Search results

1 – 10 of 63
Article
Publication date: 9 May 2024

Anna Korotysheva and Sergey Zhukov

This study aims to comprehensively address the challenge of delineating traffic scenarios in video footage captured by an embedded camera within an autonomous vehicle.

Abstract

Purpose

This study aims to comprehensively address the challenge of delineating traffic scenarios in video footage captured by an embedded camera within an autonomous vehicle.

Design/methodology/approach

This methodology involves systematically elucidating the traffic context by leveraging data from the object recognition subsystem embedded in vehicular road infrastructure. A knowledge base containing production rules and logical inference mechanism was developed. These components enable real-time procedures for describing traffic situations.

Findings

The production rule system focuses on semantically modeling entities that are categorized as traffic lights and road signs. The effectiveness of the methodology was tested experimentally using diverse image datasets representing various meteorological conditions. A thorough analysis of the results was conducted, which opens avenues for future research.

Originality/value

Originality lies in the potential integration of the developed methodology into an autonomous vehicle’s control system, working alongside other procedures that analyze the current situation. These applications extend to driver assistance systems, harmonized with augmented reality technology, and enhance human decision-making processes.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 14 November 2022

Abdul Hannan Qureshi, Wesam Salah Alaloul, Wong Kai Wing, Syed Saad, Khalid Mhmoud Alzubi and Muhammad Ali Musarat

Rebar is the prime component of reinforced concrete structures, and rebar monitoring is a time-consuming and technical job. With the emergence of the fourth industrial revolution…

Abstract

Purpose

Rebar is the prime component of reinforced concrete structures, and rebar monitoring is a time-consuming and technical job. With the emergence of the fourth industrial revolution, the construction industry practices have evolved toward digitalization. Still, hesitation remains among stakeholders toward the adoption of advanced technologies and one of the significant reasons is the unavailability of knowledge frameworks and implementation guidelines. This study aims to investigate technical factors impacting automated monitoring of rebar for the understanding, confidence gain and effective implementation by construction industry stakeholders.

Design/methodology/approach

A structured study pipeline has been adopted, which includes a systematic literature collection, semistructured interviews, pilot survey, questionnaire survey and statistical analyses via merging two techniques, i.e. structural equation modeling and relative importance index.

Findings

The achieved model highlights “digital images” and “scanning” as two main categories being adopted for automated rebar monitoring. Moreover, “external influence”, “data-capturing”, “image quality”, and “environment” have been identified as the main factors under “digital images”. On the other hand, “object distance”, “rebar shape”, “occlusion” and “rebar spacing” have been highlighted as the main contributing factors under “scanning”.

Originality/value

The study provides a base guideline for the construction industry stakeholders to gain confidence in automated monitoring of rebar via vision-based technologies and effective implementation of the progress-monitoring processes. This study, via structured data collection, performed qualitative and quantitative analyses to investigate technical factors for effective rebar monitoring via vision-based technologies in the form of a mathematical model.

Details

Construction Innovation , vol. 24 no. 3
Type: Research Article
ISSN: 1471-4175

Keywords

Open Access
Article
Publication date: 18 April 2024

Joseph Nockels, Paul Gooding and Melissa Terras

This paper focuses on image-to-text manuscript processing through Handwritten Text Recognition (HTR), a Machine Learning (ML) approach enabled by Artificial Intelligence (AI)…

Abstract

Purpose

This paper focuses on image-to-text manuscript processing through Handwritten Text Recognition (HTR), a Machine Learning (ML) approach enabled by Artificial Intelligence (AI). With HTR now achieving high levels of accuracy, we consider its potential impact on our near-future information environment and knowledge of the past.

Design/methodology/approach

In undertaking a more constructivist analysis, we identified gaps in the current literature through a Grounded Theory Method (GTM). This guided an iterative process of concept mapping through writing sprints in workshop settings. We identified, explored and confirmed themes through group discussion and a further interrogation of relevant literature, until reaching saturation.

Findings

Catalogued as part of our GTM, 120 published texts underpin this paper. We found that HTR facilitates accurate transcription and dataset cleaning, while facilitating access to a variety of historical material. HTR contributes to a virtuous cycle of dataset production and can inform the development of online cataloguing. However, current limitations include dependency on digitisation pipelines, potential archival history omission and entrenchment of bias. We also cite near-future HTR considerations. These include encouraging open access, integrating advanced AI processes and metadata extraction; legal and moral issues surrounding copyright and data ethics; crediting individuals’ transcription contributions and HTR’s environmental costs.

