Objective Face recognition can be affected by unfavorable factors such as illumination, posture and expression, but the face image set is a collection of people’s various angles, different illuminations and even different expressions, which can effectively reduce these adverse effects and get higher face recognition rate. In order to make the face image set have higher recognition rate, a new method of combining face image set recognition is proposed, which combines an improved Histogram of Oriented Gradient (HOG) feature and Convolutional Neural Network (CNN). Method The method firstly segments the face images to be identified and performs HOG to extract features of the segmented images. Secondly, calculate the information entropy contained in each block as a weight coefficient of each block to form a new HOG features, and non-negative matrix factorization (NMF) is applied to reduce HOG features. Then the reduced-dimensional HOG features are modeled as image sets which keep your face details as much as possible. Finally, the modeled image sets are classified by using a convolutional neural network. Result The experimental results show that compared with the simple CNN method and the HOG-CNN method, the recognition rate of the method on the CMU PIE face set is increased by about 4%~10%. Conclusion The method proposed in this paper has more details of the face, overcomes the adverse effects, and improves the accuracy.
{"title":"Face Image Set Recognition Based On Improved HOG-NMF and Convolutional Neural Networks","authors":"Li-Ying Hao, Wei-wei Yu","doi":"10.18063/phci.v2i1.1103","DOIUrl":"https://doi.org/10.18063/phci.v2i1.1103","url":null,"abstract":"Objective Face recognition can be affected by unfavorable factors such as illumination, posture and expression, but the face image set is a collection of people’s various angles, different illuminations and even different expressions, which can effectively reduce these adverse effects and get higher face recognition rate. In order to make the face image set have higher recognition rate, a new method of combining face image set recognition is proposed, which combines an improved Histogram of Oriented Gradient (HOG) feature and Convolutional Neural Network (CNN). Method The method firstly segments the face images to be identified and performs HOG to extract features of the segmented images. Secondly, calculate the information entropy contained in each block as a weight coefficient of each block to form a new HOG features, and non-negative matrix factorization (NMF) is applied to reduce HOG features. Then the reduced-dimensional HOG features are modeled as image sets which keep your face details as much as possible. Finally, the modeled image sets are classified by using a convolutional neural network. Result The experimental results show that compared with the simple CNN method and the HOG-CNN method, the recognition rate of the method on the CMU PIE face set is increased by about 4%~10%. Conclusion The method proposed in this paper has more details of the face, overcomes the adverse effects, and improves the accuracy.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114222918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this study is to explore in depth the special context and unique experience of the live video streaming and to provide insights regarding an interpretation of the contextualization experiences model. This study uses grounded theory, depth interviews, and the physical travel of researchers to the field for participation and observations. Finally, the insight of the live broadcast platform contextualization was developed. The theoretical contribution of this study is to establish the words of mouth relationship of the live broadcast platform and ten related propositions. The study revealed the mystery of live video streaming.
{"title":"Using Grounded Theory to Explore the Words of Mouth in Live Broadcast Platform","authors":"Yi-Sheng Wang, Yuzhi Lu","doi":"10.18063/PHCI.V2I1.994","DOIUrl":"https://doi.org/10.18063/PHCI.V2I1.994","url":null,"abstract":"The purpose of this study is to explore in depth the special context and unique experience of the live video streaming and to provide insights regarding an interpretation of the contextualization experiences model. This study uses grounded theory, depth interviews, and the physical travel of researchers to the field for participation and observations. Finally, the insight of the live broadcast platform contextualization was developed. The theoretical contribution of this study is to establish the words of mouth relationship of the live broadcast platform and ten related propositions. The study revealed the mystery of live video streaming.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Biometrics emerged as a robust solution for security systems. Despite, nowadays criminals are developing techniques to accurately simulate biometric traits of valid users, process known as spoofing attack, in order to circumvent the biometric applications. Face is among the main biometric characteristics, being extremely convenient for users given its non-intrusive capture by means of digital cameras. However, face recognition systems are the ones that most suffer with spoofing attacks since such cameras, in general, can be easily fooled with common printed photographs. In this sense, countermeasure techniques should be developed and integrated to the traditional face recognition systems in order to prevent such frauds. Among the main neural networks for face spoofing detection is the discriminative Restricted Boltzmann Machine (RBM) which, besides of efficiency, achieves great results in attack detection by learning the distributions of real and fake facial images. However, it is known that deeper neural networks present better accuracy results in many tasks. In this context, we propose a novel model called Deep Discriminative Restricted Boltzmann Machine (DDRBM) applied to face spoofing detection. Results on the NUAA dataset show a significative improvement in performance when compared to the accuracy rates of a traditional discriminative RBM on attack detection.
