Hasil untuk "Cybernetics"

Menampilkan 20 dari ~134539 hasil · dari arXiv, CrossRef, DOAJ, Semantic Scholar

JSON API
arXiv Open Access 2025
Cybernetic Marionette: Channeling Collective Agency Through a Wearable Robot in a Live Dancer-Robot Duet

Anup Sathya, Jiasheng Li, Zeyu Yan et al.

We describe DANCE^2, an interactive dance performance in which audience members channel their collective agency into a dancer-robot duet by voting on the behavior of a wearable robot affixed to the dancer's body. At key moments during the performance, the audience is invited to either continue the choreography or override it, shaping the unfolding interaction through real-time collective input. While post-performance surveys revealed that participants felt their choices meaningfully influenced the performance, voting data across four public performances exhibited strikingly consistent patterns. This tension between what audience members do, what they feel, and what actually changes highlights a complex interplay between agentive behavior, the experience of agency, and power. We reflect on how choreography, interaction design, and the structure of the performance mediate this relationship, offering a live analogy for algorithmically curated digital systems where agency is felt, but not exercised.

en cs.HC, cs.RO
arXiv Open Access 2025
Holistic Specification of the Human Digital Twin: Stakeholders, Users, Functionalities, and Applications

Nils Mandischer, Alexander Atanasyan, Ulrich Dahmen et al.

The digital twin of humans is a relatively new concept. While many diverse definitions, architectures, and applications exist, a clear picture is missing on what, in fact, makes a human digital twin. Within this context, researchers and industrial use-case owners alike are unaware about the market potential of the - at the moment - rather theoretical construct. In this work, we draw a holistic vision of the human digital twin, and derive the specification of this holistic human digital twin in form of requirements, stakeholders, and users. For each group of users, we define exemplary applications that fall into the six levels of functionality: store, analyze, personalize, predict, control, and optimize. The functionality levels facilitate an abstraction of abilities of the human digital twin. From the manifold applications, we discuss three in detail to showcase the feasibility of the abstraction levels and the analysis of stakeholders and users. Based on the deep discussion, we derive a comprehensive list of requirements on the holistic human digital twin. These considerations shall be used as a guideline for research and industries for the implementation of human digital twins, particularly in context of reusability in multiple target applications.

en cs.HC, eess.SY
arXiv Open Access 2025
MMFformer: Multimodal Fusion Transformer Network for Depression Detection

Md Rezwanul Haque, Md. Milon Islam, S M Taslim Uddin Raju et al.

Depression is a serious mental health illness that significantly affects an individual's well-being and quality of life, making early detection crucial for adequate care and treatment. Detecting depression is often difficult, as it is based primarily on subjective evaluations during clinical interviews. Hence, the early diagnosis of depression, thanks to the content of social networks, has become a prominent research area. The extensive and diverse nature of user-generated information poses a significant challenge, limiting the accurate extraction of relevant temporal information and the effective fusion of data across multiple modalities. This paper introduces MMFformer, a multimodal depression detection network designed to retrieve depressive spatio-temporal high-level patterns from multimodal social media information. The transformer network with residual connections captures spatial features from videos, and a transformer encoder is exploited to design important temporal dynamics in audio. Moreover, the fusion architecture fused the extracted features through late and intermediate fusion strategies to find out the most relevant intermodal correlations among them. Finally, the proposed network is assessed on two large-scale depression detection datasets, and the results clearly reveal that it surpasses existing state-of-the-art approaches, improving the F1-Score by 13.92% for D-Vlog dataset and 7.74% for LMVD dataset. The code is made available publicly at https://github.com/rezwanh001/Large-Scale-Multimodal-Depression-Detection.

en cs.CV, cs.AI
arXiv Open Access 2025
Personal Care Utility (PCU): Building the Health Infrastructure for Everyday Insight and Guidance

