12 resultados para networked robotics
em Aston University Research Archive
Resumo:
Dementia is one of the greatest contemporary health and social care challenges, and novel approaches to the care of its sufferers are needed. New information and communication technologies (ICT) have the potential to assist those caring for people with dementia, through access to networked information and support, tracking and surveillance. This article reports the views about such new technologies of 34 carers of people with dementia. We also held a group discussion with nine carers for respondent validation. The carers' actual use of new ICT was limited, although they thought a gradual increase in the use of networked technology in dementia care was inevitable but would bypass some carers who saw themselves as too old. Carers expressed a general enthusiasm for the benefits of ICT, but usually not for themselves, and they identified several key challenges including: establishing an appropriate balance between, on the one hand, privacy and autonomy and, on the other: maximising safety; establishing responsibility for and ownership of the equipment and who bears the costs; the possibility that technological help would mean a loss of valued personal contact; and the possibility that technology would substitute for existing services rather than be complementary. For carers and dementia sufferers to be supported, the expanding use of these technologies should be accompanied by intensive debate of the associated issues.
Resumo:
The CONNECT European project that started in February 2009 aims at dropping the interoperability barrier faced by today’s distributed systems. It does so by adopting a revolutionary approach to the seamless networking of digital systems, that is, synthesizing on the fly the connectors via which networked systems communicate.
Resumo:
This research investigates the general user interface problems in using networked services. Some of the problems are: users have to recall machine names and procedures to. invoke networked services; interactions with some of the services are by means of menu-based interfaces which are quite cumbersome to use; inconsistencies exist between the interfaces for different services because they were developed independently. These problems have to be removed so that users can use the services effectively. A prototype system has been developed to help users interact with networked services. This consists of software which gives the user an easy and consistent interface with the various services. The prototype is based on a graphical user interface and it includes the following appJications: Bath Information & Data Services; electronic mail; file editor. The prototype incorporates an online help facility to assist users using the system. The prototype can be divided into two parts: the user interface part that manages interactlon with the user; the communicatIon part that enables the communication with networked services to take place. The implementation is carried out using an object-oriented approach where both the user interface part and communication part are objects. The essential characteristics of object-orientation, - abstraction, encapsulation, inheritance and polymorphism - can all contribute to the better design and implementation of the prototype. The Smalltalk Model-View-Controller (MVC) methodology has been the framework for the construction of the prototype user interface. The purpose of the development was to study the effectiveness of users interaction to networked services. Having completed the prototype, tests users were requested to use the system to evaluate its effectiveness. The evaluation of the prototype is based on observation, i.e. observing the way users use the system and the opinion rating given by the users. Recommendations to improve further the prototype are given based on the results of the evaluation. based on the results of the evah:1ation. . .'. " "', ':::' ,n,<~;'.'
Resumo:
A survey of the existing state-of-the-art of turbine blade manufacture highlights two operations that have not been automated namely that of loading of a turbine blade into an encapsulation die, and that of removing a machined blade from the encapsulation block. The automation of blade decapsulation has not been pursued. In order to develop a system to automate the loading of an encapsulation die a prototype mechanical handling robot has been designed together with a computer controlled encapsulation die. The robot has been designed as a mechanical handling robot of cylindrical geometry, suitable for use in a circular work cell. It is the prototype for a production model to be called `The Cybermate'. The prototype robot is mechanically complete but due to unforeseen circumstances the robot control system is not available (the development of the control system did not form a part of this project), hence it has not been possible to fully test and assess the robot mechanical design. Robot loading of the encapsulation die has thus been simulated. The research work with regard to the encapsulation die has focused on the development of computer controlled, hydraulically actuated, location pins. Such pins compensate for the inherent positional inaccuracy of the loading robot and reproduce the dexterity of the human operator. Each pin comprises a miniature hydraulic cylinder, controlled by a standard bidirectional flow control valve. The precision positional control is obtained through pulsing of the valves under software control, with positional feedback from an 8-bit transducer. A test-rig comprising one hydraulic location pin together with an opposing spring loaded pin has demonstrated that such a pin arrangement can be controlled with a repeatability of +/-.00045'. In addition this test-rig has demonstrated that such a pin arrangement can be used to gauge and compensate for the dimensional error of the component held between the pins, by offsetting the pin datum positions to allow for the component error. A gauging repeatability of +/- 0.00015' was demonstrated. This work has led to the design and manufacture of an encapsulation die comprising ten such pins and the associated computer software. All aspects of the control software except blade gauging and positional data storage have been demonstrated. Work is now required to achieve the accuracy of control demonstrated by the single pin test-rig, with each of the ten pins in the encapsulation die. This would allow trials of the complete loading cycle to take place.
