To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Let r ⩾ 2 be a fixed constant and let $ {\cal H} $ be an r-uniform, D-regular hypergraph on N vertices. Assume further that D → ∞ as N → ∞ and that degrees of pairs of vertices in $ {\cal H} $ are at most L where L = D/( log N)ω(1). We consider the random greedy algorithm for forming a matching in $ {\cal H} $. We choose a matching at random by iteratively choosing edges uniformly at random to be in the matching and deleting all edges that share at least one vertex with a chosen edge before moving on to the next choice. This process terminates when there are no edges remaining in the graph. We show that with high probability the proportion of vertices of $ {\cal H} $ that are not saturated by the final matching is at most (L/D)(1/(2(r−1)))+o(1). This point is a natural barrier in the analysis of the random greedy hypergraph matching process.
In this paper, a multilayer feedforward neural network (NN) is designed and trained, for human–robot collisions detection, using only the intrinsic joint position sensors of a manipulator. The topology of one NN is designed considering the coupled dynamics of the robot and trained, with and without external contacts, by Levenberg–Marquardt algorithm to detect unwanted collisions of the human operator with the manipulator and the link that is collided. The proposed approach could be applied to any industrial robot, where only the joint position signals are available. The designed NN is compared quantitatively and qualitatively with an NN, where both the intrinsic joint position and the torque sensors of the manipulator are used. The proposed method is evaluated experimentally with the KUKA LWR manipulator, which is considered as an example of the collaborative robots, using two of its joints in a planar horizontal motion. The results illustrate that the developed system is efficient and fast to detect the collisions and identify the collided link.
The basic definition of Internet of Things (IoT) is introduced. A representative IoT architecture follows as well as the specific resources and services of IoT. Then, the chapter presents a survey on the economic analysis and pricing models for data collection in IoT. The issues include data aggregation and routing, relay selection, congestion management, resource allocation, task allocation, area coverage, and privacy management. Optimal pricing and privacy management for people-centric services in mobile crowdsensing network is next reviewed. Last, the chapter investigates the problem of providing incentives for users to participate in mobile crowdsourcing by applying the rank-order tournament as the incentive mechanism.
A family of sets is said to be intersecting if any two sets in the family have non-empty intersection. In 1973, Erdős raised the problem of determining the maximum possible size of a union of r different intersecting families of k-element subsets of an n-element set, for each triple of integers (n, k, r). We make progress on this problem, proving that for any fixed integer r ⩾ 2 and for any $$k \le ({1 \over 2} - o(1))n$$, if X is an n-element set, and $${\cal F} = {\cal F}_1 \cup {\cal F}_2 \cup \cdots \cup {\cal F}_r $$, where each $$ {\cal F}_i $$ is an intersecting family of k-element subsets of X, then $$|{\cal F}| \le \left( {\matrix{n \cr k \cr } } \right) - \left( {\matrix{{n - r} \cr k \cr } } \right)$$, with equality only if $${\cal F} = \{ S \subset X:|S| = k,\;S \cap R \ne \emptyset \} $$ for some R ⊂ X with |R| = r. This is best possible up to the size of the o(1) term, and improves a 1987 result of Frankl and Füredi, who obtained the same conclusion under the stronger hypothesis $$k < (3 - \sqrt 5 )n/2$$, in the case r = 2. Our proof utilizes an isoperimetric, influence-based method recently developed by Keller and the authors.
In this chapter, the problems of determining how the ownership of the resources affect the InP and service provider's incentives to invest and how to choose the most efficient investments in an MVN are studied. First, a general system model is developed in multiple infrastructure provider and service providers engaged in a complementary relationship to exchange multiple physical and virtual resources. Subsequently, for this formulated problem, the optimal investments are derived. Furthermore, the chapter gives detailed analysis of a special case and sheds light on the problem of ownership and investment efficiency by answering the question of whether the ownership of resources should be integrated or operated separately by the service provider and infrastructure provider. Simulation results assess the parameters that affect the efficiency of investment through simulations.