To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Human Activity Recognition (HAR) holds significant importance in health and human-machine interaction. However, recognizing actions from 2D information faces challenges like occlusion, illumination variation, cluttered backgrounds, and view invariance. These hurdles are particularly pronounced in indoor patient monitoring settings due to fluctuating lighting conditions and cluttered backgrounds, which compromise the accuracy of activity recognition systems. A new architecture named IlluminationRevive has been proposed to tackle this issue, which utilizes an encoder-decoder convolutional neural network (CNN) and image post-processing blocks to enhance the image’s visual appearance. A new dataset comprising seven indoor physical activities has been proposed, created with contributions from thirty individuals aged 20–45. A hybrid fusion architecture is proposed to classify activities, integrating motion sequence information and body joint features. The proposed classification model incorporates generated Skeleton Motion History Images (SMHIs), collected human joint motion features from video frames, and novel kinematic and geometric features within window frames as inputs. The model can extract spatial and temporal feature vectors by integrating ResNet50-ViT (Residual Network-50 layers, Vision Transformer) and CNN-BiLSTM (Convolutional Neural Network-Bidirectional Long Short-Term Memory) layers. The suggested classification model was evaluated alongside state-of-the-art models using the LNMIIT-SMD (The LNM Institute of Information Technology-Skeleton Motion Dataset) and established NTU-RGBD (Nanyang Technological University’s Red Blue Green and Depth information) dataset. The evaluation aimed to assess the effectiveness of the proposed classification model architecture. Results demonstrate the superiority of the proposed model, achieving impressive accuracies of 98.21% on real-time data, 98.45% on the proposed dataset, and 97.12% on the NTU-RGBD dataset. This high-accuracy, low-latency approach enhances robotic perception for healthcare applications, enabling service robots to perform real-time patient monitoring and assistive tasks in dynamic indoor environments.
The article considers a method for obtaining a rational layout of the design of a multi-robotic system for aliquoting biomaterial, consisting of two robots with different architectures, based on the analysis of safety zones. The first robot has a serial structure and ensures the continuous operation of the second robot, performing auxiliary work related to the movement of biological samples. The second robot, which is a parallel robot, directly performs the workflow of extracting and dosing liquid into aliquots. An algorithm for determining the safety zones for each of the robots is presented, based on which the optimal mutual arrangement of the two robots is obtained. Three-dimensional models of safety zones were created, on the basis of which the digital design of the mounting frame for the two robots was performed using the method of topological optimization of material distribution in the structure. This made it possible to obtain a rational design of the mounting frame, which does not intersect with the safety zones of the robots. The surface of the robotic system mounting frame, obtained as a result of topological optimization, is transformed into a metal structure suitable for manufacturing. The strength characteristics of two variations of the mounting frame are compared: the first one, obtained through topological optimization, and its transformed analog made from a standard profile.
In autumn 2023, the Curtis R. Priem Experimental Music and Performing Arts Center (EMPAC) at Rensselaer Polytechnic Institute presented Shifting Center, an exhibition that explored sound through geological formations, architecture, and cultural artefacts. Using spatialisation techniques such as higher-order ambisonics and wave field synthesis, the works created immersive and disorienting auditory experiences. Curators Vic Brooks and Nida Ghouse framed ‘shifting centre’ as a metaphor for dislocation, evoking feminist and political theories of marginalised peripheries and centralised power. While the exhibition was conceptually and technically ambitious, we argue that the aurality of EMPAC itself – marked by abstraction, isolation and immersion – ultimately muted its decolonial potential. By tracing a lineage of spatial audio from the 1958 Philips Pavilion, we examine how architectural acoustics shape the possibilities of what can be heard in EMPAC, limiting the aural and more-than-aural reception of works presented there.
