To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Because of the increasing use of laparoscopic surgeries, robotic technologies have been developed to overcome the challenges these surgeries impose on surgeons. This paper presents an overview of the current state of surgical robots used in laparoscopic surgeries. Four main categories were discussed: handheld laparoscopic devices, laparoscope positioning robots, master–slave teleoperated systems with dedicated consoles, and robotic training systems. A generalized control block diagram is developed to demonstrate the general control scheme for each category of surgical robots. In order to review these robotic technologies, related published works were investigated and discussed. Detailed discussions and comparison tables are presented to compare their effectiveness in laparoscopic surgeries. Each of these technologies has proved to be beneficial in laparoscopic surgeries.
A welding path can be planned effectively for spot welding robots using the ant colony algorithm, but the initial parameters of the ant colony algorithm are usually selected through human experience, resulting in an unreasonable planned path. This paper combines the ant colony algorithm with the particle swarm algorithm and uses the particle swarm algorithm to train the initial parameters of the ant colony algorithm to plan an optimal path. Firstly, a mathematical model for spot welding path planning is established using the ant colony algorithm. Then, the particle swarm algorithm is introduced into the ant colony algorithm to find the optimal combination of parameters by treating the initial parameters $\alpha$ and $\beta$ of the ant colony algorithm and as two-dimensional coordinates in the particle swarm algorithm. Finally, the simulation analysis was carried out using MATLAB to obtain the paths of the improved ant colony algorithm for six different sets of parameters with an average path length of 10,357.7509 mm, but the average path length obtained by conventional algorithm was 10,830.8394 mm. Convergence analysis of the improved ant colony algorithm showed that the average number of iterations was 17. Therefore, the improved ant colony algorithm has higher solution quality and converges faster.
We find an asymptotic enumeration formula for the number of simple $r$-uniform hypergraphs with a given degree sequence, when the number of edges is sufficiently large. The formula is given in terms of the solution of a system of equations. We give sufficient conditions on the degree sequence which guarantee existence of a solution to this system. Furthermore, we solve the system and give an explicit asymptotic formula when the degree sequence is close to regular. This allows us to establish several properties of the degree sequence of a random $r$-uniform hypergraph with a given number of edges. More specifically, we compare the degree sequence of a random $r$-uniform hypergraph with a given number edges to certain models involving sequences of binomial or hypergeometric random variables conditioned on their sum.
Statistical learning—the skill to pick up probability-based regularities of the environment—plays a crucial role in adapting to the environment and learning perceptual, motor, and language skills in healthy and clinical populations. Here, we developed a new method to measure statistical learning without any manual responses. We used the Alternating Serial Reaction Time (ASRT) task, adapted to eye-tracker, which, besides measuring reaction times (RTs), enabled us to track learning-dependent anticipatory eye movements. We found robust, interference-resistant learning on RT; moreover, learning-dependent anticipatory eye movements were even more sensitive measures of statistical learning on this task. Our method provides a way to apply the widely used ASRT task to operationalize statistical learning in clinical populations where the use of manual tasks is hindered, such as in Parkinson’s disease. Furthermore, it also enables future basic research to use a more sensitive version of this task to measure predictive processing.
In this article we show that bi-intuitionistic predicate logic lacks the Craig Interpolation Property. We proceed by adapting the counterexample given by Mints, Olkhovikov and Urquhart for intuitionistic predicate logic with constant domains [13]. More precisely, we show that there is a valid implication $\phi \rightarrow \psi $ with no interpolant. Importantly, this result does not contradict the unfortunately named ‘Craig interpolation’ theorem established by Rauszer in [24] since that article is about the property more correctly named ‘deductive interpolation’ (see Galatos, Jipsen, Kowalski and Ono’s use of this term in [5]) for global consequence. Given that the deduction theorem fails for bi-intuitionistic logic with global consequence, the two formulations of the property are not equivalent.
In this paper, we extend the optimal dividend and capital injection problem with affine penalty at ruin in (Xu, R. & Woo, J.K. (2020). Insurance: Mathematics and Economics 92: 1–16) to the case with singular dividend payments. The asymptotic relationships between our value function to the one with bounded dividend density are studied, which also help to verify that our value function is a viscosity solution to the associated Hamilton–Jacob–Bellman Quasi-Variational Inequality (HJBQVI). We also show that the value function is the smallest viscosity supersolution within certain functional class. A modified comparison principle is proved to guarantee the uniqueness of the value function as the viscosity solution within the same functional class. Finally, a band-type dividend and capital injection strategy is constructed based on four crucial sets; and the optimality of such band-type strategy is proved by using fixed point argument. Numerical examples of the optimal band-type strategies are provided at the end when the claim size follows exponential and gamma distribution, respectively.
Almost stochastic dominance has been receiving a great amount of attention in the financial and economic literatures. In this paper, we characterize the properties of almost first-order stochastic dominance (AFSD) via distorted expectations and investigate the conditions under which AFSD is preserved under a distortion transform. The main results are also applied to establish stochastic comparisons of order statistics and receiver operating characteristic curves via AFSD.
Social media provides an easy and ubiquitous means by which individuals can curate and share their personal experiences while also interacting with their friends, family, and the world at large. One means by which individuals can craft their personal past via social media is through their personal photographs. However, psychologists are only beginning to appreciate the mnemonic consequences associated with sharing personal photographs on social media. The aim of this manuscript is to distil the relevant, psychological research examining the mnemonic consequences associated with photography and sharing personal photographs on social media. To this end, we discuss how a psychological approach to memory has evolved from an individualist perspective to one that is beginning to appreciate the importance of a memory ecology. We then turn to photographs as an important component of one's memory ecology and how the act of photography and sharing photos on social media may have important consequences for how individuals remember their personal past. We then end with a discussion surrounding pertinent avenues for future research. We advocate that, moving forward, psychologists should better appreciate (1) the collective nature of social media, (2) an individual's memory ecology, and (3) the mnemonic consequences associated with social media silence. In addressing these issues, we believe that psychologists and memory researchers, more generally, will gain a fuller understanding of how, and in what way, personal photographs, and the act of sharing them via social media may shape the way individuals remember their personal past.
