To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This study is predicated on the limited scholarly exploration of the connection between logos and the architectural spaces associated with these brands. The primary objective of this paper is to investigate the relationship between a brand’s corporate identity and its architectural structures through a holistic approach, leveraging artificial intelligence (AI) as a design tool. To achieve this, this study conducts an interdisciplinary literature review, synthesizing existing works in both architecture and branding. The research methodology follows a qualitative, exploratory framework, focusing on the formal and aesthetic evaluations of AI-driven visual outputs. In this context, the central aim of this study is to explore the use of contemporary technologies as a design instrument within the architectural domain. Another key objective is to examine the application of AI as a methodological tool for architectural design within the context of corporate identity. To this end, architectural forms were visually generated using text-to-image and image-to-image, with the resulting products assessed in terms of architectural presentation techniques, visual quality, and aesthetic strategies. For the study’s empirical component, brands ranked at the top of the 2023 Best Global Brands report were selected as the sample, and AI-driven architectural productions were created based on their logos. The findings suggest that AI, with its diverse styles and capabilities, can serve as a design parameter within architectural practice. This study contributes to the discourse on the evolving intersection of AI, branding, and architectural design, proposing new perspectives on the integration of these domains in the design process.
Language is central to issues of displacement and education. This paper examines how English language teachers in refugee settings negotiated and exercised autonomy in teaching and learning in the context of the COVID-19 pandemic. It draws on the notion of autonomy and its dynamics in language classrooms in refugee settings. The paper focuses on one displacement context – Jordan’s refugee settings – to offer a fine-grained analysis of teachers’ accounts to synthesise how teachers negotiated the transition to online teaching and developed practices and relations across different sites. The study recognises teachers’ rights in contributing their own experience and expertise and draws on the Participatory Ethnographic Evaluation Research (PEER) methodology, which involved working closely with a group of six language teachers as peer researchers, who conducted in-depth interviews with two of their peers. The analysis examines the ways in which autonomy was exercised, mobilised, resourced, constrained and shaped by contextual factors during the pandemic and thus provides a nuanced understanding of teachers’ experiences. The study points to the importance of understanding teacher autonomy in the context of language teaching in technology-poor environments. By providing critical insights into the dynamics of teacher autonomy in unique professional settings, it contributes to the broader discourse on digital language learning and agency, roles and skills needed by teachers to support crisis preparedness for the future.
In this paper, a cellular robot for space trusses is structured so that it can perform tasks such as moving the truss and assembling the truss. There may be some spatial operating mechanisms on the space truss that cause obstacles to the robot’s movement, especially other mobile mechanical devices that are working, which are dynamic obstacles, so a suitable path planning for the robot is needed. In path planning, A-star algorithm has the advantages of efficient searching speed and good optimization effect, but it can’t deal with the path planning problem with dynamic obstacles, so this paper improves Lifelong Planning A-star (LPA-star) algorithm so that the improved algorithm satisfies the dynamic path planning task. Then a three-dimensional truss mathematical model is established, a dynamic obstacle environment is set up, the improved LPA-star algorithm is used for path planning, and the unimproved LPA-star algorithm and the improved A-star algorithm are used to compare with it. The simulation results show that in the environment set up in this paper, the optimal path length of the improved LPA-star algorithm is shortened by about 25% and the algorithm search time is shortened by about 55% compared with the improved A-star algorithm; while the unimproved LPA-star algorithm is unable to accomplish the dynamic path planning task. Therefore, the improved LPA-star algorithm can reduce the robot’s moving distance and time consumption.
Onboard localization for multi-robot systems stands as a critical area of research with wide-ranging applications. This paper introduces an innovative framework for multi-robot localization, uniquely characterized by its onboard capability, thereby negating the dependency on external infrastructure. Our approach harnesses the inherent capabilities of each robot, enabling them to localize and synchronize their movements independently. The integration of cooperative localization algorithms with formation control mechanisms empowers a group of robots to sustain a predefined formation while following a linear trajectory. The efficacy of our framework is substantiated through comprehensive simulations and real-world experimental validations. We rigorously assess the system’s resilience to localization inaccuracies and external disturbances, demonstrating its adaptability and consistency in maintaining formation under diverse conditions. Furthermore, we explore the scalability of our approach, highlighting its potential to manage varying numbers of robots and its applicability in tasks such as collaborative transportation.
Walking mechanisms offer advantages over wheels or tracks for locomotion but often require complex designs. This paper presents the kinematic design and analysis of a novel overconstrained spatial a single degree-of-freedom leg mechanism for walking robots. The mechanism is generated by combining spherical four-bar linkages into two interconnecting loops, resulting in an overconstrained design with compact scalability. Kinematic analysis is applied using recurrent unit vector methods. Dimensional synthesis is performed using the Firefly optimization algorithm to achieve a near-straight trajectory during the stance phase for efficient walking. Constraints for mobility, singularity avoidance, and transmission angle are also implemented. The optimized design solution is manufactured using 3D printing and experimentally tested. Results verify the kinematic properties including near-straight-line motion during stance. The velocity profile shows low perpendicular vibrations. Advantages of the mechanism include compact scalability allowing variable stride lengths, smooth motion from overconstraint, and simplicity of a single actuator. The proposed overconstrained topology provides an effective option for the leg design of walking robots and mechanisms.
Machine learning has become a dominant problem-solving technique in the modern world, with applications ranging from search engines and social media to self-driving cars and artificial intelligence. This lucid textbook presents the theoretical foundations of machine learning algorithms, and then illustrates each concept with its detailed implementation in Python to allow beginners to effectively implement the principles in real-world applications. All major techniques, such as regression, classification, clustering, deep learning, and association mining, have been illustrated using step-by-step coding instructions to help inculcate a 'learning by doing' approach. The book has no prerequisites, and covers the subject from the ground up, including a detailed introductory chapter on the Python language. As such, it is going to be a valuable resource not only for students of computer science, but also for anyone looking for a foundation in the subject, as well as professionals looking for a ready reckoner.
In this paper, we investigate the number of customers that overlap or coincide with a virtual customer in an Erlang-A queue. Our analysis starts with the fluid and diffusion limit differential equations to obtain the mean and variance of the queue length. We then develop precise approximations for waiting times using fluid limits and the polygamma function. Building on this, we introduce a novel approximation scheme to calculate the mean and variance of the number of overlapping customers. This method facilitates the assessment of transient overlap risks in complex service systems, offering a useful tool for service providers to mitigate significant overlaps during pandemic seasons.
Regression is a fundamental prediction task common in data-centric engineering applications that involves learning mappings between continuous variables. In many engineering applications (e.g., structural health monitoring), feature-label pairs used to learn such mappings are of limited availability, which hinders the effectiveness of traditional supervised machine learning approaches. This paper proposes a methodology for overcoming the issue of data scarcity by combining active learning (AL) for regression with hierarchical Bayesian modeling. AL is an approach for preferentially acquiring feature-label pairs in a resource-efficient manner. In particular, the current work adopts a risk-informed approach that leverages contextual information associated with regression-based engineering decision-making tasks (e.g., inspection and maintenance). Hierarchical Bayesian modeling allow multiple related regression tasks to be learned over a population, capturing local and global effects. The information sharing facilitated by this modeling approach means that information acquired for one engineering system can improve predictive performance across the population. The proposed methodology is demonstrated using an experimental case study. Specifically, multiple regressions are performed over a population of machining tools, where the quantity of interest is the surface roughness of the workpieces. An inspection and maintenance decision process is defined using these regression tasks, which is in turn used to construct the active-learning algorithm. The novel methodology proposed is benchmarked against an uninformed approach to label acquisition and independent modeling of the regression tasks. It is shown that the proposed approach has superior performance in terms of expected cost—maintaining predictive performance while reducing the number of inspections required.
