To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
It is known that without synchronization via a global clock one cannot obtain common knowledge by communication. Moreover, it is folklore that without communicating higher-level information one cannot obtain arbitrary higher-order shared knowledge. Here, we make this result precise in the setting of gossip where agents make one-to-one telephone calls to share secrets: we prove that “everyone knows that everyone knows that everyone knows all secrets” is unsatisfiable in a logic of knowledge for gossiping. We also prove that, given n agents, $2n-3$ calls are optimal to reach “someone knows that everyone knows all secrets” and that $n - 2 + \binom{n}{2}$ calls are optimal to reach “everyone knows that everyone knows all secrets.”
The European public sector has for a long time tried to change its activities and its relation to the public through the production and provision of data and data-based technologies. Recent debates raised attention to data uses, through which societal value may be realized. However, often absent from these discussions is a conceptual and methodological debate on how to grasp and study such uses. This collection proposes a turn toward data practices—intended here as the analysis of data uses and policies, as they are articulated, understood, or turned into situated activities by different actors in specific contexts, involving organizational rules, socioeconomic factors, discourses, and artifacts. Through a mix of conceptual and methodological studies, the contributions explore how data-driven innovation within public institutions is understood, imagined, planned for, conducted, or assessed. The situations examined in this special issue show, for instance, that data initiatives carried out by different actors lack institutional rules to align data use to the actual needs of citizens; that data scientists are important moral actors whose ethical reasoning should be fostered; and that the materiality of data practices, such as databases, enables and constrains opportunities for public engagement. Collectively, the contributions offer new insights into what constitutes “data-driven innovation practices,” how different practices are assembled, and what their different political, moral, economic, and organizational implications are. The contributions focus on three particular topics of concern: the making of ethical and normative values in practice; organizational collaborations with and around data; and methodological innovations of studying data practices.
This paper addresses the problem of controlling multiple unmanned aerial vehicles (UAVs) cooperating in a formation to carry out a complex task such as surface inspection. We first use the virtual leader-follower model to determine the topology and trajectory of the formation. A double-loop control system combining backstepping and sliding mode control techniques is then designed for the UAVs to track the trajectory. A radial basis function neural network capable of estimating external disturbances is developed to enhance the robustness of the controller. The stability of the controller is proven by using the Lyapunov theorem. A number of comparisons and software-in-the-loop tests have been conducted to evaluate the performance of the proposed controller. The results show that our controller not only outperforms other state-of-the-art controllers but is also sufficient for complex tasks of UAVs such as collecting surface data for inspection. The source code of our controller can be found at https://github.com/duynamrcv/rbf_bsmc.
Cyclic proof systems permit derivations that are finite graphs in contrast to conventional derivation trees. The soundness of such proofs is ensured by imposing a soundness condition on derivations. The most common such condition is the global trace condition (GTC), a condition on the infinite paths through the derivation graph. To give a uniform treatment of such cyclic proof systems, Brotherston proposed an abstract notion of trace. We extend Brotherston’s approach into a category theoretical rendition of cyclic derivations, advancing the framework in two ways: first, we introduce activation algebras which allow for a more natural formalisation of trace conditions in extant cyclic proof systems. Second, accounting for the composition of trace information allows us to derive novel results about cyclic proofs, such as introducing a Ramsey-style trace condition. Furthermore, we connect our notion of trace to automata theory and prove that verifying the GTC for abstract cyclic proofs with certain trace conditions is PSPACE-complete.
Innovation, typically spurred by reusing, recombining and synthesizing existing concepts, is expected to result in an exponential growth of the concept space over time. However, our statistical analysis of TechNet, which is a comprehensive technology semantic network encompassing over 4 million concepts derived from patent texts, reveals a linear rather than exponential expansion of the overall technological concept space. Moreover, there is a notable decline in the originality of newly created concepts. These trends can be attributed to the constraints of human cognitive abilities to innovate beyond an ever-growing space of prior art, among other factors. Integrating creative artificial intelligence into the innovation process holds the potential to overcome these limitations and alter the observed trends in the future.
