To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
In recent years, many microrobots have been developed for search applications using swarms in places where humans cannot enter, such as disaster sites. Hexapod robots are suitable for moving over uneven terrain. In order to use micro-hexapod robots for swarm exploration, it is necessary to reduce the robot’s size while maintaining its rigidity. Herein, we propose a micro-hexapod with an SU-8 rigid frame that can be assembled from a single sheet. By applying the SU-8 coating as a structure to the hexapod and increasing the rigidity, the substrate size can be reduced to within 40 mm × 40 mm and the total length when assembled to approximately 30 mm. This enables the integration of the micro electromechanical systems (MEMS) process into small and inexpensive hexapod robots. In this study, we assembled the hexapod with a rigid frame from a sheet created using the MEMS process and evaluated the leg motion.
Precision healthcare is an emerging field of science that utilizes an individual’s health information, context, and genetics to provide more personalized diagnostics and treatments. In this manuscript, we leverage that concept and present a group of machine learning models for precision gaming. These predictive models guide adolescents through best practices related to their health. The use case deployed is for girls in India through a mobile application released in three different Indian states. To evaluate the usability of the models, experiments are designed and data (demographic, behavioral, and health-related) are collected. The experimental results are presented and discussed.
The increase in Electrical and Electronic Equipment (EEE) usage in various sectors has given rise to repair and maintenance units. Disassembly of parts requires proper planning, which is done by the Disassembly Sequence Planning (DSP) process. Since the manual disassembly process has various time and labor restrictions, it requires proper planning. Effective disassembly planning methods can encourage the reuse and recycling sector, resulting in reduction of raw-materials mining. An efficient DSP can lower the time and cost consumption. To address the challenges in DSP, this research introduces an innovative framework based on Q-Learning (QL) within the domain of Reinforcement Learning (RL). Furthermore, an Enhanced Simulated Annealing (ESA) algorithm is introduced to improve the exploration and exploitation balance in the proposed RL framework. The proposed framework is extensively evaluated against state-of-the-art frameworks and benchmark algorithms using a diverse set of eight products as test cases. The findings reveal that the proposed framework outperforms benchmark algorithms and state-of-the-art frameworks in terms of time consumption, memory consumption, and solution optimality. Specifically, for complex large products, the proposed technique achieves a remarkable minimum reduction of 60% in time consumption and 30% in memory usage compared to other state-of-the-art techniques. Additionally, qualitative analysis demonstrates that the proposed approach generates sequences with high fitness values, indicating more stable and less time-consuming disassembles. The utilization of this framework allows for the realization of various real-world disassembly applications, thereby making a significant contribution to sustainable practices in EEE industries.
The deployment of digital technologies in African cities, beyond improving service delivery, raises issues of digital inclusion, digital rights, and increasing spatial and social inequalities. As part of the African Cities Lab Summit 2023, we conducted a workshop with 20 multidisciplinary participants to explore issues related to the deployment of digital technologies in African cities. This research is a policy paper that addresses these issues and provides policy recommendations for local governments. It emphasizes the importance of inclusive digital infrastructure, regulations safeguarding vulnerable sectors, and governance ensuring citizens’ rights in the digital transformation. Focusing on transparency, equity, and collaboration with communities, local governments play a vital role in fostering inclusive digital transformation, essential for equitable and rights-centric smart cities in Africa.
In situations ranging from border control to policing and welfare, governments are using automated facial recognition technology (FRT) to collect taxes, prevent crime, police cities and control immigration. FRT involves the processing of a person's facial image, usually for identification, categorisation or counting. This ambitious handbook brings together a diverse group of legal, computer, communications, and social and political science scholars to shed light on how FRT has been developed, used by public authorities, and regulated in different jurisdictions across five continents. Informed by their experiences working on FRT across the globe, chapter authors analyse the increasing deployment of FRT in public and private life. The collection argues for the passage of new laws, rules, frameworks, and approaches to prevent harms of FRT in the modern state and advances the debate on scrutiny of power and accountability of public authorities which use FRT. This book is also available as Open Access on Cambridge Core.
This book brings together the vast research literature about gender and technology to help designers understand what a gender perspective and a focus on intersectionality can contribute to designing information technology systems and artifacts, and to assist organizations as they work to develop work cultures that are supportive of women and marginalized genders and people. Drawing on empirical and analytical studies of women's work and technology in many parts of the world, the book addresses how to make invisible aspects of work visible; how to recognize women's skills without falling into the trap of gender stereotyping; how to engage in improving working conditions; and how to defend care of life situations and needs against a managerial logic. It addresses challenges for design, including many overlooked and undervalued aspects, such as the complexities involved in human–machine interactions, as well as the need to create safe spaces for research subjects.
Unjust enrichment is a plausible cause of action for individuals whose data has been collected and used without their consent, to train, develop, or improve AI systems, or which has been sold for such purposes. Disgorgement of profits may be possible in some situations where the defendant has unlawfully collected or used personal data. Gain-based remedies have a number of advantages in this context, including the fact that it may be relatively easy to ascertain the gain, but demonstrating the loss will be considerably harder. However, contractual pre-emption may limit the utility of claims for unjust enrichment.
Financial supervisors have begun to use AI to prevent financial distress, detect fraud and, more generally, for investor protection purposes. Similarly, private parties increasingly rely on AI to decide small claims and arbitration cases. In view of this evolution, this chapter deals with the current use of AI in the financial sector, regulation of and by AI, and, most importantly, AI-driven financial supervision.
This Handbook brings together a global team of private law experts and computer scientists to examine the interface between private law and AI, which includes issues such as whether existing private law can address the challenges of AI and whether and how private law needs to be reformed to reduce the risks of AI while retaining its benefits.
Legal technologies using AI-augmented algorithms to translate the purpose of a law into a specific legal directive can be used to produce self-driving contracts, that is, a contract which instead of relying on a human referee to fill gaps, update, or reform the provisions of the contract, uses data-driven predictive algorithms to do so instead. Self-driving contracts are not simply science fiction; not only are self-driving contracts possible, they are in fact already with us.
The law should be ‘computable’, in order to make retrieval and analysis easier. Computable law takes aspects of law, which are implicit in legal texts, and aims to model them as data, rules, or forms which are amenable to computer processes. Laws should be labelled with computable structural data to permit advanced computational processing and legal analysis.
The legal treatment of autonomous algorithmic collusion in light of its technical feasibility and various theoretical considerations is an important issue because autonomous algorithmic collusion raises difficult questions concerning the attribution of conduct by algorithms to firms and reopens the longstanding debate about the legality of tacit collusion. Algorithmic collusion, namely, direct communication between algorithms, which amounts to express collusion, is illegal. Intelligent and independent adaptation to competitors’ conduct by algorithms with no direct communication between them, which is tacit collusion, is generally legal. There should be ex ante regulation to reduce algorithmic collusion.