Search results

1 – 10 of 627
Article
Publication date: 7 April 2022

Tian-Jian Luo

Steady-state visual evoked potential (SSVEP) has been widely used in the application of electroencephalogram (EEG) based non-invasive brain computer interface (BCI) due to its…

Abstract

Purpose

Steady-state visual evoked potential (SSVEP) has been widely used in the application of electroencephalogram (EEG) based non-invasive brain computer interface (BCI) due to its characteristics of high accuracy and information transfer rate (ITR). To recognize the SSVEP components in collected EEG trials, a lot of recognition algorithms based on template matching of training trials have been proposed and applied in recent years. In this paper, a comparative survey of SSVEP recognition algorithms based on template matching of training trails has been done.

Design/methodology/approach

To survey and compare the recently proposed recognition algorithms for SSVEP, this paper regarded the conventional canonical correlated analysis (CCA) as the baseline, and selected individual template CCA (ITCCA), multi-set CCA (MsetCCA), task related component analysis (TRCA), latent common source extraction (LCSE) and a sum of squared correlation (SSCOR) for comparison.

Findings

For the horizontal comparative of the six surveyed recognition algorithms, this paper adopted the “Tsinghua JFPM-SSVEP” data set and compared the average recognition performance on such data set. The comparative contents including: recognition accuracy, ITR, correlated coefficient and R-square values under different time duration of the SSVEP stimulus presentation. Based on the optimal time duration of stimulus presentation, the author has also compared the efficiency of the six compared algorithms. To measure the influence of different parameters, the number of training trials, the number of electrodes and the usage of filter bank preprocessing were compared in the ablation study.

Originality/value

Based on the comparative results, this paper analyzed the advantages and disadvantages of the six compared SSVEP recognition algorithms by considering application scenes, real-time and computational complexity. Finally, the author gives the algorithms selection range for the recognition of real-world online SSVEP-BCI.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 16 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 4 April 2016

Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh and Ke Chen

The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services, etc.) is…

Abstract

Purpose

The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services, etc.) is becoming very common. These mobile electronic services typically use a knowledge-based authentication method to authenticate a user (claimed identity). However, this authentication method is vulnerable to several security attacks. To counter the attacks and to make the authentication process more secure, this paper aims to investigate the use of touch dynamics biometrics in conjunction with a personal identification number (PIN)-based authentication method, and demonstrate its benefits in terms of strengthening the security of authentication services for mobile devices.

Design/methodology/approach

The investigation has made use of three light-weighted matching functions and a comprehensive reference data set collected from 150 subjects.

Findings

The investigative results show that, with this multi-factor authentication approach, even when the PIN is exposed, as much as nine out of ten impersonation attempts can be successfully identified. It has also been discovered that the accuracy performance can be increased by combining different feature data types and by increasing the input string length.

Originality/value

The novel contributions of this paper are twofold. Firstly, it describes how a comprehensive experiment is set up to collect touch dynamics biometrics data, and the set of collected data is being made publically available, which may facilitate further research in the problem domain. Secondly, the paper demonstrates how the data set may be used to strengthen the protection of resources that are accessible via mobile devices.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 May 2022

Lin Li, Xi Chen and Tie Zhang

Many metal workpieces have the characteristics of less texture, symmetry and reflectivity, which presents a challenge to existing pose estimation methods. The purpose of this…

Abstract

Purpose

Many metal workpieces have the characteristics of less texture, symmetry and reflectivity, which presents a challenge to existing pose estimation methods. The purpose of this paper is to propose a pose estimation method for grasping metal workpieces by industrial robots.

Design/methodology/approach

Dual-hypothesis robust point matching registration network (RPM-Net) is proposed to estimate pose from point cloud. The proposed method uses the Point Cloud Library (PCL) to segment workpiece point cloud from scenes and a trained-well robust point matching registration network to estimate pose through dual-hypothesis point cloud registration.

Findings

In the experiment section, an experimental platform is built, which contains a six-axis industrial robot, a binocular structured-light sensor. A data set that contains three subsets is set up on the experimental platform. After training with the emulation data set, the dual-hypothesis RPM-Net is tested on the experimental data set, and the success rates of the three real data sets are 94.0%, 92.0% and 96.0%, respectively.

