Self-ordering kiosks (SOKs) are widely deployed in fast food restaurants, transforming food ordering into digitally mediated, self-navigated interactions. While these systems enhance efficiency and average order value, they also create opportunities for manipulative interface design practices known as dark patterns. This paper presents a structured audit of the McDonald's self-ordering kiosk in Germany using the Temporal Analysis of Dark Patterns (TADP) framework. Through a scenario-based walkthrough simulating a time-pressured user, we reconstructed and analyzed 12 interface steps across intra-page, inter-page, and system levels. We identify recurring high-level strategies implemented through meso-level patterns such as adding steps, false hierarchy, bad defaults, hiding information, and pressured selling, and low-level patterns including visual prominence, confirmshaming, scarcity framing, feedforward ambiguity, emotional sensory manipulation, and partitioned pricing. Our findings demonstrate how these patterns accumulate across the interaction flow and may be amplified by the kiosk's linear task structure and physical context. These findings suggest that hybrid physical--digital
The advancement of artificial intelligence has transformed user interface design by enabling adaptive and personalized systems. Alongside these benefits, AI driven interfaces have also enabled the emergence of dark patterns, which are manipulative design strategies that influence user behavior for financial or business gain. As AI systems learn from data that already contains deceptive practices, they can replicate and optimize these patterns in increasingly subtle and personalized ways. This paper examines AI generated dark patterns, their psychological foundations, technical mechanisms, and regulatory implications in India. We introduce DarkPatternDetector, an automated system that crawls and analyzes websites to detect dark patterns using a combination of UI heuristics, natural language processing, and temporal behavioral signals. The system is evaluated on a curated dataset of dark and benign webpages and achieves strong precision and recall. By aligning detection results with India's Digital Personal Data Protection Act, 2023, this work provides a technical and regulatory framework for identifying and mitigating deceptive interface practices. The goal is to support ethical AI
The rapid evolution of Large Language Models (LLM) and subsequent Agentic AI technologies requires systematic architectural guidance for building sophisticated, production-grade systems. This paper presents an approach for architecting such systems using design patterns derived from enterprise distributed systems standards, formal methods, and industry practice. We classify these patterns into three tiers: LLM Agents (task-specific automation), Agentic AI (adaptive goal-seekers), and Agentic Communities (organizational frameworks where AI agents and human participants coordinate through formal roles, protocols, and governance structures). We focus on Agentic Communities - coordination frameworks encompassing LLM Agents, Agentic AI entities, and humans - most relevant for enterprise and industrial applications. Drawing on established coordination principles from distributed systems, we ground these patterns in a formal framework that specifies collaboration agreements where AI agents and humans fill roles within governed ecosystems. This approach provides both practical guidance and formal verification capabilities, enabling expression of organizational, legal, and ethical rules thr
This paper investigates the asymptotic behavior of high-order vector rogue wave (RW) solutions of the coupled nonlinear Schrödinger (CNLS) equation in the presence of multiple large internal parameters. We report several new high-order RW patterns in the CNLS system, including double-sector, double-heart, and mixed sector-heart configurations. The main novelty is that each RW pattern contains two distinct regions in which two different fundamental first-order RWs coexist simultaneously, potentially appearing as bright (eye-shaped) versus four-petaled or dark (anti-eye-shaped) forms. These two regions are respectively associated with the simple root structures of two different Adler--Moser polynomials: each region consists of well-separated first-order RWs in one-to-one correspondence with the simple roots of the associated polynomial. In addition, by tuning certain free parameters, the two regions of the RW pattern can be shifted to arbitrary locations in the $ (x,t) $-plane. This flexibility, together with the rich simple-root structures of Adler--Moser polynomials, enables the systematic generation of a much broader family of structured RW patterns in the CNLS equation.
Clinical AI systems routinely train on health data structurally distorted by documentation workflows, billing incentives, and terminology fragmentation. Prior work has characterised the mechanisms of this distortion: the three-forces model of documentary enactment, the reification feedback loop through which AI may amplify coding artefacts, and terminology governance failures that allow semantic drift to accumulate. Yet translating these insights into implementable software architecture remains an open problem. This paper proposes seven ontology-aware design patterns in Gang-of-Four pattern language for building clinical AI pipelines resilient to ontological distortion. The patterns address data ingestion validation (Ontological Checkpoint), low-frequency signal preservation (Dormancy-Aware Pipeline), continuous drift monitoring (Drift Sentinel), parallel representation maintenance (Dual-Ontology Layer), feedback loop interruption (Reification Circuit Breaker), terminology evolution management (Terminology Version Gate), and pluggable regulatory compliance (Regulatory Compliance Adapter). Each pattern is specified with Problem, Forces, Solution, Consequences, Known Uses, and Relate
Turing patterns play a fundamental role in morphogenesis and population dynamics, encoding key information about the underlying biological mechanisms. Yet, traditional inverse problems have largely relied on non-biological data such as boundary measurements, neglecting the rich information embedded in the patterns themselves. Here we introduce a new research direction that directly leverages physical observables from nature--the amplitude of Turing patterns--to achieve complete parameter identification. We present a framework that uses the spatial amplitude profile of a single pattern to simultaneously recover all system parameters, including wavelength, diffusion constants, and the full nonlinear forms of chemotactic and kinetic coefficient functions. Demonstrated on models of chemotactic bacteria, this amplitude-based approach establishes a biologically grounded, mathematically rigorous paradigm for reverse-engineering pattern formation mechanisms across diverse biological systems.
