Hasil untuk "Cybernetics"
Menampilkan 20 dari ~120924 hasil · dari CrossRef, DOAJ
Charis M. Galanakis, Markos I. Daskalakis, Ioannis M. Galanakis et al.
Abstract This review presents a comprehensive examination of the European Union's (EU) multifaceted approach to food security, focusing on the policies, standards, practices, initiatives, and national adaptations that drive the EU's food system resilience. Through frameworks such as the Common Agricultural Policy (CAP), Farm to Fork Strategy, and Food 2030, the EU has emphasized sustainable agriculture, supply chain resilience, and equitable access to food across its member states, ensuring food security while maintaining rigorous food safety standards. However, while these policies promote sustainability and supply chain resilience, their effectiveness is hindered by regulatory complexities, economic disparities, and compliance burdens on small-scale producers. This review also explores international and regional standards, including ISO and Codex Alimentarius, which uphold food safety and quality across diverse supply chains. National and local practices in countries like Austria and Finland illustrate how EU objectives are tailored to meet specific regional needs, emphasizing a flexible approach. EU-funded projects focused on food waste reduction, digital innovation, and climate resilience provide practical insights into implementing these policies and advancing the EU's long-term food security goals. By enhancing cross-regional collaboration, investing in digital tools, and addressing disparities in implementation capacity, the EU can further strengthen the adaptability and resilience of its food system, ensuring secure, sustainable, and affordable access to food for all citizens amid global challenges.
Alexander Yu. Nikiforov
Inesisa Ncube, Josiline Chigwada, Patrick Ngulube et al.
Background: Government support for the use of indigenous knowledge (IK) for sustainable livelihoods assists in the achievement of sustainable development goals (SDGs). The integration of IK into formal development frameworks has been hindered by institutional barriers or a lack of policy recognition. Objectives: The study sought to assess how the governments of South Africa and Zimbabwe support the use of IK to sustain livelihoods. Method: A qualitative case study approach was used. Data were gathered through interviews and document analysis. Interviews were conducted with government officials and two were chosen from each department or ministry using purposive sampling, and a total of 10 participants were part of the study. The national development plans (NDPs) and indigenous knowledge systems (IKS) policies were analysed to gather information on government support for the use of IK for sustainable livelihoods. Thematic analysis and content analysis were the approaches to data analysis. Results: The findings show that the South African government had implemented various mechanisms to support the use of IK for sustainable livelihoods while little efforts were made in Zimbabwe. Conclusion: The South African government formulated policies that support the use of IK to sustain livelihoods, while IK policy formulation and implementation in Zimbabwe was not evident. Contribution: The research adds to the conversation about the importance of acknowledging IK and promoting its incorporation into development interventions and policy frameworks that can help governments leverage the potential of indigenous communities as keepers of priceless knowledge and guardians of sustainable livelihoods.
Zhuang Zhang, Weicheng Fan, Yongzhou Long et al.
Soft grippers due to their highly compliant material and self-adaptive structures attract more attention to safe and versatile grasping tasks compared to traditional rigid grippers. However, those flexible characteristics limit the strength and the manipulation capacity of soft grippers. In this paper, we introduce a hybrid-driven gripper design utilizing origami finger structures, to offer adjustable finger stiffness and variable grasping range. This gripper is actuated via pneumatic and cables, which allows the origami structure to be controlled precisely for contraction and extension, thus achieving different finger lengths and stiffness by adjusting the cable lengths and the input pressure. A kinematic model of the origami finger is further developed, enabling precise control of its bending angle for effective grasping of diverse objects and facilitating in-hand manipulation. Our proposed design method enriches the field of soft grippers, offering a simple yet effective approach to achieve safe, powerful, and highly adaptive grasping and in-hand manipulation capabilities.
Zhang Maoyun, Xi Huizhuang, Tang Chen et al.
