![]() ![]() Koenig, Vincent ![]() Scientific Conference (2005) Detailed reference viewed: 74 (0 UL)![]() Zou, Benteng ![]() ![]() in Environmental Modeling and Assessment (2022) Rare earth elements govern today’s high-tech world and are deemed to be essential for the attainment of sustainable development goals. Since the 1990s, these elements have been predominantly supplied by ... [more ▼] Rare earth elements govern today’s high-tech world and are deemed to be essential for the attainment of sustainable development goals. Since the 1990s, these elements have been predominantly supplied by one single actor, China. However, due to the increasing relevance of their availability, the United States, who imports 80% of its rare earths from China, recently announced its plan to (re-)enter the rare earths supply market. This paper analyzes the strategic interactions among these two countries in open-loop and Markovian strategy spaces. Particular interest is devoted to the impact of heterogeneous supply concepts on (1) the theoretical optimal timing for the U.S. to enter the non-renewable resource market, (2) China’s optimal supply reaction to the U.S.’ entry announcement, (3) the central planner outcome, and (4) the profitability of the suppliers’ extraction behavior. By setting up a continuous-time differential game model, we show that in the absence of arbitrage opportunity, (1) the U.S. should always postpone the production launch until its rare earths reserves coincide with those of China, (2) China’s monopolistic supply is not shaped by the selected strategy, (3) while the duopolistic Markovian behavior is initially more lucrative than open-loop commitment, the opposite situation emerges as the competition proceeds, and (4) on balance, both countries are financially better off when committing to an open-loop supply path. [less ▲] Detailed reference viewed: 78 (4 UL)![]() ; Olivares Mendez, Miguel Angel ![]() in Unmanned Aircraft Systems (ICUAS), 2013 International Conference on (2013) This work aims to develop a novel Cross-Entropy (CE) optimization-based fuzzy controller for Unmanned Aerial Monocular Vision-IMU System (UAMVIS) to solve the seeand-avoid problem using its accurate ... [more ▼] This work aims to develop a novel Cross-Entropy (CE) optimization-based fuzzy controller for Unmanned Aerial Monocular Vision-IMU System (UAMVIS) to solve the seeand-avoid problem using its accurate autonomous localization information. The function of this fuzzy controller is regulating the heading of this system to avoid the obstacle, e.g. wall. In the Matlab Simulink-based training stages, the Scaling Factor (SF) is adjusted according to the specified task firstly, and then the Membership Function (MF) is tuned based on the optimized Scaling Factor to further improve the collison avoidance performance. After obtained the optimal SF and MF, 64% of rules has been reduced (from 125 rules to 45 rules), and a large number of real flight tests with a quadcopter have been done. The experimental results show that this approach precisely navigates the system to avoid the obstacle. To our best knowledge, this is the first work to present the optimized fuzzy controller for UAMVIS using Cross-Entropy method in Scaling Factors and Membership Functions optimization. [less ▲] Detailed reference viewed: 178 (8 UL)![]() Olivares Mendez, Miguel Angel ![]() in 2012 International Conference on Unmanned Aircraft Systems (ICUAS'12) (2012) This work presents two UAS See and Avoid approaches using Fuzzy Control. We compare the performance of each controller when a Cross-Entropy method is applied to optimase the parameters for one of the ... [more ▼] This work presents two UAS See and Avoid approaches using Fuzzy Control. We compare the performance of each controller when a Cross-Entropy method is applied to optimase the parameters for one of the controllers. Each controller receive information from an image processing frontend that detect and track targets in the environment. Visual information is then used under a visual servoing approach to perform autonomous avoidance. Experimental flight trials using a small quadrotor were performed to validate and compare the behaviour of both controllers. [less ▲] Detailed reference viewed: 88 (1 UL)![]() Manukyan, Anush ![]() ![]() ![]() in Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016 (2016, September 06) Unmanned Aerial Vehicles are currently investigated as an important sub-domain of robotics, a fast growing and truly multidisciplinary research field. UAVs are increasingly deployed in real-world settings ... [more ▼] Unmanned Aerial Vehicles are currently investigated as an important sub-domain of robotics, a fast growing and truly