Professional Documents
Culture Documents
Full Chapter Swarm Intelligence 10Th International Conference Ants 2016 Brussels Belgium September 7 9 2016 Proceedings 1St Edition Marco Dorigo PDF
Full Chapter Swarm Intelligence 10Th International Conference Ants 2016 Brussels Belgium September 7 9 2016 Proceedings 1St Edition Marco Dorigo PDF
https://textbookfull.com/product/swarm-intelligence-11th-
international-conference-ants-2018-rome-italy-
october-29-31-2018-proceedings-marco-dorigo/
https://textbookfull.com/product/swarm-intelligence-12th-
international-conference-ants-2020-barcelona-spain-
october-26-28-2020-proceedings-marco-dorigo/
https://textbookfull.com/product/computational-logistics-7th-
international-conference-iccl-2016-lisbon-portugal-
september-7-9-2016-proceedings-1st-edition-ana-paias/
https://textbookfull.com/product/web-reasoning-and-rule-
systems-10th-international-conference-rr-2016-aberdeen-uk-
september-9-11-2016-proceedings-1st-edition-magdalena-ortiz/
Multi disciplinary Trends in Artificial Intelligence
10th International Workshop MIWAI 2016 Chiang Mai
Thailand December 7 9 2016 Proceedings 1st Edition
Chattrakul Sombattheera
https://textbookfull.com/product/multi-disciplinary-trends-in-
artificial-intelligence-10th-international-workshop-
miwai-2016-chiang-mai-thailand-december-7-9-2016-proceedings-1st-
edition-chattrakul-sombattheera/
https://textbookfull.com/product/computational-collective-
intelligence-8th-international-conference-iccci-2016-halkidiki-
greece-september-28-30-2016-proceedings-part-i-1st-edition-ngoc-
Marco Dorigo · Mauro Birattari
Xiaodong Li · Manuel López-Ibáñez
Kazuhiro Ohkura · Carlo Pinciroli
Thomas Stützle (Eds.)
LNCS 9882
Swarm Intelligence
10th International Conference, ANTS 2016
Brussels, Belgium, September 7–9, 2016
Proceedings
123
Lecture Notes in Computer Science 9882
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zürich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbrücken, Germany
More information about this series at http://www.springer.com/series/7407
Marco Dorigo Mauro Birattari
•
Swarm Intelligence
10th International Conference, ANTS 2016
Brussels, Belgium, September 7–9, 2016
Proceedings
123
Editors
Marco Dorigo Kazuhiro Ohkura
Université Libre de Bruxelles Hiroshima University
Brussels Hiroshima
Belgium Japan
Mauro Birattari Carlo Pinciroli
Université Libre de Bruxelles École Polytechnique de Montréal
Brussels Montréal, QC
Belgium Canada
Xiaodong Li Thomas Stützle
RMIT University Université Libre de Bruxelles
Melbourne, VIC Brussels
Australia Belgium
Manuel López-Ibáñez
University of Manchester
Manchester
UK
These proceedings contain the papers presented at ANTS 2016, the 10th International
Conference on Swarm Intelligence, held at IRIDIA, Université Libre de Bruxelles,
Brussels, Belgium, during September 7–9, 2016. The ANTS series started in 1998 with
the First International Workshop on Ant Colony Optimization (ANTS 1998). Since
then ANTS, which is held bi-annually, has gradually become an international forum for
researchers in the wider field of swarm intelligence. In 2004, this development was
acknowledged by the inclusion of the term “Swarm Intelligence” (next to “Ant Colony
Optimization”) in the conference title. Since 2010, the ANTS conference has been
officially devoted to the field of swarm intelligence as a whole, without any bias toward
specific research directions. This is reflected in the title of the conference: “Interna-
tional Conference on Swarm Intelligence.”
This volume contains the best papers selected out of 47 submissions. Of these, 18
were accepted as full-length papers, while seven were accepted as short papers. This
corresponds to an overall acceptance rate of 53%. Also included in this volume are
eight extended abstracts.
All the contributions were presented as posters. The full-length papers were also
presented orally in a plenary session. Extended versions of the best papers presented at
the conference will be published in a special issue of the Swarm Intelligence journal.
We take this opportunity to thank the large number of people that were involved in
making this conference a success. We express our gratitude to the authors who con-
tributed their work, to the members of the international Program Committee, to the
additional referees for their qualified and detailed reviews, and to the staff at IRIDIA for
helping with organizational matters.
We hope the reader will find this volume useful both as a reference to current
research in swarm intelligence and as a starting point for future work.