{"title":"Deep Discriminative Restricted Boltzmann Machine (DDRBM) for Robust Face Spoofing Detection","authors":"G. Souza, J. Papa, A. Marana","doi":"10.18063/phci.v1i3.893","DOIUrl":"https://doi.org/10.18063/phci.v1i3.893","url":null,"abstract":"Biometrics emerged as a robust solution for security systems. Despite, nowadays criminals are developing techniques to accurately simulate biometric traits of valid users, process known as spoofing attack, in order to circumvent the biometric applications. Face is among the main biometric characteristics, being extremely convenient for users given its non-intrusive capture by means of digital cameras. However, face recognition systems are the ones that most suffer with spoofing attacks since such cameras, in general, can be easily fooled with common printed photographs. In this sense, countermeasure techniques should be developed and integrated to the traditional face recognition systems in order to prevent such frauds. Among the main neural networks for face spoofing detection is the discriminative Restricted Boltzmann Machine (RBM) which, besides of efficiency, achieves great results in attack detection by learning the distributions of real and fake facial images. However, it is known that deeper neural networks present better accuracy results in many tasks. In this context, we propose a novel model called Deep Discriminative Restricted Boltzmann Machine (DDRBM) applied to face spoofing detection. Results on the NUAA dataset show a significative improvement in performance when compared to the accuracy rates of a traditional discriminative RBM on attack detection.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"11 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134426422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research analyzes what predictors determine either a problematic internet use (PIU) or a functional Internet use (FIU) in 574 adolescents (303 females and 271 males). A cross-sectional study was proposed based on the compilation of an online questionnaire. It was hypothesized that Online Social-Support positively predicts PIU only when Offline Social-Support is low and Online Social-Support positively predicts FIU only when Offline Social-Support is high. Results show that Online Social-Support doesn't predict PIU, while, Offline Social-Support negatively affects It. FIU isn't affected by Offline Social-Support, while Online Social-Support predicts it. Gender differences occurs in PIU, Offline Social-Support and number of acquaintances in favor of males.
{"title":"Surfing the Web: the role of Social-Support in the adolescents’ Internet use","authors":"M. Benvenuti, E. Mazzoni","doi":"10.18063/PHCI.V1I3.845","DOIUrl":"https://doi.org/10.18063/PHCI.V1I3.845","url":null,"abstract":"This research analyzes what predictors determine either a problematic internet use (PIU) or a functional Internet use (FIU) in 574 adolescents (303 females and 271 males). A cross-sectional study was proposed based on the compilation of an online questionnaire. It was hypothesized that Online Social-Support positively predicts PIU only when Offline Social-Support is low and Online Social-Support positively predicts FIU only when Offline Social-Support is high. Results show that Online Social-Support doesn't predict PIU, while, Offline Social-Support negatively affects It. FIU isn't affected by Offline Social-Support, while Online Social-Support predicts it. Gender differences occurs in PIU, Offline Social-Support and number of acquaintances in favor of males.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116723038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. J. Adeyemi, S. Yusuf, Abu Zaki, Emmanuel Akujieze
Commercial activities are mostly centralized to main markets in many towns and cities of the Northern part of Nigeria. Such central markets constitute the noisiest part of the towns. Yet, there is no evidence that the workers and traders in such markets are aware of the challenges excessive noise pollution pose to their health. This problem serves as the basis for this research, which investigated the major source of noise pollution in Kebbi central market and make recommendation to improve the wellbeing of the people in the market.The market was divided into thirteen sections based on activities. These sections were visited twice a day for two weeks to measure their sound levels. The sound level was measured with a CEM digital noise level meter with an accuracy of ±3.5dB@1KHz. Thereafter, an ergonomic observation assessment of the noisiest section was carried out. The assessment was carried out based on rapid entire body assessment (REBA) methodology. The average sound intensity in all the sections exceeded the recommended safe sound level of 40dB. However, only the sound intensity at the grain and spice milling section (89.13 dB) exceeded the noise harmfulness level of 85dB. Operators were encouraged to use ear muffs or earplugs to minimise the exposure to harmful noise level. Proper electrification of the section was also recommended to minimise the use of internal combustion engines. The findings emphasised the need for government and relevant authorities to carry out occupational safety awareness among workers in the non-formal sector of the society.
