Vai al contenuto principale della pagina

Advances in human factors in robots, unmanned systems and cybersecurity : proceedings of the AHFE 2021 virtual conferences on human factors in robots, drones and unmanned systems, and human factors in cybersecurity, July 25-29, 2021, USA / / Matteo Zallio, Carlos Raymundo Iban̋ez, Jesus Hechavarria Hernandez, editors



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Advances in human factors in robots, unmanned systems and cybersecurity : proceedings of the AHFE 2021 virtual conferences on human factors in robots, drones and unmanned systems, and human factors in cybersecurity, July 25-29, 2021, USA / / Matteo Zallio, Carlos Raymundo Iban̋ez, Jesus Hechavarria Hernandez, editors Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2021]
©2021
Descrizione fisica: 1 online resource (283 pages)
Disciplina: 629.8
Soggetto topico: Human-robot interaction
Human engineering
Computer security
Interacció persona-ordinador
Robòtica
Seguretat informàtica
Ergonomia
Soggetto genere / forma: Congressos
Llibres electrònics
Persona (resp. second.): ZallioMatteo
Iban̋ezCarlos Raymundo
HernandezJesus Hechavarria
Nota di contenuto: Intro -- Advances in Human Factors and Ergonomics 2021 -- Preface -- Contents -- Human Factors and Unmanned Aerial Vehicles -- Concept for Cross-platform Delegation of Heterogeneous UAVs in a MUM-T Environment -- 1 Introduction and Background -- 2 Problem Definition -- 3 Concept -- 4 Implementation and Early Results -- 5 Conclusions and Outlook -- References -- Swarms, Teams, or Choirs? Metaphors in Multi-UAV Systems Design -- 1 Introduction -- 2 The Swarm Metaphor -- 3 The Team Metaphor -- 4 The Choir Metaphor -- 5 Conclusion -- References -- Visual Communication with UAS: Estimating Parameters for Gestural Transmission of Task Descriptions -- 1 Introduction -- 2 Related Work -- 3 Generating Minimal Parameter Sets for UAV Related Tasks -- 3.1 Experiment -- 3.2 Results -- 3.3 Conclusion and Outlook -- References -- A Distributed Mission-Planning Framework for Shared UAV Use in Multi-operator MUM-T Applications -- 1 Introduction and Background -- 2 Related Work -- 3 Application -- 4 Implementation -- 5 Evaluation and Discussion -- 6 Conclusion -- References -- Robots in Transportation Systems -- Conditional Behavior: Human Delegation Mode for Unmanned Vehicles Under Selective Datalink Availability -- 1 Introduction and Background -- 2 Implications of Datalink Loss for Hierarchical Control of UAVs by Humans -- 2.1 HAT Work System Descriptive Language -- 2.2 Commonly Used HAT Work System Design Patterns for UAV Control -- 3 UAVs as Worker and Compensation of Control Gap -- 3.1 No Active Datalink -- 3.2 Active Datalink -- 4 Implementation -- 4.1 Active Datalink -- 4.2 No Active Datalink -- 5 Conclusion, Application, and Future Work -- References -- Lethal Autonomous Weapon Systems: An Advocacy Paper -- References -- Measuring the Impact of a Navigation Aid in Unmanned Ship Handling via a Shore Control Center -- 1 Introduction -- 2 Method.
