To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
It is estimated that allergies afflict up to 40% of the world's population. A primary mediator for allergies is the aggregation of antigens and IgE antibodies bound to cell-surface receptors, FcεRI. Antibody/antigen aggregate formation causes stimulation of mast cells and basophils, initiating cellular degranulation and releasing immune mediators which produce an allergic or anaphylactic response. Understanding the shape and structure of these aggregates can provide critical insights into the allergic response. We have previously developed methods to geometrically model, simulate and analyze antibody aggregation inspired by rigid body robotic motion simulations. Our technique handles the large size and number of molecules involved in aggregation, providing an advantage over traditional simulations such as molecular dynamics (MD) and coarse-grained energetic models. In this paper, we study the impact of model resolution on simulations of geometric structures using both our previously developed Monte Carlo simulation and a novel application of rule-based modeling. These methods complement each other, the former providing explicit geometric detail and the latter providing a generic representation where multiple resolutions can be captured. Our exploration is focused on two antigens, a man-made antigen with three binding sites, DF3, and a common shrimp allergen (antigen), Pen a 1. We find that impact of resolution is minimal for DF3, a small globular antigen, but has a larger impact on Pen a 1, a rod-shaped molecule. The volume reduction caused by the loss in resolution allows more binding site accessibility, which can be quantified using a rule-based model with implicit geometric input. Clustering analysis of our simulation shows good correlation when compared with available experimental results. Moreover, collisions in all-atom reconstructions are negligible, at around 0.2% at 90% reduction.
Multi-robot formation control has become an important area of research due to its advantages and applications. This paper presents multi-robot formation control using a leader–follower approach without considering the leader's velocity information or estimation. The leader–follower formation is formulated by incorporating the model uncertainties and disturbances. A novel formation controller is presented using integral terminal sliding mode (ITSM) control, which drives the formation tracking error convergence to zero in finite-time. The stability of the close-loop control scheme is verified by using Lyapunov theory. Furthermore, obstacle detection and avoidance are incorporated to avoid collision while maintaining the formation. The effectiveness of the proposed controller is verified and validated using sine and lamniscate curve trajectories. Moreover, the performance of the proposed ITSM formation controller is compared with the standard linear sliding mode (LSM) control.
Social networks influence children and adolescents' physical activity. The focus of this paper is to examine the differences in the effects of physical activity on friendship selection, with eye to the implications on physical activity interventions for young children. Prior to implementing a network intervention in the field, it is important to understand potential heterogeneities in the effects that activity level have on network structure. In this study, the associations between activity level and cross-sectional network structure, and activity level and change in network structure are assessed. We studied a real-world friendship network among 81 children (average age 7.96 years) who lived in low SES neighborhoods, attended public schools, and attended one of two structured aftercare programs, of which one has existed and the other was new. We modeled network selection effects and cross-sectional properties, while accounting for potential heterogeneities between networks. There was heterogeneity in the effect of physical activity on both cross-sectional network structure and the formation and dissolution processes, both across time and between networks. This suggests that if peer selection processes are changing within a network, a static network intervention strategy for childhood physical activity could become inefficient as the network evolves.
In Eq. (22), the x symbol was incorrectly represented by an @ symbol, therefore the equation should correctly read as
\begin{eqnarray*}\dot x &=& {f_v}(x) + {g_v}(x)u,\\{y_v} &=& y_v^a(x) - y_v^d(x).\end{eqnarray*}
Similar errors were also found in the sentence following Eq. (22). In this sentence, the correct math symbol should be yva(x) and yvd(x) instead of yva(@) and yvd(@).
