Search results

1 – 10 of over 39000
Article
Publication date: 19 October 2015

Liangzhi Li and Nanfeng Xiao

This paper aims to propose a new view planning method which can be used to calculate the next-best-view (NBV) for multiple manipulators simultaneously and build an automated…

Abstract

Purpose

This paper aims to propose a new view planning method which can be used to calculate the next-best-view (NBV) for multiple manipulators simultaneously and build an automated three-dimensional (3D) object reconstruction system, which is based on the proposed method and can adapt to various industrial applications.

Design/methodology/approach

The entire 3D space is encoded with octree, which marks the voxels with different tags. A set of candidate viewpoints is generated, filtered and evaluated. The viewpoint with the highest score is selected as the NBV.

Findings

The proposed method is able to make the multiple manipulators, equipped with “eye-in-hand” RGB-D sensors, work together to accelerate the object reconstruction process.

Originality/value

Compared to the existed approaches, the proposed method in this paper is fast, computationally efficient, has low memory cost and can be used in actual industrial productions where the multiple different manipulators exist. And, more notably, a new algorithm is designed to speed up the generation and filtration of the candidate viewpoints, which can guarantee both speed and quality.

Details

Industrial Robot: An International Journal, vol. 42 no. 6
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 16 April 2018

Asanka G. Perera, Yee Wei Law, Ali Al-Naji and Javaan Chahl

The purpose of this paper is to present a preliminary solution to address the problem of estimating human pose and trajectory by an aerial robot with a monocular camera in near…

Abstract

Purpose

The purpose of this paper is to present a preliminary solution to address the problem of estimating human pose and trajectory by an aerial robot with a monocular camera in near real time.

Design/methodology/approach

The distinguishing feature of the solution is a dynamic classifier selection architecture. Each video frame is corrected for perspective using projective transformation. Then, a silhouette is extracted as a Histogram of Oriented Gradients (HOG). The HOG is then classified using a dynamic classifier. A class is defined as a pose-viewpoint pair, and a total of 64 classes are defined to represent a forward walking and turning gait sequence. The dynamic classifier consists of a Support Vector Machine (SVM) classifier C64 that recognizes all 64 classes, and 64 SVM classifiers that recognize four classes each – these four classes are chosen based on the temporal relationship between them, dictated by the gait sequence.

Findings

The solution provides three main advantages: first, classification is efficient due to dynamic selection (4-class vs 64-class classification). Second, classification errors are confined to neighbors of the true viewpoints. This means a wrongly estimated viewpoint is at most an adjacent viewpoint of the true viewpoint, enabling fast recovery from incorrect estimations. Third, the robust temporal relationship between poses is used to resolve the left-right ambiguities of human silhouettes.

Originality/value

Experiments conducted on both fronto-parallel videos and aerial videos confirm that the solution can achieve accurate pose and trajectory estimation for these different kinds of videos. For example, the “walking on an 8-shaped path” data set (1,652 frames) can achieve the following estimation accuracies: 85 percent for viewpoints and 98.14 percent for poses.

Details

International Journal of Intelligent Unmanned Systems, vol. 6 no. 2
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 1 April 1992

BERND FROHMANN

A discourse analysis of the cognitive viewpoint in library and information science identifies seven discursive strategies which constitute information as a commodity, and persons…

1665

Abstract

A discourse analysis of the cognitive viewpoint in library and information science identifies seven discursive strategies which constitute information as a commodity, and persons as surveyable information consumers, within market economy conditions. These strategies are: (a) universality of theory, (b) referentiality and reification of ‘images’, (c) internalisation of representations, (d) radical individualism and erasure of the social dimension of theory, (e) insistence upon knowledge, (f) constitution of the information scientist as an expert in image negotiation, and (g) instrumental reason, ruled by efficiency, standardisation, predictability, and determination of effects. The discourse is guided throughout by a yearning for natural‐scientific theory. The effect of the cognitive viewpoint's discursive strategy is to enable knowledge acquisition of information processes only when users' and generators' ‘images’ are constituted as objectively given natural‐scientific entities, and to disable knowledge of the same processes when considered as products of social practices. By its constitution of users as free creators of images, of the information scientist as an expert in image interpretation and delivery, and of databases as repositories of unmediated models of the world, the cognitive viewpoint performs ideological labour for modern capitalist image markets.

