A common assumption in the social learning literature is that agents exchange information in an unselfish manner. In this work, we consider the scenario where a subset of agents aims at driving the network beliefs to the wrong hypothesis. The adversaries a ...
Network information theory studies the communication of information in a network and considers its fundamental limits. Motivating from the extensive presence of the networks in the daily life, the thesis studies the fundamental limits of particular network ...
We present a general method for imputing missing information in the Worldwide Patent Statistical Database (PATSTAT) and make the resulting datasets publicly available. The PATSTAT database is the de facto standard for academic research using patent data. C ...
Jet injection devices have been studied and developed for transdermal drug delivery to avoid the use of needles. Such contact-less devices provide several advantages such as better dose control, lateral and depth localisation, lower collateral damage than ...
Refineries execute a series of interlinked processes, where the product of one unit serves as the input to another process. Potential failures within these processes affect the quality of the end products, operational efficiency, and revenue of the entire ...
Machine intelligence greatly impacts almost all domains of our societies. It is profoundly changing the field of mechanical engineering with new technical possibilities and processes. The education of future engineers also needs to adapt in terms of techni ...
Virtual metrology (VM) involves estimating a product's quality directly from production process data without physically measuring it. This enables the product quality of each unit of production to be monitored in real time, while preserving the process eff ...
In developed countries, the management of existing civil infrastructure is challenging due to evolving functional requirements, aging and climate change. Due to conservative approaches in construction design and practice, infrastructure often has hidden re ...