Mahyar Abbasian, Ramesh Jain

Building on decades of success in digital infrastructure and biomedical innovation, we propose the Personal Care Utility (PCU) - a cybernetic system for lifelong health guidance. PCU is conceived as a global, AI-powered utility that continuously orchestrates multimodal data, knowledge, and services to assist individuals and populations alike. Drawing on multimodal agents, event-centric modeling, and contextual inference, it offers three essential capabilities: (1) trusted health information tailored to the individual, (2) proactive health navigation and behavior guidance, and (3) ongoing interpretation of recovery and treatment response after medical events. Unlike conventional episodic care, PCU functions as an ambient, adaptive companion - observing, interpreting, and guiding health in real time across daily life. By integrating personal sensing, experiential computing, and population-level analytics, PCU promises not only improved outcomes for individuals but also a new substrate for public health and scientific discovery. We describe the architecture, design principles, and implementation challenges of this emerging paradigm.

en cs.CL, cs.AI
arXiv Open Access 2024
Using Explainable AI for EEG-based Reduced Montage Neonatal Seizure Detection

Dinuka Sandun Udayantha, Kavindu Weerasinghe, Nima Wickramasinghe et al.

The neonatal period is the most vulnerable time for the development of seizures. Seizures in the immature brain lead to detrimental consequences, therefore require early diagnosis. The gold-standard for neonatal seizure detection currently relies on continuous video-EEG monitoring; which involves recording multi-channel electroencephalogram (EEG) alongside real-time video monitoring within a neonatal intensive care unit (NICU). However, video-EEG monitoring technology requires clinical expertise and is often limited to technologically advanced and resourceful settings. Cost-effective new techniques could help the medical fraternity make an accurate diagnosis and advocate treatment without delay. In this work, a novel explainable deep learning model to automate the neonatal seizure detection process with a reduced EEG montage is proposed, which employs convolutional nets, graph attention layers, and fully connected layers. Beyond its ability to detect seizures in real-time with a reduced montage, this model offers the unique advantage of real-time interpretability. By evaluating the performance on the Zenodo dataset with 10-fold cross-validation, the presented model achieves an absolute improvement of 8.31% and 42.86% in area under curve (AUC) and recall, respectively.

en eess.SP, cs.AI
DOAJ Open Access 2024
Interdisciplinary, AI-Interoperable, and Universal Skills for Foreign Languages Education in Emergency Digitization

Rusudan Makhachashvili, Ivan Semenist, Ganna Prihodko et al.

Transformative potential of the knowledge economy of the XXI century, establishment of networked society, emergency digitization due to the pandemic and wartime measures have imposed elaborate interdisciplinary and transdisciplinary demands on the marketability of Liberal Arts university graduates' skills and competences, upon entering the workforce. The study is focused on the in-depth diagnostics of the development of multipurpose orientation, universality and interdisciplinarity of skillsets for students of European (English, Spanish, French, Italian, German) and Oriental (Mandarin Chinese, Japanese) Languages major programs through the span of educational activities in the time-frame of sustainable and emergency digitization measures of 2020-2024 in Ukraine. A computational framework of foreign languages education interdisciplinarity is introduced in the study. The survey analysis is used to evaluate the dimensions of interdisciplinarity, universality and transdiciplinarity, informed by the interoperability of soft skills and digital communication skills for Foreign Languages Education across contrasting timeframes and stages of foreign languages acquisition and early career training.

Information technology, Communication. Mass media
DOAJ Open Access 2024
Using the Ellipsoid Method for Sylvester's Problem and its Generalization

