首页 > 最新文献

Progress in Human Computer Interaction最新文献

英文 中文
Face Image Set Recognition Based On Improved HOG-NMF and Convolutional Neural Networks 基于改进HOG-NMF和卷积神经网络的人脸图像集识别
Pub Date : 2019-11-14 DOI: 10.18063/phci.v2i1.1103
Li-Ying Hao, Wei-wei Yu
Objective Face recognition can be affected by unfavorable factors such as illumination, posture and expression, but the face image set is a collection of people’s various angles, different illuminations and even different expressions, which can effectively reduce these adverse effects and get higher face recognition rate. In order to make the face image set have higher recognition rate, a new method of combining face image set recognition is proposed, which combines an improved Histogram of Oriented Gradient (HOG) feature and Convolutional Neural Network (CNN). Method The method firstly segments the face images to be identified and performs HOG to extract features of the segmented images. Secondly, calculate the information entropy contained in each block as a weight coefficient of each block to form a new HOG features, and non-negative matrix factorization (NMF) is applied to reduce HOG features. Then the reduced-dimensional HOG features are modeled as image sets which keep your face details as much as possible. Finally, the modeled image sets are classified by using a convolutional neural network. Result The experimental results show that compared with the simple CNN method and the HOG-CNN method, the recognition rate of the method on the CMU PIE face set is increased by about 4%~10%. Conclusion The method proposed in this paper has more details of the face, overcomes the adverse effects, and improves the accuracy.
目的人脸识别会受到光照、姿势、表情等不利因素的影响,而人脸图像集是人的各种角度、不同光照甚至不同表情的集合,可以有效降低这些不利影响,获得更高的人脸识别率。为了使人脸图像集具有更高的识别率,提出了一种将改进的定向梯度直方图(HOG)特征与卷积神经网络(CNN)相结合的人脸图像集识别新方法。方法该方法首先对待识别的人脸图像进行分割,并对分割后的图像进行HOG提取特征。其次,计算每个块中包含的信息熵作为每个块的权重系数,形成新的HOG特征,并应用非负矩阵分解(NMF)对HOG特征进行约简;然后将降维HOG特征建模为尽可能多地保留人脸细节的图像集。最后,使用卷积神经网络对建模后的图像集进行分类。结果实验结果表明,与简单CNN方法和HOG-CNN方法相比,该方法对CMU PIE人脸集的识别率提高了4%~10%左右。结论所提出的方法具有更多的面部细节,克服了不良影响,提高了准确性。
{"title":"Face Image Set Recognition Based On Improved HOG-NMF and Convolutional Neural Networks","authors":"Li-Ying Hao, Wei-wei Yu","doi":"10.18063/phci.v2i1.1103","DOIUrl":"https://doi.org/10.18063/phci.v2i1.1103","url":null,"abstract":"Objective Face recognition can be affected by unfavorable factors such as illumination, posture and expression, but the face image set is a collection of people’s various angles, different illuminations and even different expressions, which can effectively reduce these adverse effects and get higher face recognition rate. In order to make the face image set have higher recognition rate, a new method of combining face image set recognition is proposed, which combines an improved Histogram of Oriented Gradient (HOG) feature and Convolutional Neural Network (CNN). Method The method firstly segments the face images to be identified and performs HOG to extract features of the segmented images. Secondly, calculate the information entropy contained in each block as a weight coefficient of each block to form a new HOG features, and non-negative matrix factorization (NMF) is applied to reduce HOG features. Then the reduced-dimensional HOG features are modeled as image sets which keep your face details as much as possible. Finally, the modeled image sets are classified by using a convolutional neural network. Result The experimental results show that compared with the simple CNN method and the HOG-CNN method, the recognition rate of the method on the CMU PIE face set is increased by about 4%~10%. Conclusion The method proposed in this paper has more details of the face, overcomes the adverse effects, and improves the accuracy.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114222918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Grounded Theory to Explore the Words of Mouth in Live Broadcast Platform 运用扎根理论探究直播平台的口碑传播
Pub Date : 2019-06-18 DOI: 10.18063/PHCI.V2I1.994
Yi-Sheng Wang, Yuzhi Lu
The purpose of this study is to explore in depth the special context and unique experience of the live video streaming and to provide insights regarding an interpretation of the contextualization experiences model. This study uses grounded theory, depth interviews, and the physical travel of researchers to the field for participation and observations. Finally, the insight of the live broadcast platform contextualization was developed. The theoretical contribution of this study is to establish the words of mouth relationship of the live broadcast platform and ten related propositions. The study revealed the mystery of live video streaming.