The nexus of artificial intelligence (AI) and memory is typically theorized as a ‘hybrid’ or ‘symbiosis’ between humans and machines. The dangers related to this nexus are subsequently imagined as tilting the power balance between its two components, such that humanity loses control over its perception of the past to the machines. In this article, I propose a new interpretation: AI, I posit, is not merely a non-human agency that changes mnemonic processes, but rather a window through which the past itself gains agency and extends into the present. This interpretation holds two advantages. First, it reveals the full scope of the AI–memory nexus. If AI is an interactive extension of the past, rather than a technology acting upon it, every application of it constitutes an act of memory. Second, rather than locating AI’s power along familiar axes – between humans and machines, or among competing social groups – it reveals a temporal axis of power: between the present and the past. In the article’s final section, I illustrate the utility of this approach by applying it to the legal system’s increasing dependence on machines, which, I claim, represents not just a technical but a mnemonic shift, where the present is increasingly falling under the dominion of the past – embodied by AI.
This paper investigates the time N until a random walk first exceeds some specified barrier. Letting $X_i, i \geq 1,$ be a sequence of independent, identically distributed random variables with a log-concave density or probability mass function, we derive both lower and upper bounds on the probability $P(N \gt n),$ as well as bounds on the expected value $E[N].$ On barriers of the form $a + b \sqrt{k},$ where a is nonnegative, b is positive, and k is the number of steps, we provide additional bounds on $E[N].$
This paper offers a substantial improvement in the revision-theoretic approach to conditionals in theories of transparent truth. The main modifications are (i) a new limit rule; (ii) a modification of the extension to the continuum-valued case; and (iii) the suggestion of a variation on how universal quantification is handled, leading to more satisfactory laws of restricted quantification.
In our digital world, reusing data to inform: decisions, advance science, and improve people’s lives should be easier than ever. However, the reuse of data remains limited, complex, and challenging. Some of this complexity requires rethinking consent and public participation processes about it. First, to ensure the legitimacy of uses, including normative aspects like agency and data sovereignty. Second, to enhance data quality and mitigate risks, especially since data are proxies that can misrepresent realities or be oblivious to the original context or use purpose. Third, because data, both as a good and infrastructure, are the building blocks of both technologies and knowledge of public interest that can help societies work towards the well-being of their people and the environment. Using the case study of the European Health Data Space, we propose a multidimensional, polytopic framework with multiple intersections to democratising decision-making and improving the way in which meaningful participation and consent processes are conducted at various levels and from the point of view of institutions, regulations, and practices.
Two salient notions of sameness of theories are synonymy, aka definitional equivalence, and bi-interpretability. Of these two definitional equivalence is the strictest notion. In which cases can we infer synonymy from bi-interpretability? We study this question for the case of sequential theories. Our result is as follows. Suppose that two sequential theories are bi-interpretable and that the interpretations involved in the bi-interpretation are one-dimensional and identity preserving. Then, the theories are synonymous.
The crucial ingredient of our proof is a version of the Schröder–Bernstein theorem under very weak conditions. We think this last result has some independent interest.
We provide an example to show that this result is optimal. There are two finitely axiomatized sequential theories that are bi-interpretable but not synonymous, where precisely one of the interpretations involved in the bi-interpretation is not identity preserving.
In the context of dependent type theory, we show that coinductive predicates have an equivalent topological counterpart in terms of coinductively generated positivity relations, introduced by G. Sambin to represent closed subsets in point-free topology. Our work is complementary to a previous one with M. E. Maietti, where we showed that, in dependent type theory, the well-known concept of wellfounded trees has a topological counterpart in terms of proof-relevant inductively generated formal covers used to provide a predicative and constructive representation of complete suplattices. The proofs performed within Martin–Löf’s type theory and the Minimalist Foundation have been checked in the Agda proof assistant.