Visual simultaneous localisation and mapping (vSLAM) has shown considerable promise in positioning and navigating across a variety of indoor and outdoor settings, significantly enhancing the mobility of robots employed in industrial and everyday services. Nonetheless, the prevalent reliance of vSLAM technology on the assumption of static environments has led to suboptimal performance in practical implementations, particularly in unstructured and dynamically noisy environments such as substations. Despite advancements in mitigating the influence of dynamic objects through the integration of geometric and semantic information, existing approaches have struggled to strike an equilibrium between performance and real-time responsiveness. This study introduces a lightweight, multi-modal semantic framework predicated on vSLAM, designed to enable intelligent robots to adeptly navigate the dynamic environments characteristic of substations. The framework notably enhances vSLAM performance by mitigating the impact of dynamic objects through a synergistic combination of object detection and instance segmentation techniques. Initially, an enhanced lightweight instance segmentation network is deployed to ensure both the real-time responsiveness and accuracy of the algorithm. Subsequently, the algorithm’s performance is further refined by amalgamating the outcomes of detection and segmentation processes. With a commitment to maximising performance, the framework also ensures the algorithm’s real-time capability. Assessments conducted on public datasets and through empirical experiments have demonstrated that the proposed method markedly improves both the accuracy and real-time performance of vSLAM in dynamic environments.
The U.S. federal government annually awards billions of dollars as contracts to procure different products and services from external businesses. Although the federal government’s immense purchasing power provides a unique opportunity to invest in the nation’s women-owned businesses (WOBs) and minority-owned businesses (MOBs) and advance the entrepreneurial dreams of many more Americans, gender and racial disparities in federal procurement are pervasive. In this study, we undertake a granular examination of these disparities by analyzing the data on 1,551,610 contracts awarded by 58 different federal government agencies. Specifically, we examine the representation of WOBs and MOBs in contracts with varying levels of STEM intensity and across 19 different contract categories, which capture the wide array of products and services purchased by the federal government. We show that contracts with higher levels of STEM intensity are associated with a lower likelihood of being awarded to WOBs and MOBs. Interestingly, the negative association between a contract’s STEM intensity and its likelihood to be awarded to MOBs is particularly salient for Black-, and Hispanic-owned businesses. Among the 19 categories of contracts, Black-owned businesses are more likely to receive contracts that are characterized by lower median pay levels. Collectively, these results provide data-driven evidence demonstrating the need to make a distinction between the different categories of MOBs and consider the type of products and services being procured while carrying out an examination of racial disparities in federal procurement.
The reconfigurable mechanisms can satisfy the requirements of changing environments, working conditions, and tasks on the function and performance of the mechanism and can be applied to machine tool manufacturing, space detection, etc. Inspired by the single-vertex fivefold origami pattern, a new reconfigurable parallel mechanism is proposed in this paper, which has special singular positions and stable motion due to replicating the stabilizing kinematic properties of origami. Through analyzing the topologic change of the folding process of the pattern and treating it as a reconfigurable joint, a new reconfigurable parallel mechanism with 3, 4, 5, or 6 degrees of freedom is obtained. Then, the kinematics solution, workspace, and singularity of the mechanism are calculated. The results indicate that the singular configuration of the origami-derived reconfigurable parallel mechanism is mainly located in a special plane, and the scope of the workspace is still large after the configuration change. The mechanism has the potential to adapt to multiple tasks and working conditions through the conversion among different configurations by folding reconfigurable joints on the branch chain.
We focus on exponential semi-Markov decision processes with unbounded transition rates. We first provide several sufficient conditions under which the value iteration procedure converges to the optimal value function and optimal deterministic stationary policies exist. These conditions are also valid for general semi-Markov decision processes possibly with accumulation points. Then, we apply our results to a service rate control problem with impatient customers. The resulting exponential semi-Markov decision process has unbounded transition rates, which makes the well-known uniformization technique inapplicable. We analyze the structure of the optimal policy and the monotonicity of the optimal value function by using the customization technique that was introduced by the author in prior work.
The manufacturing of the X-shaped tip of prestressed centrifugal concrete piles is nowadays done half automatically by combining the manual worker and the automatic welding robot. To make this welding process full automatically, the welding seam tracking algorithm is considered. There are many types of sensors that can be used to detect the welding seam such as vision sensor, laser vision sensor, arc sensor, or touch sensor. Each type of sensor has its advantages and disadvantages. In this paper, an algorithm for welding seam tracking using laser distance sensor is proposed. Firstly, the fundamental mathematics theory of the algorithm is presented. Next, the positioning table system supports the procedure is designed and manufactured. The object of this research is the fillet joint because of the characteristics of the X-shaped tip of the concrete piles. This paper proposes a new method to determine the welding trajectory of the tip using laser distance sensor. After that, the experimental results are received to verify the proposed idea. Finally, the improved proposal of the algorithm is considered to increase the accuracy of the suggested algorithm.