General Chair
Marco Dorigo Université Libre de Bruxelles, Belgium
Co-chairs
Mauro Birattari Université Libre de Bruxelles, Belgium
Thomas Stützle Université Libre de Bruxelles, Belgium
Technical Chairs
Xiaodong Li RMIT University, Australia
Manuel López-Ibáñez University of Manchester, UK
Kazuhiro Ohkura Hiroshima University, Japan
Publication Chair
Carlo Pinciroli École Polytechnique de Montréal, Canada
Program Committee
Afnizanfaizal Abdullah Universiti Teknologi Malaysia, Malaysia
Andrea Perna Université Libre de Bruxelles, Belgium
Andy Adamatzky University of the West of England, UK
Ann Nowe Vrije Universiteit Brussel, Belgium
Daniel Angus The University of Queensland, Australia
Prasanna Balaprakash Argonne National Laboratory, USA
Jacob Beal BBN Technologies, USA
VIII Organization
Full Papers
Short Papers
Extended Abstracts
1 Introduction
The structure of the paper follows. First the technique used to define forma-
tions in both the DNS, and SNS algorithms will be explained. The range of forma-
tions, scalability, flexibility, and robustness of the two formation definitions will
then be examined. Next the implementation of the algorithms as behaviours and
their incorporation into a behaviour-based controller will be described. Next, a
series of numerical simulations which evaluate the performance of the algorithms
will be described, and their results discussed. Finally, the paper will conclude with
a summary of the results, and description of future work.
2 Formation Definitions
2.1 Static Neighbour Selection
The SNS algorithm [12] defines the desired formation by specifying bearing con-
straints between a robot and a subset of its swarm mates. Each robot must be
uniquely identifiable in order to converge to the desired formation. Figure 1(a)
illustrates how these constraints are defined by the SNS algorithm using the
example of 4 robots forming a square. Each robot has a unique identification
number (1 to 4), and a set of constraints (target ID and bearing). The bear-
ing constraint is used to construct a unit vector f which the algorithm uses to
calculate a control signal.
Fig. 1. Defining a square formation using the SNS and DNS algorithms. Each arrow in
the figures represents a constraint or edge normal required by the formation definition.
In (a) robot 1 has bearing constraints 0 and −π/2 with robots 2 and 3 respectively.
Similar constraints exist for the remaining 3 robots. In (b) the formation definition is
given by only 4 values (π/2, π, −π/2,0) regardless of the number of robots. All bearings
are measured counter clockwise from North as indicated in the top right corner each
figure.
Variety of Formations. The SNS algorithm is able to form any parallel rigid
formation [12]. This includes shapes with internal structure (e.g. filled polygons).
Based on the formations tested in simulation, the DNS algorithm is limited to
line segments and the convex hulls of polygons. Although limited, the formations
available to the DNS algorithm are useful in the context of the sweep coverage
problem and others [1,13]. Example formations are shown in Fig. 2.
Fig. 2. Examples of the formations studied in simulation. (a) The line maximizes the
cumulative field of view (FoV) of sensors perpendicular to the formation. (b) The wedge
formation has similar FoV benefits as the line with the added benefit of increased visual
contact between robots. (c) The square formation has benefits outside the context of
the sweep coverage problem such as perimeter keeping and containment.
Neither algorithm controls the scale of the formation. This is a result of hav-
ing only bearing information to define the formation. However, with the inclu-
sion of an obstacle avoidance behaviour, which treats other robots as obstacles,
a minimum scale is maintained.
be scalable, it must be independent of group size [4]. Figure 1 shows how the
information require to define a formation in the SNS algorithm depends linearly
on the group size. Therefore, communication with the swarm is not scalable when
using the SNS algorithm. The definition of a formation in the DNS algorithm
is independent of group size, and therefore communication with the swarm is
scalable with respect to group size. However, communication would scale linearly
with the complexity of the formation (i.e. number of edges).
Flexibility of a swarm robotic system is the ability to handle changes to
group size [7]. The SNS algorithm requires changes to the bearing constraints
of neighbours of a lost or added swarm member. The DNS algorithm requires
no changes to the information stored by the swarm when members are added or
removed.
A source of robustness in swarm robotic systems comes from unit redun-
dancy [7]. That is any member of the swarm can take on the role of another
member of the swarm (assuming homogeneous robots). The DNS algorithm
maintains unit redundancy by not requiring neighbours to be uniquely iden-
tifiable. The SNS algorithm requires robots to be uniquely identifiable and so
lacks unit redundancy.