本研究的目的是深入探讨视频流直播的特殊情境和独特体验,并为情境化体验模型的解释提供见解。本研究采用扎根理论、深度访谈和研究人员实地参与和观察的实际旅行。最后,提出了直播平台情境化的见解。本研究的理论贡献在于建立了直播平台的口碑关系和十个相关命题。这项研究揭示了视频直播的奥秘。
{"title":"Using Grounded Theory to Explore the Words of Mouth in Live Broadcast Platform","authors":"Yi-Sheng Wang, Yuzhi Lu","doi":"10.18063/PHCI.V2I1.994","DOIUrl":"https://doi.org/10.18063/PHCI.V2I1.994","url":null,"abstract":"The purpose of this study is to explore in depth the special context and unique experience of the live video streaming and to provide insights regarding an interpretation of the contextualization experiences model. This study uses grounded theory, depth interviews, and the physical travel of researchers to the field for participation and observations. Finally, the insight of the live broadcast platform contextualization was developed. The theoretical contribution of this study is to establish the words of mouth relationship of the live broadcast platform and ten related propositions. The study revealed the mystery of live video streaming.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Discriminative Restricted Boltzmann Machine (DDRBM) for Robust Face Spoofing Detection 基于深度判别约束玻尔兹曼机的鲁棒人脸欺骗检测
Pub Date : 2018-12-26 DOI: 10.18063/phci.v1i3.893
G. Souza, J. Papa, A. Marana
Biometrics emerged as a robust solution for security systems. Despite, nowadays criminals are developing techniques to accurately simulate biometric traits of valid users, process known as spoofing attack, in order to circumvent the biometric applications. Face is among the main biometric characteristics, being extremely convenient for users given its non-intrusive capture by means of digital cameras. However, face recognition systems are the ones that most suffer with spoofing attacks since such cameras, in general, can be easily fooled with common printed photographs. In this sense, countermeasure techniques should be developed and integrated to the traditional face recognition systems in order to prevent such frauds. Among the main neural networks for face spoofing detection is the discriminative Restricted Boltzmann Machine (RBM) which, besides of efficiency, achieves great results in attack detection by learning the distributions of real and fake facial images. However, it is known that deeper neural networks present better accuracy results in many tasks. In this context, we propose a novel model called Deep Discriminative Restricted Boltzmann Machine (DDRBM) applied to face spoofing detection. Results on the NUAA dataset show a significative improvement in performance when compared to the accuracy rates of a traditional discriminative RBM on attack detection.
生物识别技术成为安全系统的一个强大解决方案。尽管如此,目前犯罪分子正在开发技术,以准确地模拟有效用户的生物特征,这一过程被称为欺骗攻击,以绕过生物识别应用程序。面部是主要的生物特征之一,通过数码相机的非侵入式捕捉,对用户来说非常方便。然而,人脸识别系统是最容易遭受欺骗攻击的系统,因为这种相机通常很容易被普通的打印照片所欺骗。从这个意义上说,应该开发对策技术,并将其整合到传统的人脸识别系统中,以防止此类欺诈行为。在人脸欺骗检测的主要神经网络中,判别限制玻尔兹曼机(RBM)除了效率高外,还通过学习真实和虚假人脸图像的分布,在攻击检测方面取得了很好的效果。然而,众所周知,深度神经网络在许多任务中表现出更好的准确性。在此背景下,我们提出了一种新的模型,称为深度判别受限玻尔兹曼机(DDRBM),用于人脸欺骗检测。在NUAA数据集上的结果显示,与传统的判别RBM攻击检测的准确率相比,性能有了显着提高。
{"title":"Deep Discriminative Restricted Boltzmann Machine (DDRBM) for Robust Face Spoofing Detection","authors":"G. Souza, J. Papa, A. Marana","doi":"10.18063/phci.v1i3.893","DOIUrl":"https://doi.org/10.18063/phci.v1i3.893","url":null,"abstract":"Biometrics emerged as a robust solution for security systems. Despite, nowadays criminals are developing techniques to accurately simulate biometric traits of valid users, process known as spoofing attack, in order to circumvent the biometric applications. Face is among the main biometric characteristics, being extremely convenient for users given its non-intrusive capture by means of digital cameras. However, face recognition systems are the ones that most suffer with spoofing attacks since such cameras, in general, can be easily fooled with common printed photographs. In this sense, countermeasure techniques should be developed and integrated to the traditional face recognition systems in order to prevent such frauds. Among the main neural networks for face spoofing detection is the discriminative Restricted Boltzmann Machine (RBM) which, besides of efficiency, achieves great results in attack detection by learning the distributions of real and fake facial images. However, it is known that deeper neural networks present better accuracy results in many tasks. In this context, we propose a novel model called Deep Discriminative Restricted Boltzmann Machine (DDRBM) applied to face spoofing detection. Results on the NUAA dataset show a significative improvement in performance when compared to the accuracy rates of a traditional discriminative RBM on attack detection.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"11 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134426422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Surfing the Web: the role of Social-Support in the adolescents’ Internet use 上网:社会支持在青少年网络使用中的作用
Pub Date : 2018-12-26 DOI: 10.18063/PHCI.V1I3.845
M. Benvenuti, E. Mazzoni
This research analyzes what predictors determine either a problematic internet use (PIU) or a functional Internet use (FIU) in 574 adolescents (303 females and 271 males). A cross-sectional study was proposed based on the compilation of an online questionnaire. It was hypothesized that Online Social-Support positively predicts PIU only when Offline Social-Support is low and Online Social-Support positively predicts FIU only when Offline Social-Support is high. Results show that Online Social-Support doesn't predict PIU, while, Offline Social-Support negatively affects It. FIU isn't affected by Offline Social-Support, while Online Social-Support predicts it. Gender differences occurs in PIU, Offline Social-Support and number of acquaintances in favor of males.
本研究分析了574名青少年(303名女性和271名男性)有问题的互联网使用(PIU)或功能性的互联网使用(FIU)的预测因素。在编制在线调查问卷的基础上,提出了横断面研究。假设线上社会支持仅在线下社会支持较低时对PIU有正向预测,线上社会支持仅在线下社会支持较高时对FIU有正向预测。结果表明,线上社会支持对个人行为意愿没有预测作用,而线下社会支持对个人行为意愿有负向影响。FIU不受线下社会支持的影响,而在线社会支持可以预测它。在PIU、线下社会支持和熟人数量上存在男性优势的性别差异。
{"title":"Surfing the Web: the role of Social-Support in the adolescents’ Internet use","authors":"M. Benvenuti, E. Mazzoni","doi":"10.18063/PHCI.V1I3.845","DOIUrl":"https://doi.org/10.18063/PHCI.V1I3.845","url":null,"abstract":"This research analyzes what predictors determine either a problematic internet use (PIU) or a functional Internet use (FIU) in 574 adolescents (303 females and 271 males). A cross-sectional study was proposed based on the compilation of an online questionnaire. It was hypothesized that Online Social-Support positively predicts PIU only when Offline Social-Support is low and Online Social-Support positively predicts FIU only when Offline Social-Support is high. Results show that Online Social-Support doesn't predict PIU, while, Offline Social-Support negatively affects It. FIU isn't affected by Offline Social-Support, while Online Social-Support predicts it. Gender differences occurs in PIU, Offline Social-Support and number of acquaintances in favor of males.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116723038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effect of Noise Pollution Among Milling Machine Operators in North-West Nigeria. 噪音污染对尼日利亚西北部铣床操作员的影响。
Pub Date : 2018-12-26 DOI: 10.18063/phci.v1i2.809
A. J. Adeyemi, S. Yusuf, Abu Zaki, Emmanuel Akujieze
Commercial activities are mostly centralized to main markets in many towns and cities of the Northern part of Nigeria. Such central markets constitute the noisiest part of the towns. Yet, there is no evidence that the workers and traders in such markets are aware of the challenges excessive noise pollution pose to their health. This problem serves as the basis for this research, which investigated the major source of noise pollution in Kebbi central market and make recommendation to improve the wellbeing of the people in the market.The market was divided into thirteen sections based on activities. These sections were visited twice a day for two weeks to measure their sound levels. The sound level was measured with a CEM digital noise level meter with an accuracy of ±3.5dB@1KHz. Thereafter, an ergonomic observation assessment of the noisiest section was carried out. The assessment was carried out based on rapid entire body assessment (REBA) methodology. The average sound intensity in all the sections exceeded the recommended safe sound level of 40dB. However, only the sound intensity at the grain and spice milling section (89.13 dB) exceeded the noise harmfulness level of 85dB. Operators were encouraged to use ear muffs or earplugs to minimise the exposure to harmful noise level. Proper electrification of the section was also recommended to minimise the use of internal combustion engines. The findings emphasised the need for government and relevant authorities to carry out occupational safety awareness among workers in the non-formal sector of the society.
