Search results

1 – 10 of 468
Article
Publication date: 28 August 2007

Hai Chao Li, Hong Ming Gao and Lin Wu

This paper aims to develop a performing approach for telerobotic arc welding in an unstructured environment.

Abstract

Purpose

This paper aims to develop a performing approach for telerobotic arc welding in an unstructured environment.

Design/methodology/approach

A teleteaching approach is presented for an arc welding telerobotic system in an unstructured environment. Improved laser vision sensor enhances the precision of teleteaching welding seam. Stereoscopic vision display system is developed to provide the perception information of remote environment that increased the dexterity of the teleteaching process. Operator interacts with the system by welding multi‐modal human‐machine interface, which integrated the teleteaching operation window, status display window and space mouse.

Findings

The sensor‐based teleteaching approach, which integrated laser vision sensing and stereoscopic vision display, can perform arc welding of most welding seam trajectory in an unstructured environment. The approach releases the payload of human operator and improves adaptability of the arc welding system.

Research limitations/implications

The paper provides the remote welding telerobotic approach that is gentle to most unstructured environments.

Practical implications

The sensor‐based teleteaching approach provides the capability of a telerobotic system used in remote welding field, which can shorten the incident response time and maintenance period of nuclear plants, space and underwater.

Originality/value

This paper introduces the sensor‐based teleteaching concept and performing procedure to be used for remote telerobotic arc welding.

Details

Industrial Robot: An International Journal, vol. 34 no. 5
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 8 June 2010

Ting‐Yi Chang, Yu‐Ju Yang and Chun‐Cheng Peng

In keystroke‐based authentication systems, an input device to enter a password is needed. Users are verified by checking the validity of the password and typing characteristics…

1824

Abstract

Purpose

In keystroke‐based authentication systems, an input device to enter a password is needed. Users are verified by checking the validity of the password and typing characteristics. However, some devices have no standard desktop keyboard such as personal digital assistants and mobile phones. With these types of electronics, the system cannot successfully work in the authentication phase while the registration process is implemented based on a computer keyboard. This results in a reduction of system portability. The purpose of this paper is to employ the rhythm clicked by a mouse as another identifiable factor to authenticate a user's identity.

Design/methodology/approach

Mouse click can be replaced by a stylus and fingers on touch screens or numeral buttons on mobile phones. A total of 25 users participated and the click data are based on time instances of pressing and releasing the mouse button, which are captured while the user clicks a rhythm. Three features are calculated using these click data, and a reasonable amount of results with neural networks and other classifiers shows the click characteristics are able to function as another identifiable factor.

Findings

A reasonable amount of results with neural networks and other classifiers shows the click characteristics are able to function as another identifiable factor.

Originality/value

The paper presents a personalized rhythm click‐based authentication system.

Details

Information Management & Computer Security, vol. 18 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 December 2003

Nasr Eddine Debbache

The growing density in air traffic and the consequential increase in the workload of air traffic controllers generates the need for a constant evaluation of the existing…

Abstract

The growing density in air traffic and the consequential increase in the workload of air traffic controllers generates the need for a constant evaluation of the existing capabilities of control systems. A possible solution to this issue would consist in recommending a new organisation of the control unit. In this work, we limit ourselves to the presentation and evaluation of the “Interface Dialogue Contrôleur”: electronic stripping interface. This interface is suggested as a replacement for strip papers, which are information supports on planes that transit in specific sectors. An evaluation of this interface will be presented at the end of the paper.

Details

Aircraft Engineering and Aerospace Technology, vol. 75 no. 6
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 1 April 1992

Nancy Melin Nelson

PROTEX™ Keyboarding System Fights Carpal Tunnel Syndrome. Carpal tunnel syndrome (CTS) currently costs U.S. employers in excess of $27 billion annually in absenteeism and worker's…

Abstract

PROTEX™ Keyboarding System Fights Carpal Tunnel Syndrome. Carpal tunnel syndrome (CTS) currently costs U.S. employers in excess of $27 billion annually in absenteeism and worker's compensation claims, and is deemed by many experts as the major occupational hazard of the information age. CTS occurs when the nerve and tendons in the carpal tunnel (inside the wrist) are compressed by awkward and forceful hand movements. The symptoms of CTS are numbness, tingling, and pain in the hands and fingers.

Details

Academic and Library Computing, vol. 9 no. 4
Type: Research Article
ISSN: 1055-4769

Article
Publication date: 20 September 2022

Wanyu Pei, Tian Tian Sky Lo and Xiangmin Guo

Ancient Chinese architecture is famous for its wooden frame structure and unique position in world architecture history. As numerous types of components and complex combinations…

Abstract

Purpose

Ancient Chinese architecture is famous for its wooden frame structure and unique position in world architecture history. As numerous types of components and complex combinations exist, the overall structural system and how they are interlocked have always been crucial but challenging parts of the study. Students find it hard to understand and remember the concepts using traditional 2D paper media, making such knowledge unattractive to pass on to the new generation. To overcome the challenges, this research aims to examine the effect of combining Virtual Reality (VR) with digital interaction games in learning structural characteristics (dougong) of ancient Chinese architecture.

Design/methodology/approach

This research develops an interactive cognitive system in the VR environment based on constructivist theory to improve the learning approach of ancient Chinese architecture. Applying an experimental procedure, the feedback of an experimental group using the VR cognition system and a control group using traditional learning 2D media are collected to examine the differences in learning effectiveness and user experience.