3 Methods
This section will describe the methods used to compare the DNS and SNS algo-
rithms. The model of the robot used in the simulations will be described first.
Next the behaviour-based controller used to implement the algorithms, as well
as a definition of the behaviours will be given. Finally, the simulations used to
evaluate the algorithms will be described.
a desired velocity vector. The controller sums these vectors, Eq. 1, to produce
the final velocity command.
vcmd = vi (1)
i
where vcmd is the velocity command, and vi is the ith behaviour’s velocity vector
with magnitude bounded between [0,1]. Details of the behaviours’ stimuli, and
responses are given in the following sections.
Two different controllers were defined for the evaluation simulation, con-
troller D (dynamic), and controller S (static). In addition to a pattern formation
behaviour, a simple obstacle avoidance behaviour is included in each controller’s
behaviour set. The behaviour sets for Controller D and S are {βobst , βDN S }, and
{βobst , βSN S , βSN S }, respectively. Controller S contains two βSN S behaviours,
one for each constraint used to define the formation [12]. Controller D was also
used by the proof of concept simulations.
Obstacle Avoidance Behaviour (βobst ). The input for the obstacle avoid-
ance behaviour is a vector, r, in the direction of the detected obstacle. If there
is no obstacle in physical contact then the response is vobst = 0. The behaviour
response in the presents of an obstacle, vobst is given by Eq. 2,
vobst = γr ⊥ −r (2)
SNS Algorithm Behaviour (βsns ). The input for the SNS behaviour is a unit
vector, r, in the direction of the target robot specified by the bearing constraint.
(Sect. 2.1). The behaviour response, vsns is given by Eq. 3,
vsns = (r · f ⊥ )r ⊥ (3)
DNS Algorithm Behaviour (βdns ). The input for the DNS behaviour is the
set of unit vectors, {ri }, encoding the bearings to all visible swarm mates. The
field of view of the robot’s bearing sensor is divided into three sensing regions;
dead ahead, forward, and rear (See Fig. 3). Note that the dead ahead region is a
subset of the forward region. If a robot is detected in a region the corresponding
boolean flag (Bda , Bf w , Bre ) is set to true. The value of these flags determines
A Bearing-Only Pattern Formation Algorithm for Swarm Robotics 9
the response of the DNS behaviour. The response and its dependence on the
boolean flags, is shown in Eq. 4.
⎧
⎪
⎨−F Bre · (!Bf w )
vdns = F ⊥ Bda (4)
⎪
⎩
(r · F )F Bf w
where r ∈ {ri } is the bearing vector with the largest projection on to the forma-
tion normal, F . The DNS behaviour causes the robot to move in the direction
of F until one of two conditions are met. The first condition is if a swarm
mate is detected in the dead ahead visual region. In this case the direction of
travel is rotated by π/2 radians (CCW). The other condition is if the robot has
no swarm mates ahead of it. In this case the behaviour responds by moving
backward along F . This backward motion is meant to stabilize the edge in the
presence of noise.
The parameter, ωwidth , controls the angular width of the dead ahead visual
region (See Fig. 3). Two different values of ωwidth were used depending on the
formation being constructed. A value of 18o was used for line formations. This
value should realistically depend on physical dimensions of the robot since it is
intend to help the robot find an empty space along its edge, however the above
(a) (b)
Fig. 3. (a) The sensing regions are defined with respect to the formation normal, F ,
and not the orientation of the robot. The width of the dead ahead region is controlled
by the ωwidth parameter. (b) An illustrated example of the DNS behaviour responses of
4 robots with the same F . The formation normal F is shown in the upper right corner.
Robot 1 only senses swarm mates to the rear, and response with −F . Robots 2 and
4 sense neighbours ahead (outside of the dead ahead region), and in their rear sensing
region and response with F . Lastly, robot 3 senses a neighbour in its dead ahead region,
and so travels along F ⊥ . The vectors R21 , R23 , R24 encode the bearings measured by
robot 2 of its neighbours. Vector R21 , the bearing measured by robot 2 of robot 1, has
the largest projection on the F , and is used by robot 2 in the calculation of its DNS
behaviour’s response (see Sect. 3.2).
10 N. Shiell and A. Vardy
value was found to be adequate for the simulations. It was found that using the
dead ahead visual zone for non-linear formations caused the algorithm to diverge
from the desired formation.
Table 1. Summary of parameters used during the evaluation simulations. Note ωwidth ,
and rmax relate to behaviours and are described in Sect. 3.2
1
https://github.com/nicholishiell/DiskSimulation.
A Bearing-Only Pattern Formation Algorithm for Swarm Robotics 11
4 Experimental Results
The performance of the algorithms was evaluated when constructing line, wedge,
and square formations with various group sizes (8, 16, 20 and 32 robots). Each set
of evaluation parameters (algorithm, formation, group size) was simulated 100
times and the metric values recorded for each run. The average metric values
and standard deviation over all runs were calculated, and the results shown
graphically in Fig. 4.
Fig. 4. Results of evaluation simulations. The bar in plot (a) labelled DNS* is the result
of running the DNS algorithm for a line formation without the dead ahead region.
the algorithms as an analogy for energy use, which is a limiting factor in mobile
robotic systems. The performance metric is defined in Eq. 5,
i di
α= (5)
N
where di is the integrated path length of the ith robot, and N is the total number
of robots in the swarm. The integrated path length of each robot is defined by
Eq. 6.
di = vi (j)Δt (6)
j
where di is the integrated path length of the ith robot, the sum is over all time
steps j, the velocity of the ith robot at time step j is vi (j), and Δt is the time
step used in the simulation.
Unfortunately, the use of this sensing region in more complex formations (wedge
and square) caused the algorithm to diverge.
A video showing the proof of concept simulations in V-REP is available
online2 . The video shows the DNS algorithm constructing line, wedge, and square
formations with a group size of 12 robots.
5 Conclusion
This paper introduced a decentralized bearing-only pattern formation algorithm,
known as the Dynamic Neighbour Selection algorithm. The DNS algorithm was
compared to a similar algorithm presented in [12] using a single integrator sim-
ulation, and by comparing the impact of their differing formation definitions.
The DNS algorithm was further tested in a more realistic V-REP simulation.
A cooperative behaviour-based controller was used in both simulations which
integrated each pattern algorithm with a basic obstacle avoidance behaviour.
The formation definition comparison shows the DNS algorithm improves upon
the scalability, flexibility, and robustness of the SNS algorithm. Furthermore, the
simulation shows the DNS algorithm to be more efficient than the SNS algorithm
for group sizes greater than 8. The simulations also showed the DNS algorithm to
be less dependent on group size, and initial deployment than the SNS algorithm.
Although the DNS algorithm has improved upon some aspects of bearing-
only pattern formation algorithms, it still has limitations similar to all bearing-
only algorithms. The relative lengths of polygon segments are not controlled,
and the density of robots along a segment of the formation is not uniform. In
the context of a solution to the sweep coverage problem these limitations are
significant and will need to be addressed.
Before the DNS algorithm can be integrated into a behaviour-based solution
to the sweep coverage problem a number of tasks remain. A theoretical proof of
convergence and shape limitations of the DNS algorithms would strengthen the
case for the robustness of the algorithm. Another task is the development of a
behaviour to space the robots at “effective” intervals using environmental cues.
Lastly, the control software developed in ROS for the V-REP simulation must
be ported to the BuPiGo robots and live trials of the DNS algorithm conducted
to confirm the results reported in this paper.
Acknowledgements. The authors of this paper would like to thank the anonymous
reviewers for their helpful comments and insights.
References
1. Balch, T., Arkin, R.C.: Behavior-based formation control for multirobot teams.
IEEE Trans. Robot. Autom. 14(6), 926–939 (1998)
2. Bishop, A.N., Basiri, M.: Bearing-only triangular formation control on the plane
and the sphere. In: 2010 18th Mediterranean Conference on Control & Automation
(MED), pp. 790–795. IEEE (2010)
2
https://youtu.be/D7ZB4lNxJsE.
14 N. Shiell and A. Vardy
3. Bishop, A.N., Shames, I., Anderson, B.: Stabilization of rigid formations with
direction-only constraints. In: 2011 50th IEEE Conference on Decision and Control
and European Control Conference (CDC-ECC), pp. 746–752. IEEE (2011)
4. Franchi, A., Giordano, P.R.: Decentralized control of parallel rigid formations with
direction constraints and bearing measurements. In: 2012 IEEE 51st Annual Con-
ference on Decision and Control (CDC), pp. 5310–5317. IEEE (2012)
5. Gage, D.W.: Command control for many-robot systems. Technical report, DTIC
Document (1992)
6. Grassé, P.P.: La reconstruction du nid et les coordinations interindividuelles
chezbellicositermes natalensis etcubitermes sp. la théorie de la stigmergie: Essai
d’interprétation du comportement des termites constructeurs. Insectes Soc. 6(1),
41–80 (1959)
7. Martinoli, A.: Collective complexity out of individual simplicity. Artif. Life 7(3),
315–319 (2001)
8. Monteiro, S., Bicho, E.: A dynamical systems approach to behavior-based forma-
tion control. In: Proceedings of IEEE International Conference on Robotics and
Automation, ICRA 2002, vol. 3, pp. 2606–2611. IEEE (2002)
9. Moshtagh, N., Michael, N., Jadbabaie, A., Daniilidis, K.: Vision-based, distributed
control laws for motion coordination of nonholonomic robots. IEEE Trans. Robot.
