Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 250.00Authors: Guangnan, Zhang | Tao, Hai | Rahman, Md Arafatur | Yao, Liu | AL-Saffar, Ahmed | Meng, Qiao | Liu, Wei | Yaseen, Zaher Mundher
Article Type: Research Article
Abstract: BACKGROUND: An isolated robot must take account of uncertainty in its world model and adapt its activities to take into account such as uncertainty. In the same way, a robot interaction with security and privacy issues (RISAPI) with people has to account for its confusion about the human internal state, as well as how this state will shift as humans respond to the robot. OBJECTIVES: This paper discusses RISAPI of our original work in the field, which shows how probabilistic planning and system theory algorithms in workplace robotic systems that work with people can allow for that reasoning …using a security robot system. The problem is a general way as an incomplete knowledge 2-player game. RESULTS: In this general framework, the various hypotheses and these contribute to thrilling and complex robot behavior through real-time interaction, which transforms actual human subjects into a spectrum of production systems, robots, and care facilities. CONCLUSION: The models of the internal human situation, in which robots can be designed efficiently, are limited, and achieve optimal computational intractability in large, high-dimensional spaces. To achieve this, versatile, lightweight portrayals of the human inner state and modern algorithms offer great hope for reasoning. Show more
Keywords: Inner state, complex robot, modern algorithms, spectrum
DOI: 10.3233/WOR-203421
Citation: Work, vol. 68, no. 3, pp. 871-879, 2021
Authors: Han, Meifeng | Zhang, Fuli | Ning, Ning | Zhou, Junwei | Shanthini, A. | Vivekananda, G.N.
Article Type: Research Article
Abstract: BACKGROUND: In recent years, several tracker systems have been developed to monitor a 3-dimensional skull position for facial action whereas, various tracker systems simultaneously analyze the single sequence of video, which can be provided with low-quality cameras and less security. Initially, implementing a 2-D face detector and an unrepentance system has been suggested; furthermore, it has been improved using an integrated 3-D face initialized scheme for the real-time tracker in the present face recognition systems. OBJECTIVES: To overcome the present setbacks of the conventional systems, Face Pose Detection assisted controlled FACE++ tool position of Three-Dimensional Robot (FPLF3D) has …been proposed in this article. Furthermore, the suggested proposed configuration has a high-end monitoring approach, which is used to improve the reliability of the robot’s human-machine contact in the workplace environment for security assistance. Additionally, the robot’s direction can be controlled by the operator’s head position assessment of the camera (or any active viewing system) using a three-dimensional robot. RESULTS: Besides, the applications that are imitated by headers like telepresence, computer-generated reality, and video competitions will directly take advantage of the strategies introduced in this paper. CONCLUSION: Finally, real video tests at the lab-scale level show the accuracy and usefulness of the approaches proposed in this research outperform the existing methods used for tracking. Show more
Keywords: 3D recognition robot, security enhancement, human-machine contact, security
DOI: 10.3233/WOR-203422
Citation: Work, vol. 68, no. 3, pp. 881-890, 2021
Authors: Zhang, Mengqi | Wang, Xi | Sathishkumar, V.E. | Sivakumar, V.
Article Type: Research Article
Abstract: BACKGROUND: Nowadays, the growth of smart cities is enhanced gradually, which collects a lot of information and communication technologies that are used to maximize the quality of services. Even though the intelligent city concept provides a lot of valuable services, security management is still one of the major issues due to shared threats and activities. For overcoming the above problems, smart cities’ security factors should be analyzed continuously to eliminate the unwanted activities that used to enhance the quality of the services. OBJECTIVES: To address the discussed problem, active machine learning techniques are used to predict the quality …of services in the smart city manages security-related issues. In this work, a deep reinforcement learning concept is used to learn the features of smart cities; the learning concept understands the entire activities of the smart city. During this energetic city, information is gathered with the help of security robots called cobalt robots. The smart cities related to new incoming features are examined through the use of a modular neural network. RESULTS: The system successfully predicts the unwanted activity in intelligent cities by dividing the collected data into a smaller subset, which reduces the complexity and improves the overall security management process. The efficiency of the system is evaluated using experimental analysis. CONCLUSION: This exploratory study is conducted on the 200 obstacles are placed in the smart city, and the introduced DRL with MDNN approach attains maximum results on security maintains. Show more
Keywords: Cobalt robots, deep reinforcement learning, modular neural network, safe environment
DOI: 10.3233/WOR-203423
Citation: Work, vol. 68, no. 3, pp. 891-902, 2021
Authors: Tao, Hai | Rahman, Md Arafatur | Jing, Wang | Li, Yafeng | Li, Jing | Al-Saffar, Ahmed | Zhang, Renrui | Salih, Sinan Q.