Originality/value

Our research produces a set of best practice recommendations for researchers, data providers and memory institutions, surrounding HTR use. This forms an initial, though not comprehensive, blueprint for directing future HTR research. In pursuing this, the narrative that HTR’s speed and efficiency will simply transform scholarship in archives is deconstructed.

Open Access
Article
Publication date: 26 April 2024

Adela Sobotkova, Ross Deans Kristensen-McLachlan, Orla Mallon and Shawn Adrian Ross

This paper provides practical advice for archaeologists and heritage specialists wishing to use ML approaches to identify archaeological features in high-resolution satellite…

Abstract

Purpose

This paper provides practical advice for archaeologists and heritage specialists wishing to use ML approaches to identify archaeological features in high-resolution satellite imagery (or other remotely sensed data sources). We seek to balance the disproportionately optimistic literature related to the application of ML to archaeological prospection through a discussion of limitations, challenges and other difficulties. We further seek to raise awareness among researchers of the time, effort, expertise and resources necessary to implement ML successfully, so that they can make an informed choice between ML and manual inspection approaches.

Design/methodology/approach

Automated object detection has been the holy grail of archaeological remote sensing for the last two decades. Machine learning (ML) models have proven able to detect uniform features across a consistent background, but more variegated imagery remains a challenge. We set out to detect burial mounds in satellite imagery from a diverse landscape in Central Bulgaria using a pre-trained Convolutional Neural Network (CNN) plus additional but low-touch training to improve performance. Training was accomplished using MOUND/NOT MOUND cutouts, and the model assessed arbitrary tiles of the same size from the image. Results were assessed using field data.

Findings

Validation of results against field data showed that self-reported success rates were misleadingly high, and that the model was misidentifying most features. Setting an identification threshold at 60% probability, and noting that we used an approach where the CNN assessed tiles of a fixed size, tile-based false negative rates were 95–96%, false positive rates were 87–95% of tagged tiles, while true positives were only 5–13%. Counterintuitively, the model provided with training data selected for highly visible mounds (rather than all mounds) performed worse. Development of the model, meanwhile, required approximately 135 person-hours of work.

Research limitations/implications

Our attempt to deploy a pre-trained CNN demonstrates the limitations of this approach when it is used to detect varied features of different sizes within a heterogeneous landscape that contains confounding natural and modern features, such as roads, forests and field boundaries. The model has detected incidental features rather than the mounds themselves, making external validation with field data an essential part of CNN workflows. Correcting the model would require refining the training data as well as adopting different approaches to model choice and execution, raising the computational requirements beyond the level of most cultural heritage practitioners.

Practical implications

Improving the pre-trained model’s performance would require considerable time and resources, on top of the time already invested. The degree of manual intervention required – particularly around the subsetting and annotation of training data – is so significant that it raises the question of whether it would be more efficient to identify all of the mounds manually, either through brute-force inspection by experts or by crowdsourcing the analysis to trained – or even untrained – volunteers. Researchers and heritage specialists seeking efficient methods for extracting features from remotely sensed data should weigh the costs and benefits of ML versus manual approaches carefully.

Social implications

Our literature review indicates that use of artificial intelligence (AI) and ML approaches to archaeological prospection have grown exponentially in the past decade, approaching adoption levels associated with “crossing the chasm” from innovators and early adopters to the majority of researchers. The literature itself, however, is overwhelmingly positive, reflecting some combination of publication bias and a rhetoric of unconditional success. This paper presents the failure of a good-faith attempt to utilise these approaches as a counterbalance and cautionary tale to potential adopters of the technology. Early-majority adopters may find ML difficult to implement effectively in real-life scenarios.