4(25), 851–860 (2009)
10. Reynolds, C.W.: Flocks, herds and schools: a distributed behavioral model. Com-
put. Graph. 21(4), 25–34 (1987)
11. ROS: Robot Operating System. http://www.ros.org
12. Schoof, E., Chapman, A., Mesbahi, M.: Bearing-compass formation control: a
human-swarm interaction perspective. In: American Control Conference (ACC),
pp. 3881–3886. IEEE (2014)
13. Sousselier, T., Dreo, J., Sevaux, M.: Line formation algorithm in a swarm of reactive
robots constrained by underwater environment. Expert Syst. Appl. 42(12), 5117–
5127 (2015)
14. V-REP: Virtual Robot Experimentation Platform. http://www.coppeliarobotics.
com/
15. Vardy, A., Shiell, N.: Bupigo: an open and extensible platform for visually-guided
swarm robots (2015)
A Macroscopic Privacy Model for Heterogeneous
Robot Swarms
1 Introduction
To date, the issues of privacy and security remain poorly addressed within robot-
ics at large. These issues are particularly important in large-scale multi-robot
systems, where individual robots must share data to coordinate their actions
and communicate with human operators. In this work, we frame the problem of
privacy within the context of heterogenous robot swarms. Indeed, while much
research in the domain of distributed robotics and multi-robot systems explores
how to develop strategies for coordinating robots of the same type (i.e., homo-
geneous robot teams), it is generally acknowledged that exploiting heterogeneity
by design leads to more robust, versatile, and efficient systems — especially
when functional, temporal, spatial, and behavioral heterogeneity are explicitly
sought after [3,12]. However, by introducing heterogeneity by design, we impose
a certain degree of uniqueness and specialization. As a consequence, any given
robot type may be critical to securing the system’s ability to operate without
failure. Hence, we must find ways of protecting the heterogeneous swarm to avoid
threats that arise when the various roles within the swarm can be determined
by adversaries.
A class of applications for swarm robotic systems is based on an architecture
that exploits a centralized component (e.g., cloud connectivity). This type of
architecture has been shown to be a very efficient and practical means for coor-
dinating robotic swarms, because it enables a form of feedback control based
on abstract information of the swarm’s state, permitting high-level interaction
c Springer International Publishing Switzerland 2016
M. Dorigo et al. (Eds.): ANTS 2016, LNCS 9882, pp. 15–27, 2016.
DOI: 10.1007/978-3-319-44427-7 2
16 A. Prorok and V. Kumar
between the swarm and a supervisory agent [1,10]. In addition, this structure is
beneficial as it facilitates (i) access to big data, (ii) access to parallel computing
facilities, (iii) access to collective learning structures, and (iv) access to human
support [8]. Figure 1 schematizes the architecture. The robot swarm operates on
a physical layer. On a subsequent layer, observable system-level state informa-
tion is gathered by means of some sensory data stream (camera, radio, etc.).
This data stream is public, and is observable by one or several observers that
are physically co-located with the swarm itself. Finally, the state information is
forwarded to the cloud, where it is used for purposes such as monitoring, data
processing, or machine learning. The data may also be used as input to a con-
troller, which, based on this stream and potentially other information available
in the cloud, computes a control feedback that is relayed back to the swarm. In
this scheme, there are two points where privacy matters. The first point is at the
level of the physical observer(s), who may not be allowed to determine private
data (e.g., identify the different types of robots operating in a given space). The
second point is within the cloud, where entities (such as the controller) are not
allowed to act upon private information. In the following, we will formalize the
notion of privacy with respect to system-level information.
