An Improved Separating Hyperplane Method with Application to Embedded Intelligent Devices

Author(s):  
Yanjun Li ◽  
Ping Guo ◽  
Xin Xin
Author(s):  
Alan Beggs

AbstractThis paper presents a proof of Afriat’s (Int Econ Rev 8:67–77) theorem on revealed preference by using the idea that a rational consumer should not be vulnerable to arbitrage. The main mathematical tool is the separating hyperplane theorem.


2013 ◽  
Vol 2013 ◽  
pp. 1-14 ◽  
Author(s):  
Josep Ferrer ◽  
Juan R. Pacha ◽  
Marta Peña

We consider bimodal linear systems consisting of two linear dynamics acting on each side of a given hyperplane, assuming continuity along the separating hyperplane. We prove that the study of controllability can be reduced to the unobservable case, and for these ones we obtain a simple explicit characterization of controllability for dimensions 2 and 3, as well as some partial criteria for higher dimensions.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 146
Author(s):  
Lakshmi Prasad Mudarakola ◽  
J K.R. Sastry ◽  
V Chandra Prakash

Thorough testing of embedded systems is required especially when the systems are related to monitoring and controlling the mission critical and safety critical systems. The embedded systems must be tested comprehensively which include testing hardware, software and both together. Embedded systems are highly intelligent devices that are infiltrating our daily lives such as the mobile in your pocket, and wireless infrastructure behind it, routers, home theatre system, the air traffic control station etc. Software now makes up 90% of the value of these devices. In this paper, authors present different methods to test an embedded system using test cases generated through combinatorial techniques. The experimental results for testing a TMCNRS (Temperature Monitoring and Controlling Nuclear Reactor System) using test cases generated from combinatorial methods are also shown.


2017 ◽  
Vol 2 (3) ◽  
pp. 139-143 ◽  
Author(s):  
Hannes G. Kenngott ◽  
Martin Apitz ◽  
Martin Wagner ◽  
Anas A. Preukschas ◽  
Stefanie Speidel ◽  
...  

AbstractIn the last hundred years surgery has experienced a dramatic increase of scientific knowledge and innovation. The need to consider best available evidence and to apply technical innovations, such as minimally invasive approaches, challenges the surgeon both intellectually and manually. In order to overcome this challenge, computer scientists and surgeons within the interdisciplinary field of “cognitive surgery” explore and innovate new ways of data processing and management. This article gives a general overview of the topic and outlines selected pre-, intra- and postoperative applications. It explores the possibilities of new intelligent devices and software across the entire treatment process of patients ending in the consideration of an “Intelligent Hospital” or “Hospital 4.0”, in which the borders between IT infrastructures, medical devices, medical personnel and patients are bridged by technology. Thereby, the “Hospital 4.0” is an intelligent system, which gives the right information, at the right time, at the right place to the individual stakeholder and thereby helps to decrease complications and improve clinical processes as well as patient outcome.


2021 ◽  
Vol 1 (1) ◽  
Author(s):  
Yaya Heryadi ◽  
Michael James

The advent of smartphone technology has provided us with intelligent devices for communication as well as playing game. Unfortunately, applications that exploit available sensors in the smartphone are mostly designed for people with no physical handicap. This paper presents Mata, a game user interface using eye-tracking to operate and control games running on Android smartphone. This system is designed to enhance user experiences and help motoric impaired peoples in using smartphone for playing games. Development and testing of the Mata system has proven the concepts of eye-tracking and eyegazing usage as unimodal input for game user interface.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Hao Qinxia ◽  
Shah Nazir ◽  
Ma Li ◽  
Habib Ullah ◽  
Wang Lianlian ◽  
...  

The influential stage of Internet of Things (IoT) has reformed all fields of life in general but specifically with the emergence of artificial intelligence (AI) has drawn the attention of researchers into a new paradigm of life standard. This revolution has been accepted around the globe for making life easier with the use of intelligent devices such as smart sensors, actuators, and many other devices. AI-enabled devices are more intelligent and capable of doing a specific task which saves a lot of resources and time. Different approaches are available in the existing literature to tackle diverse issues of real life based on AI and IoT systems. The role of decision-making has its own importance in the AI-enabled and IoT systems. In-depth knowledge of the existing literature is dire need of the research community to summarize the literature in effective way by which practitioners and researchers can benefit from the prevailing proofs and suggest new solutions for solving a particular problem of AI-enabled sensing and decision-making for the IoT system. To facilitate research community, the proposed study presents a systematic literature review of the existing literature, organizes the evidences in a systematic way, and then analyzes it for future research. The study reported the literature of the last 5 years based on the research questions, inclusion and exclusion criteria, and quality assessment of the selected study. Finally, derivations are drawn from the included paper for future research.


Author(s):  
Daniel Fuentes ◽  
Rosalía Laza ◽  
Antonio Pereira

The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly) who want to join the world of the new technologies


2021 ◽  
Vol 9 (1) ◽  
pp. 89-96
Author(s):  
EMILLI LIJAU

Smart homes are one of the Internet of Things (IoT) applications most significant to enable people to operate intelligent devices on the Internet in their homes. However, when users can access an intelligent home system remotely, they have major privacy and confidentiality difficulties to overcome. Nothing has been done to improve the safety characteristics of an intelligent home with current research on authentication approaches. For example, to address these issues and to develop a reciprocal tracking authentication system with a critical aspect of a deal, we recommend an Internet based Smart Home System (IFTTT) model. As a controller and a safety guard, an IFTTT-Home Gateway provides a user with remote access to a Smart Home System within their company. The system is designed for mutual authentication with security features such as anonymity and full advance security by using Elliptical Curve Encryption, Nonces, XOR or cryptographic Hash functions. We also incorporate multi factor authentication (MFA) into the model to ensure more security and preventing privacy leakage.


Sign in / Sign up

Export Citation Format

Share Document