Computerized Automated Systems

2022 ◽  
pp. 95-169
Keyword(s):  
1996 ◽  
Vol 26 (12) ◽  
pp. 1420-1427 ◽  
Author(s):  
T. BRUNNEE ◽  
A. SEEBERGER ◽  
J. KLEINE-TEBBE ◽  
G. KUNKEL

2017 ◽  
Vol 68 (10) ◽  
pp. 2289-2292
Author(s):  
Dorin Badoiu ◽  
Georgeta Toma

One of the solutions to reduce the production and maintenance costs of the sucker rod pumping installations is to develop automated systems for regulating and controlling their operations. The development of these automated systems requires an attentive modeling of the dynamics of the mechanism of the pumping unit, process in which the identification of the values of the parameters involved in the calculations plays an essential role. The paper presents the manner of determining the values of some parameters of the mechanism of a C-320D-256-100 pumping unit starting from the variation on a cinematic cycle of the motor torque at the crank shaft. Simulations were performed with a computer program developed by the authors, and the experimental records were processed with the program Total Well Management.


2014 ◽  
Author(s):  
Stephanie M. Merritt ◽  
Kelli Huber ◽  
Jennifer LaChapell-Unnerstall ◽  
Deborah Lee
Keyword(s):  

Author(s):  
Cyrus K. Foroughi ◽  
Shannon Devlin ◽  
Richard Pak ◽  
Noelle L. Brown ◽  
Ciara Sibley ◽  
...  

Objective Assess performance, trust, and visual attention during the monitoring of a near-perfect automated system. Background Research rarely attempts to assess performance, trust, and visual attention in near-perfect automated systems even though they will be relied on in high-stakes environments. Methods Seventy-three participants completed a 40-min supervisory control task where they monitored three search feeds. All search feeds were 100% reliable with the exception of two automation failures: one miss and one false alarm. Eye-tracking and subjective trust data were collected. Results Thirty-four percent of participants correctly identified the automation miss, and 67% correctly identified the automation false alarm. Subjective trust increased when participants did not detect the automation failures and decreased when they did. Participants who detected the false alarm had a more complex scan pattern in the 2 min centered around the automation failure compared with those who did not. Additionally, those who detected the failures had longer dwell times in and transitioned to the center sensor feed significantly more often. Conclusion Not only does this work highlight the limitations of the human when monitoring near-perfect automated systems, it begins to quantify the subjective experience and attentional cost of the human. It further emphasizes the need to (1) reevaluate the role of the operator in future high-stakes environments and (2) understand the human on an individual level and actively design for the given individual when working with near-perfect automated systems. Application Multiple operator-level measures should be collected in real-time in order to monitor an operator’s state and leverage real-time, individualized assistance.


2021 ◽  
pp. 1329878X2110058
Author(s):  
Neil Selwyn ◽  
Chris O’Neill ◽  
Gavin Smith ◽  
Mark Andrejevic ◽  
Xin Gu

The COVID-19 pandemic has seen the rapid but sometimes controversial take-up of ‘online examination proctoring’ systems by universities keen to maintain their assessment schedules during times of campus closure. Following the theoretical tradition of media ‘domestication’, this article examines the mainstream adoption of different online proctoring systems in Australian higher education during the first year of the pandemic. Through analysis of interviews, documents, news, social media and marketing materials, the article examines the ‘appropriation’, ‘objectification’, incorporation’ and ‘conversion’ of proctoring technology from the perspective of commercial providers, university authorities, university staff and student groups. This raises a number of critical issues underpinning the adoption of this exam surveillance technology – not least the surrender of control to commercial providers, the hidden labour required to sustain ‘automated’ systems and the increased vulnerabilities of ‘remote’ studying.


Sign in / Sign up

Export Citation Format

Share Document