To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The importance of intuitionistic temporal logics in Computer Science and Artificial Intelligence has become increasingly clear in the last few years. From the proof-theory point of view, intuitionistic temporal logics have made it possible to extend functional programming languages with new features via type theory, while from the semantics perspective, several logics for reasoning about dynamical systems and several semantics for logic programming have their roots in this framework. We consider several axiomatic systems for intuitionistic linear temporal logic and show that each of these systems is sound for a class of structures based either on Kripke frames or on dynamic topological systems. We provide two distinct interpretations of “henceforth”, both of which are natural intuitionistic variants of the classical one. We completely establish the order relation between the semantically defined logics based on both interpretations of “henceforth” and, using our soundness results, show that the axiomatically defined logics enjoy the same order relations.
This chapter addresses many other aspects that are affected in addition to the direct communication links, when introducing Automotive Ethernet into the vehicle architecture. It describes how the system development process is affected, the software design, the networking architecture, test and qualification, as well as functional safety. Last but not least it shares some important lessons learned.
One of the key advantages to use Automotive Ethernet is the large number of protocols that can be used with it. This chapter explains the options that exist for Quality of Service with the Time Sensitive Networking standards. It furthermore addresses the topic of switches and virtual LANs, of IP-related decisions, and of a communication middleware that enables service-oriented communication also in the in-vehicle network. Furthermore, the basics of Automotive Ethernet related security are described.
In cars, Ethernet has to function under very specific conditions with stringent electromagnetic compatibility and quality requirements. These are true for all electronics, but especially challenging for the communication technologies and the communication links they use. This chapter thus gives an overview on the EMC, channel, and quality requirements Automotive Ethernet (and any other communication technology) has to fulfill.
This chapter gives an overview on the background and main properties of all Automotive Ethernet physical layer technologies currently available, starting from the channel, over PCS, PMA, and multidrop channel access in the case of 10BASE-T1S.
Ethernet was invented more than 40 years ago. Originally intended for the IT industry/data centers, it was adopted in a variety of industries. This chapter explains the main developments in these industries to show the starting point for the automotive industry, when adopting Automotive Ethernet.
The regulation of technology is an important and topical area of law, relevant to almost all aspects of society. Technology Law: Australian and International Perspectives presents a thorough exploration of the new legal challenges created by evolving technologies, from the use of facial recognition technology in criminal investigations to the rise and regulation of cryptocurrencies. A well-written and fascinating introduction to technology law in Australia and internationally, Technology Law provides thorough coverage of the theoretical perspectives, legislation, cases and developing issues where technology and the law interact. The text covers data protection and privacy, healthcare technology, criminal justice technology, commercial transactions, cybercrime, social media and intellectual property, and canvasses the future of technology and technology law. Written by leading experts in the field, Technology Law is an excellent resource for law students and legal professionals with an interest in the area.
Automatic generation of high-quality meshes is a base of CAD/CAE systems. The element extraction is a major mesh generation method for its capabilities to generate high-quality meshes around the domain boundary and to control local mesh densities. However, its widespread applications have been inhibited by the difficulties in generating satisfactory meshes in the interior of a domain or even in generating a complete mesh. The element extraction method's primary challenge is to define element extraction rules for achieving high-quality meshes in both the boundary and the interior of a geometric domain with complex shapes. This paper presents a self-learning element extraction system, FreeMesh-S, that can automatically acquire robust and high-quality element extraction rules. Two central components enable the FreeMesh-S: (1) three primitive structures of element extraction rules, which are constructed according to boundary patterns of any geometric boundary shapes; (2) a novel self-learning schema, which is used to automatically define and refine the relationships between the parameters included in the element extraction rules, by combining an Advantage Actor-Critic (A2C) reinforcement learning network and a Feedforward Neural Network (FNN). The A2C network learns the mesh generation process through random mesh element extraction actions using element quality as a reward signal and produces high-quality elements over time. The FNN takes the mesh generated from the A2C as samples to train itself for the fast generation of high-quality elements. FreeMesh-S is demonstrated by its application to two-dimensional quad mesh generation. The meshing performance of FreeMesh-S is compared with three existing popular approaches on ten pre-defined domain boundaries. The experimental results show that even with much less domain knowledge required to develop the algorithm, FreeMesh-S outperforms those three approaches in essential indices. FreeMesh-S significantly reduces the time and expertise needed to create high-quality mesh generation algorithms.