This study explored the effects of interacting with ChatGPT 4.0 on L2 learners’ motivation to write English argumentative essays. Conducted at a public university in a non-English-speaking country, the study had an experimental and mixed-methods design. It utilized both quantitative and qualitative data analyses to inform the development of effective AI-enhanced tailored interventions for teaching L2 essay writing. Overall, the results revealed that interacting with ChatGPT 4.0 had a positive lasting effect on learners’ motivation to write argumentative essays in English. However, a decline in their motivation at the delayed post-intervention stage suggested the need to maintain a balance between utilizing ChatGPT as a writing support tool and enhancing their independent writing capabilities. Learners attributed the increase in their motivation to several factors, including their perceived improvement in essay writing skills, the supportive learning environment created by ChatGPT as a tutor, positive interactions with it, and the development of meta-cognitive awareness by addressing their specific writing issues. The study highlights the potential of AI-based tools in enhancing L2 learners’ motivation in English classrooms.
We consider the count of subgraphs with an arbitrary configuration of endpoints in the random-connection model based on a Poisson point process on ${\mathord{\mathbb R}}^d$. We present combinatorial expressions for the computation of the cumulants and moments of all orders of such subgraph counts, which allow us to estimate the growth of cumulants as the intensity of the underlying Poisson point process goes to infinity. As a consequence, we obtain a central limit theorem with explicit convergence rates under the Kolmogorov distance and connectivity bounds. Numerical examples are presented using a computer code in SageMath for the closed-form computation of cumulants of any order, for any type of connected subgraph, and for any configuration of endpoints in any dimension $d{\geq} 1$. In particular, graph connectivity estimates, Gram–Charlier expansions for density estimation, and correlation estimates for joint subgraph counting are obtained.
We apply moral foundations theory (MFT) to explore how the public conceptualizes the first eight months of the conflict between Ukraine and the Russian Federation (Russia). Our analysis includes over 1.1 million English tweets related to the conflict over the first 36 weeks. We used linguistic inquiry word count (LIWC) and a moral foundations dictionary to identify tweets’ moral components (care, fairness, loyalty, authority, and sanctity) from the United States, pre- and post-Cold War NATO countries, Ukraine, and Russia. Following an initial spike at the beginning of the conflict, tweet volume declined and stabilized by week 10. The level of moral content varied significantly across the five regions and the five moral components. Tweets from the different regions included significantly different moral foundations to conceptualize the conflict. Across all regions, tweets were dominated by loyalty content, while fairness content was infrequent. Moral content over time was relatively stable, and variations were linked to reported conflict events.
Even though Sub-Saharan Africa (SSA) is lagging in digital technology adoption among the global average, there is substantial progress in terms of Information and Communication Technology (ICT) access and use, where it plays a crucial role in increasing the quality of life in the regions. However, digital gaps still exist within the continents, even though technology adoption across African nations has shown an increase in progress. This paper aims to explore factors that contribute to different adoption rates among three digital technologies in SSA, specifically mobile phones, fixed broadband, and fixed telephones. The methodology utilizes panel regression analysis to examine data sourced from the World Bank, which consists of 48 SSA countries from 2006 to 2022. The findings show a consistent growth in mobile phone subscriptions, different from fixed telephone and broadband internet that shows stagnant progress. Furthermore, infrastructure, and human capital are the most significant factors in addition to other influencing factors. The results of this study provide the African governments with insightful advice on addressing the digital divide and accelerating their digital transformation.
A more intuitive appreciation of spatial compliant behavior can be obtained through analysis and description of the behavior in terms of its centers, specifically the center of stiffness, the center of compliance, and the center of elasticity. This paper investigates the properties of each of these centers. Necessary and sufficient conditions for the coincidence of these centers are identified. A physical appreciation of those compliant behaviors that have coincident centers is obtained in terms of restrictions on the geometry of topologically simple mechanisms that realize those behaviors. The results can be used in the design of compliant mechanisms for robotic manipulation, especially when the compliance is characterized by the location of its center.
