In human comp.ter interaction, the ultimate goal is to have effortless and natural communication. In the research literature significant effort has been directed toward understanding the functional aspects of the comm...
详细信息
We present an example of the use of multi-attribute utility analysis in the design of a robot system. Multi-attribute utility analysis is a tool used by Systems Engineers to aid in deciding amongst numerous alternativ...
详细信息
ISBN:
(纸本)0780384636
We present an example of the use of multi-attribute utility analysis in the design of a robot system. Multi-attribute utility analysis is a tool used by Systems Engineers to aid in deciding amongst numerous alternatives. Its strength lies in the fact that very different metrics can be comp.red, and that it takes into account human preferences and risk attitudes. As a design tool, multi-attribute utility analysis is performed off line, during the system design phase, to choose among possible designs, comp.nents, gains, etc. We offer a demonstration of multi-attribute utility analysis in designing a Hybrid Switched-System Visual Servo System. We have previously introduced such a system, and here use multi-attribute utility analysis to to select a switching algorithm that best suits the needs of a specific user.
This paper introduces two experiments practicing for digital Asia, the technical Intercultural Collaboration Experiment and the non-technical China-Japan-Korea Virtual Community Experiment. By analyzing the two experi...
详细信息
ISBN:
(纸本)981238961X
This paper introduces two experiments practicing for digital Asia, the technical Intercultural Collaboration Experiment and the non-technical China-Japan-Korea Virtual Community Experiment. By analyzing the two experiments, we found that, it is possible to use machine translation technologies to make the effective communication among people in Asian countries. The analysis also shows that human interferences and adaptations to machine translation is a solution to break the language barriers in multilingual collaboration and intercultural communication.
String similarity measures of edit distance, cosine correlation and Dice coefficient are adopted to evaluate machine translation results. Experiment shows that the evaluation method distinguishes well between good and...
详细信息
String similarity measures of edit distance, cosine correlation and Dice coefficient are adopted to evaluate machine translation results. Experiment shows that the evaluation method distinguishes well between good and bad translations. Another experiment manifests a consistency between human and automatic scorings of 6 general-purpose MT systems. Equational analysis validates the experimental results. Although the data and graphs are very promising, correlation coefficient and significance tests at 0.01 level are made to ensure the reliability of the results. Linear regression is made to map the automatic scoring results to human scorings.
A novel method of separating point spread function from blurred images using zeros of the z transform is presented when more than one blurred images are available. The proposed method is demonstrated to be effective w...
详细信息
ISBN:
(纸本)0780386884
A novel method of separating point spread function from blurred images using zeros of the z transform is presented when more than one blurred images are available. The proposed method is demonstrated to be effective with significant contamination of signal-to-noise ratios over 30dB. This method holds much promise as a blind deconvolution (i.e. problem of recovering two functions from their convolution) technique, as it does not impose any constraints on the point spread function such as positivity. The article is presented with experimental results over different signal-to-noise ratios depicting its effectiveness as a practical image restoration technique.
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can communicate securely with each other by usin...
详细信息
ISBN:
(纸本)0769520510
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can communicate securely with each other by using the session key. In this paper, we will propose an approach to solve the problem of supervising secure communication in a level-based hierarchy. In the proposed scheme, any two users with the same security level can efficiently establish a session key and both of them can apply it to encrypt (or decrypt) the communication messages. Accordingly, a user with higher security level can conveniently derive the session key and supervise the communication. The security of the proposed scheme is based on Diffie-Hellman's key agreement and RSA's scheme. To reveal the session key, a malicious user has to solve the factorization and the discrete logarithm problems.
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file or a verification table. A user first...
详细信息
ISBN:
(纸本)0769520510
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file or a verification table. A user first applies for an account in the financial organization and then uses the given IC card to login. In the login phase, a user inputs the identity and password, transmits the generated values to the center. In the authentication phase, the system uses the secret key and remotely submitted message to verify whether the request is legal or not. A one-time-used random number and a timestamp are supplied to protect the potential attacks, which may replay a previously intercepted login request. Further, by using the characteristics of IC cards, the proposed scheme is very suitable for authenticating passwords remotely.
This paper presents the dynamic external Home Agent (x-HA) assignment for mobile Virtual Private Networks (VPNs). The proposed architecture is based on the IPsec-based VPN proposed by the IETF for mobile users. The IE...
详细信息
In the next fifty years, the main problem of AI is "the solution of Mutil-Agent in the dynamic and un-forecast environment", the standard problem is the robot vs. robot or human vs. robot comp.tition. This p...
详细信息
ISBN:
(纸本)0780384032
In the next fifty years, the main problem of AI is "the solution of Mutil-Agent in the dynamic and un-forecast environment", the standard problem is the robot vs. robot or human vs. robot comp.tition. This paper discusses the problem of collaboration and coordination in RoboCup Agent based on reinforcement learning and shows our experiment results.
This paper presents a novel Genetic Algorithm (GA)-based autonomous comp.nsator design and position command shaping considering the stand vibration suppression for the fast and precise positioning of mechatronic syste...
详细信息
暂无评论