Pub Date : 2019-01-01DOI: 10.4018/978-1-5225-7368-5.ch060
K. Jakobs
The chapter first looks at the links that exist between standards and standardization on the one hand and innovation and economics on the other. It then offers a brief description of a typical standards setting process. The complex “web” of standards setting organizations in the ICT sector is discussed next. Subsequently, a flexible tool to describe the characteristics of an SSO is introduced. It can be deployed by firms to identify the SSO that is best suited for a planned standardization activity. This selection is only part of the fairly complex task of standardization management, which will be described next. Finally, the chapter will briefly discuss national standardization strategies.
{"title":"ICT Standardization","authors":"K. Jakobs","doi":"10.4018/978-1-5225-7368-5.ch060","DOIUrl":"https://doi.org/10.4018/978-1-5225-7368-5.ch060","url":null,"abstract":"The chapter first looks at the links that exist between standards and standardization on the one hand and innovation and economics on the other. It then offers a brief description of a typical standards setting process. The complex “web” of standards setting organizations in the ICT sector is discussed next. Subsequently, a flexible tool to describe the characteristics of an SSO is introduced. It can be deployed by firms to identify the SSO that is best suited for a planned standardization activity. This selection is only part of the fairly complex task of standardization management, which will be described next. Finally, the chapter will briefly discuss national standardization strategies.","PeriodicalId":52560,"journal":{"name":"Foundations and Trends in Human-Computer Interaction","volume":"121 6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87399951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/978-1-5225-7368-5.ch036
K. Spenser, L. Betts
Whilst researchers have defined face-to-face bullying to include elements of repetition, power imbalance, and intentional acts directed towards an individual, the definition and conceptualization of cyberbullying is more widely debated. Alongside arguing why researchers and practitioners should address cyberbullying, this chapter will review some of the unique aspects of cyberbullying that are central to this form of bullying. In particular, the chapter will consider the issues of anonymity, access, repetition, permanency, power, audience, and motivation. The chapter will also discuss how these issues can, in turn, influence how cyberbullying is conceptualized and the conclusions that can be drawn from research on cyberbullying. Finally, solutions and recommendations and future research in the area of cyberbullying will be presented.
{"title":"Defining and Conceptualizing Cyberbullying","authors":"K. Spenser, L. Betts","doi":"10.4018/978-1-5225-7368-5.ch036","DOIUrl":"https://doi.org/10.4018/978-1-5225-7368-5.ch036","url":null,"abstract":"Whilst researchers have defined face-to-face bullying to include elements of repetition, power imbalance, and intentional acts directed towards an individual, the definition and conceptualization of cyberbullying is more widely debated. Alongside arguing why researchers and practitioners should address cyberbullying, this chapter will review some of the unique aspects of cyberbullying that are central to this form of bullying. In particular, the chapter will consider the issues of anonymity, access, repetition, permanency, power, audience, and motivation. The chapter will also discuss how these issues can, in turn, influence how cyberbullying is conceptualized and the conclusions that can be drawn from research on cyberbullying. Finally, solutions and recommendations and future research in the area of cyberbullying will be presented.","PeriodicalId":52560,"journal":{"name":"Foundations and Trends in Human-Computer Interaction","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85857547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/978-1-5225-2255-3.CH576
Trevor J. Bihl, William A. Young II, G. Weckman
Despite the natural advantage humans have for recognizing and interpreting patterns, large and complex datasets, as in big data, preclude efficient human analysis. Artificial neural networks (ANNs) provide a family of pattern recognition approaches for prediction, clustering, and classification applicable to KDD with ANN model complexity ranging from simple (for small problems) to highly complex (for large issues). To provide a starting point for readers, this chapter first describes foundational concepts that relate to ANNs. A listing of commonly used ANN methods, heuristics, and criteria for initializing ANNs are then discussed. Common pre- and post-data processing methods for dimensionality reduction and data quality issues are then described. The authors then provide a tutorial example of ANN analysis. Finally, the authors list and describe applications of ANNs to specific business-related endeavors for further reading.
