scholarly journals Task-Level Authoring for Remote Robot Teleoperation

2021 ◽  
Vol 8 ◽  
Author(s):  
Emmanuel Senft ◽  
Michael Hagenow ◽  
Kevin Welsh ◽  
Robert Radwin ◽  
Michael Zinn ◽  
...  

Remote teleoperation of robots can broaden the reach of domain specialists across a wide range of industries such as home maintenance, health care, light manufacturing, and construction. However, current direct control methods are impractical, and existing tools for programming robot remotely have focused on users with significant robotic experience. Extending robot remote programming to end users, i.e., users who are experts in a domain but novices in robotics, requires tools that balance the rich features necessary for complex teleoperation tasks with ease of use. The primary challenge to usability is that novice users are unable to specify complete and robust task plans to allow a robot to perform duties autonomously, particularly in highly variable environments. Our solution is to allow operators to specify shorter sequences of high-level commands, which we call task-level authoring, to create periods of variable robot autonomy. This approach allows inexperienced users to create robot behaviors in uncertain environments by interleaving exploration, specification of behaviors, and execution as separate steps. End users are able to break down the specification of tasks and adapt to the current needs of the interaction and environments, combining the reactivity of direct control to asynchronous operation. In this paper, we describe a prototype system contextualized in light manufacturing and its empirical validation in a user study where 18 participants with some programming experience were able to perform a variety of complex telemanipulation tasks with little training. Our results show that our approach allowed users to create flexible periods of autonomy and solve rich manipulation tasks. Furthermore, participants significantly preferred our system over comparative more direct interfaces, demonstrating the potential of our approach for enabling end users to effectively perform remote robot programming.

Author(s):  
Merrill Warkentin ◽  
Kimberly Davis ◽  
Ernst Bekkering

The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security provided by such a password (because they are more difficult to violate or “crack”). However, such passwords tend to be more difficult for end users to remember, particularly when the password does not spell a recognizable word (or includes non-alphanumeric characters such as punctuation marks or other symbols). Conversely, when end users select their own more easily remembered passwords, the passwords may also be easier to crack. This study presents a new approach to entering passwords, which combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords as well as high-protection, assigned-password procedures. The present study investigates trade-offs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all password procedures tested to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared with that high-security password. Further research will be conducted to investigate long-term benefits.


2020 ◽  
Author(s):  
Mehmet Ismet Can Dede ◽  
Gokhan Kiper ◽  
Tolga Ayav ◽  
Barbaros Özdemirel ◽  
Enver Tatlicioglu ◽  
...  

Abstract Endoscopic endonasal surgery is a commonly practiced minimally invasive neurosurgical operation for the treatment of a wide range of skull base pathologies including pituitary tumors. A common shortcoming of this surgery is the necessity of a third hand when the endoscope has to be handled to allow active use of both hands of the main surgeon. The robot surgery assistant NeuRoboScope system has been developed to take over the endoscope from the main surgeon's hand while providing the surgeon with the necessary means of controlling the location and direction of the endoscope. One of the main novelties of the NeuRoboScope system is its human-robot interface designs which regulate and facilitate the interaction between the surgeon and the robot assistant. The human-robot interaction design of the NeuRoboScope system is investigated in two domains: direct physical interaction and master-slave teleoperation. The user study indicating the learning curve and ease of use of the master-slave teleoperation is given and this paper is concluded via providing the reader with an outlook of possible new human-robot interfaces for the robot assisted surgery systems.


2008 ◽  
pp. 2114-2129
Author(s):  
Merrill Warkentin

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


Author(s):  
Brad A. Myers ◽  
Sae Young Jeong ◽  
Yingyu Xie ◽  
Jack Beaton ◽  
Jeff Stylos ◽  
...  

All software today is written using application programming interfaces (APIs). We performed a user study of the online documentation of a large and complex API for Enterprise Service-Oriented Architecture (eSOA), which identified many issues and recommendations for making API documentation easier to use. eSOA is an appropriate testbed because the target users include high-level business experts who do not have significant programming expertise and thus can be classified as “end-user developers.” Our study showed that the participants’ background influenced how they navigated the documentation. Lack of familiarity with business terminology was a barrier for developers without business application experience. Both groups avoided areas of the documentation that had an inconsistent visual design. A new design for the documentation that supports flexible navigation strategies seems to be required to support the wide range of users for eSOA. This paper summarizes our study and provides recommendations for future documentation for APIs.


