Results 51 to 60 of about 907,408 (299)

Convenience Voting Legislation [PDF]

open access: yes, 2008
The popularity of "convenience voting" measures -- vote-by-mail (VBM), liberal absentee voting and Early Vote -- has grown in recent years. A majority of states now permit voting by mail upon request, early voting, or both. This trend towards convenience
Erin Ferns
core  

Voting and the Cardinal Aggregation of Judgments [PDF]

open access: yes, 2004
The paper elaborates the idea that voting is an instance of the aggregation of judgments, this being a more general concept than the aggregation of preferences. To aggregate judgments one must first measure them.
A Johnston   +20 more
core   +2 more sources

Improving the Robustness of Visual Teach‐and‐Repeat Navigation Using Drift Error Correction and Event‐Based Vision for Low‐Light Environments

open access: yesAdvanced Robotics Research, EarlyView.
Visual teach‐and‐repeat (VTR) navigation allows robots to learn and follow routes without building a full metric map. We show that navigation accuracy for VTR can be improved by integrating a topological map with error‐drift correction based on stereo vision.
Fuhai Ling, Ze Huang, Tony J. Prescott
wiley   +1 more source

Compliant Pneumatic Feet with Real‐Time Stiffness Adaptation for Humanoid Locomotion

open access: yesAdvanced Robotics Research, EarlyView.
A compliant pneumatic foot with real‐time variable stiffness enables humanoid robots to adapt to changing terrains. Using onboard vision and pressure control, the foot modulates stiffness within each gait cycle, reducing impact forces and improving balance. The design, cast in soft silicone with embedded air chambers and Kevlar wrapping, offers durable,
Irene Frizza   +3 more
wiley   +1 more source

Why Not a Philosopher King? and Other Objections to Epistocracy

open access: yesPhenomenology and Mind, 2019
In this paper I will examine epistocracy as a form of limiting the political agency of some citizens (by removing their political rights) and offer an internal critique of it.
Dragan Kuljanin
doaj   +1 more source

Consensus Formation and Change are Enhanced by Neutrality

open access: yesAdvanced Science, EarlyView.
Neutral agents are shown to enhance both the formation and overturning of consensus in collective decision‐making. A general mathematical model and experiments with locusts and humans reveal that neutrality enables robust consensus via simple interactions and accelerates consensus change by reducing effective population size.
Andrei Sontag   +3 more
wiley   +1 more source

Towards a Global History of Voting: Sovereignty, the Diffusion of Ideas, and the Enchanted Individual

open access: yesReligions, 2012
This article suggests a framework for moving toward a global history of voting and democracy that focuses less on the diffusion of European ideas (however important those ideas were) than on embedding the history of voting within a worldwide history of ...
David Gilmartin
doaj   +1 more source

Organ‐Specific and Conserved Regulatory Logic Orchestrates Gene Expression in the Embryonic Mesothelium

open access: yesAdvanced Science, EarlyView.
Integrated multi‐omic profiling maps the gene‐regulatory landscape of the coelomic mesothelium across heart, lung, and pancreas. A cardiac‐restricted regulatory program is uncovered in which TBX20 activates heart mesothelial (epicardial) cis‐regulatory elements, while MAF emerges as a conserved regulator of mesothelial identity.
Quang Minh Dang   +3 more
wiley   +1 more source

Decision Making in the System of Representative Government in the Region as an Element of State Control

open access: yesУправленческое консультирование, 2018
Decision making in the system of representative government public administration as a collective choice. The analysis of the political influence of factions in representative bodies of the system of managerial decision-making using index Shapley - Subika
Marina Vyacheslavovna Isakova   +1 more
doaj  

An Adaptive Ensemble Machine Learning Model for Intrusion Detection

open access: yesIEEE Access, 2019
In recent years, advanced threat attacks are increasing, but the traditional network intrusion detection system based on feature filtering has some drawbacks which make it difficult to find new attacks in time.
Xianwei Gao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy