790 resultados para Perceived control
Resumo:
This paper proposes an efficient and online learning control system that uses the successful Model Predictive Control (MPC) method in a model based locally weighted learning framework. The new approach named Locally Weighted Learning Model Predictive Control (LWL-MPC) has been proposed as a solution to learn to control complex and nonlinear Elastic Joint Robots (EJR). Elastic Joint Robots are generally difficult to learn to control due to their elastic properties preventing standard model learning techniques from being used, such as learning computed torque control. This paper demonstrates the capability of LWL-MPC to perform online and incremental learning while controlling the joint positions of a real three Degree of Freedom (DoF) EJR. An experiment on a real EJR is presented and LWL-MPC is shown to successfully learn to control the system to follow two different figure of eight trajectories.
Resumo:
This paper presents a shared autonomy control scheme for a quadcopter that is suited for inspection of vertical infrastructure — tall man-made structures such as streetlights, electricity poles or the exterior surfaces of buildings. Current approaches to inspection of such structures is slow, expensive, and potentially hazardous. Low-cost aerial platforms with an ability to hover now have sufficient payload and endurance for this kind of task, but require significant human skill to fly. We develop a control architecture that enables synergy between the ground-based operator and the aerial inspection robot. An unskilled operator is assisted by onboard sensing and partial autonomy to safely fly the robot in close proximity to the structure. The operator uses their domain knowledge and problem solving skills to guide the robot in difficult to reach locations to inspect and assess the condition of the infrastructure. The operator commands the robot in a local task coordinate frame with limited degrees of freedom (DOF). For instance: up/down, left/right, toward/away with respect to the infrastructure. We therefore avoid problems of global mapping and navigation while providing an intuitive interface to the operator. We describe algorithms for pole detection, robot velocity estimation with respect to the pole, and position estimation in 3D space as well as the control algorithms and overall system architecture. We present initial results of shared autonomy of a quadrotor with respect to a vertical pole and robot performance is evaluated by comparing with motion capture data.
Resumo:
This paper details the progress to date, toward developing a small autonomous helicopter. We describe system architecture, avionics, visual state estimation, custom IMU design, aircraft modelling, as well as various linear and neuro/fuzzy control algorithms. Experimental results are presented for state estimation using fused stereo vision and IMU data, heading control, and attitude control. FAM attitude and velocity controllers have been shown to be effective in simulation.
Resumo:
The future emergence of many types of airborne vehicles and unpiloted aircraft in the national airspace means collision avoidance is of primary concern in an uncooperative airspace environment. The ability to replicate a pilot’s see and avoid capability using cameras coupled with vision based avoidance control is an important part of an overall collision avoidance strategy. But unfortunately without range collision avoidance has no direct way to guarantee a level of safety. Collision scenario flight tests with two aircraft and a monocular camera threat detection and tracking system were used to study the accuracy of image-derived angle measurements. The effect of image-derived angle errors on reactive vision-based avoidance performance was then studied by simulation. The results show that whilst large angle measurement errors can significantly affect minimum ranging characteristics across a variety of initial conditions and closing speeds, the minimum range is always bounded and a collision never occurs.
Resumo:
We investigated whether belief-based differences exist between students who have strong and weak intentions to integrate complementary and alternative therapy (CAT) into future psychology practice by recommending CAT or specific CAT practitioners to clients. A cross-sectional methodology was used. Psychology undergraduate students (N = 106) participated in a paper-based questionnaire design to explore their underlying beliefs related to CAT integration. The study was undertaken at a major university in Queensland, Australia. The theory of planned behaviour belief-based framework guided the study. Multivariate analyses of variance examined the influence of behavioural, normative, and control beliefs on the strong and weak intention groups. A multiple regression analysis investigated the relative importance of these belief sets for predicting intentions. We found that clear differences emerged between strong and weak intenders on behavioural and normative beliefs, but not control beliefs. Strong intenders perceived the positive outcomes of integrating CAT, such as being able to offer clients a more holistic practice and having confidence in the practitioners/practices, as more likely to occur than weak intenders, and perceived the negative outcome of compromising my professional practice as less likely. Strong in-tenders were more likely than weak intenders to perceive that a range of important referents (e.g., clients) would think they should integrate CAT. Results of the regression analysis revealed the same pattern of results in that behavioural and normative beliefs, but not control beliefs, significantly predicted intentions. The findings from this study can be used to inform policy and educational initiatives that aim to encourage CAT use in psychology practice.
