The paper presents some human factor issues in pen computing. Pen computing has distinct advantages in relation to users, tasks and products. It also offers an attractive and efficient interface for a variety of tasks...
详细信息
The paper presents some human factor issues in pen computing. Pen computing has distinct advantages in relation to users, tasks and products. It also offers an attractive and efficient interface for a variety of tasks and work situations. However, there are problems with current techniques for handwriting recognition both in terms of accuracy that users can achieve and the extent to which recognition failures can be understood and avoided. There is definitely a market for pen-based computing systems and that applications range from spreadsheets, word processing, address book and etc. applications differ in term of the balance of task components used. Indications show that those in which handwritten input recognition requirement is not a major task and where software support for the recognition interface provides effective guidance to the user is most effective.
The paper discusses would be limitations that computer software rather than hardware can impose on sophisticated microprocessor based control of cars and the efforts being done to develop tools to support car software...
详细信息
The paper discusses would be limitations that computer software rather than hardware can impose on sophisticated microprocessor based control of cars and the efforts being done to develop tools to support car software development. CASE workbench tools are described with their limitations. Software engineering environments including their requirements and benefits are considered. Real time software development tools and route planning software are also described.
The enrichment of the user environment brought about by the integration of non - text based information presentation and capture presents significant demands upon our current hierarchy of data networks. This paper exa...
详细信息
The enrichment of the user environment brought about by the integration of non - text based information presentation and capture presents significant demands upon our current hierarchy of data networks. This paper examines these requirements and suggests that Asynchronous Transfer Mode (ATM) presents a sufficiently scaleable and usable technology to become a major enabling force within mixed media applications.
The geometric bounding toolbox is a set of routines in MATLABTM to perform operations on polytopes, polyhedra and ellipsoids. The package has the efficiency and ease of use of its routines that seems to make these com...
详细信息
The geometric bounding toolbox is a set of routines in MATLABTM to perform operations on polytopes, polyhedra and ellipsoids. The package has the efficiency and ease of use of its routines that seems to make these complex operations simple. The paper is an overview of the use of MATLAB toolbox GBT for system identification and control.
The competence of the HyperNet system was evaluated. In addition, an advanced path able to satisfy the standards of more complicated, extensive, real-time uses were discussed. The HyperNet system integrates probabilis...
详细信息
The competence of the HyperNet system was evaluated. In addition, an advanced path able to satisfy the standards of more complicated, extensive, real-time uses were discussed. The HyperNet system integrates probabilistic, RAM-based, feed forward design and employs a conventional VLSI IC with on-board Reward-Penalty learning program. The system also provides opportunity for inexpensive Ultra Large Scale and Wafer Scale Integration.
This paper describes on-going research that is currently being undertaken by the control Theory and applications Centre, Coventry University, into developing controllers which make use of both model-based and rule-bas...
详细信息
This paper describes on-going research that is currently being undertaken by the control Theory and applications Centre, Coventry University, into developing controllers which make use of both model-based and rule-based techniques. The resulting combined controller are able to make 'better' use of available information on the plant and investigative studies to date indicate that such an approach can provide for adaptivity within a robust controller design framework.
The paper reviews the use of the handwritten signature in pen computing. The handwritten signature has many purposes and meanings like 1) to witness intention, 2) to indicate physical presence, 3) as a seal of approva...
详细信息
The paper reviews the use of the handwritten signature in pen computing. The handwritten signature has many purposes and meanings like 1) to witness intention, 2) to indicate physical presence, 3) as a seal of approval and 4) as a stamp of authenticity. Behind these purposes are two ideas: the signature is a distinctive personal mark and since it is distinctive, its authenticity can be verified. Due to the widespread use for personal authentication, electronically captured signatures can be a natural and acceptable way to remove the last rump of paper-based transactions into the electronic domain. The requirement for a signature is perhaps the final barrier to the paperless office. Use of electronically captured signatures would offer greater security without placing a burden upon the user. Acceptance of electronic signature verification lessens fraud and opens a new age of convenience for the pen based computer and a new era of efficiency for the paper logged office.
The European Community has issued the Machinery Directive to effect a fundamental change in the way new machinery is developed for safety. It mandates that, effective January 1995, machines not undergoing the appropri...
详细信息
The European Community has issued the Machinery Directive to effect a fundamental change in the way new machinery is developed for safety. It mandates that, effective January 1995, machines not undergoing the appropriate EC conformity assessment and not compliant with any country-specific machinery safety laws in Europe will not be marketed in the EC. The directive is set to enhance safety awareness and initiate adoption of appropriate steps. However, the complexity of modern control systems renders the testing of systematic faults impractical. Their complexity increases the susceptibility to dangerous systematic faults, inadvertently designed into the system. To address this problem, a thought-through, risk-based quality approach throughout the life cycle of the machine may be used.
Implementing QFD requires a certain amount of adaptation to fit to a particular company and project requirements. It is important for users to recognize the reason for its use and to identify the limitations. The main...
详细信息
Implementing QFD requires a certain amount of adaptation to fit to a particular company and project requirements. It is important for users to recognize the reason for its use and to identify the limitations. The main potential barriers to successful implementation of QFD are the difficulty of listening to the voice, misinterpretation of message, constantly changing customer needs and too many customers and needs. To understand how these factors affect a project requires static/dynamic analysis and levels analysis. Tools such as reverse component selection, parametric analysis and synectics can facilitate smooth QFD implementation.
In summer 1993 Travers Morgan undertook a feasibility study into a revolutionary method of speed deterrent which utilizes the latest techniques in machine vision to identify vehicle speed and display violation details...
详细信息
ISBN:
(纸本)085296613X
In summer 1993 Travers Morgan undertook a feasibility study into a revolutionary method of speed deterrent which utilizes the latest techniques in machine vision to identify vehicle speed and display violation details to the road user. The purpose of the study was to study the robustness of emerging machine vision techniques, its suitability as a potential enforcement tool and to monitor driver behaviour when presented with real time violation details. The field trial indicates that Machine Vision techniques have reached a stage of development whereby it is worthy of consideration as an enforcement and traffic management tool. The work undertaken to date provides encouraging evidence of its potential in the future. Broader potential applications, whilst requiring robust trials and evaluation, include: Determining journey times and thus delays to enhance the quality of data displayed for driver information;Advising of current least journey time routes where networks present alternatives;controlling speed in response to increased demand to maximize carriageway capacity;Analyzing number plates by country of origin;Identifying overweight or overheight vehicles;Court surveillance of traffic to detect stolen vehicles;Secure car park management systems;and, Detection of evasion of selected road pricing system.
暂无评论