The Chinese express delivery industry processes nearly 110 billion items in 2022,averaging an annual growth rate of 200%.Among the various types of sorting systems used for handling express items,cross-belt sorting sy...The Chinese express delivery industry processes nearly 110 billion items in 2022,averaging an annual growth rate of 200%.Among the various types of sorting systems used for handling express items,cross-belt sorting systems stand out as the most crucial.However,despite their high degree of automation,the workload for operators has intensified owing to the surging volume of express items.In the era of Industry 5.0,it is imperative to adopt new technologies that not only enhance worker welfare but also improve the efficiency of cross-belt systems.Striking a balance between efficiency in handling express items and operator well-being is challenging.Digital twin technology offers a promising solution in this respect.A realization method of a human-machine integrated digital twin is proposed in this study,enabling the interaction of biological human bodies,virtual human bodies,virtual equipment,and logistics equipment in a closed loop,thus setting an operating framework.Key technologies in the proposed framework include a collection of heterogeneous data from multiple sources,construction of the relationship between operator fatigue and operation efficiency based on physiological measurements,virtual model construction,and an online optimization module based on real-time simulation.The feasibility of the proposed method was verified in an express distribution center.展开更多
Electromyography(EMG)has already been broadly used in human-machine interaction(HMI)applications.Determining how to decode the information inside EMG signals robustly and accurately is a key problem for which we urgen...Electromyography(EMG)has already been broadly used in human-machine interaction(HMI)applications.Determining how to decode the information inside EMG signals robustly and accurately is a key problem for which we urgently need a solution.Recently,many EMG pattern recognition tasks have been addressed using deep learning methods.In this paper,we analyze recent papers and present a literature review describing the role that deep learning plays in EMG-based HMI.An overview of typical network structures and processing schemes will be provided.Recent progress in typical tasks such as movement classification,joint angle prediction,and force/torque estimation will be introduced.New issues,including multimodal sensing,inter-subject/inter-session,and robustness toward disturbances will be discussed.We attempt to provide a comprehensive analysis of current research by discussing the advantages,challenges,and opportunities brought by deep learning.We hope that deep learning can aid in eliminating factors that hinder the development of EMG-based HMI systems.Furthermore,possible future directions will be presented to pave the way for future research.展开更多
Combination flexible and stretchable textiles with self-powered sensors bring a novel insight into wearable functional electronics and cyber security in the era of Internet of Things.This work presents a highly flexib...Combination flexible and stretchable textiles with self-powered sensors bring a novel insight into wearable functional electronics and cyber security in the era of Internet of Things.This work presents a highly flexible and self-powered fully fabric-based triboelectric nanogenerator(F-TENG)with sandwiched structure for biomechanical energy harvesting and real-time biometric authentication.The prepared F-TENG can power a digital watch by low-frequency motion and respond to the pressure change by the fall of leaves.A self-powered wearable keyboard(SPWK)is also fabricated by integrating large-area F-TENG sensor arrays,which not only can trace and record electrophysiological signals,but also can identify individuals’typing characteristics by means of the Haar wavelet.Based on these merits,the SPWK has promising applications in the realm of wearable electronics,self-powered sensors,cyber security,and artificial intelligences.展开更多
To reduce the complexity of the configuration and control strategy for shoulder rehabilitation exoskeleton,a 2R1R1P2R serial of shoulder exoskeleton based on gravity balance is proposed.Based on three basic rotatory s...To reduce the complexity of the configuration and control strategy for shoulder rehabilitation exoskeleton,a 2R1R1P2R serial of shoulder exoskeleton based on gravity balance is proposed.Based on three basic rotatory shoulder joints,an exact kinematic constraint system can be formed between the exoskeleton and the upper arm by introducing a passive sliding pair and a center of glenohumeral(CGH)unpowered compensation mechanism,which realizes the human-machine kinematic compatibility.Gravity balance is used in the CGH compensation mechanism to provide shoulder joint support.Meanwhile,the motion of the compensation mechanism is pulled by doing reverse leading through the arm to realize the kinematic self-adaptive,which decreases control complexity.Besides,a simple and intuitive spring adjustment strategy is proposed to ensure the gravity balance of any prescribed quality.Furthermore,according to the influencing factors analysis of the scapulohumeral rhythm,the kinematic analysis of CGH mechanism is performed,which shows that the mechanism can fit the trajectory of CGH under various conditions.Finally,the dynamic simulation of the mechanism is carried out.Results indicate that the compensation torques are reduced to below 0.22 N·m,and the feasibility of the mechanism is also verified.展开更多