Resumo:
Online travel reviews are emerging as a powerful source of information affecting tourists' pre-purchase evaluation of a hotel organization. This trend has highlighted the need for a greater understanding of the impact of online reviews on consumer attitudes and behaviors. In view of this need, we investigate the influence of online hotel reviews on consumers' attributions of service quality and firms' ability to control service delivery. An experimental design was used to examine the effects of four independent variables: framing; valence; ratings; and target. The results suggest that in reviews evaluating a hotel, remarks related to core services are more likely to induce positive service quality attributions. Recent reviews affect customers' attributions of controllability for service delivery, with negative reviews exerting an unfavorable influence on consumers' perceptions. The findings highlight the importance of managing the core service and the need for managers to act promptly in addressing customer service problems.
Resumo:
A long-running issue in appetite research concerns the influence of energy expenditure on energy intake. More than 50 years ago, Otto G. Edholm proposed that "the differences between the intakes of food [of individuals] must originate in differences in the expenditure of energy". However, a relationship between energy expenditure and energy intake within any one day could not be found, although there was a correlation over 2 weeks. This issue was never resolved before interest in integrative biology was replaced by molecular biochemistry. Using a psychobiological approach, we have studied appetite control in an energy balance framework using a multi-level experimental system on a single cohort of overweight and obese human subjects. This has disclosed relationships between variables in the domains of body composition [fat-free mass (FFM), fat mass (FM)], metabolism, gastrointestinal hormones, hunger and energy intake. In this Commentary, we review our own and other data, and discuss a new formulation whereby appetite control and energy intake are regulated by energy expenditure. Specifically, we propose that FFM (the largest contributor to resting metabolic rate), but not body mass index or FM, is closely associated with self-determined meal size and daily energy intake. This formulation has implications for understanding weight regulation and the management of obesity.
Resumo:
The Queensland Government has implemented strategies promoting a shift from individual car use to active transport, a transition which requires drivers to adapt to sharing the road with increased numbers of people cycling through transport network. For this to occur safely, changes in both road infrastructure and road user expectations and behaviors will be needed. Creating separate cycle infrastructure does not remove the need for cyclists to commence, cross or finish travel on shared roads. Currently intersections are one of the predominant shared road spaces where crashes result in cyclists being injured or killed. This research investigates how Brisbane cyclists and drivers perceive risk when interacting with other road users at intersections. The current study replicates a French study conducted by co-authors Chaurand and Delhomme in 2011 and extends it to assess gender effects which have been reported in other Australian cycling research. An online survey was administered to experienced cyclists and drivers. Participants rated the level of risk they felt when imagining a number of different road situations. Based on the earlier French study it is expected that perceived crash risk will be influenced both by the participant’s mode of travel and the type of interacting vehicle and perceived risk will be greater when the interaction is with a car than a bicycle. It is predicted that risk perception will decrease as the level of experience increases and that male participants will have a higher perception of skill and lower perception of risk than females. The findings of this Queensland study will provide a valuable insight into perceived risk and the traffic behaviours of drivers and cyclists when interacting with other road users and results will be available for presentation at the Congress.
Resumo:
Purpose: The effect of exercise on body mass is likely to be partially mediated through changes in appetite control. However, no studies have examined the effect of chronic exercise on obestatin and cholecystokinin (CCK) plasma concentrations or the sensitivity to detect differences in preload energy in obese individuals. The objective of this study was to investigate the effects of chronic exercise on 1) fasting and postprandial plasma concentrations of obestatin, CCK, leptin, and glucose insulinotropic peptide (GIP) and 2) the accuracy of energy compensation in response to covert preload manipulation. Methods: This study used a 12-wk supervised exercise program in 22 sedentary overweight/obese individuals. Fasting/postprandial plasma concentrations of obestatin, CCK, leptin, and GIP were assessed before and after the intervention. Energy compensation at a 30-min test meal after a high-energy (607 kcal) or a low-energy (246 kcal) preload and for the rest of the day (cumulative energy intake [EI]) was also measured. Results: There was a significant reduction in the plasma concentration of fasting plasma GIP and both fasting and postprandial leptin concentrations after the exercise intervention (P < 0.05 for all). No significant changes were observed for CCK or obestatin. A significant preload–exercise interaction (P = 0.011) was observed on cumulative EI and energy compensation for the same period (−87% ± 196% vs 68% ± 165%, P = 0.011). Weight loss (3.5 ± 1.4 kg, P < 0.0001) was not correlated with changes in energy compensation. Conclusions: This study suggests that exercise improves the accuracy of compensation for previous EI, independent of weight loss. Unexpectedly, and in contrast to GIP and leptin, exercise-induced weight loss had no effect on obestatin or CCK concentrations.
Resumo:
Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.