商业活动主要集中在尼日利亚北部许多城镇的主要市场。这样的中心市场构成了城镇中最嘈杂的部分。然而,没有证据表明这些市场中的工人和商人意识到过度的噪音污染对他们的健康构成的挑战。这个问题是本研究的基础,本研究调查了Kebbi中央市场的主要噪音污染源,并提出了改善市场人民福祉的建议。市场根据活动分为十三个部分。在两周的时间里,这些区域每天被访问两次,以测量它们的声音水平。声级测量采用CEM数字噪声级计,精度为±3.5dB@1KHz。然后,对噪声最大的部分进行了工效学观察评价。评估基于快速全身评估(REBA)方法进行。各段平均声强均超过建议安全声级40dB。但是,只有谷物和香料研磨段的声强(89.13 dB)超过了85dB的噪声危害等级。操作员应戴上耳罩或耳塞,以减低接触有害噪音的程度。此外,还建议对该部分进行适当的电气化,以尽量减少内燃机的使用。调查结果强调,政府和有关当局需要在社会非正规部门的工人中开展职业安全意识。
{"title":"Effect of Noise Pollution Among Milling Machine Operators in North-West Nigeria.","authors":"A. J. Adeyemi, S. Yusuf, Abu Zaki, Emmanuel Akujieze","doi":"10.18063/phci.v1i2.809","DOIUrl":"https://doi.org/10.18063/phci.v1i2.809","url":null,"abstract":"Commercial activities are mostly centralized to main markets in many towns and cities of the Northern part of Nigeria. Such central markets constitute the noisiest part of the towns. Yet, there is no evidence that the workers and traders in such markets are aware of the challenges excessive noise pollution pose to their health. This problem serves as the basis for this research, which investigated the major source of noise pollution in Kebbi central market and make recommendation to improve the wellbeing of the people in the market.The market was divided into thirteen sections based on activities. These sections were visited twice a day for two weeks to measure their sound levels. The sound level was measured with a CEM digital noise level meter with an accuracy of ±3.5dB@1KHz. Thereafter, an ergonomic observation assessment of the noisiest section was carried out. The assessment was carried out based on rapid entire body assessment (REBA) methodology. The average sound intensity in all the sections exceeded the recommended safe sound level of 40dB. However, only the sound intensity at the grain and spice milling section (89.13 dB) exceeded the noise harmfulness level of 85dB. Operators were encouraged to use ear muffs or earplugs to minimise the exposure to harmful noise level. Proper electrification of the section was also recommended to minimise the use of internal combustion engines. The findings emphasised the need for government and relevant authorities to carry out occupational safety awareness among workers in the non-formal sector of the society.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128165949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Evolution of Human Computation: Past, Present and Future 人类计算的进化:过去、现在和未来
Pub Date : 2018-12-26 DOI: 10.18063/phci.v1i2.805
Man-Ching Yuen
Human computation is a technique that utilizes human abilities to perform computation tasks that are difficult for computers to process. Since the concept of human computation was introduced in 2003, many applications have been developed in an ad hoc manner and a large number of published works have focused on different aspects of human computation, such as computational techniques and performance analysis. To understand how to apply human computation to solve different problems today, it is important to understand how human computation evolves and why it happens. In light of the achievements of human computation so far, we consider what the future may hold for this relatively new field.
