The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Attention and emotions are two major functions underlying human behavior. Evidence shows that these two processes interact extensively in the human brain. In fields such as human-computer interactions and artificial intelligence, computational models of attention and emotions have been developed to be included in cognitive agent architectures. However, these have been implemented as two separated...
Crowd analytics is becoming a highly desirable feature of Intelligent Video Surveillance (IVS) applications. In this paper we propose a new, practical approach that adds very little computational and configuration overhead to an IVS system. The approach extends a standard IVS system, using available video content analysis data and camera calibration information to provide accurate human count estimation...
In this work, personality profiles are used to develop parameterized bot behaviors. While the personality profile structure was originally designed as a descriptive tool for human behavior, as used here it is a generative tool, allowing a plurality of different behaviors to result from a single rule set. This paper describes our use of the Five-Factor Model of personality to develop a bot that plays...
With the development of mobile web integration technologies and wireless sensor networks, the interactive activities of human society increasingly rely on the heterogeneous network environment including the communication network, the Internet and sensor networks. This paper tries to apply socially aware computing and data mining to the mobile web application integration technology. It emphasizes understanding...
The integration of social networking concepts into the Internet of Things (IoT) has led to the so called Social Internet of Things (SIoT) paradigm, according to which the objects are capable of establishing social relationships in an autonomous way with respect to their owners. The benefits are those of improving scalability in information/service discovery when the SIoT is made of huge numbers of...
The ability to track, detect and monitor human activities in real time conditions is very important for security and surveillance operation. The movements of the human body and limbs generate unique microDoppler features which enable the identification and classification of a wide diversity of human motions. In this paper, we propose a method to simulate the signal generated by human motion, by modeling...
Cooperation in nature is a complex topic and its study has left scientists with many open questions. Over the past two decades research has been undertaken into how cooperation works in an evolutionary context and how we can emulate it for social analysis. Numerous computer models have been developed and analyzed, with many models formulated as spatial or network games. These games use various update...
Artificially synthesized sentences are used for malicious purposes such as unsolicited commercial junk submission to Web site. We study a problem to distinguish between natural and synthesized messages generated in Markov chains and show experimental results. Based on the difficulties of the problem, we consider a new application to CAPTCHA, a type of challenge-response test used in computing to ensure...
We present a novel unsupervised learning method for human action categories from video sequences using Latent Dirichlet Markov Clustering (LDMC). Video sequences are represented by a novel "bag-of-words" representation, where each frame corresponds to a "word". The algorithm automatically learns the probability distributions of the words and the intermediate topics corresponding...
Effective decision-making within teams and organizations require members to quickly identify, process, and share information with each other. Trust has received significant attention as a key concept to improve performance of information sharing tasks and teams. In this paper, we study the impact of a composite trust based agent model on information sharing in organizations. Our proposed composite...
Considerable time and effort often go into designing and implementing experimental set-ups (ES) in robotics. These activities are usually not at the focus of our research and thus go underreported. This results in replication of work and lack of comparability. This paper lays out our view of the theoretical considerations necessary when deciding on the type of experiment to conduct. It describes our...
In this work we use hand configuration and contact points during in-hand object exploration to identify the manipulated objects. Different contact points associated to an object shape can be represented in a latent space and lie on a lower dimensional non-linear manifold in the contact points space which is suitable for modelling and recognition. Associating and learning hand configurations to specific...
The bag-of-words approach with local spatio-temporal features have become a popular video representation for action recognition. Recent methods have typically focused on capturing global and local statistics of features. However, existing approaches ignore relations between the features, particularly space-time arrangement of features, and thus may not be discriminative enough. Therefore, we propose...
Engineering for products was changed to product lifecycle management (PLM) during the past ten years. This change was in great extent result of continuous developments in CAD/CAM/CAE/CAT and other engineering areas during the last third of the past century. New characteristics of the present PLM-based engineering practice are application of virtual engineering technology, integration of various areas...
In this work, we focus on the issue of diffusion in dynamic networks. We begin by proposing a generic framework that merges two essential aspects of the problem: diffusion and network dynamics. Then, our framework is used for comparing effects of two aspects of the human behavior, sociability and network dynamics. On the one hand the dynamics of the network is related to the movements of individuals...
In order to obtain a better human-machine engineering implementation effect and get a faster feedback during the bridge designing, the paper suggested a virtual simulation and evaluation method. And by using of the software Visual C++, MultiGen and Vega, an evaluation simulation system was also built. Such a system can display the whole layout of the bridge, evaluate the key human-machine designing...
Centered around the model of ESDDM, a software evolution process model based on evolution behavior interface, and the knowledge of component classification and component retrieval evaluation, this paper furthered previous work by proposing a component reusability evaluation method based on fuzzy mathematics. The method provides an effective way of evaluating the reusable ability of a certain component...
3D human model is widely used in various fields, especially real human model. Along with the development of 3D scanning techniques, real human body data can be acquired by 3D scanner. But the number of point cloud data is huge. Human model data processing requires massive calculation although the computer hardware performance is better and better. In order to overcome the problem, this paper presents...
We describe an agent-based model of individual human behavior that combines a dual-process architecture with reactive planning and mental models in order to capture a wide range of human behavior, including both behavioral and conceptual errors. Human operator behavior is an important factor in resilient control of systems that has received relatively little attention. Models of human behavior and...
In this research, the authors aimed to mining Life logs for developing a user model-based service application. Life logs can be constructed by analyzing Motion logs, which are obtained from questionnaires, or motion data collected from sensors. And the user models, which help applications to provide appropriate service, can be constructed by mining these Life logs.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.