Originality/value

The contributions are as follows: first, dual-hypothesis RPM-Net is proposed which can realize the pose estimation of discrete and less-textured metal workpieces from point cloud, and second, a method of making training data sets is proposed using only CAD models with the visualization algorithm of the PCL.

Details

Industrial Robot: the international journal of robotics research and application, vol. 49 no. 6
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 1 December 1999

Roger T. Couture, Mohan Singh, Wayne Lee, Paul Chahal, Leonard Wankel, Margaret Oseen and Gary Wheeler

The study investigated the effects of two mental training strategies separately and combined on subjects’ shooting performance following an endurance march. Further, the study…

1774

Abstract

The study investigated the effects of two mental training strategies separately and combined on subjects’ shooting performance following an endurance march. Further, the study examined the suitability of a ten‐session training programme for the police force. On Trial 1, following a three hour march, 44 subjects shot 25 rounds. Subjects were then randomly assigned to four groups (biofeedback, relaxation, combined biofeedback and relaxation and control). After two weeks of mental training, subjects performed both tasks again on Trial 2. A repeated two‐way ANOVA indicated a significant improvement (p < 0.01) in shooting accuracy by the combined group. Suitability for this mental training programme was strongly supported by the experimental groups (71 per cent to 80 per cent). Subjects were generally better able to relax and focus. They were also more aware of their body and their physiological control. Results are discussed in light of potential benefits for cognitive strategies in precision tasks following endurance activities.

Details

Policing: An International Journal of Police Strategies & Management, vol. 22 no. 4
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 13 July 2012

Weiguo Sheng, Gareth Howells, Michael Fairhurst, Farzin Deravi and Shengyong Chen

Biometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys…

Abstract

Purpose

Biometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys necessarily compromises the information secured by those keys. To address such concerns, efforts based on dynamic key generation directly from the biometrics have recently emerged. However, previous methods often have quite unacceptable authentication performance and/or small key spaces and therefore are not viable in practice. The purpose of this paper is to propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys.

Design/methodology/approach

This proposition is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.

Findings

The evaluation demonstrates that the proposed method for dynamic key generation can offer both good reliability and security in practice, and outperforms other related methods.

Originality/value

In this paper, the authors propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys. This is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.

Details

Information Management & Computer Security, vol. 20 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 March 1998

Robert Gaizauskas and Yorick Wilks

In this paper we give a synoptic view of the growth of the text processing technology of information extraction (IE) whose function is to extract information about a pre‐specified…

1404

Abstract

In this paper we give a synoptic view of the growth of the text processing technology of information extraction (IE) whose function is to extract information about a pre‐specified set of entities, relations or events from natural language texts and to record this information in structured representations called templates. Here we describe the nature of the IE task, review the history of the area from its origins in AI work in the 1960s and 70s till the present, discuss the techniques being used to carry out the task, describe application areas where IE systems are or are about to be at work, and conclude with a discussion of the challenges facing the area. What emerges is a picture of an exciting new text processing technology with a host of new applications, both on its own and in conjunction with other technologies, such as information retrieval, machine translation and data mining.

Details

Journal of Documentation, vol. 54 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 13 November 2009

George K. Stylios

Examines the fifthteenth published year of the ITCRR. Runs the whole gamut of textile innovation, research and testing, some of which investigates hitherto untouched aspects…

1098

Abstract

Examines the fifthteenth published year of the ITCRR. Runs the whole gamut of textile innovation, research and testing, some of which investigates hitherto untouched aspects. Subjects discussed include cotton fabric processing, asbestos substitutes, textile adjuncts to cardiovascular surgery, wet textile processes, hand evaluation, nanotechnology, thermoplastic composites, robotic ironing, protective clothing (agricultural and industrial), ecological aspects of fibre properties – to name but a few! There would appear to be no limit to the future potential for textile applications.