人工计算是一种利用人的能力来执行计算机难以处理的计算任务的技术。自2003年引入人类计算的概念以来,许多应用程序以特别的方式开发,并且大量出版的作品集中在人类计算的不同方面,例如计算技术和性能分析。要理解今天如何应用人类计算来解决不同的问题,重要的是要理解人类计算是如何演变的,以及为什么会发生。鉴于人类计算迄今取得的成就,我们考虑这个相对较新的领域的未来。
{"title":"The Evolution of Human Computation: Past, Present and Future","authors":"Man-Ching Yuen","doi":"10.18063/phci.v1i2.805","DOIUrl":"https://doi.org/10.18063/phci.v1i2.805","url":null,"abstract":"Human computation is a technique that utilizes human abilities to perform computation tasks that are difficult for computers to process. Since the concept of human computation was introduced in 2003, many applications have been developed in an ad hoc manner and a large number of published works have focused on different aspects of human computation, such as computational techniques and performance analysis. To understand how to apply human computation to solve different problems today, it is important to understand how human computation evolves and why it happens. In light of the achievements of human computation so far, we consider what the future may hold for this relatively new field.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116845279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Structural Design, Optimization and Analysis of Robotic Arm Via Finite Elements. 机械臂结构设计、优化与有限元分析。
Pub Date : 2018-12-26 DOI: 10.18063/phci.v1i2.784
T. Mushiri, Joseph Kurebwa
The study set out to determine the optimum architecture of a robotic arm link based on weight and payload and perform vibrational and stress analyses on the resultant shape. Findings showed the effectiveness of topology optimization in preliminary stages of structural design. The subsequent linear static analyses confirmed the degree of safety of the robotic arm links. It was also shown that that preload in the actuator wire incorporated in the links can be manipulated to tune the natural frequency of the structure. These findings contribute to the ongoing design of the entire robotic first aid system by providing data, which will be used for selection of components and inspire confidence to proceed with manufacture.
该研究旨在确定基于重量和有效载荷的机械臂连杆的最佳结构,并对最终形状进行振动和应力分析。研究结果表明,拓扑优化在结构设计的初始阶段是有效的。随后的线性静力分析证实了机械臂连杆的安全程度。研究还表明,可以通过操纵连杆中执行器导线中的预紧力来调整结构的固有频率。这些发现通过提供数据,有助于整个机器人急救系统的持续设计,这些数据将用于组件的选择,并激发继续生产的信心。
{"title":"Structural Design, Optimization and Analysis of Robotic Arm Via Finite Elements.","authors":"T. Mushiri, Joseph Kurebwa","doi":"10.18063/phci.v1i2.784","DOIUrl":"https://doi.org/10.18063/phci.v1i2.784","url":null,"abstract":"The study set out to determine the optimum architecture of a robotic arm link based on weight and payload and perform vibrational and stress analyses on the resultant shape. Findings showed the effectiveness of topology optimization in preliminary stages of structural design. The subsequent linear static analyses confirmed the degree of safety of the robotic arm links. It was also shown that that preload in the actuator wire incorporated in the links can be manipulated to tune the natural frequency of the structure. These findings contribute to the ongoing design of the entire robotic first aid system by providing data, which will be used for selection of components and inspire confidence to proceed with manufacture.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132354926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human Computer Interaction, Cognitive Cybernetic & Captological Education 人机交互,认知控制论与动物学教育
Pub Date : 2018-11-28 DOI: 10.18063/phci.v1i2.759
Zdenko Balaž 1*, Borna-Ivan Balaž 2
This paper was inspired by the topics by Marshal McLuhan about cibernetisation media understanding, associated with new findings in intelligent systems that lead towards technological anthropomorphisation, and Larsen's model of cognitive controller mood. The results of research conducted from 1990 to the present day outlining the issues associated with captology are presented, and their transfer to specific areas in education outlined. The objective of the theory is to comprehend, interpret and describe the appearance of various disciplines in the natural and social sciences relating to cognitive cybernetics and Human Computer Interaction. In accordance with the unique principles, multidisciplinarity is replaced by pluriperspectivity, and an approach to integrating research methods with engineering design. The theory answers questions using cognitive cybernetics and its recognition and transformation of Descartes's saying: "cogito ergo sum", (I think, therefore I am). Work presents the relationship and correlation between man and technology as Human computer interaction with technological definitions Intelligent Systems and Captology. Special attention is focused on today's modern education with the use of virtual media and the cultural matrix within which the particular media is active. For intelligent educations systems to become more useful and acceptable, we need to consider the “system” as a synergistic composition of software behaviors, and the human interacting.  Human interaction must be dominant and having considered the ruling. This cannot be achieved with today's captological educational media. Captological educational media stifles people, casts their most important, (social), role in education and makes them unhappy? Human Computer Interaction, as a strategy and philosophy, is the future of education!