Originality/value

Unlike many high-profile reports from well-funded projects, our paper represents a serious but modestly resourced attempt to apply an ML approach to archaeological remote sensing, using techniques like transfer learning that are promoted as solutions to time and cost problems associated with, e.g. annotating and manipulating training data. While the majority of articles uncritically promote ML, or only discuss how challenges were overcome, our paper investigates how – despite reasonable self-reported scores – the model failed to locate the target features when compared to field data. We also present time, expertise and resourcing requirements, a rarity in ML-for-archaeology publications.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 16 February 2022

Pragati Agarwal, Sanjeev Swami and Sunita Kumari Malhotra

The purpose of this paper is to give an overview of artificial intelligence (AI) and other AI-enabled technologies and to describe how COVID-19 affects various industries such as…

3642

Abstract

Purpose

The purpose of this paper is to give an overview of artificial intelligence (AI) and other AI-enabled technologies and to describe how COVID-19 affects various industries such as health care, manufacturing, retail, food services, education, media and entertainment, banking and insurance, travel and tourism. Furthermore, the authors discuss the tactics in which information technology is used to implement business strategies to transform businesses and to incentivise the implementation of these technologies in current or future emergency situations.

Design/methodology/approach

The review provides the rapidly growing literature on the use of smart technology during the current COVID-19 pandemic.

Findings

The 127 empirical articles the authors have identified suggest that 39 forms of smart technologies have been used, ranging from artificial intelligence to computer vision technology. Eight different industries have been identified that are using these technologies, primarily food services and manufacturing. Further, the authors list 40 generalised types of activities that are involved including providing health services, data analysis and communication. To prevent the spread of illness, robots with artificial intelligence are being used to examine patients and give drugs to them. The online execution of teaching practices and simulators have replaced the classroom mode of teaching due to the epidemic. The AI-based Blue-dot algorithm aids in the detection of early warning indications. The AI model detects a patient in respiratory distress based on face detection, face recognition, facial action unit detection, expression recognition, posture, extremity movement analysis, visitation frequency detection, sound pressure detection and light level detection. The above and various other applications are listed throughout the paper.

Research limitations/implications

Research is largely delimited to the area of COVID-19-related studies. Also, bias of selective assessment may be present. In Indian context, advanced technology is yet to be harnessed to its full extent. Also, educational system is yet to be upgraded to add these technologies potential benefits on wider basis.

Practical implications

First, leveraging of insights across various industry sectors to battle the global threat, and smart technology is one of the key takeaways in this field. Second, an integrated framework is recommended for policy making in this area. Lastly, the authors recommend that an internet-based repository should be developed, keeping all the ideas, databases, best practices, dashboard and real-time statistical data.

Originality/value

As the COVID-19 is a relatively recent phenomenon, such a comprehensive review does not exist in the extant literature to the best of the authors’ knowledge. The review is rapidly emerging literature on smart technology use during the current COVID-19 pandemic.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Book part
Publication date: 23 April 2024

Kaneez Masoom, Anchal Rastogi and Shad Ahmad Khan

Knowledge management (KM) is an important topic in the age of big data, and this study adds to the existing body of literature by providing a novel KM perspective on the…

Abstract

Knowledge management (KM) is an important topic in the age of big data, and this study adds to the existing body of literature by providing a novel KM perspective on the technological phenomenon of artificial intelligence (AI). This study aims to discover how AI might facilitate knowledge-based business-to-business (B2B) marketing. In this chapter, the authors take a close look at the building blocks of AI and the relationships between them. Future research directions and also the effects of the various market information building components on B2B marketing are discussed. The study’s approach is theoretical; it tries to provide a framework for characterising the phenomenon of AI and its constituent parts. Additionally, this chapter provides a methodical analysis of the three categories of market information crucial to B2B marketing: knowledge of customers, knowledge of users, and knowledge of external markets. This research looks at AI through the lens of the conventional data processing framework, analysing the six pillars upon which AI systems are founded. It also explained how the framework’s components work together to transform data into actionable information. In this chapter, the authors will look at how AI works and how it can benefit B2B knowledge-based marketing. It’s not aimed at AI experts but rather at general marketing managers. In this chapter, the possible effects of AI on B2B marketing are discussed using examples from the real world.

Details

Digital Influence on Consumer Habits: Marketing Challenges and Opportunities
Type: Book
ISBN: 978-1-80455-343-5

Keywords

Article
Publication date: 30 April 2024

Baoxu Tu, Yuanfei Zhang, Kang Min, Fenglei Ni and Minghe Jin

This paper aims to estimate contact location from sparse and high-dimensional soft tactile array sensor data using the tactile image. The authors used three feature extraction…

Abstract

Purpose

This paper aims to estimate contact location from sparse and high-dimensional soft tactile array sensor data using the tactile image. The authors used three feature extraction methods: handcrafted features, convolutional features and autoencoder features. Subsequently, these features were mapped to contact locations through a contact location regression network. Finally, the network performance was evaluated using spherical fittings of three different radii to further determine the optimal feature extraction method.