Petro Stetsyuk, Olha Khomiak, Oleksander Davydov

Sylvester's problem or the problem of the smallest bounding circle is the problem of constructing a circle of the smallest radius that contains a finite set of points on the plane. In n-dimensional space, it corresponds to the problem of the smallest bounding hypersphere, which can be formulated as the problem of minimizing a convex piecewise quadratic function. The article is dedicated to study of the ellipsoid method application for solving this problem and the minimax convex programming problem, which is equivalent to the generalized problem of the smallest bounding hypersphere. The generalized problem consists in finding the center of a sphere in an n-dimensional space that has a minimal radius and contains a finite set of n-dimensional spheres given by their centers and radii. The article consists of 3 sections. Section 1 describes the emshor algorithm – the algorithm of the ellipsoid method for problem of minimization of an arbitrary convex function, proves its convergence theorems, gives a geometric interpretation of the algorithm, which is based on the use of a minimum volume ellipsoid. Octave implementation of the emshor algorithm is presented here, which can be successfully applied for non-smooth convex functions minimization if the number of variables is n = 2 - 30. In Section 2, the sylvester1 algorithm is built, which is an application of the emshor algorithm for solving the problem of minimizing a convex piecewise quadratic function, which is equivalent to the problem of finding a sphere of minimum radius for a finite set of points. In Section 3, the sylvester2 algorithm is built, which is an application of the emshor algorithm for solving the problem of minimization of a convex function, which is equivalent to the generalized problem of finding a sphere of minimum radius for a finite set of spheres with given centers and radii. The results of testing the sylvester1 and sylvester2 algorithms demonstrate high working speed for modern computers and high accuracy in terms of optimal value of the objective function when solving problems in n-dimensional spaces for small values n = 2 - 30.

DOAJ Open Access 2023
Securing Big Data Integrity for Industrial IoT in Smart Manufacturing Based on the Trusted Consortium Blockchain (TCB)

Mazen Juma, Fuad Alattar, Basim Touqan

The smart manufacturing ecosystem enhances the end-to-end efficiency of the mine-to-market lifecycle to create the value chain using the big data generated rapidly by edge computing devices, third-party technologies, and various stakeholders connected via the industrial Internet of things. In this context, smart manufacturing faces two serious challenges to its industrial IoT big data integrity: real-time transaction monitoring and peer validation due to the volume and velocity dimensions of big data in industrial IoT infrastructures. Modern blockchain technologies as an embedded layer substantially address these challenges to empower the capabilities of the IIoT layer to meet the integrity requirements of the big data layer. This paper presents the trusted consortium blockchain (TCB) framework to provide an optimal solution for big data integrity through a secure and verifiable hyperledger fabric modular (HFM). The TCB leverages trustworthiness in heterogeneous IIoT networks of governing end-point peers to achieve strong integrity for big data and support high transaction throughput and low latency of HFM contents. Our proposed framework drives the fault-tolerant properties and consensus protocols to monitor malicious activities of tunable peers if compromised and validates the signed evidence of big data recorded in real-time HFM operated over different smart manufacturing environments. Experimentally, the TCB has been evaluated and reached tradeoff results of throughput and latency better than the comparative consortium blockchain frameworks.

Computer software, Technology
arXiv Open Access 2022
Loc-VAE: Learning Structurally Localized Representation from 3D Brain MR Images for Content-Based Image Retrieval

Kei Nishimaki, Kumpei Ikuta, Yuto Onga et al.

Content-based image retrieval (CBIR) systems are an emerging technology that supports reading and interpreting medical images. Since 3D brain MR images are high dimensional, dimensionality reduction is necessary for CBIR using machine learning techniques. In addition, for a reliable CBIR system, each dimension in the resulting low-dimensional representation must be associated with a neurologically interpretable region. We propose a localized variational autoencoder (Loc-VAE) that provides neuroanatomically interpretable low-dimensional representation from 3D brain MR images for clinical CBIR. Loc-VAE is based on $β$-VAE with the additional constraint that each dimension of the low-dimensional representation corresponds to a local region of the brain. The proposed Loc-VAE is capable of acquiring representation that preserves disease features and is highly localized, even under high-dimensional compression ratios (4096:1). The low-dimensional representation obtained by Loc-VAE improved the locality measure of each dimension by 4.61 points compared to naive $β$-VAE, while maintaining comparable brain reconstruction capability and information about the diagnosis of Alzheimer's disease.

en eess.IV, cs.CV
DOAJ Open Access 2022
Computational Intelligence in Metric Analysis of the Skull in the Context of Maxillofacial Surgery

Ales Prochazka, Tatjana Dostalova, Oldrich Vysata et al.

