skip to main content
10.5555/1732323guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
SMC'09: Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
2009 Proceeding
Publisher:
  • IEEE Press
Conference:
San Antonio TX USA October 11 - 14, 2009
ISBN:
978-1-4244-2793-2
Published:
11 October 2009

Reflects downloads up to 01 Jan 2025Bibliometrics
Abstract

No abstract available.

Article
A haptic teleoperation study using wave variables and scaling matrices
Pages 1–5

A haptics investigation is conducted when human subjects have to deal with a bilateral teleoperation system with two levels of time delay (400 and 1,000 ms) and four types of scaling matrices that provide a passivity form of stabilization. The wave ...

Article
Omnidirectional robotic telepresence through augmented virtuality for increased situation awareness in hazardous environments
Pages 6–11

This paper proposes a novel low-cost robotic telepresence approach to situation awareness, initially aimed for hazardous environments. The robot supports omnidirectional movement, wide field of vision, haptic feedback and binaural sound. It is ...

Article
Compensating device inertia for 6-DOF haptic rendering
Pages 12–17

In this paper, the importance of the user's primary holding pivot point on the end effector of a haptic interface is discussed. Both theoretical analysis and experimental results demonstrate that this holding pivot point is critical for the correct ...

Article
Algorithm optimizations for low-complexity eye tracking
Pages 18–22

This paper investigates techniques for reducing computational complexity of tracking eyes of computer user. By empirical evaluation of a number of techniques we define a technology capable of monitoring eyes of computer user in real time with high ...

Article
Fuzzy virtual impedance controller in human-vehicle interaction
Pages 23–26

In the previous studies mechanical impedance has become well implement in the field of human-machine interaction. However, in human-vehicle interaction there is a variant environment when driving a vehicle, thus apart from interacting with human, ...

Article
Navigation in eight cardinal directions with pseudo-attraction force for the visually impaired
Pages 27–32

We have proposed a haptic direction indicator that will help visually impaired pedestrians to travel a path and avoid hazards areas intuitively and safely by means of force-based navigation. The haptic direction indicator uses the pseudoattraction force ...

Article
Target acquisition by a hands-free wireless tilt mouse
Pages 33–38

Today the effective use of computers (e.g. those with Internet browsers and graphical interfaces) involves the use of some sort of cursor control like what a mouse provides. However, a standard mouse is not always the best option for all users. There ...

Article
Predictive validity of wheelchair driving behavior for fine motor abilities: definition of input variables for an adaptive wheelchair system
Pages 39–44

This paper introduces an approach for dynamically adapting the level of automation of a wheelchair system on the basis of the current level of the user's motor abilities. For this purpose, a study is described, during which participants drove through a ...

Article
Towards a 2D tactile vocabulary for navigation of blind and visually impaired
Pages 45–51

In this paper we present research work towards a 2D tactile vocabulary for training visually impaired for their independent mobility. The vocabulary is associated to a 2D tactile array (vibration array), which is a part of a wearable navigation ...

Article
New computer protocol with subsensory stimulation and visual/auditory biofeedback for balance assessment in amputees
Pages 52–59

In this study, we hypothesized that the static standing weight bearing steadiness and dynamic walking weight shifting stability could be improved by providing neuromuscular facilitation using subeensory stimulation and visual-auditory biofeedback in ...

Article
Network intrusion detection using fuzzy class association rule mining based on genetic network programming
Pages 60–67

Computer Systems are exposed to an increasing number and type of security threats due to the expanding of internet in recent years. How to detect network intrusions effectively becomes an important techniques. This paper presents a novel fuzzy class ...

Article
Design of a lattice-based access control scheme
Pages 68–73

We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped ...

Article
Sh@re: negotiated audit in social networks
Pages 74–79

With the growth in the popularity of social networking sites like Facebook and MySpace, there is an increasing concern about privacy of content posted by users. Many users enter personal details about themselves but have poor understanding of theats ...

Article
Keystroke-based authentication by key press intervals as a complementary behavioral biometric
Pages 80–85

Analysis of keystroke dynamics can be useful in protecting personal data because an individual is authenticated not only by password, but also by that individual's keystroke patterns. In this way, intrusion becomes more difficult because the username/...

Article
Adapting to the data explosion: ensuring justice for all
Pages 86–90

The age of electronic information will continue to engender a technological evolution to which the efforts of human beings will have to adjust. In the legal realm in the United States, the time and costs associated with meeting a party's obligations to ...