Resumo:
This article proposes an approach for real-time monitoring of risks in executable business process models. The approach considers risks in all phases of the business process management lifecycle, from process design, where risks are defined on top of process models, through to process diagnosis, where risks are detected during process execution. The approach has been realized via a distributed, sensor-based architecture. At design-time, sensors are defined to specify risk conditions which when fulfilled, are a likely indicator of negative process states (faults) to eventuate. Both historical and current process execution data can be used to compose such conditions. At run-time, each sensor independently notifies a sensor manager when a risk is detected. In turn, the sensor manager interacts with the monitoring component of a business process management system to prompt the results to process administrators who may take remedial actions. The proposed architecture has been implemented on top of the YAWL system, and evaluated through performance measurements and usability tests with students. The results show that risk conditions can be computed efficiently and that the approach is perceived as useful by the participants in the tests.
Resumo:
The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary. This thesis investigates issues of existing approaches to access control in allocating optimal level of access to users and proposes solutions in the form of new access control models. These issues are most evident when uncertainty surrounding users’ access needs, incentive to misuse and accountability are considered, hence the title of the thesis. We first analyse access control in environments where the administrator is unable to identify the users who may need access to resources. To resolve this uncertainty an administrative model with delegation support is proposed. Further, a detailed technical enforcement mechanism is introduced to ensure delegated resources cannot be misused. Then we explicitly consider that users are self-interested and capable of misusing resources if they choose to. We propose a novel game theoretic access control model to reason about and influence the factors that may affect users’ incentive to misuse. Next we study access control in environments where neither users’ access needs can be predicted nor they can be held accountable for misuse. It is shown that by allocating budget to users, a virtual currency through which they can pay for the resources they deem necessary, the need for a precise pre-allocation of permissions can be relaxed. The budget also imposes an upper-bound on users’ ability to misuse. A generalised budget allocation function is proposed and it is shown that given the context information the optimal level of budget for users can always be numerically determined. Finally, Role Based Access Control (RBAC) model is analysed under the explicit assumption of administrators’ uncertainty about self-interested users’ access needs and their incentives to misuse. A novel Budget-oriented Role Based Access Control (B-RBAC) model is proposed. The new model introduces the notion of users’ behaviour into RBAC and provides means to influence users’ incentives. It is shown how RBAC policy can be used to individualise the cost of access to resources and also to determine users’ budget. The implementation overheads of B-RBAC is examined and several low-cost sub-models are proposed.
Resumo:
This paper aims to inform design strategies for smart space technology to enhance libraries as environments for co-working and informal social learning. The focus is on understanding user motivations, behaviour, and activities in the library when there is no programmed agenda. The study analyses gathered data over five months of ethnographic research at ‘The Edge’ – a bookless library space at the State Library of Queensland in Brisbane, Australia, that is explicitly dedicated to co-working, social learning, peer collaboration, and creativity around digital culture and technology. The results present five personas that embody people’s main usage patterns as well as motivations, attitudes, and perceived barriers to social learning. It appears that most users work individually or within pre-organised groups, but usually do not make new connections with co-present, unacquainted users. Based on the personas, four hybrid design dimensions are suggested to improve the library as a social interface for shared learning encounters across physical and digital spaces. The findings in this paper offer actionable knowledge for managers, decision makers, and designers of technology-enhanced library spaces and similar collaboration and co-working spaces.
Resumo:
Several approaches have been introduced in the literature for active noise control (ANC) systems. Since the filtered-x least-mean-square (FxLMS) algorithm appears to be the best choice as a controller filter, researchers tend to improve performance of ANC systems by enhancing and modifying this algorithm. This paper proposes a new version of the FxLMS algorithm, as a first novelty. In many ANC applications, an on-line secondary path modeling method using white noise as a training signal is required to ensure convergence of the system. As a second novelty, this paper proposes a new approach for on-line secondary path modeling on the basis of a new variable-step-size (VSS) LMS algorithm in feed forward ANC systems. The proposed algorithm is designed so that the noise injection is stopped at the optimum point when the modeling accuracy is sufficient. In this approach, a sudden change in the secondary path during operation makes the algorithm reactivate injection of the white noise to re-adjust the secondary path estimate. Comparative simulation results shown in this paper indicate the effectiveness of the proposed approach in reducing both narrow-band and broad-band noise. In addition, the proposed ANC system is robust against sudden changes of the secondary path model.
Resumo:
This paper proposes a self-tuning feedforward active noise control (ANC) system with online secondary path modeling. The step-size parameters of the controller and modeling filters have crucial rule on the system performance. In literature, these parameters are adjusted by trial-and-error. In other words, they are manually initialized before system starting, which require performing extensive experiments to ensure the convergence of the system. Hence there is no guarantee that the system could perform well under different situations. In the proposed method, the appropriate values for the step-sizes are obtained automatically. Computer simulation results indicate the effectiveness of the proposed method.