We present algorithms and a C code to reveal quantum contextuality and evaluate the contextuality degree (a way to quantify contextuality) for a variety of point-line geometries located in binary symplectic polar spaces of small rank. With this code we were not only able to recover, in a more efficient way, all the results of a recent paper by de Boutray et al. [(2022). Journal of Physics A: Mathematical and Theoretical55 475301], but also arrived at a bunch of new noteworthy results. The paper first describes the algorithms and the C code. Then it illustrates its power on a number of subspaces of symplectic polar spaces whose rank ranges from 2 to 7. The most interesting new results include: (i) non-contextuality of configurations whose contexts are subspaces of dimension 2 and higher, (ii) non-existence of negative subspaces of dimension 3 and higher, (iii) considerably improved bounds for the contextuality degree of both elliptic and hyperbolic quadrics for rank 4, as well as for a particular subgeometry of the three-qubit space whose contexts are the lines of this space, (iv) proof for the non-contextuality of perpsets and, last but not least, (v) contextual nature of a distinguished subgeometry of a multi-qubit doily, called a two-spread, and computation of its contextuality degree. Finally, in the three-qubit polar space we correct and improve the contextuality degree of the full configuration and also describe finite geometric configurations formed by unsatisfiable/invalid constraints for both types of quadrics as well as for the geometry whose contexts are all 315 lines of the space.
Although reasoning about equations over strings has been extensively studied for several decades, little research has been done for equational reasoning on general clauses over strings. This paper introduces a new superposition calculus with strings and present an equational theorem proving framework for clauses over strings. It provides a saturation procedure for clauses over strings and show that the proposed superposition calculus with contraction rules is refutationally complete. In particular, this paper presents a new decision procedure for solving word problems over strings and provides a new method of solving unification problems over strings w.r.t. a set of conditional equations R over strings if R can be finitely saturated under the proposed inference system with contraction rules.
Let $T=(V,E)$ be a tree in which each edge is assigned a cost; let $\mathcal{P}$ be a set of source–sink pairs of vertices in V in which each source–sink pair produces a profit. Given a lower bound K for the profit, the K-prize-collecting multicut problem in trees with submodular penalties is to determine a partial multicut $M\subseteq E$ such that the total profit of the disconnected pairs after removing M from T is at least K, and the total cost of edges in M plus the penalty of the set of still-connected pairs is minimized, where the penalty is determined by a nondecreasing submodular function. Based on the primal-dual scheme, we present a combinatorial polynomial-time algorithm by carefully increasing the penalty. In the theoretical analysis, we prove that the approximation factor of the proposed algorithm is $(\frac{8}{3}+\frac{4}{3}\kappa+\varepsilon)$, where $\kappa$ is the total curvature of the submodular function and $\varepsilon$ is any fixed positive number. Experiments reveal that the objective value of the solutions generated by the proposed algorithm is less than 130% compared with that of the optimal value in most cases.
In the process of trajectory optimization for robot manipulator, the path that is generated may deviate from the intended path because of the adjustment of trajectory parameters, if there is limitation of end-effector path in Cartesian space for specific tasks, this phenomenon is dangerous. This paper proposes a methodology that is based on the Pareto front to address this issue, and the methodology takes into account both the multi-objective optimization of robotic arm and the quality of end-effector path. Based on dung beetle optimizer, this research proposes improved non-dominated sorting dung beetle optimizer. This paper interpolates manipulator trajectory with quintic B-spline curves, achieves multi-objective trajectory optimization that simultaneously optimizes traveling time, energy consumption, and mean jerk, proposes a trajectory selection strategy that is based on Pareto solution set by introducing the concept of Fréchet distance, and the strategy enables the end-effector to approach the desired path in Cartesian space. Simulation and experimental results validate the effectiveness and practicability of the proposed methodology on the Sawyer robot manipulator.
