A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Integrating Decentralized Indoor Evacuation with Information Depositories in the Field
2017
ISPRS International Journal of Geo-Information
Information depositories enable the environment to maintain information and interact with passing-by evacuees. ...
This research supports single evacuees in a dynamically changing environment with risk-aware guidance. ...
Velocity obstacle models have been originally developed for robot motion planning. ...
doi:10.3390/ijgi6070213
fatcat:wg5vn53es5gd5ch7l6os3bqlgi
V-Lab-a virtual laboratory for autonomous agents-SLA-based learning controllers
2002
IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics)
In this paper, we present the use of stochastic learning automata (SLA) in mutliagent robotics. ...
Index Terms-Reinforcement learning, robotic agents stochastic learning automata (SLA), V-Lab. ...
In this paper we discuss the use of learning control for multiagent robotics using a stochastic learning automata (SLA). ...
doi:10.1109/tsmcb.2002.1049613
pmid:18244885
fatcat:bynolf33kzgjtoo33fxzjab7vy
Fundamental Complexity Measures of Life
[article]
2011
arXiv
pre-print
Regarding their physical level, living organisms can be compared to robots. Living organisms can behave in the next timestep as a new robot, a robot with a new function. ...
Attila Grandpierre I agree with Ball's note that the recent emphasis on DNA as a depository of digital information might be an overstatement. ...
arXiv:1204.6670v1
fatcat:mi4n7xshbrdubbrjyoug272lou
Capitalistic Musings
2018
Figshare
Conflicts are ruinous in automata based on recursive functions (Turing machines) as all robots must be. ...
James Bond always finds himself confronted with hideous, vicious, malicious machines and automata. ...
"Umheilicht" must be overcome with two movements of extreme tension: a deep study in history (natural, universal, human, religious, philosophical, etc.) ...
doi:10.6084/m9.figshare.7176533.v1
fatcat:2klo6ivnonfkhkun6cle5yg72e
Self-Organized Evolutionary Process in Sets of Interdependent Variables near the Midpoint of Phase Transition in K-Satisfiability
[chapter]
2001
Lecture Notes in Computer Science
Government to nearly 1,300 Federal depository libraries nationwide. ...
The Federal Depository Library Program (FDLP) The U.S. Congress established the Federal Depository Library Program to ensure access for the American public to U.S. Government information. ...
doi:10.1007/3-540-45443-8_20
fatcat:ght26tu6avh57kkp54kifofaee
A Self-adaptive Monitoring Framework for Component-Based Software Systems
[chapter]
2011
Lecture Notes in Computer Science
and autonomous robots, ubiquitous computing, embedded systems, ad hoc networks, and self-learning user interfaces [Cheng et al., 2008] . ...
The overhead is controlled by employing strategies for a nonlinear control problem modeled as a composition of timed automata. ...
A first idea is to construct design-oriented performance models (e.g. by means of UML-SPT or PCM as described in Section 2.2.4) that allow annotating operations with required, predicted, and measured ...
doi:10.1007/978-3-642-23798-0_30
fatcat:apnintsmcbhv7cjm2crj5ldhsa
INTELLI 2013 The Second International Conference on Intelligent Systems and Applications INTELLI 2013 Committee INTELLI Advisory Committee INTELLI 2013 Technical Program Committee
2013
Foreword The Second International Conference on Intelligent Systems and Applications (INTELLI 2013), held between April 21 st-26 th
unpublished
Software agents are autonomous entities [3] with their own goals and the ability to communicate with other agents. ...
The algorithm of the decision-making process that lies upon the computer model can be easily described on cellular automata language. ...
Dialogue is implemented rationally with attraction of computer abilities and hierarchy model. ...
fatcat:af4wfrsz5zcnddnnqcj5ry7cry
The Proceedings Book of Two Days National Conference on Emerging Areas of IT Applications in Management, Education and Social Sciences
[article]
2018
Zenodo
The token structures are recognized with the help of some diagrams. These diagrams are known as finite automata and to construct finite automata, regular expressions are used. ...