multidisciplinary research field. UAVs are increasingly deployed in real-world settings for missions in dangerous environments or in environments which are challenging to access. Combined with autonomous flying capabilities, many new possibilities, but also challenges, open up. To overcome the challenge of early identification of degradation, machine learning based on flight features is a promising direction. Existing approaches build classifiers that consider their features to be correlated. This prevents a fine-grained detection of degradation for the different hardware components. This work presents an approach where the data is considered uncorrelated and, using machine learning <br />techniques, allows the precise identification of UAV’s damages. [less ▲] Detailed reference viewed: 212 (22 UL)![]() Schleich, Julien ![]() ![]() in Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access (MobiWac'13) (2013) Detailed reference viewed: 281 (19 UL)![]() Atten, Christophe ![]() ![]() in 19th European Conference on Applications of Evolutionary Computation (EvoApplications) (2016) Detailed reference viewed: 309 (42 UL)![]() Rosalie, Martin ![]() ![]() ![]() in Proceedings of the 2Nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use (2016) The development and usage of Unmanned Aerial Vehicles (UAVs) quickly increased in the last decades, mainly for military purposes. Nowadays, this type of technology is used in non-military contexts mainly ... [more ▼] The development and usage of Unmanned Aerial Vehicles (UAVs) quickly increased in the last decades, mainly for military purposes. Nowadays, this type of technology is used in non-military contexts mainly for civil and environment protection: search & rescue teams, fire fighters, police officers, environmental scientific studies, etc. Although the technology for operating a single UAV is now mature, additional efforts are still necessary for using UAVs in fleets (or swarms). This position paper presents the ASIMUT project (Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques). The challenges of this project consist of handling several fleets of UAVs (swarms) including communication, networking and positioning aspects. This motivates the development of novel multilevel cooperation algorithms which is an area that has not been widely explored, especially when autonomy is an additional challenge. Moreover, we will provide techniques to optimize communications for multilevel swarms. Finally, we will develop distributed and localized mobility management algorithms that will cope with conflicting objectives such as connectivity maintenance and geographical area coverage. [less ▲] Detailed reference viewed: 264 (38 UL)![]() Tran Dinh, Hieu ![]() ![]() ![]() in IEEE Transactions on Wireless Communications (2022), 21(3), 1621-1637 Unmanned aerial vehicle (UAV) communication hasemerged as a prominent technology for emergency communi-cations (e.g., natural disaster) in the Internet of Things (IoT)networks to enhance the ability of ... [more ▼] Unmanned aerial vehicle (UAV) communication hasemerged as a prominent technology for emergency communi-cations (e.g., natural disaster) in the Internet of Things (IoT)networks to enhance the ability of disaster prediction, damageassessment, and rescue operations promptly. A UAV can bedeployed as a flying base station (BS) to collect data from time-constrained IoT devices and then transfer it to a ground gateway(GW). In general, the latency constraint at IoT devices and UAV’slimited storage capacity highly hinder practical applicationsof UAV-assisted IoT networks. In this paper, full-duplex (FD)radio is adopted at the UAV to overcome these challenges. Inaddition, half-duplex (HD) scheme for UAV-based relaying isalso considered to provide a comparative study between twomodes (viz., FD and HD). Herein, a device is considered tobe successfully served iff its data is collected by the UAV andconveyed to GW timely during flight time. In this context,we aim to maximize the number of served IoT devices byjointly optimizing bandwidth, power allocation, and the UAVtrajectory while satisfying each device’s requirement and theUAV’s limited storage capacity. The formulated optimizationproblem is troublesome to solve due to its non-convexity andcombinatorial nature. Towards appealing applications, we firstrelax binary variables into continuous ones and transform theoriginal problem into a more computationally tractable form.By leveraging inner approximation framework, we derive newlyapproximated functions for non-convex parts and then develop asimple yet efficient iterative algorithm for its solutions. Next,we attempt to maximize the total throughput subject to thenumber of served