The bipartite independence number of a graph $G$, denoted as $\tilde \alpha (G)$, is the minimal number $k$ such that there exist positive integers $a$ and $b$ with $a+b=k+1$ with the property that for any two disjoint sets $A,B\subseteq V(G)$ with $|A|=a$ and $|B|=b$, there is an edge between $A$ and $B$. McDiarmid and Yolov showed that if $\delta (G)\geq \tilde \alpha (G)$ then $G$ is Hamiltonian, extending the famous theorem of Dirac which states that if $\delta (G)\geq |G|/2$ then $G$ is Hamiltonian. In 1973, Bondy showed that, unless $G$ is a complete bipartite graph, Dirac’s Hamiltonicity condition also implies pancyclicity, i.e., existence of cycles of all the lengths from $3$ up to $n$. In this paper, we show that $\delta (G)\geq \tilde \alpha (G)$ implies that $G$ is pancyclic or that $G=K_{\frac{n}{2},\frac{n}{2}}$, thus extending the result of McDiarmid and Yolov, and generalizing the classic theorem of Bondy.
Multibody dynamics methodologies have been fundamental tools utilized to model and simulate robotic systems that experience contact conditions with the surrounding environment, such as in the case of feet and ground interactions. In addressing such problems, it is of paramount importance to accurately and efficiently handle the large body displacement associated with locomotion of robots, as well as the dynamic response related to contact-impact events. Thus, a generic computational approach, based on the Newton–Euler formulation, to represent the gross motion of robotic systems, is revisited in this work. The main kinematic and dynamic features, necessary to obtain the equations of motion, are discussed. A numerical procedure suitable to solve the equations of motion is also presented. The problem of modeling contacts in dynamical systems involves two main tasks, namely, the contact detection and the contact resolution, which take into account for the kinematics and dynamics of the contacting bodies, constituting the general framework for the process of modeling and simulating complex contact scenarios. In order to properly model the contact interactions, the contact kinematic properties are established based on the geometry of contacting bodies, which allow to perform the contact detection task. The contact dynamics is represented by continuous contact force models, both in terms of normal and tangential contact directions. Finally, the presented formulations are demonstrated by the application to several robotics systems that involve contact and impact events with surrounding environment. Special emphasis is put on the systems’ dynamic behavior, in terms of performance and stability.
Since its establishment in 2014, Data for Policy (https://dataforpolicy.org) has emerged as a prominent global community promoting interdisciplinary research and cross-sector collaborations in the realm of data-driven innovation for governance and policymaking. This report presents an overview of the community’s evolution from 2014 to 2023 and introduces its six-area framework, which provides a comprehensive mapping of the data for policy research landscape. The framework is based on extensive consultations with key stakeholders involved in the international committees of the annual Data for Policy conference series and the open-access journal Data & Policy (https://www.cambridge.org/core/journals/data-and-policy), published by Cambridge University Press. By presenting this inclusive framework, along with the guiding principles and future outlook for the community, this report serves as a vital foundation for continued research and innovation in the field of data for policy.
Abstract This chapter documents how children negotiated with the gender-based norms in engaging with digital technologies. They used two negotiation strategies to navigate the gender-constraints imposed on their digital engagements: 1) producing glamour and 2) enacting and experiencing privacy. The chapter begins with a description of the first thematic category: glamour. Poor children in Indian slums perceived digital technologies as channels for fulfilling their aspirations, especially upward class mobility. To unpack the second negotiation strategy i.e., privacy, I complicate the dominant understanding of digital users’ right to privacy by demonstrating that privacy is a gendered, classed, and culturally distinct concept. Children's definition and practice of digital privacy bore witness to the influence of patriarchy and misogyny dominant in their communities.
Keywords: glamour, digital privacy, upward class mobility, surveillance, public, confession
Manufacturing Online Identities
Thrift (2008) defines glamour as the industrial production of a sense of fascination with digital technologies. The fascination for digital technologies is tied to the discourse that digital technologies can revolutionise living conditions and alter the material realities of the users. Similarly, Gundle and Castelli (2006) define glamour as an outcome of modernist thought, arguing that the concept has antecedents in capitalist logic. I extend this conceptualisation and propose that glamour allows users to compensate for the “lack” in their lives resulting from the socio-economic and cultural constraints they face. The glamour of digital technologies grants the users liminal access to experiences they aspire to participate in, thus making them increasingly aware of the existing constraints and scarcity in their material worlds. I have categorised children's perception of the glamour of digital technologies under two themes. First, children believed they would experience upward social mobility through the online identities and networks they cultivated. In other words, children used digital technologies to get a glimpse into middle- and upper-class lives. Still, they could not translate these virtual experiences into material reality. Second, children used digital technologies to create glamorous online profiles and networks mimicking the realities of middle- and high-income people. Though children used digital technologies to give others an illusion of their glamour, the glamour was manufactured online and rarely helped them acquire upward class mobility.