Details

Journal of Documentation, vol. 48 no. 4
Type: Research Article
ISSN: 0022-0418

Open Access
Article
Publication date: 30 April 2015

Hee-sung Bae and Yang-kee Lee

There are three aims of this research. One is to verify the mutual effects between internal collaboration and external collaboration, another is to prove performance improvement…

Abstract

There are three aims of this research. One is to verify the mutual effects between internal collaboration and external collaboration, another is to prove performance improvement among different levels of supply chain collaboration, and the third is to analyze gaps between the two viewpoints. The population is Korean FDI firms in China and 208 data are used in the analysis. The data are treated with various methods: exploratory and confirmatory factor analyses, SEM, cluster analysis, ANOVA, MANOVA and post hoc analysis. The results are as follows. First, external collaboration and internal collaboration have positive effects on each other, which have a positive effect on performance. This means that efficiency of internal processes is the cause of promoting connection with external processes and information generated from the market is the basis of a variance of internal processes, followed by high performance. Second, service performance improvement is more definite than cost performance improvement among different levels of supply chain collaboration. Firms can achieve more definite results in service performance when they perform supply chain collaboration. Third, this research verifies both the viewpoint of directions of supply chain collaboration and the strategic choice viewpoint of supply chain collaboration to better understand supply chain collaboration. Both viewpoints approach supply chain collaboration from different viewpoints but they do explain the methods for performance improvement.

Details

Journal of International Logistics and Trade, vol. 13 no. 1
Type: Research Article
ISSN: 1738-2122

Keywords

Article
Publication date: 10 April 2017

Özden Melis Uluğ and J. Christopher Cohrs

Exploring the understandings of conflict held by Members of Parliament (MPs) provides a meaningful picture of a conflict in a particular society. The aim of the study is to…

Abstract

Purpose

Exploring the understandings of conflict held by Members of Parliament (MPs) provides a meaningful picture of a conflict in a particular society. The aim of the study is to explore the Kurdish conflict understandings among MPs in Turkey.

Design/methodology/approach

The current research used Q methodology, which is a suitable method to identify socially shared perspectives and to identify intra- and inter-group differences, and Entman’s (1993) frame analysis to explore subjective understandings of the Kurdish conflict. Data were collected from 23 MPs from four political parties.

Findings

The analysis revealed four qualitatively distinct viewpoints: Turkish Nationalist view, Social Democratic view, Conservative-Religious view and Pro-Kurdish view.

Originality/value

This study contributes to the understanding of political parties’ perspectives on the Kurdish conflict in Turkey by representing each political party’s priorities and concerns. The meaning of these priorities and concerns, implications for conflict resolution and the usefulness of the Q methodology for exploring conflict understandings are also discussed.

Details

International Journal of Conflict Management, vol. 28 no. 2
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 1 February 2021

Narasimhulu K, Meena Abarna KT and Sivakumar B

The purpose of the paper is to study multiple viewpoints which are required to access the more informative similarity features among the tweets documents, which is useful for…

Abstract

Purpose

The purpose of the paper is to study multiple viewpoints which are required to access the more informative similarity features among the tweets documents, which is useful for achieving the robust tweets data clustering results.

Design/methodology/approach

Let “N” be the number of tweets documents for the topics extraction. Unwanted texts, punctuations and other symbols are removed, tokenization and stemming operations are performed in the initial tweets pre-processing step. Bag-of-features are determined for the tweets; later tweets are modelled with the obtained bag-of-features during the process of topics extraction. Approximation of topics features are extracted for every tweet document. These set of topics features of N documents are treated as multi-viewpoints. The key idea of the proposed work is to use multi-viewpoints in the similarity features computation. The following figure illustrates multi-viewpoints based cosine similarity computation of the five tweets documents (here N = 5) and corresponding documents are defined in projected space with five viewpoints, say, v1,v2, v3, v4, and v5. For example, similarity features between two documents (viewpoints v1, and v2) are computed concerning the other three multi-viewpoints (v3, v4, and v5), unlike a single viewpoint in traditional cosine metric.

