This paper reports on a simulation conducted to determine the number of semiautonomous robots that one operator can handle. Robots can be teleoperated, meaning a human controls the robot and tells it what to do;autono...
详细信息
This paper reports on a simulation conducted to determine the number of semiautonomous robots that one operator can handle. Robots can be teleoperated, meaning a human controls the robot and tells it what to do;autonomous, where the robot makes its own decisions;or teleautonomous, a combination of the two. The use of autonomous robots may reduce operator errors due to fatigue. However, at times, these robots may require human intervention, e.g., if they get stuck or in Urban Search and Rescue if a victim is found. A simulation of multiple autonomous robots and one human operator was conducted. The results indicate that while 7-10 robots give the operator barely any idle time, 1-4 robots allow too much. Based on these results, a single human operator handling somewhere between 5-6 robots might be ideal.
The dynamic environment of Business Coalition (BC) requires a flexible access control approach to deal with user management and policy writing. However, the traditional approach applied to BC assigns to access control...
详细信息
Context-aware applications use information from their surrounding environment to adapt their behavior. This paper proposes a reflexive, loose-coupled, event-based infrastructure named CxFramework to aid the developmen...
详细信息
The unified management of user rights and access control policies in a corporation with many units is not easy to implement. Moreover, most of the distributed access control systems are complex and heterogeneous, maki...
详细信息
ISBN:
(纸本)9781605581668
The unified management of user rights and access control policies in a corporation with many units is not easy to implement. Moreover, most of the distributed access control systems are complex and heterogeneous, making it hard to maintain a unified control over all fine grained policies employed by each unit. This paper proposes a unified administration of policies for corporation environments by applying a management scheme based on authorization certificates. These certificates allow the derivation of new fine grained policies in the domain of each unit, assuring that no corporation policies will be violated. These new policies update automatically the corporation repository, preserving the unified management of user rights, and then update the corresponding policy repository of each unit. Our proposal provides a real loosely coupled policy management scheme using a serverless public key infrastructure and the Web Services technology. The prototype shows the proposal viability. Copyright 2009 ACM.
Nowadays, software organizations have needed to develop excellent and reliable products. This scenario has helped to increase the relevance of quality assurance activities, especially the testing discipline. However, ...
详细信息
This work approaches relative aspects to the alarm processing problem and fault diagnosis in system level, having as purpose filter the alarms generated during a outage and identify the equipment under fault. A method...
详细信息
In this paper, we propose a new method to enhance hidden unit activations of multi-layered networks and to retrain networks imitating enhanced hidden unit activations. One of the most serious problems of multilayered ...
详细信息
ISBN:
(纸本)9780889867802
In this paper, we propose a new method to enhance hidden unit activations of multi-layered networks and to retrain networks imitating enhanced hidden unit activations. One of the most serious problems of multilayered networks consists in difficulty in interpreting final internal representations obtained by learning. Though many methods have been proposed to solve this problem, the problem still remains unsolved. For this problem, we propose a method to enhance hidden unit activations with explicit responses to input patterns. In addition, we propose a new method to retrain networks by imitating the enhanced hidden unit activations. We applied the method to a student survey, a cabinet approval rating estimation and another student survey. In all these problems, we succeeded in producing explicit and interpretable final representations.
The objective of this study is to introduce the concept of evolving granular neural networks (eGNN) and to develop a framework of information granulation and its role in the online design of neural networks. The sugge...
详细信息
In the last few years, Alzheimer's disease has been the most frequent cause of dementia and it is responsible, alone or in association with other diseases, for 50% of the cases in western countries. Dementias are ...
详细信息
To achieve effective 3D shape retrieval, there is a crucial need for efficient shape matching methods. This paper introduces a new method for 3D shape matching, which uses a simplified octree representation of 3D mesh...
详细信息
暂无评论