IoT devices. Finally, numerical results showthat the proposed algorithms significantly outperform benchmarkapproaches in terms of the number of served IoT devices andsystem throughput. [less ▲] Detailed reference viewed: 124 (26 UL)![]() Tran Dinh, Hieu ![]() ![]() ![]() E-print/Working paper (2020) Unmanned aerial vehicle (UAV) communication has emerged as a prominent technology for emergency communications (e.g., natural disaster) in Internet of Things (IoT) networks to enhance the ability of ... [more ▼] Unmanned aerial vehicle (UAV) communication has emerged as a prominent technology for emergency communications (e.g., natural disaster) in Internet of Things (IoT) networks to enhance the ability of disaster prediction, damage assessment, and rescue operations promptly. In this paper, a UAV is deployed as a flying base station (BS) to collect data from time-constrained IoT devices and then transfer the data to a ground gateway (GW). In general, the latency constraint at IoT users and the limited storage capacity of UAV highly hinder practical applications of UAV-assisted IoT networks. In this paper, full-duplex (FD) technique is adopted at the UAV to overcome these challenges. In addition, half-duplex (HD) scheme for UAV-based relaying is also considered to provide a comparative study between two modes (viz., FD and HD). Herein, a device is successfully served iff its data is collected by UAV and conveyed to GW within the flight time. In this context, we aim at maximizing the number of served IoT devices by jointly optimizing bandwidth and power allocation, as well as the UAV trajectory, while satisfying the requested timeout (RT) requirement of each device and the UAV’s limited storage capacity. The formulated optimization problem is troublesome to solve due to its non-convexity and combinatorial nature. Toward appealing applications, we first relax binary variables into continuous values and transform the original problem into a more computationally tractable form. By leveraging inner approximation framework, we derive newly approximated functions for non-convex parts and then develop a simple yet efficient iterative algorithm for its solutions. Next, we attempt to maximize the total throughput subject to the number of served IoT devices. Finally, numerical results show that the proposed algorithms significantly outperform benchmark approaches in terms of the number of served IoT devices and the amount of collected data. [less ▲] Detailed reference viewed: 97 (10 UL)![]() ; Nguyen, van Dinh ![]() in IEEE Transactions on Vehicular Communications (2021), 70(4), 3298-3313 This paper considers secure communications for an underlay cognitive radio network (CRN) in the presence of an external eavesdropper (Eve). The secrecy performance of CRNs is usually limited by the ... [more ▼] This paper considers secure communications for an underlay cognitive radio network (CRN) in the presence of an external eavesdropper (Eve). The secrecy performance of CRNs is usually limited by the primary receiver’s interference power constraint. To overcome this issue, we propose to use an unmanned aerial vehicle (UAV) as a friendly jammer to interfere Eve in decoding the confidential message from the secondary transmitter (ST). Our goal is to jointly optimize the transmit power and UAV’s trajectory in the three-dimensional (3D) space to maximize the average achievable secrecy rate of the secondary system. The formulated optimization problem is nonconvex due to the nonconvexity of the objective and nonconvexity of constraints, which is very challenging to solve. To obtain a suboptimal but efficient solution to the problem, we first transform the original problem into a more tractable form and develop an iterative algorithm for its solution by leveraging the inner approximation framework. We further extend the proposed algorithm to the case of imperfect location information of Eve, where the average worst-case secrecy rate is considered as the objective function. Extensive numerical results are provided to demonstrate the merits of the proposed algorithms over existing approaches. [less ▲] Detailed reference viewed: 95 (8 UL)![]() Stolfi Rosso, Daniel ![]() ![]() ![]() in Frontiers in Robotics and AI (2021), 8 In this paper we present a surveillance system for early detection of escapers from a restricted area based on a new swarming mobility model called CROMM-MS (Chaotic Rössler Mobility Model for Multi ... [more ▼] In this paper we present a surveillance system for early detection of escapers from a restricted area based on a new swarming mobility model called CROMM-MS (Chaotic Rössler Mobility Model for Multi-Swarms). CROMM-MS is designed for controlling the trajectories