Social networks, particularly those defined by friendships, influence many childhood and adolescent health behaviors such as the use of alcohol, tobacco, and other drugs, as well as diet and physical activity. Few, if any, studies have examined the concordance between friendship networks and sun exposure/safety behaviors. This study examines the friendship networks and sun safety behaviors for a group of fourth and fifth grade students taking part in a larger sun safety intervention, “SunSmart” (n = 128). Intra-class correlation, homophily hypothesis testing, and exponential random graph models were used to test friendship homophily based on sun safety behaviors. Peer Leaders were identified through social network popularity, and sun safety change scores were compared between Peer Leaders and non-leaders. Results show that students cluster based on shared demographic characteristics and some sun safety behaviors, and that there was a trend for Peer Leaders to respond better to the SunSmart intervention than non-leaders. Implications for future sun safety interventions using Peer Leaders as champions for sun safety behavior change are discussed.
Despite the pivotal role that both power and interpersonal trust play in a multitude of social exchange situations, relatively little is known about their interplay. Moreover, previous theorizing makes competing claims. Do we consider our relatively more powerful exchange partners to be less trustworthy, as rational choice reasoning would suggest? Or do more complex psychological mechanisms lead us to trust them more, as motivated cognition reasoning implies? Extending the latter approach, we develop and empirically test three hypotheses on the interrelation between perceptions of interpersonal trust and power. According to the status value hypothesis, individuals are more likely to befriend those whom they or others perceive as powerful. The status signaling hypothesis states that the friends of people one perceives as powerful will also be seen as powerful. According to the self-monitoring hypothesis, high self-monitors are more likely than low self-monitors to befriend those they or others perceive as powerful. We use multiplex stochastic actor-based models to analyze the co-evolution of trust and power relations among n = 49 employees in a Dutch Youth Care organization. Data covers three waves of a longitudinal sociometric network survey collected over a period of 18 months in the years 2009–2010. In general, we find some support for all three hypotheses, though the effects are weak. Being one of the first organizational field studies on the co-evolution of power and trust, we conclude with discussing the implications of these findings for the study of social exchange processes.
Named Entity Recognition (NER) is an essential task for many natural language processing systems, which makes use of various linguistic resources. NER becomes more complicated when the language in use is morphologically rich and structurally complex, such as Arabic. This language has a set of characteristics that makes it particularly challenging to handle. In a previous work, we have proposed an Arabic NER system that follows the hybrid approach, i.e. integrates both rule-based and machine learning-based NER approaches. Our hybrid NER system is the state-of-the-art in Arabic NER according to its performance on standard evaluation datasets. In this article, we discuss a novel methodology for overcoming the coverage drawback of rule-based NER systems in order to improve their performance and allow for automated rule update. The presented mechanism utilizes the recognition decisions made by the hybrid NER system in order to identify the weaknesses of the rule-based component and derive new linguistic rules aiming at enhancing the rule base, which will help in achieving more reliable and accurate results. We used ACE 2004 Newswire standard dataset as a resource for extracting and analyzing new linguistic rules for person, location and organization names recognition. We formulate each new rule based on two distinctive feature groups, i.e. Gazetteers of each type of named entities and Part-of-Speech tags, in particular noun and proper noun. Fourteen new patterns are derived, formulated as grammar rules, and evaluated in terms of coverage. The conducted experiments exploit a POS tagged version of the ACE 2004 NW dataset. The empirical results show that the performance of the enhanced rule-based system, i.e. NERA 2.0, improves the coverage of the previously misclassified person, location and organization named entities types by 69.93 per cent, 57.09 per cent and 54.28 per cent, respectively.
The rapidly growing field of computational social choice, at the intersection of computer science and economics, deals with the computational aspects of collective decision making. This handbook, written by thirty-six prominent members of the computational social choice community, covers the field comprehensively. Chapters devoted to each of the field's major themes offer detailed introductions. Topics include voting theory (such as the computational complexity of winner determination and manipulation in elections), fair allocation (such as algorithms for dividing divisible and indivisible goods), coalition formation (such as matching and hedonic games), and many more. Graduate students, researchers, and professionals in computer science, economics, mathematics, political science, and philosophy will benefit from this accessible and self-contained book.