The current paper presents a technique that allows us to analyze the privacy
of heterogeneous robot swarms by quantifying the amount of information leaked
when an external observer is able to gather high-level information on the swarm’s
behavior. We demonstrate our technique through a case-study of collaborative
task solving. Specifically, we make the following contributions:
A Macroscopic Privacy Model for Heterogeneous Robot Swarms 17
Heterogeneity and diversity are core concepts of this work. To develop our for-
malism, we borrow terminology from biodiversity literature [2]. We define a
system of robots, where each robot belongs to a species. The system is com-
posed of NS species S = {1, . . . , NS }, with a total number of robots N , and
N (s) robots per species such that s∈S N (s) = N . At the individual level, the
robots are governed by stochastic control policies [1,12]. A finite-state-machine
(FSM) accounts for interspecific states. We denote these states as aI(·) , where
the subscript denotes the state activity (e.g., search, navigate, etc.), and the
superscript I is the set of all species that are involved in this state. For exam-
{1,2}
ple, a(grip) is a state where species 1 and 2 collaborate to grip an object. Note
that I may also be an empty set, which indicates that the state is unrelated
to any particular species (we call such states byproducts, as they can relate to
performance metrics or environmental conditions).
Since we focus on designing interspecific interaction mechanisms, we choose
a modeling framework that implicitly accounts for system-level state transitions.
We build our formalism on the theory of Chemical Reaction Networks (CRN) [5],
because it allows us to define interaction mechanisms efficiently, while capturing
essential system dynamics that depend on robot-to-robot interactions. CRNs
are a powerful means of representing complex systems — though not a new
field of research, many recent research findings that simplify the calculations
18 A. Prorok and V. Kumar
are accelerating the adoption of CRNs into domains other than biology and
chemistry [5,11].
We define our CRN as a triplet N = (A, C, R), where A is the set of states,
C is the set of complexes, and R is the set of reactions.
State set A: The state set encompasses all states that arise in the system, with
A = {A1 , . . . , ANA } where NA is the number of states. States relating to a
specific species s are denoted by A(s) . The set of all states includes both species-
specific states as well as byproduct states a∅(·) . We have
NS
A(s) = ∪ aI(·) and A = ∪ A(s) where A(0) = {a∅(·) } (1)
s∈I s=0
NA ρij
work, we use mass-action propensity functions, and rl (x; κl ) = κl i=1 xi for
all Rl = (Cj , ·). The net loss and gain of each reaction is summarized in a
NA × NR stoichiometry matrix Γ , the columns of which encode the change of
population per reaction. In particular, the i-th column of Γ corresponds to the
i-th reaction Ri = (Cj , Ck ) and thus, the column is equal to ρk − ρj . The
elements Γji are the so-called stoichiometric coefficients of the j-th state in the
i-th reaction. Positive and negative coefficients denote products and reactants
of the reaction, respectively.
Finally, we describe the dynamics of our system with help of two functions:
an execution function fN , and a query function q:
fN (x0 , t) : NN NA
≥0 × R≥0 → N≥0
A
q(x) : NN
≥0 → N
A NO
, NO ∈ N>0 (2)
Another random document with
no related content on Scribd:
Fig. 1
Diagram of the Electrical Connections of a Controller to a Two-Pole Series
Motor
Fig. 2
Upper-End View of the Controller, Showing the Manner of Attaching the
Springs
The Motor is Constructed of Pieces of Tin, a Nail, and Some Wood Blocks
R eed furniture has become very popular within the last few years,
and the newer designs and methods have been so attractive as
to place this constructive effort among the handicraft series of
modern art. It is possible so to analyze, simplify, and illustrate this
work as to make it feasible for amateurs, and at the same time there
are possibilities which involve problems that may try the ability of the
skilled workman. In other words, there are possibilities of progress in
this kind of furniture making. There are places where careful weaving
is the principal aim; again particular attention will be given to corners,
or, perhaps, a nicety of modeling will be found necessary to bring out
the proper curves involved.
Each piece of reed furniture has a framework, usually of dowels,
but it may also be made of boards in such models as small tables,
dressers, bedsteads, chests, etc. The board construction is more
often covered with flat reed. In footstools there are both kinds of
framework. The illustrations show the same parts marked with the
same letters throughout the series of sketches.
The Framework of the Stool is Made of Large Dowels, Then Covered with
Windings of Reed and a Woven Reed Top and Apron
Details of the Dowel Pieces, Showing Dimensions for Drilling the Holes to
Admit the Spokes of Reed, Manner of Building the Framework, and How the
Top is Woven
The side weaving is called the apron, and in this case the pairing
weave is used. The short spokes will have to be inserted in the
under side of the side rails, and the extra spokes are added after the
weaving is started and a small strip woven. The pairing weave is