2.1 Missions -- 2.2 Configuration -- 2.3 Participants -- 2.4 Data Processing -- 3 Results -- 4 Conclusion and Future Work -- References -- A Computational Assessment of Ergonomics in an Industrial Human-Robot Collaboration Workplace Using System Dynamics -- 1 Introduction -- 2 Method -- 3 Model -- 3.1 Conceptual Description of the System -- 3.2 Detailed Model -- 4 Simulation and Prospection -- 5 Conclusions and Future Work -- References -- A New Modular Intensive Design Solution for ROVs -- 1 Introduction -- 2 User Research -- 2.1 Observation -- 2.2 Interview -- 3 Design Process -- 3.1 Modular Design Idea -- 3.2 Optimize the Disassembly Structure -- 3.3 Design of Action Module -- 4 Evaluation of Design -- 5 Conclusion -- References -- Drones, Robots and Humanized Behaviors -- Designing for the Unknown: Using Structured Analysis and Design Technique (SADT) to Create a Pilot Domain for a Shore Control Centre for Autonomous Ships -- 1 Introduction -- 2 SADT -- 2.1 Agent-/Artefact Orientated Flowcharts -- 2.2 The Operator -- 3 Case -- 4 Discussion -- 5 Conclusion -- References -- Reporting of Ethical Conduct in Human-Robot Interaction Research -- 1 Introduction -- 2 Method -- 3 Results -- 4 Discussion -- References -- Exploratory Analysis of Research Publications on Robotics in Costa Rica Main Public Universities -- 1 Introduction -- 2 Research Objective -- 3 Background -- 4 Methodology -- 4.1 Selection Criteria -- 5 Findings and Discussion of Results -- 5.1 Distribution of Publications According to year, the Gender of Authorship, University, and Robotic Field -- 5.2 Distribution of Publications According to Gender, Format, Source, and Robotic Field -- 5.3 Distribution of Publications by Type of Robot, Target Audience, and Robotic Role -- 6 Conclusions -- References -- A Century of Humanoid Robotics in Cinema: A Design-Driven Review -- 1 Introduction.
2 Taxonomy -- 3 Selection Criteria -- 4 Visualization -- 5 Findings and Conclusion -- References -- RESPONDRONE - A Multi-UAS Platform to Support Situation Assessment and Decision Making for First Responders -- 1 Introduction -- 2 End-User Requirements -- 2.1 End-User Studies -- 2.2 Design Thinking Workshop -- 3 The RESPONDONE Multi-UAS Platform -- 3.1 Multi-UAS Control and Supervision -- 3.2 User Interface Mock-Ups -- 4 First UI Evaluation -- 4.1 Method -- 4.2 Results -- 5 Discussion -- References -- Robotic Systems for Social Interactions -- Exploring Resilience and Cohesion in Human-Autonomy Teams: Models and Measurement -- 1 Introduction -- 2 Theory: Resilience in Human-Autonomy Teams -- 2.1 Team Cohesion and Resilience -- 2.2 Network and Cyber Resilience -- 2.3 Resilience: Controls Perspective -- 3 Methods -- 3.1 Initial Item Development -- 3.2 Content Validation -- 4 Content Validation Results -- 5 Conclusions and Path Forward -- References -- Multi-modal Emotion Recognition for User Adaptation in Social Robots -- 1 Introduction -- 2 Emotion Detection and Dialog Systems -- 3 Improving Multi Modal Dialog Systems -- 4 Conclusion -- References -- Robot Design Needs Users: A Co-design Approach to HRI -- 1 Scenario -- 2 UX Design Applied to Robotics -- 2.1 Understanding the Social Robot -- 2.2 Understanding the End User -- 3 Co-designing Robots -- 3.1 Stages of the Project -- 3.2 Issues for the Robotic Project -- 4 Good Practices and Challenges for Collaborative Robot Design -- References -- Social Robotic Platform to Strengthen Literacy Skills -- 1 Introduction -- 2 The Robot - Human Interaction -- 3 Design and Implementation -- 3.1 Robotic Platform Structure -- 3.2 Actuators and Controller -- 3.3 Tití App -- 3.4 The Social Interaction -- 4 Conclusions -- References -- Structural Bionic Method of Climbing Robot Based on Video Key Frame Extraction.