Findings

This study develops an interactive cognitive system to aid in learning the structural system of ancient Chinese architecture. The results indicate that integrating VR and interactive learning games can increase students' positive attitudes and learning effectiveness towards ancient Chinese architecture.

Originality/value

This study integrates VR technology and interactive games to improve the learning approach. It examines the effect of applying the concept of human–computer interaction in learning ancient Chinese buildings. The concept of designing the interactive cognitive system is expected to guide students gradually to be the main body of learning and stimulate their learning enthusiasm and motivation.

Details

Open House International, vol. 48 no. 2
Type: Research Article
ISSN: 0168-2601

Keywords

Article
Publication date: 18 April 2008

Najam Saqib and Rajesh V. Manchanda

This paper seeks to establish the importance of studying the effects of licensing brand alliances from a customer's standpoint, to investigate the effectiveness of licensing as a…

4472

Abstract

Purpose

This paper seeks to establish the importance of studying the effects of licensing brand alliances from a customer's standpoint, to investigate the effectiveness of licensing as a strategy by comparing it with a brand extension of a well‐known parent brand, and to provide a theoretical explanation for the licensing effects.

Design/methodology/approach

In Study 1, subjects' attitudes were measured towards a lesser known brand with and without licensing by Sony, and Sony alone in a three‐factor (licensing, no licensing, and Sony) between‐subjects design. Study 2 compared a licensed brand with a brand extension of a well‐known brand using the Chow test.

Findings

A brand “licensed by Sony” was evaluated higher than without licensing. Moreover, no difference was found between evaluation of a brand licensed by Sony and Sony alone. Study 2 revealed no significant difference between the data collected from a licensed brand and a well‐known brand extension, suggesting that being a licensed brand in some cases may be as effective as being an extension of a well‐known brand.

Research limitations/implications

The research examined the effects of strong brand names (e.g. Sony). It would be interesting to extend the findings by examining the brand names that are perhaps less strong (e.g. Samsung) to test the generalizability of the research.

Practical implications

For lesser‐known brands, licensing could be a viable strategy to increase their brand evaluation.

Originality/value

For new brands, this paper provides evidence that licensing is a viable strategy, and also provides a theoretical explanation for the licensing effects.

Details

Journal of Product & Brand Management, vol. 17 no. 2
Type: Research Article
ISSN: 1061-0421

Keywords

Article
Publication date: 1 June 1998

Jack Hollingum

Explains a simulation system, the Wheelbarrow Mk 8 Plus control training simulator, developed by Anite Systems to be used by the army for training operators of remote vehicles for…

217

Abstract

Explains a simulation system, the Wheelbarrow Mk 8 Plus control training simulator, developed by Anite Systems to be used by the army for training operators of remote vehicles for making safe explosive devices.

Details

Industrial Robot: An International Journal, vol. 25 no. 3
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 5 January 2010

Olusegun Folorunso and AdioTaofeek Akinwale

In tertiary institution, some students find it hard to learn database design theory, in particular, database normalization. The purpose of this paper is to develop a visualization…

1160

Abstract

Purpose

In tertiary institution, some students find it hard to learn database design theory, in particular, database normalization. The purpose of this paper is to develop a visualization tool to give students an interactive hands‐on experience in database normalization process.

Design/methodology/approach

The model‐view‐controller architecture is used to alleviate the black box syndrome associated with the study of algorithm behavior for database normalization process. The authors propose a visualization “exploratory” tool that assists the learners in understanding the actual behavior of the database normalization algorithms of choice and also in evaluating the validity/quality of the algorithm. This paper describes the visualization tool and its effectiveness in teaching and learning normalization forms and their functional dependencies.

Findings

The effectiveness of the tool has been evaluated in surveys. It shows that students generally viewed the tool more positively than the textbook technique. This difference is significant to p<0.05 (t=1.645). The mean interactions precision and calculated value using expert judge relevance ratings show a significant difference between visualization tool and textbook performance 3.74 against 2.61 for precision with calculated t=6.69.

Originality/value

The visualization tool helped students validate/check their learning of normalization process. Consequently, the paper shows that the tool has a positive impact on students' perception.

Details

Campus-Wide Information Systems, vol. 27 no. 1
Type: Research Article
ISSN: 1065-0741

Keywords

Article
Publication date: 1 May 1985

Federal Library Committee

Here are some things to think about if you're planning for system expansion—perhaps for a local area network (LAN)—for non‐OCLC applications. If you expect to use SC350 or ACQ350…

Abstract

Here are some things to think about if you're planning for system expansion—perhaps for a local area network (LAN)—for non‐OCLC applications. If you expect to use SC350 or ACQ350 software, consult with your network office about hard drives and software for those applications.

Details

OCLC Micro, vol. 1 no. 5
Type: Research Article
ISSN: 8756-5196

Article
Publication date: 1 March 1983

Personal computers were predicted by workers in the field of Cybernetics many decades ago. The technology may not have arrived at that time but scientists, particularly those…

Abstract

Personal computers were predicted by workers in the field of Cybernetics many decades ago. The technology may not have arrived at that time but scientists, particularly those concerned with education, saw the personal computer as part of a new educational system.

Details

Kybernetes, vol. 12 no. 3
Type: Research Article
ISSN: 0368-492X

1 – 10 of 468