The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a task allocation method in which, although social utility is attempted to be maximized, agents also give weight to individual preferences based on their own specifications and capabilities. Due to the recent advances in computer and network technologies, many services can be provided by appropriately combining multiple types of information and different computational capabilities...
A straight line motion is a common application in engineering design and manufacture. The Peaucellier mechanism generates exact straight lines, meeting some restrictions among their links dimensions and the input angle. The mechanism has eight links, but due to those initial restrictions, only requires to find relations among three of its eight links and rotation angle. This paper explains the process...
The performance of a ROS application is a function of the individual performance of its constituent nodes. Since ROS nodes are typically configurable (parameterised), the specific parameter values adopted will determine the level of performance generated. In addition, ROS applications may be distributed across multiple computation devices, thus providing different options for node allocation. We address...
One of the main challenges of current person recognition techniques lies on difficulties of recognition in various poses. Recently, attention has been focused on using soft biometric information extracted from the human body to overcome the biometric recognition system's limitation in unconstrained environments. In this paper, we integrate the face and body information in a linear combination. We...
Gender and diversity balance issues are prominent in the field of engineering. The way engineers and their research are perceived are two areas that contribute to youth deciding on careers in science and engineering. The perceptions of the youth on traits of Electrical and Computer Engineers (ECEs) and their research were explored through a survey of summer youth program students at Michigan Tech...
In this paper, we present the development of a graphical user interface for a commercially available humanoid robot to study its interaction with children. The interface has been designed to facilitate the overall operation of the robot, and ultimately improve the interaction with children. Four pilot cases are studied to investigate overall effectiveness of the developed robotic setup in interacting...
A large variety of social robots with various applications have been developed recently in order to improve Human-Robot Interaction (HRI) and satisfy certain social needs such as companionship. However, they cannot be deployed in Middle East due to their inability to have verbal communications in user's native language, availability issues, and high costs. This research introduces the design and development...
Programmable matter i.e. matter that can change its physical properties, more likely its shape according to an internal or an external action is a good example of a cybermatics component. As it links a cyberized shape to real matter, it is a straight example of cyber-physical conjugation. But, this interaction between virtual and real worlds needs two elements. The first one is to find a way to represent...
This paper reports the experience of running a professional development workshop on advanced computing technologies for high and middle school computer teachers. The workshop introduced the teachers to new trends in computing technologies to be applied in the classroom. Thirty-two teachers took part in the workshop and benefited from its content. The workshop covered four different hot computing topics,...
Typing CAPTCHA is usually troublesome and is unpleasant for the users. But the security of some of the websites depends on it and causes that human being is distinguished from robots facing with different websites. Filling CAPTCHA by humans can be used effectively like electronization of books and different texts. In this article it has been attempted to examine using image processing for converting...
This paper deals with the design principles and implementation of a reconfigurable real-time software platform designed for data exchange between software modules of unmanned underwater and surface vehicles. The aim of developing a new robotic platform was the realization of a light-weight OS-independent library that allows integrating AUVs, ROVs and surface vehicles to a single computing cluster...
Virtual agents are artificial intelligent artifacts that mimic natural conversations with users. The media equation posits that human-agent interaction mirrors the social cues prevalent in human-to-human relationship. As such, personality adaptation-convergence (similarity-attraction) and divergence (complementary-attraction) in human-agent interaction have been explored, particularly in the context...
The possibility of more intuitive human-machine interfaces has sparked the development of new visual technologies. The way humans interact with elements of their environment should not be limited to the screens of phones or computers. Other alternatives where a sensation of spatial freedom are under development. Projection systems, using continuous light on surrounding surfaces, represent a major...
This paper present to develop long range formation control for unmanned aerial vehicles (UAVs) to broaden UAV operation region. Operation region of a small UAV is often limited within a line of sight propagation due to limited wireless network and communication. Most common wireless networks have a high bandwidth but require a clear line of sight without any obstacles. Recently, a number of researches...
Just as abusive behavior can play define the nature of a human-human interaction, mistreatment can play a similar role in Human-Robot Interaction. Earlier work demonstrated that people perceived a robot as more emotionally capable than a computer. This led to different perceptions of aggressive behavior (as mistreatment for a robot, but not so for a computer). This study is a follow-up to that work...
We present the results of a pilot study that investigates if and how people judge the trustworthiness of a robot during social Human-Robot Interaction (sHRI). Current research in sHRI has observed that people tend to interact with robots socially. However, results from neuroscience suggests people use different cognitive mechanisms interacting with robots than they do with humans, leading to a debate...
A welding seam detection and feature point extraction system for robotic arc welding is proposed in this paper. The system consists of a CCD camera, a line structure laser, a narrowband optical filter to overcome the interference from arc light and other light sources, and an embedded computer board for image processing and error calculation. By taking use of optical triangulation measurement method,...
Previous research has suggested that access and exposure to computing, social supports, preparatory privilege, a sense of belonging in computing and/or a computing identity all contribute to women pursuing computing as a field of study or intended career. What we know less about is what keeps young women persisting in computing despite the obstacles they encounter. This paper describes findings from...
The current studies indicated that sound can improve the visual perception. However, whether the gain is influenced by temporal disparity between visual and auditory stimuli, and whether the gain is the same for older and younger adults remains unclear. To clarify this mechanism, ten older adults and 10 younger adults were invited to confirm and visual/auditory discrimination task. The visual target...
Dialogue systems are computer systems that communicate with a human in spoken or written form. Their popularity has increased in recent years and they attract a large research and development interest. In this paper, a survey on dialogue systems is presented. A classification scheme is proposed and then the reviewed methodologies are evaluated based on a number of features, in order to obtain a maturity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.