1 Introduction -- 2 Theory of Bionic Climbing Robot and Key Frame Extraction -- 2.1 Bionic Climbing Robot -- 2.2 Key Frame Extraction -- 3 Key Frame Images Extraction -- 4 Structure Model Extraction and Transformation -- 5 Conclusion -- References -- Prototype System for Control the ScorBot ER-4U Robotic Arm Using Free Tools -- 1 Introduction -- 2 Hardware -- 2.1 Electronic Control Interface -- 2.2 Electronic Module -- 2.3 Primary Board -- 2.4 Angular Interface -- 3 Software -- 3.1 Communication Interface -- 3.2 Control Firmware -- 3.3 Broker -- 3.4 Control Host -- 4 Experimental Results -- 5 Conclusions -- References -- Human Factors in Cybersecurity -- Detecting Cyberattacks Using Linguistic Analysis -- 1 Introduction -- 2 Levenshtein Distance -- 3 Research Approach -- 4 Reverse Translation -- 5 Comparing Literary Quotes (Q) and Film Dialog (F) -- 6 Comparing the Most and Least Accurate MLD Measures -- 7 Conclusions -- References -- Digital Image Forensics Using Hexadecimal Image Analysis -- 1 Introduction -- 2 Background and Related Work -- 3 Experimental Work -- 4 Results and Comparison -- 5 Conclusion and Future Work -- References -- Identifying Soft Biometric Features from a Combination of Keystroke and Mouse Dynamics -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Mouse Dynamics -- 3.2 Keystroke Dynamics -- 3.3 Machine Learning -- 4 Results -- 4.1 Gender -- 4.2 Handedness -- 4.3 Age -- 4.4 Hours Spent on Electronic Devices -- 4.5 Feature Selection -- 5 Conclusion -- References -- CyberSecurity Privacy Risks -- 1 Introduction -- 2 Privacy -- 3 CyberSecurity Risks -- 4 Privacy Risks -- 4.1 Smart Devices and the Internet of Things (IoT) -- 4.2 Wearables -- 4.3 Social Media -- 4.4 Medical -- 4.5 Financial -- 4.6 Big Data -- 5 Privacy Mitigations -- 5.1 Legal Privacy Protection -- 5.2 Computer and Applications Privacy Settings.
6 Conclusion -- References -- Sharing Photos on Social Media: Visual Attention Affects Real-World Decision Making -- 1 Introduction -- 2 Method -- 2.1 Participants -- 2.2 Procedure -- 2.3 Photo Sharing Task -- 2.4 Personality Measures -- 2.5 Data Acquisition and Processing -- 3 Results -- 3.1 Descriptive Statistics -- 3.2 Correlations -- 3.3 Effects of Looking on Likelihood to Share Memes -- 4 Discussion -- References -- Prosthetic Face Makeups and Detection -- 1 Introduction -- 2 Related Work -- 3 Prosthetic Face Makeup Experiments -- 4 Thermal Signatures -- 5 Near-Infrared Signatures -- 6 Toward Explainable Detection -- 7 Conclusions -- References -- Analysis of Risks to Data Privacy for Family Units in Many Countries -- 1 Introduction -- 2 Selection of Countries for Analysis -- 3 Postal Code Systems -- 4 "Pigeonholes" -- 5 Second Approach -- 6 Family Unit Definition -- 7 Extending to a Global Model -- 8 Conclusions -- References -- Exploring Understanding and Usage of Two-Factor Authentication Account Recovery -- 1 Introduction -- 1.1 User Studies Surrounding 2FA -- 1.2 2FA Account Recovery -- 1.3 Cyber Hygiene: Training and Expertise -- 2 Method -- 2.1 Participants -- 2.2 Materials and Procedure -- 2.3 Knowledge of Authentication -- 3 Results -- 3.1 Demographics and Usage -- 3.2 Overall Authentication Knowledge: Cybersecurity Training and Experience with an Attack -- 4 Discussion -- References -- Strategies of Naive Software Reverse Engineering: A Qualitative Analysis -- 1 Introduction -- 2 Past Research -- 3 Method and Materials -- 4 Results and Discussion -- References -- How Safely Do We Behave Online? An Explanatory Study into the Cybersecurity Behaviors of Dutch Citizens -- 1 Introduction -- 1.1 The Capability Opportunity Motivation-Behavior Model -- 2 Materials and Method -- 2.1 Sample and Procedure -- 2.2 Measures -- 3 Results.
3.1 Descriptive Statistics and Bivariate Analyses.
Titolo autorizzato: Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity  Visualizza cluster
ISBN: 3-030-79997-2
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910488711503321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture notes in networks and systems ; ; Volume 268.