{"title":"Effect of Noise Pollution Among Milling Machine Operators in North-West Nigeria.","authors":"A. J. Adeyemi, S. Yusuf, Abu Zaki, Emmanuel Akujieze","doi":"10.18063/phci.v1i2.809","DOIUrl":"https://doi.org/10.18063/phci.v1i2.809","url":null,"abstract":"Commercial activities are mostly centralized to main markets in many towns and cities of the Northern part of Nigeria. Such central markets constitute the noisiest part of the towns. Yet, there is no evidence that the workers and traders in such markets are aware of the challenges excessive noise pollution pose to their health. This problem serves as the basis for this research, which investigated the major source of noise pollution in Kebbi central market and make recommendation to improve the wellbeing of the people in the market.The market was divided into thirteen sections based on activities. These sections were visited twice a day for two weeks to measure their sound levels. The sound level was measured with a CEM digital noise level meter with an accuracy of ±3.5dB@1KHz. Thereafter, an ergonomic observation assessment of the noisiest section was carried out. The assessment was carried out based on rapid entire body assessment (REBA) methodology. The average sound intensity in all the sections exceeded the recommended safe sound level of 40dB. However, only the sound intensity at the grain and spice milling section (89.13 dB) exceeded the noise harmfulness level of 85dB. Operators were encouraged to use ear muffs or earplugs to minimise the exposure to harmful noise level. Proper electrification of the section was also recommended to minimise the use of internal combustion engines. The findings emphasised the need for government and relevant authorities to carry out occupational safety awareness among workers in the non-formal sector of the society.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128165949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Human computation is a technique that utilizes human abilities to perform computation tasks that are difficult for computers to process. Since the concept of human computation was introduced in 2003, many applications have been developed in an ad hoc manner and a large number of published works have focused on different aspects of human computation, such as computational techniques and performance analysis. To understand how to apply human computation to solve different problems today, it is important to understand how human computation evolves and why it happens. In light of the achievements of human computation so far, we consider what the future may hold for this relatively new field.
{"title":"The Evolution of Human Computation: Past, Present and Future","authors":"Man-Ching Yuen","doi":"10.18063/phci.v1i2.805","DOIUrl":"https://doi.org/10.18063/phci.v1i2.805","url":null,"abstract":"Human computation is a technique that utilizes human abilities to perform computation tasks that are difficult for computers to process. Since the concept of human computation was introduced in 2003, many applications have been developed in an ad hoc manner and a large number of published works have focused on different aspects of human computation, such as computational techniques and performance analysis. To understand how to apply human computation to solve different problems today, it is important to understand how human computation evolves and why it happens. In light of the achievements of human computation so far, we consider what the future may hold for this relatively new field.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116845279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The study set out to determine the optimum architecture of a robotic arm link based on weight and payload and perform vibrational and stress analyses on the resultant shape. Findings showed the effectiveness of topology optimization in preliminary stages of structural design. The subsequent linear static analyses confirmed the degree of safety of the robotic arm links. It was also shown that that preload in the actuator wire incorporated in the links can be manipulated to tune the natural frequency of the structure. These findings contribute to the ongoing design of the entire robotic first aid system by providing data, which will be used for selection of components and inspire confidence to proceed with manufacture.