We present flight patterns for a collision-free passage of swarms of drones through one or more openings. The narrow openings provide drones with access to an infrastructure component such as charging stations to charge their depleted batteries and hangars for storage. The flight patterns are a staging area (queues) that match the rate at which an infrastructure component and its openings process drones. They prevent collisions and may implement different policies that control the order in which drones pass through an opening. We illustrate the flight patterns with a 3D display that uses drones configured with light sources to illuminate shapes.
We extend the notion of shape-Wilf-equivalence to vincular patterns (also known as "generalized patterns" or "dashed patterns"). First we introduce a stronger equivalence on patterns which we call filling-shape-Wilf-equivalence. When vincular patterns $α$ and $β$ are filling-shape-Wilf-equivalent, we prove that the direct sum $α\oplusσ$ is filling-shape-Wilf-equivalent to $β\oplusσ$. We also discover two new pairs of patterns which are filling-shape-Wilf-equivalent: when $α$, $β$, and $σ$ are nonempty consecutive patterns which are Wilf-equivalent, $α\oplusσ$ is filling-shape-Wilf-equivalent to $β\oplusσ$; and for any consecutive pattern $α$, $1\oplusα$ is filling-shape-Wilf-equivalent to $1\ominusα$. These equivalences generalize Wilf-equivalences found by Elizalde and Kitaev. These new equivalences imply many new Wilf-equivalences for vincular patterns
We determine the colored patterns that appear in any $2$-edge coloring of $K_{n,n}$, with $n$ large enough and with sufficient edges in each color. We prove the existence of a positive integer $z_2$ such that any $2$-edge coloring of $K_{n,n}$ with at least $z_2$ edges in each color contains at least one of these patterns. We give a general upper bound for $z_2$ and prove its tightness for some cases. We define the concepts of bipartite $r$-tonality and bipartite omnitonality using the complete bipartite graph as a base graph. We provide a characterization for bipartite $r$-tonal graphs and prove that every tree is bipartite omnitonal. Finally, we define the bipartite balancing number and provide the exact bipartite balancing number for paths and stars.
Permutations that avoid given patterns have been studied in great depth for their connections to other fields of mathematics, computer science, and biology. From a combinatorial perspective, permutation patterns have served as a unifying interpretation that relates a vast array of combinatorial structures. In this paper, we introduce the notion of patterns in inversion sequences. A sequence $(e_1,e_2,\ldots,e_n)$ is an inversion sequence if $0 \leq e_i<i$ for all $i \in [n]$. Inversion sequences of length $n$ are in bijection with permutations of length $n$; an inversion sequence can be obtained from any permutation $π=π_1π_2\ldots π_n$ by setting $e_i = |\{j \ | \ j < i \ {\rm and} \ π_j > π_i \}|$. This correspondence makes it a natural extension to study patterns in inversion sequences much in the same way that patterns have been studied in permutations. This paper, the first of two on patterns in inversion sequences, focuses on the enumeration of inversion sequences that avoid words of length three. Our results connect patterns in inversion sequences to a number of well-known numerical sequences including Fibonacci numbers, Bell numbers, Schröder numbers, and Euler up/
We classify all bi-vincular patterns of length two and three according to the number of permutations avoiding them. These patterns were recently defined by Bousquet-Melou et. al., and are natural generalizations of Babson and Steingrimsson's generalized patterns. The patterns are divided into seven and 24 Wilf classes, for lengths two and three, respectively. For most of the patterns an explicit form for the number of permutations avoiding the pattern is given.
We prove several Wilf-equivalences for vincular patterns of length 4, some of which generalize to infinite families of vincular patterns. We also present functional equations for the generating functions for the number of permutations of length n avoiding a single pattern for the patterns 124-3, 134-2, 231-4, 241-3, 132-4, and 142-3. This nearly completes the Wilf-classification of vincular patterns of length 4. As a corollary, these results imply Wilf-equivalences for certain barred patterns of length 5 with a single bar.
We identify a precise geometric relationship between: (i) certain natural pairs of irreducible reflection groups (``Coxeter pairs"); (ii) self-similar quasicrystalline patterns formed by superposing sets of 1D quasi-periodically-spaced lines, planes or hyper-planes (``Ammann patterns"); and (iii) the tilings dual to these patterns (``Penrose-like tilings"). We use this relationship to obtain all irreducible Ammann patterns and their dual Penrose-like tilings, along with their key properties in a simple, systematic and unified way, expanding the number of known examples from four to infinity. For each symmetry, we identify the minimal Ammann patterns (those composed of the fewest 1d quasiperiodic sets) and construct the associated Penrose-like tilings: 11 in 2D, 9 in 3D and one in 4D. These include the original Penrose tiling, the four other previously known Penrose-like tilings, and sixteen that are new. We also complete the enumeration of the quasicrystallographic space groups corresponding to the irreducible non-crystallographic reflection groups, by showing that there is a unique such space group in 4D (with nothing beyond 4D).