This chapter examines the extent to which e-commerce platforms may be held liable for problematic goods sold by third-party sellers on their websites. Several courts have hesitated to find e-commerce platforms liable under products liability and warranty law for products sold on their marketplaces by third-party sellers. This chapter argues that the increasing shift from in-person sales of goods to online sales necessitates a shift in current interpretations of key principles under state products liability and warranty law under Article 2 of the Uniform Commercial Code to better protect consumer interests. E-commerce platforms should, upon meeting certain criteria, be viewed as sellers and merchants for purposes of Article 2 warranties and products liability law. This chapter also highlights the role of state consumer law mandating product warnings and the federal Communications Decency Act, which, in some cases, may pose a hurdle to successful consumer claims against e-commerce platforms. The chapter concludes by offering a path forward.
3D printing, or additive manufacturing, has consequences for intellectual property (IP) law and for business models. The mechanical and digital technology of 3D printing enables the creations of a three-dimensional object from a digital 3D software model in a Computer-aided Design (CAD) file. The 3D printing platforms for creating, modifying, and transferring CAD files can take place in digital form easily and quickly, which presents opportunities for copying and raises new IP law protection considerations. 3D printing’s proliferating use by hobbyists and in new industries transforms traditional methods of creation, distribution, and sale of goods through the use of CAD files, and, in so doing, raises questions about the scope of IP legal protection and necessitates reevaluation of IP statutes. 3D printing’s technological advancement may require IP laws to evolve and respond to the nature of the technology. In addition, 3D printing raises new considerations for business models and for the supply chain due to the technology’s ability to provide complexity, customization, efficiency, expansive range of applications, and modularization. Moreover, the digital nature of CAD files, which embody physical objects in digital form, transforms design, modification, and transfer of objects and parts, reallocating production of objects to be more nimble and more flexible. As such, 3D printing can enable a new way to mass customize and can replace mass production in ways that allow new business entities to capture a new way of creating value.
Quantum technologies are promising to become one of the most impactful emerging technologies of the century. As governments and the private sector race to achieve quantum supremacy, it is crucial for the legal community to understand and analyze how these technologies will influence societies and shape consumer experiences. This essay offers an overview of the potential impacts of Quantum Information Science and Technology (QIST) on privacy as we know it today. It reviews quantum computers, quantum internet, quantum encryptions, and quantum sensing to offer a brief introduction of these fields for the legal community. This essay then proposes a novel analytical framework for future scholarly work on QIST privacy impacts. It concludes that QIST could have primary and secondary effects on privacy that would both improve and undermine privacy. Understanding the challenges that privacy scholars may soon face and having a robust framework to work with is a crucial step for future research in this emerging area of study.
The right to repair not only has important consumer value by preserving the useful life of existing products, but it also has additional and important social value by conserving natural resources and reducing pollution. However, the consumer right to repair in recent years has come under threat through the overextension by intellectual property (IP) doctrines that avoid current limits on antitrust liability by leasing or licensing rather than selling products to avoid “exhausting” IP rights and by applying IP rights to smaller portions of overall sold products, thereby treating parts rehabilitation or parts supply as prohibited acts of making or importation. Constitutional conflicts preemption might address some of these concerns, but federal legislation also is needed to protect consumers’ right to repair their purchased products.
Novel methods of data collection and analysis can enhance traditional risk management practices that rely on expert engineering judgment and established safety records, specifically when key conditions are met: Analysis is linked to the decisions it is intended to support, standards and competencies remain up to date, and assurance and verification activities are performed. This article elaborates on these conditions. The reason engineers are required to perform calculations is to support decision-making. Since humans are famously weak natural statisticians, rather than ask stakeholders to implicitly assimilate data, and arrive at a decision, we can instead rely on subject matter experts to explicitly define risk management decision problems. The results of engineering calculation can then also communicate which interventions (if any) are considered to be risk-optimal. It is also proposed that the next generation of engineering standards should learn from the success of open source software development in community building. Interacting with open datasets and code can promote engagement, identification (and resolution) of errors, training and ultimately competence. Finally, the profession’s tradition of independent verification should also be applied to the complex models that will increasingly contribute to the safety of the built environment. Model assurance will be required to keep pace with model development to identify suitable use cases as adequately safe. These are considered to be increasingly important components in ensuring that methods of data-centric engineering can be safely and appropriately adopted in industry.