We, the Editor and Publisher of Applied Artificial Intelligence, have retracted the following article:Zhang Maoyun, Xi Huizhuang, Tang Chen, Jiang Yuheng, Zhang Ziyan & Tian Chunlin, Binding Mechanism of Aviation Wire Harness Based on Improved Particle Swarm Optimization, Applied Artificial Intelligence https://doi.org/10.1080/08839514.2024.2327009Since publication, concerns have been raised by the authors about the integrity of the data presented in the article. The authors have identified issues with the programming statistics that have led to conclusions which are not credible and have requested the retraction of the article.We have been informed in our decision-making by our policy on publishing ethics and integrity and the COPE guidelines on retractions.The retracted article will remain online to maintain the scholarly record, but it will be digitally watermarked on each page as “Retracted”.
T. Thang Vo-Doan, V. Than Dung, Hirotaka Sato
While engineers put lots of effort, resources, and time in building insect scale micro aerial vehicles (MAVs) that fly like insects, insects themselves are the real masters of flight. What if we would use living insect as platform for MAV instead? Here, we reported a flight control via electrical stimulation of a flight muscle of an insect-computer hybrid robot, which is the interface of a mountable wireless backpack controller and a living beetle. The beetle uses indirect flight muscles to drive wing flapping and three major direct flight muscles (basalar, subalar, and third axilliary (3Ax) muscles) to control the kinematics of the wings for flight maneuver. While turning control was already achieved by stimulating basalar and 3Ax muscles, electrical stimulation of subalar muscles resulted in braking and elevation control in flight. We also demonstrated around 20 degrees of contralateral yaw and roll by stimulating individual subalar muscle. Stimulating both subalar muscles lead to an increase of 20 degrees in pitch and decelerate the flight by 1.5 m/s2 as well as an induce in elevation of 2 m/s2.
Lazarov Andon D.
Malware attacks cause great harms in the contemporary information systems and that requires analysis of computer networks reaction in case of malware impact. The focus of the present study is on the analysis of the computer network’s states and reactions in case of malware attacks defined by the susceptibility, exposition, infection and recoverability of computer nodes. Two scenarios are considered – equilibrium without secure software and not equilibrium with secure software in the computer network. The behavior of the computer network under a malware attack is described by a system of nonhomogeneous differential equations. The system of the nonhomogeneous differential equations is solved, and analytical expressions are derived to analyze network characteristics in case of susceptibility, exposition, infection and recoverability of computer nodes during malware attack. The analytical expressions derived are illustrated with results of numerical experiments. The conception developed in this work can be applied to control, prevent and protect computer networks from malware intrusions.
Atheer Hadi Issa Al-Rammahi
The world has experienced a health crisis with the outbreak of the COVID-19 virus. The mask has been identified as the most effective way to prevent the spread of the virus. This has led to the need for a face mask recognition device that not only detects the presence of the mask but also provides the accuracy with which a person is wearing the face mask. In addition, the face mask should also be recognized from all angles. The project aims to create a new and improved real-time face mask recognition tool using image processing and computer vision approaches. A dataset consisting of images with and without a mask was used. For the purposes of this project, a pre-trained MobileNetV2 convolutional neural network was used. The performance of the given model was evaluated. The model presented in this project can detect the face mask with an accuracy of 99.21%. The face mask recognition tool can effectively detect the face mask in the side direction, which makes it more useful. The optimization function which contains the learning loops and the optimization function are also used.
Moshe Sipper, Jason H. Moore
We present AddGBoost, a gradient boosting-style algorithm, wherein the decision tree is replaced by a succession of (possibly) stronger learners, which are optimized via a state-of-the-art hyperparameter optimizer. Through experiments over 90 regression datasets we show that AddGBoost emerges as the top performer for 33% (with 2 stages) up to 42% (with 5 stages) of the datasets, when compared with seven well-known machine-learning algorithms: KernelRidge, LassoLars, SGDRegressor, LinearSVR, DecisionTreeRegressor, HistGradientBoostingRegressor, and LGBMRegressor.
Halaman 24 dari 6047