Article
The centrality of user modeling to high recall with high precision search
Pages 91–96

The objective of Search is to find documents relevant to a particular user's notion of relevance. However, relevance is often a moving target: imperfectly defined and subject to change as more documents are seen. In this paper, we report on systematic ...

Article
Impedance matching of humans * machines in high-Q information retrieval systems
Pages 97–101

Treating the information retrieval (IR) task as one of classification has been shown to be the most effective way to achieve high performance. In real-world Systems, a human is the ultimate determinant of relevance and must be integrated symbiotically ...

Article
Replication and automation of expert judgments: information engineering in legal E-discovery
Pages 102–107

The retrieval of digital evidence responsive to discovery requests in civil litigation, known in the United States as "e-discovery," presents several important and understudied conditions and challenges. Among the most important of these are (i) that ...

Article
Human aided computer assessment for exhaustive search
Pages 108–112

Human-computer interaction has been proposed as a means for more effectively dealing with the challenges posed by information retrieval. However, within the hierarchy of information needs, certain kinds of needs are only poorly handled by existing ...

Article
Self-supervised learning by information enhancement: target-generating and spontaneous learning for competitive learning
Pages 113–119

In this paper, we propose a new self-supervised learning method for competitive learning as well as self-organizing maps. In this model, a network enhances its state by itself, and this enhanced state is to be imitated by another state of the network. ...

Article
An interactive evolutionary approach for content based image retrieval
Pages 120–125

Content Based Image Retrieval (CBIR) systems aim to provide a means to find pictures in large repositories without using any other information except its contents usually as low-level descriptors. Since these descriptors do not exactly match the high ...

Article
Design principle of two mass jumping system
Pages 126–130

In our previous research, we developed a jumping legged robot aiming at expansion of mobile robot's activities. In jumping motion, the velocity and mass of robot have large effect on jumping height and motion. In order to analyze the jumping motion, one-...

Article
The simulation of MRT transfer system based on bus holding strategies with platform constraints
Pages 131–136

This research aims at the bus holding strategies for the simulation of Mass Rapid Transit (MRT) transferring system in a terminal station with platform constraints for bus in the metropolitan area. We developed and evaluated the transfer system through ...

Article
Motion planning with obstacle avoidance for kinematically redundant manipulators based on two recurrent neural networks
Pages 137–142

Inverse kinematic motion planning of redundant manipulators by using recurrent neural networks in the presence of obstacles and uncertainties is a real-time nonlinear optimization problem. To tackle this problem, two subproblems should be resolved in ...

Article
Simulating inertial and centripetal forces for segmentation of overlapped handwritten digits
Pages 143–147

This paper presents a new algorithm for segmentation of overlapped cursive handwritten digits. Segmentation is a common issue for automatic character recognition. The work in digits is common in applications as bank check or postal code processing. Our ...

Article
A filtering algorithm for highly noisy images of brazilian ATM bank checks
Pages 148–152

This paper presents a new algorithm for filtering images of Brazilian bank checks. These images were generated by ATM machines and they present several kind of noise imposed by the digitization process. A new wavelet-based filtering algorithm is ...

Article
New formula for image reconstruction from projections by the 2-D paired transformation
Pages 153–156

To solve the problem of image reconstruction from projections, we describe an effective representation of the image by the paired transform which is a frequency and time representation of the image. We present a new effective formula for the inverse 2-D ...

Article
Two-view face recognition using bayesian fusion
Pages 157–162

Two-dimensional face recognition suffered from pose changes, while three-dimensional approaches are with high computational complexity. Motivated by this, a two-view face recognition system for digital home is presented in this paper. Besides the ...

Article
Charged active contour model
Pages 163–168

A novel, physical-based force, called as Lorentz force inspired by classical electrodynamics is introduced for the active contour models, and the truncation computing method of Lorentz Force is detailed. Several comparative results indicate that the new ...

Article
A comprehensive audio-visual corpus for teaching sound persian phoneme articulation
Pages 169–174

Building an audio-visual data corpus is one significant step in audio-visual research. One of the most challenging tasks in computer science is computer-aided speech therapy and language learning. Developing computer applications for training and ...

Index terms have been assigned to the content through auto-classification.

Recommendations