As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats. We need to use multiple types of tools and techniques to learn and understand the evolving threat landscape. Data is a common thread linking various types of devices and end users. Analyzing data across different segments of cybersecurity domains, particularly data generated during cyber-attacks, can help us understand threats better, prevent future cyber-attacks, and provide insights into the evolving cyber threat landscape. This book takes a data oriented approach to studying cyber threats, showing in depth how traditional methods such as anomaly detection can be extended using data analytics and also applies data analytics to non-traditional views of cybersecurity, such as multi domain analysis, time series and spatial data analysis, and human-centered cybersecurity.
Every year the shortage of biosamples is increasing, while the requirements for their quality are constantly tightening, which requires the introduction of new technological solutions. To solve these problems, a robotic system for aliquoting biological liquid was developed. The aliquotation process is described. The station includes a serial robot on which a gripper based on a globoid worm is installed. The gripping device is parameterized and takes into account the gripping force for different finger deflections. 3D models were developed using Computer Aided Design (CAD) system tools, after which working layouts were created using 3D printing. The design process and test results are discussed to show the efficiency of the built prototype with lab tests.
This article is concerned with remote monitoring and control of the 2-degrees of freedom (DoF) robotic manipulators, which have nonlinear dynamics over the packet erasure channel, which is an abstract model for communication over the Internet, WiFi, or Zigbee modules. This type of communication is subject to imperfections, such as random packet dropout and rate distortion. These imperfections cause a significant challenge for monitoring and control of robotic manipulators in the industrial environments because sensitive data, such as sensor data and control commands may not ever reach to their destination resulting in significant performance degradation. Therefore, the effects of these imperfections must be compensated. In this article, we apply two coding and control techniques previously developed for the telepresence ad teleoperation of autonomous vehicles to compensate the effects of the above communication imperfections for remote monitoring and control of the 2-DoF robotic manipulators controlled over the packet erasure channel. To achieve this goal, we design a new linear controller and a new nonlinear controller for the 2-DoF robotic manipulators over the packet erasure channel. The first technique is based on the linearization method and the second technique uses a nonlinear controller. The performances of these two techniques for remote monitoring and control of robotic manipulators are evaluated and compared with each other in this paper. We illustrate their satisfactory performances in the presence of severe communication imperfections.
Population-based structural health monitoring (PBSHM) provides a means of accounting for inter-turbine correlations when solving the problem of wind farm anomaly detection. Across a wind farm, where a group of structures (turbines) is placed in close vicinity to each other, the environmental conditions and, thus, structural behavior vary in a spatiotemporal manner. Spatiotemporal trends are often overlooked in the existing data-based wind farm anomaly detection methods, because most current methods are designed for individual structures, that is, detecting anomalous behavior of a turbine based on the past behavior of the same turbine. In contrast, the idea of PBSHM involves sharing data across a population of structures and capturing the interactions between structures. This paper proposes a population-based anomaly detection method, specifically for a localized population of structures, which accounts for the spatiotemporal correlations in structural behavior. A case study from an offshore wind farm is given to demonstrate the potential of the proposed method as a wind farm performance indicator. It is concluded that the method has the potential to indicate operational anomalies caused by a range of factors across a wind farm. The method may also be useful for other tasks such as wind power and turbine load modeling.
Deep nets are becoming larger and larger in practice, with no respect for (non)-factors that ought to limit growth including the so-called curse of dimensionality (CoD). Donoho suggested that dimensionality can be a blessing as well as a curse. Current practice in industry is well ahead of theory, but there are some recent theoretical results from Weinan E’s group suggesting that errors may be independent of dimensions $d$. Current practice suggests an even stronger conjecture: deep nets are not merely immune to CoD, but actually, deep nets thrive on scale.
Vectors—or length-indexed lists—are classic example of a dependent type. Yet, most tutorials stay clear of any function on vectors whose definition requires non-trivial equalities between natural numbers to type check. This pearl shows how to write functions, such as vector reverse, that rely on monoidal equalities to be type correct without having to write any additional proofs. These techniques can be applied to many other functions over types indexed by a monoid, written using an accumulating parameter, and even be used to decide arbitrary equalities over monoids ‘for free.’
Surface roughness (SR) is one of the major parameters used to govern the quality of the fused deposition modeling (FDM)-printed products, and the FDM process parameters can be easily regulated in order to obtain a good surface finish. The surface quality of the product produced by the FDM is generally affected by the staircase effect that needs to be managed. Also, the production time (PT) to fabricate the product and volume percentage error (VPE) should be minimized to make the FDM process more efficient. The aim of this paper is to accomplish these three objectives with the use of the parametric optimization technique integrating the artificial neural network (ANN) and the whale optimization algorithm (WOA). The FDM parameters which have been taken into consideration are layer thickness, nozzle temperature, printing speed, and raster width. Experimentation has been conducted on printed samples to examine the impact of the input parameters on SR, VPE, and PT according to Taguchi's L27 orthogonal array. The ANN model has been built up using the experimental data, which was further used as an objective function in the WOA with an aim to minimize output responses. The robustness of the proposed method has been validated on the optimal combinations of FDM process parameters.