Details

International Journal of Clothing Science and Technology, vol. 21 no. 6
Type: Research Article
ISSN: 0955-6222

Keywords

Article
Publication date: 1 March 1995

Roger Stuart

Describes research into managers′ experiences of significantorganizational change attempts. The research project was aimed atdeveloping frameworks which: describe, illuminate and…

5748

Abstract

Describes research into managers′ experiences of significant organizational change attempts. The research project was aimed at developing frameworks which: describe, illuminate and enable a better understanding of managers′ journeys through organizational change; serve as a template for bringing together the very diverse and fragmented literature relating to individuals experiencing change; highlight issues and pointers for the design and facilitation of effective organizational change initiatives. The first part describes the context, spirit, intentions, sample and methodology of the research. Also, reviews a broad range of literature which can inform our understanding of individuals in change. Propounds the need to open up the “real world” of organizational change, as perceived and experienced by managers, rather than any “ideal” view of how that world is desired or supposed to be. Presents and discusses research findings on the sensed and initiating “primary” triggers for change‐that is, the formal and communicated organizational change objectives; and the perceived and felt “secondary” triggers for change‐that is, the issues raised by, and the implications of, the organizational changes for individual managers. The second part presents a framework depicting the phases and components of managers′ journeys through organizational change. On the framework, the experience of managers can be located, in terms of their thoughts, feelings and behaviours, as the processes of change unfold. While each manager′s journey was found to be unique, the framework proved to be ubiquitous in enabling the mapping of all the managers′ journeys, and it also accommodates literature on phenomena as diverse as learning, personal transition, catastrophe and survival, trauma and stress, loss and “death”, and worry and grief. The findings emphasize the profoundness and deeply felt emotionality of many managers′ experiencing of change in organizations. Finally, identifies the outcomes of managers′ journeys through significant attempts at organizational change. Also presents the reported helping and hindering factors to those journeys. Implications of these findings are pursued, particularly in terms of the leadership and development roles and behaviours required, if the organization and its management are to move beyond simply requiring change towards actively facilitating its achievement.

Details

Personnel Review, vol. 24 no. 2
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 1 September 1993

Roger Brooksbank

Provides a practical self‐help guide for professional salespeoplewho want to improve their sales performance. Divided into two parts,Part 1 deals with booking the appointment and…

Abstract

Provides a practical self‐help guide for professional salespeople who want to improve their sales performance. Divided into two parts, Part 1 deals with booking the appointment and Part 2 with making the sale. Part 1 covers areas such as how to add structure to telephone calls; the development of a personalized script designed to provide a more consistent pattern of high performance; and how to generate both more and better quality appointments. Part 2 covers the skills required in selling face‐to‐face and covers how to analyse the key components of the sales presentation; restructure, strengthen and inject fresh ideas; rebuild the presentation so as to maximize sales performance; and how to take full control of personal development as a sales professional. Based on established principles of successful selling, the workbook outlines a model of the selling process based on the five core skill areas of opening, probing, matching, closing and objection handling. Aimed at salespeople and sales managers, the model provides a framework for the ongoing development of sales skills which is highly practical and applicable to any face‐to‐face selling situation. Also contains a comprehensive series of worksheets to complete on each of the issues raised; and a series of “windows” provide condensed information for quick reference.

Details

Marketing Intelligence & Planning, vol. 11 no. 9
Type: Research Article
ISSN: 0263-4503

Keywords

Book part
Publication date: 24 August 2011

Tommy Tsung Ying Shih

Researchers continue to seek understanding of industrialization as a state managed process. How to create and implement new industries based on advanced knowledge is on the policy…

Abstract

Researchers continue to seek understanding of industrialization as a state managed process. How to create and implement new industries based on advanced knowledge is on the policy agenda of many advanced nations. Measures that promote these developments include national capacity building in science and technology, the formation of technology transfer systems, and the establishment of industrial clusters. What these templates often overlook is an analysis of use. This chapter aims to increase the understanding of the processes that embed new solutions in structures from an industrial network perspective. The chapter describes an empirical study of high-technology industrialization in Taiwan that the researcher conducts to this end. The study shows that the Taiwanese industrial model is oversimplified and omits several important factors in the development of new industries. This study bases its findings on the notions that resource combination occurs in different time and space, the new always builds on existing resource structures, and the users are important as active participants in development processes.

Details

Interfirm Networks: Theory, Strategy, and Behavior
Type: Book
ISBN: 978-1-78052-024-7

Keywords

1 – 10 of 627