This paper studies the case of the collusive price of the hotel industry in Kunming by economically analyzingthe unsustainability of the collusive price and instability of collusive organizations, doubts about the col...This paper studies the case of the collusive price of the hotel industry in Kunming by economically analyzingthe unsustainability of the collusive price and instability of collusive organizations, doubts about the collusive behavior,and thinks that the collusive price is not helpful to the development of tourism industry, the pillar industry in YunnanProvince.展开更多
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co...In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a collusion detector based on the GN algorithm for the trust evaluation model is proposed in the open Internet environment. By analyzing the behavioral characteristics of collusion groups, the concept of flatting is defined and the G-N community mining algorithm is used to divide suspicious communities. On this basis, a collusion community detector method is proposed based on the breaking strength of suspicious communities. Simulation results show that the model has high recognition accuracy in identifying collusion nodes, so as to effectively defend against malicious attacks of collusion nodes.展开更多
The fusion of VlSI (visual identity system Internet), digital maps and Web GIS is presented. Web GIS interface interactive design with VISI needs to consider more new factors. VISI can provide the design principle, ...The fusion of VlSI (visual identity system Internet), digital maps and Web GIS is presented. Web GIS interface interactive design with VISI needs to consider more new factors. VISI can provide the design principle, elements and contents for the Web GIS. The design of the Wuhan Bus Search System is fulfilled to confirm the validity and practicability of the fusion.展开更多
We introduce evolutionary game method to analyze low-price collusion in inquiry market of Sci-Tech Innovation Board of China(SIBC)from the perspective of strategic interaction between large institutional investors(LII...We introduce evolutionary game method to analyze low-price collusion in inquiry market of Sci-Tech Innovation Board of China(SIBC)from the perspective of strategic interaction between large institutional investors(LIIs),small and medium-sized institutional investors(SMIIs),and supervision department(SD).The results show that supervision behaviors of SD,and quotation behaviors of institutional investors,are subject to supervision conditions.Under the condition that benefits of tough supervision are lower a lot than minimum benefits of light supervision(light supervision condition),SD will choose light supervision and institutional investors will turn to illegal quotation in response.Finally,a steady-state equilibrium with low-price collusion will form in SIBC’s inquiry market even with a large supervision penalty for illegal quotation.On the contrary,under the condition that benefits of tough supervision are higher a lot than maximum benefits of light supervision(tough supervision condition)and with a large penalty for illegal quotation,SD and institutional investors will choose tough supervision and legal quotation.Further numerical simulations under light supervision condition show that:(1)High-price culling rule will become a booster for low-price collusion and accelerate SMIIs’evolutionary process to imitative quotation.(2)Blindly increasing penalties for illegal quotation or reducing the culling rate is not an appropriate approach to solve the problem of low-price collusion since it cannot shift supervision condition from light into tough and make SD supervise toughly.(3)Institutional investors’choices of quotation strategies are more volatile and highly susceptible to supervision behaviors of SD when facing exogenous uncertainty.Therefore,the keys to solving the problem of low-price collusion are shifting supervision condition from light into tough through increasing incremental benefits of tough supervision,and providing institutional investors with a stable and predictable supervision policy.In conclusion,the creation of a fair inquiry market doesn’t only depend on restraint and punishment to institutional investors,but also requires the establishment of supervision mechanism those are compatible with market-based inquiry.展开更多
Wireless Sensor Networks (WSNs) are being deployed for a wide variety of applications and the security problems of them have received considerable attention. Considering the limitations of power, computation capabilit...Wireless Sensor Networks (WSNs) are being deployed for a wide variety of applications and the security problems of them have received considerable attention. Considering the limitations of power, computation capability and storage resources, this paper proposed an efficient defense against collusion scheme based on elliptic curve cryptography for wireless sensor networks in order to solve the problems that sensor node-key leaking and adversaries make compromised nodes as their collusions to launch new attack. In the proposed scheme, the group-key distribution strategy is employed to compute the private key of each sensor node, and the encryption and decryption algorithms are constructed based on Elliptic Curve Cryptography (ECC). The command center (node) only needs to broadcast a controlling header with three group elements, and the authorized sensor node can correctly recover the session key and use it to decrypt the broadcasting message. Analysis and proof of the proposed scheme's efficiency and security show that the proposed scheme can resist the k-collusion attack efficiently.展开更多