{"title":"Artificial Neural Networks and Their Applications in Business","authors":"Trevor J. Bihl, William A. Young II, G. Weckman","doi":"10.4018/978-1-5225-2255-3.CH576","DOIUrl":"https://doi.org/10.4018/978-1-5225-2255-3.CH576","url":null,"abstract":"Despite the natural advantage humans have for recognizing and interpreting patterns, large and complex datasets, as in big data, preclude efficient human analysis. Artificial neural networks (ANNs) provide a family of pattern recognition approaches for prediction, clustering, and classification applicable to KDD with ANN model complexity ranging from simple (for small problems) to highly complex (for large issues). To provide a starting point for readers, this chapter first describes foundational concepts that relate to ANNs. A listing of commonly used ANN methods, heuristics, and criteria for initializing ANNs are then discussed. Common pre- and post-data processing methods for dimensionality reduction and data quality issues are then described. The authors then provide a tutorial example of ANN analysis. Finally, the authors list and describe applications of ANNs to specific business-related endeavors for further reading.","PeriodicalId":52560,"journal":{"name":"Foundations and Trends in Human-Computer Interaction","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82810235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/978-1-5225-2255-3.CH015
M. Wasim, Fauzan Saeed, Abdul Aziz, A. Siddiqui
Raster-stereography is a 3D surface topography technique that provides height and curvature information of the subject. This is a non-contact, non-invasive, and radiation-free technique that is mostly used to analyze the back shape of a human body. The most practical aspect of raster-stereography is ease in its apparatus setup and reduced exposure to x-rays. Another very important and effective application is to identify the human faces that can be used in security domain. The problem of breaking lines was observed while traversing the distorted raster pattern on the human body. These breaks in raster pattern increased significantly when projected on the face. Computationally, it becomes difficult to extract all valid curvatures of the human face. This problem was resolved using a modified dotted raster, and the noise effect was reduced substantially. The dotted raster technique proved that it is by far the best option when compared with the conventional line grid.
{"title":"Dotted Raster-Stereography","authors":"M. Wasim, Fauzan Saeed, Abdul Aziz, A. Siddiqui","doi":"10.4018/978-1-5225-2255-3.CH015","DOIUrl":"https://doi.org/10.4018/978-1-5225-2255-3.CH015","url":null,"abstract":"Raster-stereography is a 3D surface topography technique that provides height and curvature information of the subject. This is a non-contact, non-invasive, and radiation-free technique that is mostly used to analyze the back shape of a human body. The most practical aspect of raster-stereography is ease in its apparatus setup and reduced exposure to x-rays. Another very important and effective application is to identify the human faces that can be used in security domain. The problem of breaking lines was observed while traversing the distorted raster pattern on the human body. These breaks in raster pattern increased significantly when projected on the face. Computationally, it becomes difficult to extract all valid curvatures of the human face. This problem was resolved using a modified dotted raster, and the noise effect was reduced substantially. The dotted raster technique proved that it is by far the best option when compared with the conventional line grid.","PeriodicalId":52560,"journal":{"name":"Foundations and Trends in Human-Computer Interaction","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83540930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/978-1-5225-7368-5.ch056
Alessio Drivet
Paul was a common octopus living in a public aquarium in Germany. It became internationally known during the World Cup in 2010 when it was used to “predict” the results of football games. Paul correctly predicted all the outcomes. What animal was better than an octopus, with its eight tentacles-tips, in lending itself to introduce non-deterministic phenomena? In the chapter, teachers who want to develop the theme “data and forecasts” find eight ideas. These ideas are supported by the use of artifacts, digital tools, and web resources.
{"title":"Eight Tips for the Theme “Data and Forecasts”","authors":"Alessio Drivet","doi":"10.4018/978-1-5225-7368-5.ch056","DOIUrl":"https://doi.org/10.4018/978-1-5225-7368-5.ch056","url":null,"abstract":"Paul was a common octopus living in a public aquarium in Germany. It became internationally known during the World Cup in 2010 when it was used to “predict” the results of football games. Paul correctly predicted all the outcomes. What animal was better than an octopus, with its eight tentacles-tips, in lending itself to introduce non-deterministic phenomena? In the chapter, teachers who want to develop the theme “data and forecasts” find eight ideas. These ideas are supported by the use of artifacts, digital tools, and web resources.","PeriodicalId":52560,"journal":{"name":"Foundations and Trends in Human-Computer Interaction","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73455945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/978-1-5225-7368-5.ch044
Ana Melro, Lídia Oliveira
For several years now, technology usage cannot be separated from screens. Examples include television, computer, smartphone, mobile phone, tablet, e-book reader, multimedia player (music and/or audio), camera and camcorder, watch, digital advertising public panels, virtual reality glasses. In fact, if the goal is to understand what can be considered a screen, the examples will not cease to increase. The major goal of the chapter is to explore the screen definition and the way in which it has emerged in society, in a cross way, almost without being noticed, but ubiquitously, even becoming inseparable from most of the necessary activities.