Simultaneous localization and mapping technology is the basis for multi-robot systems to complete navigation, path planning, and autonomous exploration in complex, dynamic, and Global Positioning System (GPS)-denied environments. This paper reviews the current status and progress of multi-robot simultaneous localization and mapping (SLAM) technology based on LiDAR. First, this paper studies the basic principles of LiDAR SLAM. It analyzes the system model construction of LiDAR SLAM, including the mobile robot coordinate system model, kinematic model, sensor model, map presentation, LiDAR SLAM framework, and classic algorithms. Then, this paper discusses the basic framework of collaborative SLAM, analyzes the key issues such as data association, loop closure detection, and global graph optimization in collaborative SLAM, and conducts a detailed literature review on the solutions to key problems in sub-fields of multi-robot SLAM such as frontier detection, task allocation, map fusion, and compares the advantages and disadvantages of various algorithms. Finally, this paper outlines the challenges and future research directions of multi-robot LiDAR SLAM.
In recent years, the deterioration of infrastructure facilities, such as bridges, has caused several problems. Currently, human inspectors conduct periodic inspections to identify damaged areas. However, this process is expensive and time-consuming. Therefore, robotic inspection has received significant attention. This study focused on magnet-wheeled inspection robots operating along complex multilevel paths. The movement from the bottom to the top surface of the flanges was particularly difficult, similar to that of an overhanging steel plate. As the motor drives the robot wheel, gravity and anti-torque interfere with the robot’s movement along its path. However, static analysis shows that the impact can be reduced depending on the robot’s posture relative to that of the flange. Therefore, a magnetic-wheeled robot with a posture-changing pushing mechanism is proposed. This study confirms that the proposed robot can travel along its path using a pushing mechanism while carrying a 1.0 kg weight. Therefore, the robot’s ability to conduct inspections while carrying heavy equipment, such as inspection devices, was confirmed.
Robots need a sense of touch to handle objects effectively, and force sensors provide a straightforward way to measure touch or physical contact. However, contact force data are typically sparse and difficult to analyze, as it only appears during contact and is often affected by noise. Therefore, many researchers have consequently relied on vision-based methods for robotic manipulation. However, vision has limitations, such as occlusions that block the camera’s view, making it ineffective or insufficient for dexterous tasks involving contact. This article presents a method for robotic systems operating under quasi-static conditions to perform contact-rich manipulation using only force/torque measurements. First, the interaction forces/torques between the manipulated object and its environment are collected in advance. A potential function is then constructed from the collected force/torque data using Gaussian process regression with derivatives. Next, we develop haptic dynamic movement primitives (Haptic DMPs) to generate robot trajectories. Unlike conventional DMPs, which primarily focus on kinematic aspects, our Haptic DMPs incorporate force-based interactions by integrating the constructed potential energy. The effectiveness of the proposed method is demonstrated through numerical tasks, including the classical peg-in-hole problem.
Human interactions in the online world comprise a combination of positive and negative exchanges. These diverse interactions can be captured using signed network representations, where edges take positive or negative weights to indicate the sentiment of the interaction between individuals. Signed networks offer valuable insights into online political polarization by capturing antagonistic interactions and ideological divides on social media platforms. This study analyzes polarization on Menéame, a Spanish social media platform that facilitates engagement with news stories through comments and voting. Using a dual-method approach—Signed Hamiltonian Eigenvector Embedding for Proximity for signed networks and Correspondence Analysis for unsigned networks—we investigate how including negative ties enhances the understanding of structural polarization levels across different conversation topics on the platform. While the unsigned Menéame network effectively delineates ideological communities, only by incorporating negative ties can we identify ideologically extreme users who engage in antagonistic behaviors: without them, the most extreme users remain indistinguishable from their less confrontational ideological peers.
This chapter examines the intersection of artificial intelligence and the right of publicity, with a particular focus on deepfakes. It explores the concept of the right of publicity, its historical development, and its relevance in the digital age. The chapter delves into the legal challenges posed by deepfakes, which can manipulate individuals’ images and voices for malicious or commercial purposes. The chapter closes by discussing potential legal remedies and regulatory approaches to address the risks associated with deepfakes and to protect individuals’ rights of publicity.
The onward march of AI poses fundamental challenges for the entire intellectual property system. For patent, trade secret, and copyright, the challenge flows from AI’s interaction with and influence on the definition of protectible creations and information. As discussed earlier, the discordance risks significantly shrinking the pool of what is subject to protection by patent, trade secret, and copyright.