Problem Framing: How Can Model-Based Methods Help Systems Engineers Solve The Right Problem?

Insight ◽  
2014 ◽  
Vol 17 (4) ◽  
pp. 26-28 ◽  
Author(s):  
Michele Knight ◽  
Les Vencel ◽  
Daniel DeLaurentis
Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4141
Author(s):  
Wouter Houtman ◽  
Gosse Bijlenga ◽  
Elena Torta ◽  
René van de Molengraft

For robots to execute their navigation tasks both fast and safely in the presence of humans, it is necessary to make predictions about the route those humans intend to follow. Within this work, a model-based method is proposed that relates human motion behavior perceived from RGBD input to the constraints imposed by the environment by considering typical human routing alternatives. Multiple hypotheses about routing options of a human towards local semantic goal locations are created and validated, including explicit collision avoidance routes. It is demonstrated, with real-time, real-life experiments, that a coarse discretization based on the semantics of the environment suffices to make a proper distinction between a person going, for example, to the left or the right on an intersection. As such, a scalable and explainable solution is presented, which is suitable for incorporation within navigation algorithms.


2011 ◽  
Vol 121-126 ◽  
pp. 867-871 ◽  
Author(s):  
Jie Li ◽  
Wei Wei Shan ◽  
Chao Xuan Tian

In order to evaluate the security of Application Specific Integrated Circuit (ASIC) implemented cryptographic algorithms at an early design stage, a Hamming distance model based power analysis is proposed. The Data Encryption Standard (DES) algorithm is taken as an example to illustrate the threats of differential power analysis (DPA) attack against the security of ASIC chip. A DPA attack against the ASIC implementation of a DES algorithm is realized based on hamming distance power model (HD model), and it realized the attack by successfully guessing the right 48-bit subkey. This result indicates that the power analysis attack based on the HD model is simple, rapid and effective for the design and evaluation of security chips.


Author(s):  
Hélène Landemore

This chapter argues that majority rule is a useful complement of inclusive deliberation, not just because majority rule is more efficient timewise, but because it has distinct epistemic properties of its own. It also stresses that majority rule is best designed for collective prediction—that is, the identification of the best options out of those selected during the deliberative phase. Of all the competing alternatives (rule of one or rule of the few), majority rule maximizes the chances of predicting the right answer among the proposed options. The chapter considers several accounts of the epistemic properties of majority rule, including the Condorcet Jury Theorem, the Miracle of Aggregation, and a more fine-grained model based on cognitive diversity.


Computers ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 18 ◽  
Author(s):  
Konstantinos Rantos ◽  
Arnolnt Spyros ◽  
Alexandros Papanikolaou ◽  
Antonios Kritsas ◽  
Christos Ilioudis ◽  
...  

Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing information, accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organisations are bound to face when they decide to invest in effective and interoperable cybersecurity information sharing and categorises them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organisations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats.


2014 ◽  
Vol 26 (8) ◽  
pp. 1601-1614 ◽  
Author(s):  
Corey N. White ◽  
Eliza Congdon ◽  
Jeanette A. Mumford ◽  
Katherine H. Karlsgodt ◽  
Fred W. Sabb ◽  
...  

The stop-signal task, in which participants must inhibit prepotent responses, has been used to identify neural systems that vary with individual differences in inhibitory control. To explore how these differences relate to other aspects of decision making, a drift-diffusion model of simple decisions was fitted to stop-signal task data from go trials to extract measures of caution, motor execution time, and stimulus processing speed for each of 123 participants. These values were used to probe fMRI data to explore individual differences in neural activation. Faster processing of the go stimulus correlated with greater activation in the right frontal pole for both go and stop trials. On stop trials, stimulus processing speed also correlated with regions implicated in inhibitory control, including the right inferior frontal gyrus, medial frontal gyrus, and BG. Individual differences in motor execution time correlated with activation of the right parietal cortex. These findings suggest a robust relationship between the speed of stimulus processing and inhibitory processing at the neural level. This model-based approach provides novel insight into the interrelationships among decision components involved in inhibitory control and raises interesting questions about strategic adjustments in performance and inhibitory deficits associated with psychopathology.


2008 ◽  
Vol 28 (39) ◽  
pp. 9790-9796 ◽  
Author(s):  
B. U. Forstmann ◽  
S. Jahfari ◽  
H. S. Scholte ◽  
U. Wolfensteller ◽  
W. P. M. van den Wildenberg ◽  
...  

2013 ◽  
Vol 198 ◽  
pp. 33-38 ◽  
Author(s):  
Krzysztof Lipiński

Below, numerical analyses, as well as dynamics of a complex mechanism, are presented. Two objectives are focused: inverse dynamic model is needed (dedicated to be use in the model predictive controller); an identification method is searched (some trajectory parameters are controlled, when specific trajectory is tracked under an open-loop model-based control), as selected parameters must be identified for the model. A redundantly actuated mechatronic system is considered (in the present case some planar, parallel manipulator). When the redundancies are present, traditional torque estimation techniques can not be used directly (a non-square matrix is present in the equations). Thus, the right Moore-Penrose pseudo-inverse is used to estimate them. To model the mechanism - multibody dynamics is used. Its dynamics equations are nonlinear in respect to the joints position (displacements are significant during the mechanism motion). An open-loop model-based control algorithm is postulated for the system (the subcomponents from the closed-loop controller will not be considered in the present paper). As the real parameters of the controlled object can differ from the ones proposed in the controller, obtained trajectories differ from the requested (open-loop controller is used only). Correlations between the inertia error and the trajectory errors are tested. Sensible trajectory parameters are searched to estimate inertia of the controlled object. At present, analyses are restricted to numerical experiments, only.


Author(s):  
Simon Ausserlechner ◽  
Sandra Fruhmann ◽  
Wolfgang Wieser ◽  
Birgit Hofer ◽  
Raphael Spork ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document