We consider the problem of minimizing the number of triangles in a graph of given order and size, and describe the asymptotic structure of extremal graphs. This is achieved by characterizing the set of flag algebra homomorphisms that minimize the triangle density.
Governments encourage use of electric vehicles (EV) via regulation and investment to minimize greenhouse gas (GHG) emissions. Manufacturers produce vehicles to maximize profit, given available public infrastructure and government incentives. EV public adoption depends not only on price and vehicle attributes, but also on EV market size and infrastructure available for refueling, such as charging station proximity and recharging length and cost. Earlier studies have shown that government investment can create EV market growth, and that manufacturers and charging station operators must cooperate to achieve overall profitability. This article describes a framework that connects decisions by the three stakeholders (government, EV manufacturer, charging station operator) with preferences of the driving public. The goal is to develop a framework that allows the effect of government investment on the EV market to be quantified. This is illustrated in three scenarios in which we compare optimal public investment for a city in USA (Ann Arbor, Michigan) and one in China (Beijing) to minimize emissions, accounting for customer preferences elicited from surveys conducted in the two countries. Under the modeling assumptions of the framework, we find that high customer sensitivity to prices, combined with manufacturer and charging station operator profit maximization strategies, can render government investment in EV subsidies ineffective, while a collaboration among stakeholders can achieve both emission reduction and profitability. When EV and station designs improve beyond a certain threshold, government investment influence on EV adoption is attenuated apparently due to diminishing customer willingness to buy. Furthermore, our analysis suggests that a diversified government investment portfolio could be especially effective for the Chinese market, with charging costs and price cuts on license plate fees being as important as EV subsidies.
A long-standing conjecture of Richter and Thomassen states that the total number of intersection points between any n simple closed Jordan curves in the plane, so that any pair of them intersect and no three curves pass through the same point, is at least (1−o(1))n2.
We confirm the above conjecture in several important cases, including the case (1) when all curves are convex, and (2) when the family of curves can be partitioned into two equal classes such that each curve from the first class touches every curve from the second class. (Two closed or open curves are said to be touching if they have precisely one point in common and at this point the two curves do not properly cross.)
An important ingredient of our proofs is the following statement. Let S be a family of n open curves in ℝ2, so that each curve is the graph of a continuous real function defined on ℝ, and no three of them pass through the same point. If there are nt pairs of touching curves in S, then the number of crossing points is $\Omega(nt\sqrt{\log t/\log\log t})$.
Random increasing k-trees represent an interesting and useful class of strongly dependent graphs that have been studied widely, including being used recently as models for complex networks. In this paper we study an informative notion called BFS-profile and derive, by several analytic means, asymptotic estimates for its expected value, together with the limiting distribution in certain cases; some interesting consequences predicting more precisely the shapes of random k-trees are also given. Our methods of proof rely essentially on a bijection between k-trees and ordinary trees, the resolution of linear systems, and a specially framed notion called Flajolet–Odlyzko admissibility.
Characterizations of semi-stable and stage extensions in terms of two-valued logical models are presented. To this end, the so-called GL-supported and GL-stage models are defined. These two classes of logical models are logic programming counterparts of the notion of range which is an established concept in argumentation semantics.
There has been an increased interest in the decision problems for linear logic and its fragments. Here, we give a fully self-contained, easy-to-follow, but fully detailed, direct and constructive proof of the undecidability of a very simple Horn-like fragment of linear logic, which is accessible to a wide range of people. Namely, we show that there is a direct correspondence between terminated computations of a Minsky machine M and cut-free linear logic derivations for a Horn-like sequent of the form
Neither negation, nor &, nor constants, nor embedded implications/bangs are used here.
Furthermore, our particular correspondence constructed above provides decidability for each of the Horn-like fragments whenever we confine ourselves to any two forms of the above Horn-like implications, along with the complexity bounds that come from the proof.