In this device, two fingerprints to be matched are first aligned with the use of their minutiae, then the image decomposed in several overlapping sub-windows, each sub-window is convolved with a depository ...
This paper contains the proposal for the new model of IOT which can be implemented on all the human being. ...
doi:10.5281/zenodo.5830922
fatcat:mv2r4wt6srcp5hnropxqwaeady
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
[chapter]
2022
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
Lastly, the Stirling engine has a potential to be competitive enough with the other renewable technologies with some necessary technical modifications to make this heat engine a feasible and effective ...
The performance of existing and proposed algorithms is analysed with regard to several metrics. ...
Learning automata (LA) is a reinforcement learning model that has been combined with the Confident Information Coverage (CIC) model to considerably increase network lifetime as well as its coverage. ...
doi:10.13052/rp-9788770227667
fatcat:da47mjbbyzfwnbpde7rgbrlppe
Toxicity Analysis and Cry Gene Profiling of Bacillus Thuringiensis Isolated from Western Ghats of Tamil Nadu State, India
2018
Proceedings of the Indian National Science Academy
The most satisfactory way, in my opinion, is that of reducing the concept of finite procedure to that of a machine with a finite number of parts, as has been done by the British mathematician Turing". ...
We model a large provider network with two autonomous systems (AS), 5 metropolitan regions, with each metropolitan region further divided randomly into 20, 40, 60, 80 and 100 access regions. ...
over ubiquitous, autonomic computing. ...
doi:10.16943/ptinsa/2018/49413
fatcat:2w6rohpbava5zh6m26tsiz7qky
The ribotype theory on the origin of life
1981
Journal of Theoretical Biology
The theory substitutes the genotype-phenotype duality with the trinity genotype-ribotype-phenotype, and proposes that life on earth originated with the ancestors of today's ribotypes. ...
The first three chapters describe separate models on precellular evolution, the evolution of protocells and the nature of the cell respectively, and the unity of the theory comes from the fact that they ...
DNA, however, can substitute RNA as a depository of instructions and at this job it performs better than RNA. ...
doi:10.1016/0022-5193(81)90211-3
pmid:7329073
fatcat:aqbehv5dbzfplh47jztefknq5m
Transaction Machines – The Infrastructure of Financial Markets
2016
This is achieved by leveraging a specific philosophical account of technology coupled with a computational and evolutionary account of financial markets. ...
For example the sealed bid auction can be modelled as pushdown automata with two reading heads. ...
They start with the so--called Null market and demonstrate how it can be modelled as finite automata. ...
doi:10.25602/gold.00018748
fatcat:bplu6gue6vhnnacjshh4ipriae
Toward a Theory of Emergence: The Role of Social Influence in Emergent Self-Organisation
2018
Drawing on pragmatic foundations, this study explores how complex organisations adapt through emergent self-organisation, with a focus on the role of social influence between agents. ...
In organisations faced with considerable uncertainty and responsibility for the control of immense resources, it is surprising to find an emergent, iterative approach is ingrained within key strategic ...
robotics (Jin & Meng, 2011) . ...
doi:10.25904/1912/2066
fatcat:4c5yodkghrd3xfeyeumuerhnx4
Topologies and design methods for folding kinetic structures : expanding the architectural paradigm
2014
The API of the 3D modeler is the interface point with the user. ...
Cybernetics,
, the vision of 'robotic architecture' is still only at an innovation stage. ...
doi:10.14288/1.0072143
fatcat:4ggsf2xbkncs7or2ydjwq2ooyy
Web Usage Mining
[chapter]
Web Mining
Though automata of various sorts have existed for centuries, it is only with the development of computers, control theory, and artificial intelligence (AI) since the 1950s that anything resembling autonomous ...
This idea is that a page with many outgoing links is valuable since it may be a Web directory or a Web resource depository. ...
In general, queries involve relationships between terms and documents (such as, e.g., "find articles dealing with Java Native Interface"), and can be modelled as vectors in the vector-space model. ...
doi:10.4018/978-1-59140-414-9.ch018
fatcat:ap6nd7exerg3xe2izd6porxocu
« Previous
Showing results 1 — 15 out of 18 results