Design/methodology/approach

This paper aims to estimate contact location from sparse and high-dimensional soft tactile array sensor data using the tactile image.

Findings

This research indicates that data collected by probes can be used for contact localization. Introducing a batch normalization layer after the feature extraction stage significantly enhances the model’s generalization performance. Through qualitative and quantitative analyses, the authors conclude that convolutional methods can more accurately estimate contact locations.

Originality/value

The paper provides both qualitative and quantitative analyses of the performance of three contact localization methods across different datasets. To address the challenge of obtaining accurate contact locations in quantitative analysis, an indirect measurement metric is proposed.

Details

Industrial Robot: the international journal of robotics research and application, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

20

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. 30 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 9 February 2024

Xiaoqing Zhang, Genliang Xiong, Peng Yin, Yanfeng Gao and Yan Feng

To ensure the motion attitude and stable contact force of massage robot working on unknown human tissue environment, this study aims to propose a robotic system for autonomous…

Abstract

Purpose

To ensure the motion attitude and stable contact force of massage robot working on unknown human tissue environment, this study aims to propose a robotic system for autonomous massage path planning and stable interaction control.

Design/methodology/approach

First, back region extraction and acupoint recognition based on deep learning is proposed, which provides a basis for determining the working area and path points of the robot. Second, to realize the standard approach and movement trajectory of the expert massage, 3D reconstruction and path planning of the massage area are performed, and normal vectors are calculated to control the normal orientation of robot-end. Finally, to cope with the soft and hard changes of human tissue state and body movement, an adaptive force tracking control strategy is presented to compensate the uncertainty of environmental position and tissue hardness online.

Findings

Improved network model can accomplish the acupoint recognition task with a large accuracy and integrate the point cloud to generate massage trajectories adapted to the shape of the human body. Experimental results show that the adaptive force tracking control can obtain a relatively smooth force, and the error is basically within ± 0.2 N during the online experiment.

Originality/value

This paper incorporates deep learning, 3D reconstruction and impedance control, the robot can understand the shape features of the massage area and adapt its planning massage path to carry out a stable and safe force tracking control during dynamic robot–human contact.

Details

Industrial Robot: the international journal of robotics research and application, vol. 51 no. 3
Type: Research Article
ISSN: 0143-991X

Keywords

Book part
Publication date: 21 May 2024

Muhammad Shujaat Mubarik and Sharfuddin Ahmed Khan

Digital technologies (DTs) have emerged as a major driving force, transmuting the ways Supply Chains (SCs) are managed. The integration of DTs in supply chain management (SCM)…

Abstract

Digital technologies (DTs) have emerged as a major driving force, transmuting the ways Supply Chains (SCs) are managed. The integration of DTs in supply chain management (SCM), Digital Supply Chain Management (DSCM), has fundamentally reshaped the SCM landscape, offering new opportunities and challenges for organizations. This chapter provides a comprehensive overview of modern DTs and the way they impact modern SCM. This chapter has twofold objectives. First, it illustrates the major changes that DTs have brought to the supply chain landscape, unraveling their multifaceted implications. Second, it offers readers a deeper and comprehensive understanding of the challenges and opportunities arising from the incorporation of DTs into supply chains. By going through the chapter, readers will be able to have a comprehensive grasp of how DTs are reshaping SCM and how organizations can survive and thrive in the digital age. This chapter commences by shedding light on how DTs have and continue to redefine SCM, improving supply chain resilience, visibility, and sustainability in an increasingly complex and interconnected world. It also highlights the role of DTs in enhancing SC visibility, agility, and customer-centricity. Furthermore, this chapter briefly highlights the challenges related to the adoption (pre and post) of DTs in SCM, elucidating on issues related to talent acquisition, data security, and regulatory compliance. It also highlights the ethical and societal implications of this digital transformation, emphasizing the significance of responsible and sustainable practices. This chapter, with the help of three cases, illustrates how the adoption of DTs in SC can impact the various SC performance indicators.

Details

The Theory, Methods and Application of Managing Digital Supply Chains
Type: Book
ISBN: 978-1-80455-968-0

Keywords

1 – 10 of 63