{"title":"Screen Culture","authors":"Ana Melro, Lídia Oliveira","doi":"10.4018/978-1-5225-7368-5.ch044","DOIUrl":"https://doi.org/10.4018/978-1-5225-7368-5.ch044","url":null,"abstract":"For several years now, technology usage cannot be separated from screens. Examples include television, computer, smartphone, mobile phone, tablet, e-book reader, multimedia player (music and/or audio), camera and camcorder, watch, digital advertising public panels, virtual reality glasses. In fact, if the goal is to understand what can be considered a screen, the examples will not cease to increase. The major goal of the chapter is to explore the screen definition and the way in which it has emerged in society, in a cross way, almost without being noticed, but ubiquitously, even becoming inseparable from most of the necessary activities.","PeriodicalId":52560,"journal":{"name":"Foundations and Trends in Human-Computer Interaction","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79726021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/978-1-5225-2255-3.CH592
G. Yasuda
This chapter deals with the design and implementation of bio-inspired control architectures for intelligent multiple mobile robot systems. Focusing on building control systems, this chapter presents a non-centralized, behavior-based methodology for autonomous cooperative control, inspired by the adaptive and self-organizing capabilities of biological systems, which can generate robust and complex behaviors through limited local interactions. With autonomous behavior modules for discrete event distributed control, a modular, Petri net-based behavioral control software has been implemented in accordance with a hierarchical distributed hardware structure. The behavior modules with respective pre-conditions and post-conditions can be dynamically connected in response to status events from action control modules at the lower level to achieve the specified overall task. The approach involving planning, control, and reactivity can integrate high-level command input with the behavior modules through the distributed autonomous control architecture.
{"title":"A Bio-Inspired, Distributed Control Approach to the Design of Autonomous Cooperative Behaviors in Multiple Mobile Robot Systems","authors":"G. Yasuda","doi":"10.4018/978-1-5225-2255-3.CH592","DOIUrl":"https://doi.org/10.4018/978-1-5225-2255-3.CH592","url":null,"abstract":"This chapter deals with the design and implementation of bio-inspired control architectures for intelligent multiple mobile robot systems. Focusing on building control systems, this chapter presents a non-centralized, behavior-based methodology for autonomous cooperative control, inspired by the adaptive and self-organizing capabilities of biological systems, which can generate robust and complex behaviors through limited local interactions. With autonomous behavior modules for discrete event distributed control, a modular, Petri net-based behavioral control software has been implemented in accordance with a hierarchical distributed hardware structure. The behavior modules with respective pre-conditions and post-conditions can be dynamically connected in response to status events from action control modules at the lower level to achieve the specified overall task. The approach involving planning, control, and reactivity can integrate high-level command input with the behavior modules through the distributed autonomous control architecture.","PeriodicalId":52560,"journal":{"name":"Foundations and Trends in Human-Computer Interaction","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77051586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/978-1-5225-2255-3.CH400
M. Véstias
IEEE-754 2008 has extended the standard with decimal floating-point arithmetic. Human-centric applications, like financial and commercial, depend on decimal arithmetic since the results must match exactly those obtained by human calculations without being subject to errors caused by decimal to binary conversions. Decimal multiplication is a fundamental operation utilized in many algorithms, and it is referred in the standard IEEE-754 2008. Decimal multiplication has an inherent difficulty associated with the representation of decimal numbers using a binary number system. Both bit and digit carries, as well as invalid results, must be considered in decimal multiplication in order to produce the correct result. This chapter focuses on algorithms for hardware implementation of decimal multiplication. Both decimal fixed-point and floating-point multiplication are described, including iterative and parallel solutions.