Article Type: Research Article
Abstract: BACKGROUND: Human-robot interaction (HRI) is becoming a current research field for providing granular real-time applications and services through physical observation. Robotic systems are designed to handle the roles of humans and assist them through intrinsic sensing and commutative interactions. These systems handle inputs from multiple sources, process them, and deliver reliable responses to the users without delay. Input analysis and processing is the prime concern for the robotic systems to understand and resolve the queries of the users. OBJECTIVES: In this manuscript, the Interaction Modeling and Classification Scheme (IMCS) is introduced to improve the accuracy of HRI. This …scheme consists of two phases, namely error classification and input mapping. In the error classification process, the input is analyzed for its events and conditional discrepancies to assign appropriate responses in the input mapping phase. The joint process is aided by a linear learning model to analyze the different conditions in the event and input detection. RESULTS: The performance of the proposed scheme shows that it is capable of improving the interaction accuracy by reducing the ratio of errors and interaction response by leveraging the information extraction from the discrete and successive human inputs. CONCLUSION: The fetched data are analyzed by classifying the errors at the initial stage to achieve reliable responses. Show more
Keywords: Linear processing, robotic systems, input mapping, interaction response, recognition
DOI: 10.3233/WOR-203424
Citation: Work, vol. 68, no. 3, pp. 903-912, 2021
Authors: Gong, Suning | Dinesh Jackson Samuel, R. | Pandian, Sanjeevi
Article Type: Research Article
Abstract: BACKGROUND: For campus workplace secure text mining, robotic assistance with feature optimization is essential. The space model of the vector is usually used to represent texts. Besides, there are still two drawbacks to this basic approach: the curse and lack of semantic knowledge. OBJECTIVES: This paper proposes a new Meta-Heuristic Feature Optimization (MHFO) method for data security in the campus workplace with robotic assistance. Firstly, the terms of the space vector model have been mapped to the concepts of data protection ontology, which statistically calculate conceptual frequency weights by term various weights. Furthermore, according to the designs of …data protection ontology, the weight of theoretical identification is allocated. The dimensionality of functional areas is reduced significantly by combining standard frequency weights and weights based on data protection ontology. In addition, semantic knowledge is integrated into this process. RESULTS: The results show that the development of the characteristics of this process significantly improves campus workplace secure text mining. CONCLUSION: The experimental results show that the development of the features of the concept hierarchy structure process significantly enhances data security of campus workplace text mining with robotic assistance. Show more
Keywords: Text mining, security, ontology, semantic knowledge
DOI: 10.3233/WOR-203425
Citation: Work, vol. 68, no. 3, pp. 913-922, 2021
Authors: Jing, Wang | Tao, Hai | Rahman, Md Arafatur | Kabir, Muhammad Nomani | Yafeng, Li | Zhang, Renrui | Salih, Sinan Q. | Zain, Jasni Mohamad
Article Type: Research Article
Abstract: BACKGROUND: Human-Computer Interaction (HCI) is incorporated with a variety of applications for input processing and response actions. Facial recognition systems in workplaces and security systems help to improve the detection and classification of humans based on the vision experienced by the input system. OBJECTIVES: In this manuscript, the Robotic Facial Recognition System using the Compound Classifier (RERS-CC) is introduced to improve the recognition rate of human faces. The process is differentiated into classification, detection, and recognition phases that employ principal component analysis based learning. In this learning process, the errors in image processing based on the extracted different …features are used for error classification and accuracy improvements. RESULTS: The performance of the proposed RERS-CC is validated experimentally using the input image dataset in MATLAB tool. The performance results show that the proposed method improves detection and recognition accuracy with fewer errors and processing time. CONCLUSION: The input image is processed with the knowledge of the features and errors that are observed with different orientations and time instances. With the help of matching dataset and the similarity index verification, the proposed method identifies precise human face with augmented true positives and recognition rate. Show more
Keywords: Feature extraction, machine learning, HCI, classifier, processing time
DOI: 10.3233/WOR-203426
Citation: Work, vol. 68, no. 3, pp. 923-934, 2021
