Heider's balance theory emphasizes cognitive consistency in assessing others, as expressed by the phrase “The enemy of my enemy is my friend.” At the same time, the theory of indirect reciprocity provides us wit...
详细信息
Heider's balance theory emphasizes cognitive consistency in assessing others, as expressed by the phrase “The enemy of my enemy is my friend.” At the same time, the theory of indirect reciprocity provides us with a dynamical framework to study how to assess others based on their actions as well as how to act toward them based on the assessments. Well known are the “leading eight” from L1 to L8, the eight norms for assessment and action to foster cooperation in social dilemmas while resisting the invasion of mutant norms prescribing alternative actions. In this work, we begin by showing that balance is equivalent to stationarity of dynamics only for L4 and L6 (stern judging) among the leading eight. Stern judging reflects an intuitive idea that good merits reward, whereas evil warrants punishment. By analyzing the dynamics of stern judging in complete graphs, we prove that this norm almost always segregates the graph into two mutually hostile groups as the graph size grows. We then compare L4 with stern judging: The only difference of L4 is that a good player's cooperative action toward a bad one is regarded as good. This subtle difference transforms large populations governed by L4 to a “paradise” where cooperation prevails and positive assessments abound. Our study thus helps us understand the relationship between individual norms and their emergent consequences at a population level, shedding light on the nuanced interplay between cognitive consistency and segregation dynamics.
The inverse kinematics problem in serially manipulated upper limb rehabilitation robots implies the usage of the end-effector position to obtain the joint rotation angles. In contrast to the forward kinematics, there ...
详细信息
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to i...
详细信息
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to infer the states of a nonlinear dynamical system of interest based on the available noisy measurements. In recent years, the advance of network communication technology has not only popularized the networked systems with apparent advantages in terms of installation,cost and maintenance, but also brought about a series of challenges to the design of nonlinear filtering algorithms, among which the communication constraint has been recognized as a dominating concern. In this context, a great number of investigations have been launched towards the networked nonlinear filtering problem with communication constraints, and many samplebased nonlinear filters have been developed to deal with the highly nonlinear and/or non-Gaussian scenarios. The aim of this paper is to provide a timely survey about the recent advances on the sample-based networked nonlinear filtering problem from the perspective of communication constraints. More specifically, we first review three important families of sample-based filtering methods known as the unscented Kalman filter, particle filter,and maximum correntropy filter. Then, the latest developments are surveyed with stress on the topics regarding incomplete/imperfect information, limited resources and cyber ***, several challenges and open problems are highlighted to shed some lights on the possible trends of future research in this realm.
Project Portfolio Management (PPM) is essential for organizations aiming to align projects with strategic goals. Different organizations adopt diverse PPM frameworks and standards to manage project portfolios each emp...
详细信息
This paper demonstrates how supervised machine learning algorithms can be leveraged to predict match outcomes from 2015/16 football season for matches in the top professional leagues of 5 countries (Spain - La Liga, E...
详细信息
The power systems of offshore jack-up drilling rigs consist of diesel generators running in parallel load-sharing mode, controlled by an automatic Power Management System (PMS). In this paper, the operational performa...
详细信息
Recent research has shown it is possible for groups of robots to automatically "bootstrap" their own collective motion behaviors, particularly movement in a group. However, existing work has primarily provid...
详细信息
The incorporation of artificial intelligence (AI) into power-related applications signifies a new and unexplored domain in machine learning for predicting power generation. This novel method utilizes prediction models...
详细信息
In the digital age web applications have become a staple of our daily lives due to their convenience and efficiency. It is our main form of communication, transactions and how we access information. With the abilities...
详细信息
ISBN:
(纸本)9798350380286
In the digital age web applications have become a staple of our daily lives due to their convenience and efficiency. It is our main form of communication, transactions and how we access information. With the abilities of web applications, we have become reliant on them for our day-to-day tasks. Although this is not inherently bad, it has become clear that web application security is a paramount tool for online use, particularly among businesses and organisations. Web application security is the practice of protecting websites, applications, and APIs from attacks. This form of security aims to ensure that web applications function smoothly and remain unhindered by cyber vandalism, data theft, and other malicious attacks. This report will explore the top three vulnerabilities highlighted by the most recent OWASP top ten vulnerabilities report, last updated in 2021. These vulnerabilities include broken access control, cryptography failures and injection attacks. Moreover, each section will highlight how these security techniques defend, can be exploited and what measures developers can take to better defend web applications. The paper addresses the future of web application security in the context of emerging technologies such as artificial intelligence (AI) and machine learning. It speculates on how these technologies might be integrated into security strategies to enhance threat detection and response capabilities. The concept of DevSecOps is introduced as an evolutionary approach to integrate security into the development process of web applications, emphasizing the shift towards proactive security practices. In conclusion, the paper highlights the critical nature of web application security in the digital age. It provides a detailed examination of the most pressing vulnerabilities and offers guidance on implementing effective security measures. The aim is to equip developers, security professionals, and organizations with the knowledge and tools necessary to build
This paper explores the application of BlazePose, a monocular human pose estimation (HPE) model, within a teleoperation framework for a UR5 six-axis robot. Achieving teleoperation with only a single RGB camera and a d...
详细信息
暂无评论