Findings

Healthcare problems with tweets data. Topic models play a crucial role in the classification of health-related tweets with finding topics (or health clusters) instead of finding term frequency and inverse document frequency (TF–IDF) for unlabelled tweets.

Originality/value

Topic models play a crucial role in the classification of health-related tweets with finding topics (or health clusters) instead of finding TF-IDF for unlabelled tweets.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 14 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 30 April 2019

Hiroshi Asaoka, Tomoya Takahashi, Jiafei Chen, Aya Fujiwara, Masataka Watanabe and Fumiyuki Noro

The purpose of this paper is to investigate why children with autism spectrum disorder (ASD) tend to respond to tasks from their own perspective. The authors investigated the…

Abstract

Purpose

The purpose of this paper is to investigate why children with autism spectrum disorder (ASD) tend to respond to tasks from their own perspective. The authors investigated the effects of explicitness of viewpoint on performance of spontaneous level 2 perspective-taking skills in six- to eight-year-old children with ASD.

Design/methodology/approach

The authors conducted visual perspective-taking tasks with explicit and implicit instructions about the viewpoint to be used. Participants operated a toy car on a map while listening to the experimenter’s instructions. In the implicit condition, when the experimenter said “Turn right/left” at each intersection, the participants moved the car accordingly. Subsequently, in the explicit condition, the experimenter said “Look from the driver’s viewpoint and turn right/left” at each intersection.

Findings

In the implicit condition, the authors did not observe a clear developmental change in performance between six- and eight-year-old children in the ASD group. In contrast, performance in the ASD group improved under the explicit condition relative to that under the implicit condition.

Originality/value

The results suggest six- to eight-year-old children with ASD tend not to spontaneously use level 2 perspective-taking skills. Therefore, viewpoints should be explicitly instructed to children with ASD. In addition, it is also important to implement training to encourage spontaneous transitions from self-perspective to other-perspective under the implicit condition.

Details

Advances in Autism, vol. 5 no. 4
Type: Research Article
ISSN: 2056-3868

Keywords

Article
Publication date: 1 October 2005

Vojko Potocan, Matjaz Mulej and Stefan Kajzer

There is a field needing both cybernetics and systems theory: business as one way to viability – “business cybernetics” might have to emerge. The purpose of this paper is to…

1031

Abstract

Purpose

There is a field needing both cybernetics and systems theory: business as one way to viability – “business cybernetics” might have to emerge. The purpose of this paper is to address this issue.

Design/methodology/approach

A first draft of business cybernetics (BC) notion is presented. Discusses the definition of business systems (BSs) and their need for requisite holism, our understanding of cybernetics, our understanding of the (general) systems theory and systems thinking, differences between some versions of systems theories and cybernetics, and add our draft cybernetics of BSs, finishing with BC as a case of interdependence between business practice, systems theories and cybernetics and resulting conclusions.

Findings

It was not found, although quite some literature was studied and quite some practical experience in business, both as employees and as consulting instructors was collected. It is clear that cybernetics and (general) systems theory were created at about the same time by two different groups of scientists. They both dealt with complex rather than complicated entities/features/processes and they both tried to stress relations between parts of reality, which used to be considered separately and one‐sidedly rather than (requisitely) holistically.

Research limitations/implications

Later on, their “war against a too narrow specialisation” did not end in their general victory, but rather in application of their fruitful findings inside many specialised disciplines of science and practice. This is good, but not good enough, uncovered topics remain. Business is one of them.

Originality/value

Links both cybernetics and systems to an emerging “business cybernetics” in an innovative approach.