Resumo:
Book Review: Raymond E. Miles, Grant Miles and Charles C. Snow Collaborative Entrepreneurship: How Communities of Networked Firms Use Continuous Innovation to Create Economic Wealth, 2005, Palo Alto, CA: Stanford University Press 144 pages
Resumo:
In recent years, we have witnessed the mushrooming of pro- democracy and protest movements not only in the Arab world, but also within Europe and the Americas. Such movements have ranged from popular upheavals, like in Tunisia and Egypt, to the organization of large- scale demonstrations against unpopular policies, as in Spain, Greece and Poland. What connects these different events are not only their democratic aspirations, but also their innovative forms of communication and organization through online means, which are sometimes considered to be outside of the State’s control. At the same time, however, it has become more and more apparent that countries are attempting to increase their understanding of, and control over, their citizens’ actions in the digital sphere. This involves striving to develop surveillance instruments, control mechanisms and processes engineered to dominate the digital public sphere, which necessitates the assistance and support of private actors such as Internet intermediaries. Examples include the growing use of Internet surveillance technology with which online data traffic is analysed, and the extensive monitoring of social networks. Despite increased media attention, academic debate on the ambivalence of these technologies, mechanisms and techniques remains relatively limited, as is discussion of the involvement of corporate actors. The purpose of this edited volume is to reflect on how Internet-related technologies, mechanisms and techniques may be used as a means to enable expression, but also to restrict speech, manipulate public debate and govern global populaces.
Resumo:
The logic of ‘time’ in modern capitalist society appears to be a fixed concept. Time dictates human activity with a regularity, which as long ago as 1944, George Woodcock referred to as The Tyranny of the Clock. Seventy years on, Hartmut Rosa suggests humans no longer maintain speed to achieve something new, but simply to preserve the status quo, in a ‘social acceleration’ that is lethal to democracy. Political engagement takes time we no longer have, as we rush between our virtual spaces and ‘non-places’ of higher education. I suggest it’s time to confront the conspirators that, in partnership with the clock, accelerate our social engagements with technology in the context of learning. Through Critical Discourse Analysis (CDA) I reveal an alarming situation if we don’t. With reference to Bauman’s Liquid Modernity, I observe a ‘lightness’ in policy texts where humans have been ‘liquified’ Separating people from their own labour with technology in policy maintains the flow of speed a neoliberal economy demands. I suggest a new ‘solidity’ of human presence is required as we write about networked learning. ‘Writing ourselves back in’ requires a commitment to ‘be there’ in policy and provide arguments that decelerate the tyranny of time. I am though ever-mindful that social acceleration is also of our own making, and there is every possibility that we actually enjoy it.
Resumo:
This chapter explores how gentrifiers in Istanbul mobilise their social networks and social capital during the gentrification process, and how their networks are constructed through processes of “ place making” and belonging. In addition, this chapter aims to demonstrate how social capital and social networks work in practice during the gentrification process. It also examines place making and claiming strategies of gentrifiers by focusing on the following questions: (a) What are the spatial strategies of the new middle class, and what is the importance of these strategies?; (b) How are class and spatial boundaries designated in gentrified neighbourhoods?; (c) What kinds of networks and relationships play a role in developing certain housing dispositions or belonging patterns
Resumo:
This editorial provides an overview of the themes of network governance and content regulation that are expanded upon in the subsequent articles, identifying key issues and concerns that are prevalent in the literature in this field. In particular, this text considers governance not as an Internet-specific phenomenon, but as a global phenomenon, identifying and discussing literature pertaining to governance both online and offline, and providing examples of theories that seek to explain these forms of governance. Focusing on the interaction between public and private actors in content regulation, this editorial highlights that content regulation is a complex and contested issue that cannot be separated from its social and cultural contexts, and provides an overview of the articles contained.
Resumo:
In this paper, the problem of semantic place categorization in mobile robotics is addressed by considering a time-based probabilistic approach called dynamic Bayesian mixture model (DBMM), which is an improved variation of the dynamic Bayesian network. More specifically, multi-class semantic classification is performed by a DBMM composed of a mixture of heterogeneous base classifiers, using geometrical features computed from 2D laserscanner data, where the sensor is mounted on-board a moving robot operating indoors. Besides its capability to combine different probabilistic classifiers, the DBMM approach also incorporates time-based (dynamic) inferences in the form of previous class-conditional probabilities and priors. Extensive experiments were carried out on publicly available benchmark datasets, highlighting the influence of the number of time-slices and the effect of additive smoothing on the classification performance of the proposed approach. Reported results, under different scenarios and conditions, show the effectiveness and competitive performance of the DBMM.
Resumo:
Over the last decade, there has been a trend where water utility companies aim to make water distribution networks more intelligent in order to improve their quality of service, reduce water waste, minimize maintenance costs etc., by incorporating IoT technologies. Current state of the art solutions use expensive power hungry deployments to monitor and transmit water network states periodically in order to detect anomalous behaviors such as water leakage and bursts. However, more than 97% of water network assets are remote away from power and are often in geographically remote underpopulated areas, facts that make current approaches unsuitable for next generation more dynamic adaptive water networks. Battery-driven wireless sensor/actuator based solutions are theoretically the perfect choice to support next generation water distribution. In this paper, we present an end-to-end water leak localization system, which exploits edge processing and enables the use of battery-driven sensor nodes. Our system combines a lightweight edge anomaly detection algorithm based on compression rates and an efficient localization algorithm based on graph theory. The edge anomaly detection and localization elements of the systems produce a timely and accurate localization result and reduce the communication by 99% compared to the traditional periodic communication. We evaluated our schemes by deploying non-intrusive sensors measuring vibrational data on a real-world water test rig that have had controlled leakage and burst scenarios implemented.