of heterogeneous multi-swarms of aerial, ground and marine unmanned vehicles with important features such as prioritising early detections and success rate. A new Competitive Coevolutionary Genetic Algorithm (CompCGA) is proposed to optimise the vehicles’ parameters and escapers’ evasion ability using a predator-prey approach. Our results show that CROMM-MS is not only viable for surveillance tasks but also that its results are competitive in regard to the state-of-the-art approaches. [less ▲] Detailed reference viewed: 129 (15 UL)![]() Azari, Mohammad Mahdi ![]() ![]() in IEEE Globecom workshops (2022) Detailed reference viewed: 61 (8 UL)![]() Sagrillo, Damien ![]() Presentation (2019, April 28) Während das Konzept des formalen, nicht-formalen und informellen Lernens in seinen allgemeinen Orientierungen als bekannt vorausgesetzt werden kann, gilt dies weniger für die Musikpädagogik. Die ... [more ▼] Während das Konzept des formalen, nicht-formalen und informellen Lernens in seinen allgemeinen Orientierungen als bekannt vorausgesetzt werden kann, gilt dies weniger für die Musikpädagogik. Die Sichtweise auf die Kategorien des Lernens im Allgemeinen, auf die Musikpädagogik und auf die Musikausübung von Amateuren im Besonderen wird Gegenstand der folgenden Zeilen sein. Darüber hinaus wird das Konzept der „community music“ (CM), für das sich in der deutschen Sprache keine geeignete Übersetzung findet, vorgestellt werden. Der Begriff „community music“ ist nicht an einer einzigen Definition festzumachen. Zunächst scheint es, als wäre er komplett losgelöst von traditionellen Methoden des Lernens formaler und nicht-formaler Art aufzufassen und eher der Kategorie informellen Lernens zuzuordnen. In neueren Ansätzen wird CM als Teil der Inklusion und Partizipation in einem assoziativen Umfeld gesehen und als Mittel, die Barriere zwischen traditioneller Musikpädagogik und den Anforderungen der musizierenden Menschen zu überwinden. Auf der anderen Seite versteht sich CM als Gegenentwurf zur musikalischen Hochkultur Das Konzept von CM eignet sich in besonderem Maße, um den Prozess der musikalischen Ausbildung junger Menschen darzustellen. Einerseits beginnt dieser oft mit einer Amateurphase, um später, für die talentiertesten, zum Berufsleben zu führen. Andererseits beschreibt CM die Ausbildung und den Weg junger Musiker hin zu Laienmusikorganisationen. Schließlich zeichnet CM das lebenslange Wirken von Amateurmusikern nach. In meinem Beitrag werde ich Definitionen für die drei Kategorien von Bildung in Bezug auf die Musikpädagogik anbieten. (Dabei kann nicht ignoriert werden, dass es im wissenschaftlichen Diskurs für den Aspekt der non-formalen Bildung im Zusammenhang mit Musik keinen Konsens gibt.) Schließlich wird, mithilfe der in Europa gängigen künstlerischen Praxis des Blasmusikwesens, die Verbindung der beiden Konzepte – Bildungskategorien und CM – exemplifiziert. [less ▲] Detailed reference viewed: 164 (5 UL)![]() Kohns, Oliver ![]() in Gegenwartsliteratur: ein Germanistisches Jahrbuch (2013), 12 Der Beitrag fragt nach der Bedeutung von Begriffen wie »Gesetz« und »Gerechtigkeit« in den Texten Handkes. Eine schillernde Bedeutungsfülle nimmt das Konzept des »Gesetzes« an, es verweist aber zentral – ... [more ▼] Der Beitrag fragt nach der Bedeutung von Begriffen wie »Gesetz« und »Gerechtigkeit« in den Texten Handkes. Eine schillernde Bedeutungsfülle nimmt das Konzept des »Gesetzes« an, es verweist aber zentral – wie im Vergleich mit Stifters »sanftem Gesetz« gezeigt werden soll – auf eine ästhetische Vorstellung von Gerechtigkeit (in der Wahrnehmung und Beschreibung der Wirklichkeit). Die Lektüre von Die Stunde der wahren Empfindung (1975) und Die Wiederholung (1986) soll zeigen, dass diese Vorstellung von Gerechtigkeit – als Suche nach dem Gesetz – auch die narrative Struktur von Handkes Texten prägen kann. Die »Serbien«-Texte Handkes zeigen schließlich, dass auch die explizit politischen Interventionen des Autors im Kontext der poetologischen Vorstellung von Gesetz und Gerechtigkeit verstanden werden müssen. [less ▲] Detailed reference viewed: 187 (12 UL)![]() ![]() ; Greiff, Samuel ![]() Scientific Conference (2015, March) Detailed reference viewed: 123 (0 UL)![]() Hu, Adelheid ![]() in Burwitz-Melzer, Eva; Königs, Frank; Riemer, Claudia (Eds.) Identität und Fremdsprachenlernen. Anmerkungen zu einer komplexen Beziehung. Arbeitspapiere der 33.Frühjahrskonferenz zur Erforschung der Fremdsprachenunterrichts (2013) Detailed reference viewed: 356 (14 UL)![]() Weigelt, Matthias ![]() Scientific Conference (2010, October) Detailed reference viewed: 75 (0 UL)![]() Margue, Michel ![]() Book published by Thelem (2020) Detailed reference viewed: 53 (3 UL) |
||