本文的灵感来自Marshal McLuhan关于数字化媒体理解的主题,与导致技术拟人化的智能系统的新发现以及Larsen的认知控制情绪模型有关。本文介绍了从1990年至今的研究结果,概述了与捕捉学相关的问题,并概述了它们向教育特定领域的转移。该理论的目标是理解、解释和描述与认知控制论和人机交互有关的自然科学和社会科学中各种学科的出现。按照独特的原则,多学科被多元视角所取代,是一种将研究方法与工程设计相结合的方法。该理论利用认知控制论及其对笛卡尔的“我思故我在”(cogito ergo sum,我思故我在)这句话的认可和转化来回答问题。工作展示了人与技术之间的关系和相关性,如人机交互与技术定义,智能系统和捕获学。特别关注今天的现代教育与使用虚拟媒体和文化矩阵,其中特定的媒体是活跃的。为了使智能教育系统变得更加有用和可接受,我们需要将“系统”视为软件行为和人类交互的协同组合。人类的互动必须是主导的,并考虑到统治。这在今天的摄影教育媒体中是无法实现的。心理学教育媒体扼杀了人们,使他们在教育中扮演最重要的(社会)角色,使他们不快乐?人机交互作为一种策略和理念,是教育的未来!
{"title":"Human Computer Interaction, Cognitive Cybernetic & Captological Education","authors":"Zdenko Balaž 1*, Borna-Ivan Balaž 2","doi":"10.18063/phci.v1i2.759","DOIUrl":"https://doi.org/10.18063/phci.v1i2.759","url":null,"abstract":"This paper was inspired by the topics by Marshal McLuhan about cibernetisation media understanding, associated with new findings in intelligent systems that lead towards technological anthropomorphisation, and Larsen's model of cognitive controller mood. The results of research conducted from 1990 to the present day outlining the issues associated with captology are presented, and their transfer to specific areas in education outlined. The objective of the theory is to comprehend, interpret and describe the appearance of various disciplines in the natural and social sciences relating to cognitive cybernetics and Human Computer Interaction. In accordance with the unique principles, multidisciplinarity is replaced by pluriperspectivity, and an approach to integrating research methods with engineering design. The theory answers questions using cognitive cybernetics and its recognition and transformation of Descartes's saying: \"cogito ergo sum\", (I think, therefore I am). Work presents the relationship and correlation between man and technology as Human computer interaction with technological definitions Intelligent Systems and Captology. Special attention is focused on today's modern education with the use of virtual media and the cultural matrix within which the particular media is active. For intelligent educations systems to become more useful and acceptable, we need to consider the “system” as a synergistic composition of software behaviors, and the human interacting.  Human interaction must be dominant and having considered the ruling. This cannot be achieved with today's captological educational media. Captological educational media stifles people, casts their most important, (social), role in education and makes them unhappy? Human Computer Interaction, as a strategy and philosophy, is the future of education!","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116027427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Online security detection system design 在线安全检测系统设计
Pub Date : 2018-06-27 DOI: 10.18063/PHCI.V1I1.762
Hongyan Han
The 21st century is the information age, information has become an important strategic resource for social development, social information has become the development trend of the world today and the core, and information security in the information society will play a very important role. With the continuous development of computer networks, global information has become the trend of human development. However, because the computer network has the form of connection diversity, terminal distribution inhomogeneity and network openness, interconnection and other characteristics, resulting in the network vulnerable to hackers, malware and other malicious attacks, the former will cause unpredictable impact on the user , While the latter often causes the system to crash. Whether in the local area network or in the wide area network, there are natural and man-made and many other factors of vulnerability and potential threats. Therefore, the network security measures should be able to all aspects of a variety of threats and vulnerabilities, so as to ensure the confidentiality of network information, integrity and availability.  A t t h e beginning of this article, the beginning of this article, through the analysis of hacker behavior and typical attacks, summarizes the inevitable reasons for the existence of network security vulnerabilities, and summarizes the status of computer network security, as well as the specifi c concepts, classifi cation and limitations of vulnerability scanning technology. The focus of this paper is to improve the original system of the theme module, and the original system to add some features to make it more perfect function. Finally, the shortcomings of the system and some suggestions for further improvement and expansion are put forward.