{"title":"Structural Design, Optimization and Analysis of Robotic Arm Via Finite Elements.","authors":"T. Mushiri, Joseph Kurebwa","doi":"10.18063/phci.v1i2.784","DOIUrl":"https://doi.org/10.18063/phci.v1i2.784","url":null,"abstract":"The study set out to determine the optimum architecture of a robotic arm link based on weight and payload and perform vibrational and stress analyses on the resultant shape. Findings showed the effectiveness of topology optimization in preliminary stages of structural design. The subsequent linear static analyses confirmed the degree of safety of the robotic arm links. It was also shown that that preload in the actuator wire incorporated in the links can be manipulated to tune the natural frequency of the structure. These findings contribute to the ongoing design of the entire robotic first aid system by providing data, which will be used for selection of components and inspire confidence to proceed with manufacture.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132354926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper was inspired by the topics by Marshal McLuhan about cibernetisation media understanding, associated with new findings in intelligent systems that lead towards technological anthropomorphisation, and Larsen's model of cognitive controller mood. The results of research conducted from 1990 to the present day outlining the issues associated with captology are presented, and their transfer to specific areas in education outlined. The objective of the theory is to comprehend, interpret and describe the appearance of various disciplines in the natural and social sciences relating to cognitive cybernetics and Human Computer Interaction. In accordance with the unique principles, multidisciplinarity is replaced by pluriperspectivity, and an approach to integrating research methods with engineering design. The theory answers questions using cognitive cybernetics and its recognition and transformation of Descartes's saying: "cogito ergo sum", (I think, therefore I am). Work presents the relationship and correlation between man and technology as Human computer interaction with technological definitions Intelligent Systems and Captology. Special attention is focused on today's modern education with the use of virtual media and the cultural matrix within which the particular media is active. For intelligent educations systems to become more useful and acceptable, we need to consider the “system” as a synergistic composition of software behaviors, and the human interacting. Human interaction must be dominant and having considered the ruling. This cannot be achieved with today's captological educational media. Captological educational media stifles people, casts their most important, (social), role in education and makes them unhappy? Human Computer Interaction, as a strategy and philosophy, is the future of education!
本文的灵感来自Marshal McLuhan关于数字化媒体理解的主题,与导致技术拟人化的智能系统的新发现以及Larsen的认知控制情绪模型有关。本文介绍了从1990年至今的研究结果,概述了与捕捉学相关的问题,并概述了它们向教育特定领域的转移。该理论的目标是理解、解释和描述与认知控制论和人机交互有关的自然科学和社会科学中各种学科的出现。按照独特的原则,多学科被多元视角所取代,是一种将研究方法与工程设计相结合的方法。该理论利用认知控制论及其对笛卡尔的“我思故我在”(cogito ergo sum,我思故我在)这句话的认可和转化来回答问题。工作展示了人与技术之间的关系和相关性,如人机交互与技术定义,智能系统和捕获学。特别关注今天的现代教育与使用虚拟媒体和文化矩阵,其中特定的媒体是活跃的。为了使智能教育系统变得更加有用和可接受,我们需要将“系统”视为软件行为和人类交互的协同组合。人类的互动必须是主导的,并考虑到统治。这在今天的摄影教育媒体中是无法实现的。心理学教育媒体扼杀了人们,使他们在教育中扮演最重要的(社会)角色,使他们不快乐?人机交互作为一种策略和理念,是教育的未来!
{"title":"Human Computer Interaction, Cognitive Cybernetic & Captological Education","authors":"Zdenko Balaž 1*, Borna-Ivan Balaž 2","doi":"10.18063/phci.v1i2.759","DOIUrl":"https://doi.org/10.18063/phci.v1i2.759","url":null,"abstract":"This paper was inspired by the topics by Marshal McLuhan about cibernetisation media understanding, associated with new findings in intelligent systems that lead towards technological anthropomorphisation, and Larsen's model of cognitive controller mood. The results of research conducted from 1990 to the present day outlining the issues associated with captology are presented, and their transfer to specific areas in education outlined. The objective of the theory is to comprehend, interpret and describe the appearance of various disciplines in the natural and social sciences relating to cognitive cybernetics and Human Computer Interaction. In accordance with the unique principles, multidisciplinarity is replaced by pluriperspectivity, and an approach to integrating research methods with engineering design. The theory answers questions using cognitive cybernetics and its recognition and transformation of Descartes's saying: \"cogito ergo sum\", (I think, therefore I am). Work presents the relationship and correlation between man and technology as Human computer interaction with technological definitions Intelligent Systems and Captology. Special attention is focused on today's modern education with the use of virtual media and the cultural matrix within which the particular media is active. For intelligent educations systems to become more useful and acceptable, we need to consider the “system” as a synergistic composition of software behaviors, and the human interacting. Human interaction must be dominant and having considered the ruling. This cannot be achieved with today's captological educational media. Captological educational media stifles people, casts their most important, (social), role in education and makes them unhappy? Human Computer Interaction, as a strategy and philosophy, is the future of education!","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116027427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The 21st century is the information age, information has become an important