of view of a particular application the choice of the most appropriate operator is an important part of system design. This paper gives a brief summary of the best known operatorst- such as t-norms, t-conorms, uninorms, averaging and compensative operators, and outlines their most important properties. Two new pairs of distances, based on binary operations and their generalizations, are introduced, based on the fuzzy entropy approach, and their properties are outlined
Entropy and Hausdorff Dimension in Random Growing Trees
We investigate the limiting behavior of random tree growth in preferential
attachment models. The tree stems from a root, and we add vertices to the
system one-by-one at random, according to a rule which depends on the degree
distribution of the already existing tree. The so-called weight function, in
terms of which the rule of attachment is formulated, is such that each vertex
in the tree can have at most K children. We define the concept of a certain
random measure mu on the leaves of the limiting tree, which captures a global
property of the tree growth in a natural way. We prove that the Hausdorff and
the packing dimension of this limiting measure is equal and constant with
probability one. Moreover, the local dimension of mu equals the Hausdorff
dimension at mu-almost every point. We give an explicit formula for the
dimension, given the rule of attachment
The International Division of Labor in Economists' Field: Academic Subordination in Exchange for Political Prerogatives in Argentina
Since the 1970s, economics has emerged as a global profession, with economists becoming main characters of the intellectual and political life in many countries. Inspired by Bourdieu, several analyses faced the challenge of âtheorizing fields beyond the nation-stateâ (Buchholz 2016). Some scholars emphasized that internationalization entailed a growing asymmetry between dominant and dominated participants: the former acting as âexportersâ and the latter as âimportersâ of ideas (Dezalay and Garth 2002). Others pointed out the process of âcreative destructionâ that accompanied the globalization of local fields (Fourcade 2006). Finally, still others noted the emergence of a new field of globalized experts and think tanks (Medvetz 2012). Through a socio-historical depiction of economists in Argentina, we problematize the subordinated role of peripheral economists. Rather than a dominant-dominated logic, we identify a new international division of labor. Based on more than 60 interviews with economists, archival research, and statistical analyses, this paper shows that while a dependent position in the global academic field reduced Argentinian economistsâ theoretical autonomy, it gave them the scientific authority that in turn paved the road to access very well-paid work as consultants and high-level public servants
New Medical Robotics Standards â Aiming for Autonomous Systems
AbstractâAutonomy is a fundamental attribute of robotics,
yet it is one of the hardest terms to define, assess and regulate.
Autonomy probably poses the greatest safety challenge within
the medical field. AI methods and decision support systems are
playing an increasing role in all domains of healthcare, and their breakthrough in medical robotics is just around the corner, assuming a safe regulatory framework can be developed. Supporting these trends, a new generation of robotics standards is emerging both in the IEEE and in the ISO/IEC domain, already focusing on the big challenge of the future medical systems: autonomy. This work provides a brief overview of the brand new standards targeting this complex area
Overview of Some Security Aspectsof Smart Phones
Smart phones or mobile phones with advanced capabilities are used by more people. Their popularity and relatively weaker security level have made them attractive targets for attackers. Mobile phone security in the beginning has not kept pace with traditional computer security. Security methods, such as firewalls, antivirus software and encryption, were insufficiently represented on mobile phones, and mobile operating systems were not updated as frequently as those on personal computers. However, mobile security nowadays is a rapidly growing field in the security area. With the increase in the number of mobile devices and their applications, the need for mobile security has increased extremely over the past several years. This paper gives an overview of some of the security aspects that must be considered when choosing a particular model of a smart phone with a satisfactory level of security: biometrics, encryption, hardware-assisted security, sandboxed user data, VPN possibility etc. A special accent in the paper is placed on newer types of processors as one of the most important components of the mobile device and their security possibilities. A comparative analysis of the key technical characteristics of the most commonly used newer processors is also given. In addition, the paper also focuses on the use of mobile security software and Android browsers, pointing out its numerous useful features
- âŠ