2019 ◽  
Vol 3 (1) ◽  
pp. 205
Author(s):  
Mahmoud M. Abdelrahman ◽  
Ahmed Mohamed Yousef Toutou

In this paper, we represent an approach for combining machine learning (ML) techniques with building performance simulation by introducing four methods in which ML could be effectively involved in this field i.e. Classification, Regression, Clustering and Model selection . Rhino-3d-Grasshopper SDK was used to develop a new plugin for involving machine learning in design process using Python programming language and making use of scikit-learn module, that is, a python module which provides a general purpose high level language to nonspecialist user by integration of wide range supervised and unsupervised learning algorithms with high performance, ease of use and well documented features. ANT plugin provides a method to make use of these modules inside Rhino\Grasshopper to be handy to designers. This tool is open source and is released under BSD simplified license. This approach represents promising results regarding making use of data in automating building performance development and could be widely applied. Future studies include providing parallel computation facility using PyOpenCL module as well as computer vision integration using scikit-image.


Author(s):  
Merrill Warkentin ◽  
Kimberly Davis ◽  
Ernst Bekkering

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


2008 ◽  
pp. 81-97
Author(s):  
Merrill Warkentin ◽  
Kimberly Davis ◽  
Ernst Bekkering

The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security provided by such a password (because they are more difficult to violate or “crack”). However, such passwords tend to be more difficult for end users to remember, particularly when the password does not spell a recognizable word (or includes non-alphanumeric characters such as punctuation marks or other symbols). Conversely, when end users select their own more easily remembered passwords, the passwords may also be easier to crack. This study presents a new approach to entering passwords, which combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords as well as high-protection, assigned-password procedures. The present study investigates trade-offs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all password procedures tested to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared with that high-security password. Further research will be conducted to investigate long-term benefits.


2010 ◽  
Vol 22 (1) ◽  
pp. 23-51 ◽  
Author(s):  
Brad A. Myers ◽  
Sae Young Jeong ◽  
Yingyu Xie ◽  
Jack Beaton ◽  
Jeff Stylos ◽  
...  

All software today is written using application programming interfaces (APIs). We performed a user study of the online documentation of a large and complex API for Enterprise Service-Oriented Architecture (eSOA), which identified many issues and recommendations for making API documentation easier to use. eSOA is an appropriate testbed because the target users include high-level business experts who do not have significant programming expertise and thus can be classified as “end-user developers.” Our study showed that the participants’ background influenced how they navigated the documentation. Lack of familiarity with business terminology was a barrier for developers without business application experience. Both groups avoided areas of the documentation that had an inconsistent visual design. A new design for the documentation that supports flexible navigation strategies seems to be required to support the wide range of users for eSOA. This paper summarizes our study and provides recommendations for future documentation for APIs.


Author(s):  
V. Dodokhov ◽  
N. Pavlova ◽  
T. Rumyantseva ◽  
L. Kalashnikova

The article presents the genetic characteristic of the Chukchi reindeer breed. The object of the study was of the Chukchi reindeer. In recent years, the number of reindeer of the Chukchi breed has declined sharply. Reduced reindeer numbers could lead to biodiversity loss. The Chukchi breed of deer has good meat qualities, has high germination viability and is adapted in adverse tundra conditions of Yakutia. Herding of the Chukchi breed of deer in Yakutia are engaged only in the Nizhnekolymsky district. There are four generic communities and the largest of which is the agricultural production cooperative of nomadic tribal community «Turvaurgin», which was chosen to assess the genetic processes of breed using microsatellite markers: Rt6, BMS1788, Rt 30, Rt1, Rt9, FCB193, Rt7, BMS745, C 143, Rt24, OheQ, C217, C32, NVHRT16, T40, C276. It was found that microsatellite markers have a wide range of alleles and generally have a high informative value for identifying of genetic differences between animals and groups of animal. The number of identified alleles is one of the indicators of the genetic diversity of the population. The total number of detected alleles was 127. The Chukchi breed of deer is characterized by a high level of heterozygosity, and the random crossing system prevails over inbreeding in the population. On average, there were 7.9 alleles (Na) per locus, and the mean number of effective alleles (Ne) was 4.1. The index of fixation averaged 0.001. The polymorphism index (PIC) ranged from 0.217 to 0.946, with an average of 0.695.


Author(s):  
O. Y. Balalaieva ◽  

The purpose of the article is to study the dynamics of electronic dictionaries development abroad and in Ukraine using methods of analysis of scientific sources, comparison, generalization and systematization. Electronic dictionaries have been found to be a relatively new phenomenon in the lexicographic market, evolving from machine-readable dictionaries, exact copies of paper editions to complex digital lexicographic systems with a powerful arsenal of functions over the decades. The stages of development of autonomous and online dictionaries are described. Electronic dictionaries due to the advanced search capabilities, speed, simplicity, ease of use, accessibility and compactness have gained popularity among a wide range of users. Today they are used in many spheres of human activity – scientific, educational, professional, everyday communication. However, the analysis of the current level of development of Ukrainian electronic resources indicates a shortage of electronic dictionaries both common and terminological vocabulary. The lack of electronic dictionaries is due to a number of objective problems, both practical and theoretical, that is why research in the field of domestic computer lexicography is a promising area of further research.


Sign in / Sign up

Export Citation Format

Share Document