strategic resource for social development, social information has become the development trend of the world today and the core, and information security in the information society will play a very important role. With the continuous development of computer networks, global information has become the trend of human development. However, because the computer network has the form of connection diversity, terminal distribution inhomogeneity and network openness, interconnection and other characteristics, resulting in the network vulnerable to hackers, malware and other malicious attacks, the former will cause unpredictable impact on the user , While the latter often causes the system to crash. Whether in the local area network or in the wide area network, there are natural and man-made and many other factors of vulnerability and potential threats. Therefore, the network security measures should be able to all aspects of a variety of threats and vulnerabilities, so as to ensure the confidentiality of network information, integrity and availability. A t t h e beginning of this article, the beginning of this article, through the analysis of hacker behavior and typical attacks, summarizes the inevitable reasons for the existence of network security vulnerabilities, and summarizes the status of computer network security, as well as the specifi c concepts, classifi cation and limitations of vulnerability scanning technology. The focus of this paper is to improve the original system of the theme module, and the original system to add some features to make it more perfect function. Finally, the shortcomings of the system and some suggestions for further improvement and expansion are put forward.
{"title":"Online security detection system design","authors":"Hongyan Han","doi":"10.18063/PHCI.V1I1.762","DOIUrl":"https://doi.org/10.18063/PHCI.V1I1.762","url":null,"abstract":"The 21st century is the information age, information has become an important strategic resource for social development, social information has become the development trend of the world today and the core, and information security in the information society will play a very important role. With the continuous development of computer networks, global information has become the trend of human development. However, because the computer network has the form of connection diversity, terminal distribution inhomogeneity and network openness, interconnection and other characteristics, resulting in the network vulnerable to hackers, malware and other malicious attacks, the former will cause unpredictable impact on the user , While the latter often causes the system to crash. Whether in the local area network or in the wide area network, there are natural and man-made and many other factors of vulnerability and potential threats. Therefore, the network security measures should be able to all aspects of a variety of threats and vulnerabilities, so as to ensure the confidentiality of network information, integrity and availability. A t t h e beginning of this article, the beginning of this article, through the analysis of hacker behavior and typical attacks, summarizes the inevitable reasons for the existence of network security vulnerabilities, and summarizes the status of computer network security, as well as the specifi c concepts, classifi cation and limitations of vulnerability scanning technology. The focus of this paper is to improve the original system of the theme module, and the original system to add some features to make it more perfect function. Finally, the shortcomings of the system and some suggestions for further improvement and expansion are put forward.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The robot is a planar joint robot composed of three degrees of freedom. Its main function is to carry out the handlingand movement of precision instruments and objects. Because of the small size, simple transmission principle, iswidely used in the electrical and electronic industry, household appliances, precision machinery industry and otherfi elds. The whole system consists of robot, robot arm, joint, stepper motor drive system and so on. Through the degreeof freedom of the stepper motor drive, complete the robot, the robot arm position changes. Specifi c design content:synchronous toothed belt drive design, screw nut design, the output shaft and shell design, stepper motor selection.On the basis of checking the strength of the structure, we optimize the structure of the robot.
{"title":"Structural Design of Industrial Robot","authors":"T. Jiang","doi":"10.18063/PHCI.V1I1.558","DOIUrl":"https://doi.org/10.18063/PHCI.V1I1.558","url":null,"abstract":"The robot is a planar joint robot composed of three degrees of freedom. Its main function is to carry out the handlingand movement of precision instruments and objects. Because of the small size, simple transmission principle, iswidely used in the electrical and electronic industry, household appliances, precision machinery industry and otherfi elds. The whole system consists of robot, robot arm, joint, stepper motor drive system and so on. Through the degreeof freedom of the stepper motor drive, complete the robot, the robot arm position changes. Specifi c design content:synchronous toothed belt drive design, screw nut design, the output shaft and shell design, stepper motor selection.On the basis of checking the strength of the structure, we optimize the structure of the robot.","PeriodicalId":299144,"journal":{"name":"Progress in Human Computer Interaction","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132350729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}