Authors: Zhang, Guangnan | Jing, Wang | Tao, Hai | Rahman, Md Arafatur | Salih, Sinan Q. | AL-Saffar, Ahmed | Zhang, Renrui
Article Type: Research Article
Abstract: BACKGROUND: Human-Robot Interaction (HRI) has become a prominent solution to improve the robustness of real-time service provisioning through assisted functions for day-to-day activities. The application of the robotic system in security services helps to improve the precision of event detection and environmental monitoring with ease. OBJECTIVES: This paper discusses activity detection and analysis (ADA) using security robots in workplaces. The application scenario of this method relies on processing image and sensor data for event and activity detection. The events that are detected are classified for its abnormality based on the analysis performed using the sensor and image data …operated using a convolution neural network. This method aims to improve the accuracy of detection by mitigating the deviations that are classified in different levels of the convolution process. RESULTS: The differences are identified based on independent data correlation and information processing. The performance of the proposed method is verified for the three human activities, such as standing, walking, and running, as detected using the images and sensor dataset. CONCLUSION: The results are compared with the existing method for metrics accuracy, classification time, and recall. Show more
Keywords: Monitoring, convolution neural networks, event detection, HRI, sensor data processing
DOI: 10.3233/WOR-203427
Citation: Work, vol. 68, no. 3, pp. 935-943, 2021
Authors: Chen, Long | Sivaparthipan, C.B. | Rajendiran, Sowmipriya
Article Type: Research Article
Abstract: BACKGROUND: In recent years, social media have filtered our life both in the professional and personal aspects. Currently, most of us suffer from poor quality of thinking, which is due to the impact of social media towards our lives, particularly in the health care arena. OBJECTIVES: In this article, cultural tension due to social media creates an unwanted risk to the youngsters and others with sleep deprivation. They become dependent on staying dynamic via social networking sites media all the time. As indicated by an ongoing report, there is a reliable connection between the measure of time spent …via web-based networking media and depression among youthful grown-ups, which creates unprofessional problems and potential healthcare risk in individuals due to the usage of social media. RESULTS: This article speaks about the research gap and possible risks reforming strategies on healthcare communication in social media through statistical analysis. CONCLUSION: The experimental validation of case studies shows prominent solutions that have not been addressed in traditional methods. Show more
Keywords: Dynamic system, statistical analysis, health issues, data collection, social media
DOI: 10.3233/WOR-203428
Citation: Work, vol. 68, no. 3, pp. 945-953, 2021
Authors: Pingli, Duan | Muthu, Bala Anand | Kadry, Seifedine Nimer
Article Type: Research Article
Abstract: BACKGROUND: The manufacturing industry undergoes a new age, with significant changes taking place on several fronts. Companies devoted to digital transformation take their future plants inspired by the Internet of Things (IoT). The IoT is a worldwide network of interrelated physical devices, which is an essential component of the internet, including sensors, actuators, smart apps, computers, mechanical machines, and people. The effective allocation of the computing resources and the carrier is critical in the Industrial Internet of Things (IIoT) for smart production systems. Indeed, the existing assignment method in the smart production system cannot guarantee that resources meet the inherently …complex and volatile requirements of the user are timely. Many research results on resource allocations in auction formats which have been implemented to consider the demand and real-time supply for smart development resources, but safety privacy and trust estimation issues related to these outcomes are not actively discussed. OBJECTIVES: The paper proposes a Hierarchical Trustful Resource Assignment (HTRA) and Trust Computing Algorithm (TCA) based on Vickrey Clarke-Groves (VGCs) in the computer carriers necessary resources to communicate wirelessly among IIoT devices and gateways, and the allocation of CPU resources for processing information at the CPC. RESULTS: Finally, experimental findings demonstrate that when the IIoT equipment and gateways are valid, the utilities of each participant are improved. CONCLUSION: This is an easy and powerful method to guarantee that intelligent manufacturing components genuinely work for their purposes, which want to integrate each element into a system without interactions with each other. Show more
Keywords: Safety, privacy, trustfulness, VGC’s, IoT, CPU
DOI: 10.3233/WOR-203429
Citation: Work, vol. 68, no. 3, pp. 955-965, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]