In this paper, we propose an extension of logic programming where each default literal derived from the well-founded model is associated to a justification represented as an algebraic expression. This expression contains both causal explanations (in the form of proof graphs built with rule labels) and terms under the scope of negation that stand for conditions that enable or disable the application of causal rules. Using some examples, we discuss how these new conditions, we respectively call enablers and inhibitors, are intimately related to default negation and have an essentially different nature from regular cause-effect relations. The most important result is a formal comparison to the recent algebraic approaches for justifications in logic programming: Why-not Provenance and Causal Graphs. We show that the current approach extends both Why-not Provenance and Causal Graphs justifications under the well-founded semantics and, as a byproduct, we also establish a formal relation between these two approaches.
Technical function is a key concept in engineering design. Despite the centrality of the concept, a systematic, rigorous analysis of the utility of function and its different conceptualizations is missing in the engineering design literature. This paper addresses this challenge. We investigate the utility of function and its different meanings in the following engineering design contexts: malfunction explanation, innovative design, redesign, and routine design. This analysis provides theoretical justification for the current engineering practice of accepting ambiguity of functional descriptions and for methods to translate and/or convert functional descriptions across engineering design frameworks. We show that the utility of specific meanings of function is highly task dependent, identify novel roles for functional descriptions in engineering design, and present methodological implications for translation methods for functional descriptions.
An efficient single-layer dynamic semisupervised feedforward neural network clustering method with one epoch training, data dimensionality reduction, and controlling noise data abilities is discussed to overcome the problems of high training time, low accuracy, and high memory complexity of clustering. Dynamically after the entrance of each new online input datum, the code book of nonrandom weights and other important information about online data as essentially important information are updated and stored in the memory. Consequently, the exclusive threshold of the data is calculated based on the essentially important information, and the data is clustered. Then, the network of clusters is updated. After learning, the model assigns a class label to the unlabeled data by considering a linear activation function and the exclusive threshold. Finally, the number of clusters and density of each cluster are updated. The accuracy of the proposed model is measured through the number of clusters, the quantity of correctly classified nodes, and F-measure. Briefly, in order to predict the survival time, the F-measure is 100% of the Iris, Musk2, Arcene, and Yeast data sets and 99.96% of the Spambase data set from the University of California at Irvine Machine Learning Repository; and the superior F-measure results in between 98.14% and 100% accuracies for the breast cancer data set from the University of Malaya Medical Center. We show that the proposed method is applicable in different areas, such as the prediction of the hydrate formation temperature with high accuracy.
We use the technique of “classical realizability” to build new models of ZF + DC in which R is not well ordered. This gives new relative consistency results, which are not obtainable by forcing. This gives also a new method to get programs from proofs of arithmetical formulas with dependent choice.
The work described in this paper is part of the development of a framework to support the joint execution of cooperative missions by a group of vehicles, in a simulated, augmented, or real environment. Such a framework brings forward the need for formal languages in which to specify the vehicles that compose a team, the scenario in which they will operate, and the mission to be performed. This paper introduces the Scenario Description Language (SDL) and the Team Description Language (TDL), two Extensible Markup Language based dialects that compose the static components necessary for representing scenario and mission knowledge. SDL provides a specification of physical scenario and global operational constraints, while TDL defines the team of vehicles, as well as team-specific operational restrictions. The dialects were defined using Extensible Markup Language schemas, with all required information being integrated in the definitions. An interface was developed and incorporated into the framework, allowing for the creation and edition of SDL and TDL files. Once the information is specified, it can be used in the framework, thus facilitating environment and team specification and deployment. A survey answered by practitioners and researchers shows that the satisfaction with SDL+TDL is elevated (the overall evaluation of SDL+TDL achieved a score of 4 out of 5, with 81%/78.6% of the answers ≥4); in addition, the usability of the interface was evaluated, achieving a score of 86.7 in the System Usability Scale survey. These results imply that SDL+TDL is flexible enough to represent scenarios and teams, through a user-friendly interface.