21世纪是信息时代,信息已成为社会发展的重要战略资源,社会信息化已成为当今世界的发展趋势和核心,而信息安全在信息社会中将发挥非常重要的作用。随着计算机网络的不断发展,全球信息化已成为人类发展的趋势。然而,由于计算机网络具有连接形式的多样性、终端分布的非同质性以及网络的开放性、互联性等特点,导致网络容易受到黑客、恶意软件等恶意攻击,前者会对用户造成不可预知的影响,而后者往往会导致系统崩溃。无论是在局域网还是在广域网中,都存在着自然和人为等诸多因素的脆弱性和潜在威胁。因此,网络安全措施应能够防范各方面的各种威胁和漏洞,从而保证网络信息的保密性、完整性和可用性。在本文的开头,本文通过对黑客行为和典型攻击的分析,总结出网络安全漏洞存在的必然原因,并总结了计算机网络安全的现状,以及漏洞扫描技术的具体概念、分类和局限性。本文的重点是对原有系统的主题模块进行改进,并在原有系统的基础上增加一些功能,使其功能更加完善。最后,提出了系统存在的不足和进一步完善和扩展的建议。
{"title":"Online security detection system design","authors":"Hongyan Han","doi":"10.18063/PHCI.V1I1.762","DOIUrl":"https://doi.org/10.18063/PHCI.V1I1.762","url":null,"abstract":"The 21st century is the information age, information has become an important strategic resource for social development, social information has become the development trend of the world today and the core, and information security in the information society will play a very important role. With the continuous development of computer networks, global information has become the trend of human development. However, because the computer network has the form of connection diversity, terminal distribution inhomogeneity and network openness, interconnection and other characteristics, resulting in the network vulnerable to hackers, malware and other malicious attacks, the former will cause unpredictable impact on the user , While the latter often causes the system to crash. Whether in the local area network or in the wide area network, there are natural and man-made and many other factors of vulnerability and potential threats. Therefore, the network security measures should be able to all aspects of a variety of threats and vulnerabilities, so as to ensure the confidentiality of network information, integrity and availability.  A t t h e beginning of this article, the beginning of this article, through the analysis of hacker behavior and typical attacks, summarizes the inevitable reasons for the existence of network security vulnerabilities, and summarizes the status of computer network security, as well as the specifi c concepts, classifi cation and limitations of vulnerability scanning technology. The focus of this paper is to improve the original system of the theme module, and the original system to add some features to make it more perfect function. Finally, the shortcomings of the system and some suggestions for further improvement and expansion are put forward.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structural Design of Industrial Robot 工业机器人结构设计
Pub Date : 2018-06-17 DOI: 10.18063/PHCI.V1I1.558
T. Jiang
The robot is a planar joint robot composed of three degrees of freedom. Its main function is to carry out the handlingand movement of precision instruments and objects. Because of the small size, simple transmission principle, iswidely used in the electrical and electronic industry, household appliances, precision machinery industry and otherfi elds. The whole system consists of robot, robot arm, joint, stepper motor drive system and so on. Through the degreeof freedom of the stepper motor drive, complete the robot, the robot arm position changes. Specifi c design content:synchronous toothed belt drive design, screw nut design, the output shaft and shell design, stepper motor selection.On the basis of checking the strength of the structure, we optimize the structure of the robot.
该机器人是由三个自由度组成的平面关节机器人。它的主要功能是对精密仪器和物体进行搬运和移动。由于体积小,传动原理简单,被广泛应用于电气电子工业、家用电器、精密机械工业等领域。整个系统由机器人、机械臂、关节、步进电机驱动系统等组成。通过步进电机的自由度驱动,完成机器人、机械臂位置的变化。具体设计内容:同步齿形带传动设计、螺帽设计、输出轴及壳体设计、步进电机选型。在对结构强度进行校核的基础上,对机器人的结构进行优化。
{"title":"Structural Design of Industrial Robot","authors":"T. Jiang","doi":"10.18063/PHCI.V1I1.558","DOIUrl":"https://doi.org/10.18063/PHCI.V1I1.558","url":null,"abstract":"The robot is a planar joint robot composed of three degrees of freedom. Its main function is to carry out the handlingand movement of precision instruments and objects. Because of the small size, simple transmission principle, iswidely used in the electrical and electronic industry, household appliances, precision machinery industry and otherfi elds. The whole system consists of robot, robot arm, joint, stepper motor drive system and so on. Through the degreeof freedom of the stepper motor drive, complete the robot, the robot arm position changes. Specifi c design content:synchronous toothed belt drive design, screw nut design, the output shaft and shell design, stepper motor selection.On the basis of checking the strength of the structure, we optimize the structure of the robot.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132350729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Progress in Human Computer Interaction
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1