{"title":"Decimal Hardware Multiplier","authors":"M. Véstias","doi":"10.4018/978-1-5225-2255-3.CH400","DOIUrl":"https://doi.org/10.4018/978-1-5225-2255-3.CH400","url":null,"abstract":"IEEE-754 2008 has extended the standard with decimal floating-point arithmetic. Human-centric applications, like financial and commercial, depend on decimal arithmetic since the results must match exactly those obtained by human calculations without being subject to errors caused by decimal to binary conversions. Decimal multiplication is a fundamental operation utilized in many algorithms, and it is referred in the standard IEEE-754 2008. Decimal multiplication has an inherent difficulty associated with the representation of decimal numbers using a binary number system. Both bit and digit carries, as well as invalid results, must be considered in decimal multiplication in order to produce the correct result. This chapter focuses on algorithms for hardware implementation of decimal multiplication. Both decimal fixed-point and floating-point multiplication are described, including iterative and parallel solutions.","PeriodicalId":52560,"journal":{"name":"Foundations and Trends in Human-Computer Interaction","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77880460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/978-1-5225-2255-3.CH372
C. Duret
This chapter will propose an ontology of virtual environments that calls into question the dichotomy between the real and the virtual. This will draw on the concepts of trajectivity and “médiance” in order to describe the way virtual environments, with their technological and symbolic features, take part in the construction of human environments. This theoretical proposition will be illustrated with the analysis of Arcadia, a virtual environment built in Second Life. Finally, a meso-criticism will be proposed as a new approach for the study of virtual environments.
{"title":"The Trajectivity of Virtual Worlds","authors":"C. Duret","doi":"10.4018/978-1-5225-2255-3.CH372","DOIUrl":"https://doi.org/10.4018/978-1-5225-2255-3.CH372","url":null,"abstract":"This chapter will propose an ontology of virtual environments that calls into question the dichotomy between the real and the virtual. This will draw on the concepts of trajectivity and “médiance” in order to describe the way virtual environments, with their technological and symbolic features, take part in the construction of human environments. This theoretical proposition will be illustrated with the analysis of Arcadia, a virtual environment built in Second Life. Finally, a meso-criticism will be proposed as a new approach for the study of virtual environments.","PeriodicalId":52560,"journal":{"name":"Foundations and Trends in Human-Computer Interaction","volume":"77 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76312749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/978-1-5225-2255-3.CH596
S. Nisar, Osman Hasan
Minimally invasive surgery (MIS) has revolutionized the world of surgery. On one hand, it offered many revolutionary advantages; on the other hand, it proved to be a tedious and sophisticated technique for surgeons. Telesurgical robotics came forward to assist surgeons and made surgeries even further innovative, safer, and efficacious. Kinematic—a fundamental and foremost design step—acts as the lynchpin of performance of a surgical robot. It plays a decisive role and defines the capabilities and viability of a robot vis-à-vis its application. This chapter tries to understand the kinematic design approaches in practice so far and discusses their features and potential shortcomings. Some of the notable kinematic structures are explained in detail, and an all-inclusive consideration to the kinematic aspects of the existing designs has been given. Based on the key challenges identified, possible solutions are suggested, which is followed by future research directions and conclusion.
{"title":"Telesurgical Robotics and a Kinematic Perspective","authors":"S. Nisar, Osman Hasan","doi":"10.4018/978-1-5225-2255-3.CH596","DOIUrl":"https://doi.org/10.4018/978-1-5225-2255-3.CH596","url":null,"abstract":"Minimally invasive surgery (MIS) has revolutionized the world of surgery. On one hand, it offered many revolutionary advantages; on the other hand, it proved to be a tedious and sophisticated technique for surgeons. Telesurgical robotics came forward to assist surgeons and made surgeries even further innovative, safer, and efficacious. Kinematic—a fundamental and foremost design step—acts as the lynchpin of performance of a surgical robot. It plays a decisive role and defines the capabilities and viability of a robot vis-à-vis its application. This chapter tries to understand the kinematic design approaches in practice so far and discusses their features and potential shortcomings. Some of the notable kinematic structures are explained in detail, and an all-inclusive consideration to the kinematic aspects of the existing designs has been given. Based on the key challenges identified, possible solutions are suggested, which is followed by future research directions and conclusion.","PeriodicalId":52560,"journal":{"name":"Foundations and Trends in Human-Computer Interaction","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73642332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}