We extend the notion of an enumeration scheme developed by Zeilberger and Vatter to the case of vincular patterns (also called "generalized patterns" or "dashed patterns"). In particular we provide an algorithm which takes in as input a set $B$ of vincular patterns and search parameters and returns a recurrence (called a "scheme") to compute the number of permutations of length $n$ avoiding $B$ or confirmation that no such scheme exists within the search parameters. We also prove that if $B$ contains only consecutive patterns and patterns of the form $σ_1σ_2 ... σ_{t-1}-σ_t$, then such a scheme must exist and provide the relevant search parameters. The algorithms are implemented in Maple and we provide empirical data on the number of small pattern sets admitting schemes. We make several conjectures on Wilf-classification based on this data. We also outline how to refine schemes to compute the number of $B$-avoiding permutations of length $n$ with $k$ inversions.
Dimensionality reduction (DR) plays a vital role in the visual analysis of high-dimensional data. One main aim of DR is to reveal hidden patterns that lie on intrinsic low-dimensional manifolds. However, DR often overlooks important patterns when the manifolds are distorted or masked by certain influential data attributes. This paper presents a feature learning framework, FEALM, designed to generate a set of optimized data projections for nonlinear DR in order to capture important patterns in the hidden manifolds. These projections produce maximally different nearest-neighbor graphs so that resultant DR outcomes are significantly different. To achieve such a capability, we design an optimization algorithm as well as introduce a new graph dissimilarity measure, named neighbor-shape dissimilarity. Additionally, we develop interactive visualizations to assist comparison of obtained DR results and interpretation of each DR result. We demonstrate FEALM's effectiveness through experiments and case studies using synthetic and real-world datasets.
Alzheimer's disease (AD) cannot be reversed, but early diagnosis will significantly benefit patients' medical treatment and care. In recent works, AD diagnosis has the primary assumption that all categories are known a prior -- a closed-set classification problem, which contrasts with the open-set recognition problem. This assumption hinders the application of the model in natural clinical settings. Although many open-set recognition technologies have been proposed in other fields, they are challenging to use for AD diagnosis directly since 1) AD is a degenerative disease of the nervous system with similar symptoms at each stage, and it is difficult to distinguish from its pre-state, and 2) diversified strategies for AD diagnosis are challenging to model uniformly. In this work, inspired by the concerns of clinicians during diagnosis, we propose an open-set recognition model, OpenAPMax, based on the anomaly pattern to address AD diagnosis in real-world settings. OpenAPMax first obtains the abnormal pattern of each patient relative to each known category through statistics or a literature search, clusters the patients' abnormal pattern, and finally, uses extreme value theory (EVT) t
Dark patterns are interface designs that nudge users towards behavior that is against their best interests. Since humans are often not even aware that they are influenced by these malicious patterns, research has to identify ways to protect web users against them. One approach to this is the automatic detection of dark patterns which enables the development of tools that are able to protect users by proactively warning them in cases where they face a dark pattern. In this paper, we present ongoing work in the direction of automatic detection of dark patterns, and outline an example to detect malicious patterns within the domain of cookie banners.
Enterprise application integration (EAI) solutions are the centrepiece of current enterprise IT architectures (e.g., cloud and mobile computing, business networks), however, require the formalization of their building blocks, represented by integration patterns, verification and optimization. This work serves as an instructive pattern formalization catalog that leads to the formalization of all currently known integration patterns. Therefore, we explain the classification of the underlying requirements of the pattern semantics and formalize representative patterns from the different categories, by realizing them in timed db-net. In this way, the catalog will allow for the addition of future patterns by assigning them to a category and applying the described formalism.
Data mining is the task of discovering interesting patterns from large amounts of data. There are many data mining tasks, such as classification, clustering, association rule mining, and sequential pattern mining. Sequential pattern mining finds sets of data items that occur together frequently in some sequences. Sequential pattern mining, which extracts frequent subsequences from a sequence database, has attracted a great deal of interest during the recent data mining research because it is the basis of many applications, such as: web user analysis, stock trend prediction, DNA sequence analysis, finding language or linguistic patterns from natural language texts, and using the history of symptoms to predict certain kind of disease. The diversity of the applications may not be possible to apply a single sequential pattern model to all these problems. Each application may require a unique model and solution. A number of research projects were established in recent years to develop meaningful sequential pattern models and efficient algorithms for mining these patterns. In this paper, we theoretically provided a brief overview three types of sequential patterns model.
In the last years, different types of patterns in permutations have been studied: vincular, bivincular and mesh patterns, just to name a few. Every type of permutation pattern naturally defines a corresponding computational problem: Given a pattern P and a permutation T (the text), is P contained in T? In this paper we draw a map of the computational landscape of permutation pattern matching with different types of patterns. We provide a classical complexity analysis and investigate the impact of the pattern length on the computational hardness. Furthermore, we highlight several directions in which the study of computational aspects of permutation patterns could evolve.