We study the lattice of extensions of four-valued Belnap–Dunn logic, called super-Belnap logics by analogy with superintuitionistic logics. We describe the global structure of this lattice by splitting it into several subintervals, and prove some new completeness theorems for super-Belnap logics. The crucial technical tool for this purpose will be the so-called antiaxiomatic (or explosive) part operator. The antiaxiomatic (or explosive) extensions of Belnap–Dunn logic turn out to be of particular interest owing to their connection to graph theory: the lattice of finitary antiaxiomatic extensions of Belnap–Dunn logic is isomorphic to the lattice of upsets in the homomorphism order on finite graphs (with loops allowed). In particular, there is a continuum of finitary super-Belnap logics. Moreover, a non-finitary super-Belnap logic can be constructed with the help of this isomorphism. As algebraic corollaries we obtain the existence of a continuum of antivarieties of De Morgan algebras and the existence of a prevariety of De Morgan algebras which is not a quasivariety.
Since Kripke, philosophers have distinguished a priori true statements from necessarily true ones. A statement is a priori true if its truth can be established before experience, and necessarily true if it could not have been false according to logical or metaphysical laws. This distinction can be captured formally using two-dimensional semantics.
There is a natural way to extend the notions of apriority and necessity so they can also apply to questions. Questions either can or cannot be resolved before experience, and either are or are not about necessary facts. Classical two-dimensionalism has no account of question meanings, so it has to be combined with a framework for question semantics in order to capture these observations. It is shown in [14] how two-dimensional semantics can be combined with inquisitive semantics, in which questions are analyzed in terms of information. The present paper investigates the logic of two-dimensional inquisitive semantics, and provides a complete proof system.
The injective version of Cantor’s theorem appears in full second-order logic as the inconsistency of the abstraction principle, Frege’s Basic Law V (BLV), an inconsistency easily shown using Russell’s paradox. This incompatibility is akin to others—most notably that of a (Dedekind) infinite universe with the Nuisance Principle (NP) discussed by neo-Fregean philosophers of mathematics. This paper uses the Burali–Forti paradox to demonstrate this incompatibility, and another closely related, without appeal to principles related to the axiom of choice—a result hitherto unestablished. It discusses both the general interest of this result, its interest to neo-Fregean philosophy of mathematics, and the potential significance of the Burali–Fortian method of proof.
Suppose in a given planar circular region, there are smart mobile evaders and we want to find them using sweeping agents. We assume the sweeping agents are in a line formation whose total length is predetermined. We propose procedures for designing a sweeping process that ensures the successful completion of the task, thereby deriving conditions on the sweeping velocity of the linear formation and its path. Successful completion of the task means that evaders with a given limit on their velocity cannot escape the sweeping agents. We present results on the search time given the initial conditions.
This paper proposes a relationship between design thinking and computational thinking. It describes design thinking and computational thinking as two prominent ways of understanding how people address design problems. It suggests that, currently, each of design thinking and computational thinking is defined and theorized in isolation from the other. A two-dimensional ontological space of the ways that people think in addressing problems is proposed, based on the orientation of the thinker towards problem and solution generality/specificity. Placement of design thinking and computational thinking within this space and discussion of their relationship leads to the suggestion of a dual process model for addressing design problems. It suggests that, in this model, design thinking and computational thinking are processes that are ontological mirror images of each other, and are the two processes by which thinkers address problems. Thinkers can move fluently between the two. The paper makes a contribution towards the theoretical foundations of design thinking and proposes questions about how design thinking and computational thinking might be both investigated and taught as constituent parts of a dual process.
Real-time localization is an important mission for self-driving cars and it is difficult to achieve precise pose information in dynamic environments. In this paper, a novel localization method is proposed to estimate the pose of self-driving cars using a 3D-LiDAR sensor. First, the multi-frame curb features and laser intensity features are extracted. Meanwhile, based on the high-precision curb map generated offline, obstacles on road are detected using region segmentation methods and their features are removed. Furthermore, a map-matching method is proposed to match the features to the map, a robust iterative closest point algorithm is utilized to deal with curb features along with a probability search method dealing with intensity features. Finally, two separate Kalman filters are used to fuse the low-cost global positioning systems and map-matching results. Both offline and online experiments are carried out in dynamic environments and the results demonstrate the accuracy and robustness of the proposed method.
Inquisitive first-order logic, InqBQ, is a system which extends classical first-order logic with formulas expressing questions. From a mathematical point of view, formulas in this logic express properties of sets of relational structures. This paper makes two contributions to the study of this logic. First, we describe an Ehrenfeucht–Fraïssé game for InqBQ and show that it characterizes the distinguishing power of the logic. Second, we use the game to study cardinality quantifiers in the inquisitive setting. That is, we study what statements and questions can be expressed in InqBQ about the number of individuals satisfying a given predicate. As special cases, we show that several variants of the question how many individuals satisfy$\alpha (x)$ are not expressible in InqBQ, both in the general case and in restriction to finite models.
Standard server assignment policies for multi-server queueing stations include the noncollaborative policy, where the servers work in parallel on different jobs; and the fully collaborative policy, where the servers work together on the same job. However, if each job can be decomposed into subtasks with no precedence relationships, then we consider a form of server coordination named task assignment where the servers work in parallel on different subtasks of the same job. We identify the task assignment policy that maximizes the long-run average throughput of a queueing station with finite internal buffers when blocked servers can be idled or reassigned to either replace or collaborate with other servers on unblocked subtasks. We then compare the server coordination policies and show that the task assignment is best when the servers are highly specialized; otherwise, the fully collaborative or noncollaborative policies are preferable depending on whether the synergy level among the servers is high or not. We also provide numerical results that quantify our previous comparison. Finally, we address buffer allocation in longer lines where there are precedence relationships between some of the tasks, and present numerical results that suggest our comparisons for one queueing station generalize to longer lines.
In this note, we use Kunen’s notion of a signing to establish two theorems about the well-founded semantics of logic programs, in the case where we are interested in only (say) the positive literals of a predicate p that are consequences of the program. The first theorem identifies a class of programs for which the well-founded and Fitting semantics coincide for the positive part of p. The second theorem shows that if a program has a signing, then computing the positive part of p under the well-founded semantics requires the computation of only one part of each predicate. This theorem suggests an analysis for query answering under the well-founded semantics. In the process of proving these results, we use an alternative formulation of the well-founded semantics of logic programs, which might be of independent interest.
Though they can be traced back to different roots, both smart design and smart systems have to do with the recent developments of artificial intelligence. There are two major questions related to them: (i) What way are smart design and smart systems enabled by artificial narrow, general, or super intelligence? and (ii) How can smart design be used in the realization of smart systems? and How can smart systems contribute to smart designing? A difficulty is that there are no exact definitions for these novel concepts in the literature. The endeavor to analyze the current situation and to answer the above questions stimulated an exploratory research whose first findings are summarized in this paper. Its first part elaborates on a plausible interpretation of the concept of smartness and provides an overview of the characteristics of smart design as a creative problem solving methodology supported by artificial intelligence. The second part exposes the paradigmatic features and system engineering issues of smart systems, which are equipped with application-specific synthetic system knowledge and reasoning mechanisms. The third part presents and elaborates on a conceptual model of AI-based couplings of smart design and smart systems. The couplings may manifest in various concrete forms in real life that are referred to as “connectors” in this paper. The principal types of connectors are exemplified and discussed. It has been found that smart design tends to manifest as a methodology of blue-printing smart systems and that smart systems will be intellectualized the enablers of implementation of smart design. Understanding the affordances of and creating proper connectors between smart design and smart systems need further explorative research.