Details

Kybernetes, vol. 34 no. 9/10
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 29 March 2021

Susan Ramlo and John B. Nicholas

The purpose of this paper is to reveal and describe the divergent viewpoints about cybersecurity within a purposefully selected group of people with a range of expertise in…

Abstract

Purpose

The purpose of this paper is to reveal and describe the divergent viewpoints about cybersecurity within a purposefully selected group of people with a range of expertise in relation to computer security.

Design/methodology/approach

Q methodology [Q] uses empirical evidence to differentiate subjective views and, therefore, behaviors in relation to any topic. Q uses the strengths of qualitative and quantitative research methods to reveal and describe the multiple, divergent viewpoints that exist within a group where individuals sort statements into a grid to represent their views. Analyses group similar views (sorts). In this study, participants were selected from a range of types related to cybersecurity (experts, authorities and uninformed).

Findings

Four unique viewpoints emerged such that one represents cybersecurity best practices and the remaining three viewpoints represent poor cybersecurity behaviors (Naïve Cybersecurity Practitioners, Worried but not Vigilant and How is Cybersecurity a Big Problem) that indicate a need for educational interventions within both the public and private sectors.

Practical implications

Understanding the divergent views about cybersecurity is important within smaller groups including classrooms, technology-based college majors, a company, a set of IT professionals or other targeted groups where understanding cybersecurity viewpoints can reveal the need for training, changes in behavior and/or the potential for security breaches which reflect the human factors of cybersecurity.

Originality/value

A review of the literature revealed that only large, nation-wide surveys have been used to investigate views of cybersecurity. Yet, surveys are not useful in small groups, whereas Q is designed to investigate behavior through revealing subjectivity within smaller groups.

Details

Information & Computer Security, vol. 29 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 November 2010

Hakim Bendjenna, Nacer‐eddine Zarour and Pierre‐Jean Charrel

The requirements engineering (RE) process constitutes the earliest phase of the information system development life cycle. Requirements elicitation is considered as one of the…

Abstract

Purpose

The requirements engineering (RE) process constitutes the earliest phase of the information system development life cycle. Requirements elicitation is considered as one of the most critical activities of this phase. Moreover, requirements elicitation is still a challenge, especially in the distributed environment of so‐called inter‐company cooperative information systems (ICISs). The purpose of this paper is to propose a methodology to elicit requirements for an ICIS.

Design/methodology/approach

An analytical research approach was conducted. The current RE approaches, which are based either on goal, scenario or viewpoint were evaluated. Then the role of the elicitation technique selection step within the requirements elicitation process was examined. Finally the factors that affect this step in a distributed environment were studied. An example from the textile industry is used to illustrate the applicability of the proposed methodology.

Findings

Though existing requirements elicitation approaches based either on goal, scenario or viewpoint are effective techniques, they do not fit exactly to a cooperative distributed environment: more issues are created by inadequate communication, time difference between sites, cultural, language and characteristics diversity of stakeholders which affect the elicitation technique selection step and thus the requirements elicitation process. In order to tackle these issues, this paper presents a methodology called MAMIE (from Macro‐ to Micro‐level requirements Elicitation) to elicit requirements for an ICIS. A prototype tool has been developed to support the operation of the methodology.

Research limitations/implications

The major limitation of the paper is that has not yet been tested in an existing organization.

Practical implications

To provide the analyst with well‐defined steps in order to elicit requirements of an ICIS. To understand the role of the elicitation technique selection step within the requirements elicitation process and identifying the factors which have an impact on this step. To select an appropriate elicitation technique according to these factors.

Originality/value

MAMIE integrates the three notions of goal, scenario and viewpoint to elicit requirements for an ICIS. The paper argues that these concepts may be used simultaneously and in a complementary way to improve the requirements elicitation process. Moreover, in order to increase the quality of the elicited requirements and thus the quality of the system‐to‐be, selecting an elicitation technique in MAMIE is not based on personal preferences but on situation assessment.

Details

Journal of Systems and Information Technology, vol. 12 no. 4
Type: Research Article
ISSN: 1328-7265

Keywords

1 – 10 of over 39000