there isnt a facet of human life that has not been touched and influenced by robots and automation. What makes robots and machines versatile is their computational intelligence. While modern intelligent sensors and po...
ISBN:
(数字)9783642373879
ISBN:
(纸本)9783642373862
there isnt a facet of human life that has not been touched and influenced by robots and automation. What makes robots and machines versatile is their computational intelligence. While modern intelligent sensors and powerful hardware capabilities have given a huge fillip to the growth of intelligent machines, the progress in the development of algorithms for smart interaction, collaboration and pro-activeness will result in the next quantum *** book deals withthe recent advancements in design methodologies, algorithms and implementation techniques to incorporate intelligence in robots and automation systems. Several articles deal with navigation, localization and mapping of mobile robots, a problem that engineers and researchers are grappling with all the time. Fuzzy logic, neural networks and neuro-fuzzy based techniques for real world applications have been detailed in a few *** edited volume is targeted to present the latest state-of-the-art computational intelligence techniques in robotics and automation. It is a compilation of the extended versions of the very best papers selected from the many that were presented at the 5thinternationalconference on automation, robotics and Applications (ICARA 2011) which was held in Wellington, New Zealand from 6-8 December, 2011. Scientists and engineers who work with robots and automation systems will find this book very useful and stimulating.
Different articles and surveys on the matter identify a remarkable success of robotics on static environments that has not replicated on dynamic areas of application. this paper presents the proposal of a research pro...
详细信息
ISBN:
(纸本)9789898565389
Different articles and surveys on the matter identify a remarkable success of robotics on static environments that has not replicated on dynamic areas of application. this paper presents the proposal of a research project that identifies the main hurdles of this issue and present feasible solutions for the matter.
In order to realize head-free eye-gaze tracking human-computer interaction(HCI) system, a novel gaze direction estimation method is proposed in this paper. the point of gaze (PoG) is estimated by building up the geome...
详细信息
Eye characteristics are significant information in pattern recognition. they are widely applied in many fields, such as human-computer interaction, face recognition and 3D face modeling from 2D images. Generally, the ...
详细信息
Adopting embedded framework and network communication mode, a kind of multi-axis embedded motion controller hardware platform design for the Panasonic A5N drive is proposed, which is Based on the modular control core ...
详细信息
A case study concerning an approach to application of domain knowledge in association rule mining is presented. Association rules are understood as general relations of two general Boolean attributes derived from colu...
详细信息
ISBN:
(纸本)9789898565754
A case study concerning an approach to application of domain knowledge in association rule mining is presented. Association rules are understood as general relations of two general Boolean attributes derived from columns of an analysed data matrix. Interesting items of domain knowledge are expressed in an intuitive form distinct from association rules. Each particular pattern of domain knowledge is mapped onto a set of all association rules which can be considered as its consequences. these sets are used when interpreting results of data mining procedure. Deduction rules concerning association rules are applied.
the rising popularity of social networking platforms, has transformed them into a valuable source of information. Sentiments or opinions expressed through the posts of users can be extracted and applied for various pu...
详细信息
ISBN:
(纸本)9789898565754
the rising popularity of social networking platforms, has transformed them into a valuable source of information. Sentiments or opinions expressed through the posts of users can be extracted and applied for various purposes. Information such as determining the political preference (e.g., Republican or Democrat) of a user can be useful, for example, in conducting opinion polls, especially around election time. In this work, we apply two different methodologies for sentiment analysis on Twitter posts and demonstrate the superiority of character based approaches over word based ones in determining political sentiment.
the presentation will cover the context and development of higher education professional educational programme for Applied informatics in Education which was created to answer the challengers of new ICTs rich educatio...
详细信息
ISBN:
(纸本)9789898565532
the presentation will cover the context and development of higher education professional educational programme for Applied informatics in Education which was created to answer the challengers of new ICTs rich educational environment. the program was initiated to train the specialists for emerging eLearning sphere having integrated competences in Technology, Pedagogy and Organization. the paper outlines the process of setting the educational programme goals, building the specialists professional portrait, target audience, learning content selection and structuring, used educational technologies for training and future development perspectives.
the Hough transform is a powerful tool in image analysis, e.g. circle detection is a fundamental issue in image processing applications of industrial parts or tools. Because of its drawbacks, various modifications of ...
详细信息
ISBN:
(纸本)9789898565778
the Hough transform is a powerful tool in image analysis, e.g. circle detection is a fundamental issue in image processing applications of industrial parts or tools. Because of its drawbacks, various modifications of the basic circle Hough transform (CHT) method have been suggested. this paper presents a modified method based on the basic CHT algorithm and using no trigonometric calculations in order to improve the computational performance of the voting process for a good accuracy and robustness of circle detection in a binary image. this paper also provides the errors analysis of the proposed method against the basic CHT method to illustrate that it can replace the basic CHT method for small values of the resolution Ε of the angle θ. It then compete the CORDIC algorithm when it is used in a hardware implementation.
A great deal of work has been done in recent years on the multi-robot patrolling problem. In such problem a team of robots is engaged to supervise an infrastructure. Commonly, the patrolling tasks are performed with t...
详细信息
ISBN:
(纸本)9789898565389
A great deal of work has been done in recent years on the multi-robot patrolling problem. In such problem a team of robots is engaged to supervise an infrastructure. Commonly, the patrolling tasks are performed withthe objective of visiting a set of points of interest. this problem has been solved in the literature by developing deterministic and centralized solutions, which perform better than decentralized and non-deterministic approaches in almost all cases. However, deterministic methods are not suitable for security purpose due to their predictability. this work provides a new decentralized and non-deterministic approach based on the model of Game theory called Stochastic Fictitious Play (SFP) to perform security tasks at critical facilities. Moreover, a detailed study aims at providing additional insight of this learning model into the multi-robot patrolling context is presented. Finally, the approach developed in this work is analyzed and compared with other methods proposed in the literature by utilizing a patrolling simulator.
暂无评论