Anthropometric studies focusing on facial metrics and their proportions form an important research area devoted to observations of the appearance of the human skull. Many different applications include the use of craniometry for maxillofacial reconstruction and surgery. This paper explores the possibility of using selected craniometric points and associated metric to observe spatial changes during the maxillofacial surgery treatment. The experimental dataset includes observations of 27 individuals. The proposed method is associated with the processing of measurements by selected methods of signal processing and computational intelligence. The statistical results point to changes of facial measures before and after the maxillofacial surgery. The proposed method conclusively demonstrates that the area of the mean upper law triangle after surgical treatment is decreased by 8.5%, at the 5% significance level of the two-sample t-test. The classification of selected measurements by a neural network model reached an accuracy of 84.9%.

Electrical engineering. Electronics. Nuclear engineering
DOAJ Open Access 2022
Evaluation and Selection Models for Ensemble Intrusion Detection Systems in IoT

Rubayyi Alghamdi, Martine Bellaiche

Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastructure from adversary activities. Several network systems suffer from drawbacks that allow intruders to use malicious traffic to obtain unauthorized access. Attacks such as Distributed Denial of Service attacks (DDoS), Denial of Service attacks (DoS), and Service Scans demand a unique automatic system capable of identifying traffic abnormality at the earliest stage to avoid system damage. Numerous automatic approaches can detect abnormal traffic. However, accuracy is not only the issue with current Intrusion Detection Systems (IDS), but the efficiency, flexibility, and scalability need to be enhanced to detect attack traffic from various IoT networks. Thus, this study concentrates on constructing an ensemble classifier using the proposed Integrated Evaluation Metrics (IEM) to determine the best performance of IDS models. The automated Ranking and Best Selection Method (RBSM) is performed using the proposed IEM to select the best model for the ensemble classifier to detect highly accurate attacks using machine learning and deep learning techniques. Three datasets of real IoT traffic were merged to extend the proposed approach’s ability to detect attack traffic from heterogeneous IoT networks. The results show that the performance of the proposed model achieved the highest accuracy of 99.45% and 97.81% for binary and multi-classification, respectively.

Computer software, Technology
arXiv Open Access 2021
Information Stealing in Federated Learning Systems Based on Generative Adversarial Networks

Yuwei Sun, Ng Chong, Hideya Ochiai

An attack on deep learning systems where intelligent machines collaborate to solve problems could cause a node in the network to make a mistake on a critical judgment. At the same time, the security and privacy concerns of AI have galvanized the attention of experts from multiple disciplines. In this research, we successfully mounted adversarial attacks on a federated learning (FL) environment using three different datasets. The attacks leveraged generative adversarial networks (GANs) to affect the learning process and strive to reconstruct the private data of users by learning hidden features from shared local model parameters. The attack was target-oriented drawing data with distinct class distribution from the CIFAR- 10, MNIST, and Fashion-MNIST respectively. Moreover, by measuring the Euclidean distance between the real data and the reconstructed adversarial samples, we evaluated the performance of the adversary in the learning processes in various scenarios. At last, we successfully reconstructed the real data of the victim from the shared global model parameters with all the applied datasets.

en cs.LG, cs.CR
arXiv Open Access 2021
End-To-End Real-Time Visual Perception Framework for Construction Automation

Mohit Vohra, Ashish Kumar, Ravi Prakash et al.

In this work, we present a robotic solution to automate the task of wall construction. To that end, we present an end-to-end visual perception framework that can quickly detect and localize bricks in a clutter. Further, we present a light computational method of brick pose estimation that incorporates the above information. The proposed detection network predicts a rotated box compared to YOLO and SSD, thereby maximizing the object's region in the predicted box regions. In addition, precision P, recall R, and mean-average-precision (mAP) scores are reported to evaluate the proposed framework. We observed that for our task, the proposed scheme outperforms the upright bounding box detectors. Further, we deploy the proposed visual perception framework on a robotic system endowed with a UR5 robot manipulator and demonstrate that the system can successfully replicate a simplified version of the wall-building task in an autonomous mode.

en cs.RO

Halaman 22 dari 6727