Speech recognition rate will deteriorate greatly in human-machine interaction when the speaker's speech mixes with a bystander's voice. This paper proposes a time-frequency approach for Blind Source Seperation...Speech recognition rate will deteriorate greatly in human-machine interaction when the speaker's speech mixes with a bystander's voice. This paper proposes a time-frequency approach for Blind Source Seperation (BSS) for intelligent Human-Machine Interaction(HMI). Main idea of the algorithm is to simultaneously diagonalize the correlation matrix of the pre-whitened signals at different time delays for every frequency bins in time-frequency domain. The prososed method has two merits: (1) fast convergence speed; (2) high signal to interference ratio of the separated signals. Numerical evaluations are used to compare the performance of the proposed algorithm with two other deconvolution algorithms. An efficient algorithm to resolve permutation ambiguity is also proposed in this paper. The algorithm proposed saves more than 10% of computational time with properly selected parameters and achieves good performances for both simulated convolutive mixtures and real room recorded speeches.展开更多
Teleoperation is of great importance in the area of robotics,especially when people are unavailable in the robot workshop.It provides a way for people to control robots remotely using human intelligence.In this paper,...Teleoperation is of great importance in the area of robotics,especially when people are unavailable in the robot workshop.It provides a way for people to control robots remotely using human intelligence.In this paper,a robotic teleoperation system for precise robotic manipulation is established.The data glove and the 7-degrees of freedom(DOFs)force feedback controller are used for the remote control interaction.The control system and the monitor system are designed for the remote precise manipulation.The monitor system contains an image acquisition system and a human-machine interaction module,and aims to simulate and detect the robot running state.Besides,a visual object tracking algorithm is developed to estimate the states of the dynamic system from noisy observations.The established robotic teleoperation systemis applied to a series of experiments,and high-precision results are obtained,showing the effectiveness of the physical system.展开更多
We analyze an infinite horizon difference game between four aggregated industries-production of producer goods, production of consumption goods, federation of labor unions, and commercial banking sector. Consumers do ...We analyze an infinite horizon difference game between four aggregated industries-production of producer goods, production of consumption goods, federation of labor unions, and commercial banking sector. Consumers do not behave strategically. They make their decisions on the basis of maximization of average discounted utility. Therefore, we do not include them in the set of players in the game. The payoffof each production industry and the commercial banking sector is equal to the average discounted sum of real dividends of its owners. The payoff of the federation of labor unions is equal to the average discounted sum of real wages and real unemployment benefits. A strict strong perfect general equilibrium is the applied solution concept for the game. It requires that there does not exist a coalition of players that can weakly Pareto improve the vector of continuation payoffs of its members in some subgame by a coordinated deviation. It is a refinement of Rubinstein's concept of a strong perfect equilibrium. We formulate and prove the sufficient condition for its existence. It is based on the assumption that no one of the aggregated industries can have a positive output without using some minimal amount of output of each other aggregated industry as an input. By definition, in each subgame, the equilibrium payoff vector in a strict strong perfect general equilibrium is strictly Pareto efficient. Thus, if each consumer either has only income from wage and unemployment benefit or receives dividend from only one aggregated industry, and his nominal income in each period along the equilibrium path exceeds social minimum, it is not possible to weakly Pareto improve the vector of consumers' average discounted real incomes. This holds not only for the whole game but also for each subgame starting in the first phase of some period.展开更多
Background With an increasing number of vehicles becoming autonomous,intelligent,and connected,paying attention to the future usage of car human-machine interface with these vehicles should become more relevant.Severa...Background With an increasing number of vehicles becoming autonomous,intelligent,and connected,paying attention to the future usage of car human-machine interface with these vehicles should become more relevant.Several studies have addressed car HMI but were less attentive to designing and implementing interactive glazing for every day(autonomous)driving contexts.Methods Reflecting on the literature,we describe an engineering psychology practice and the design of six novel future user scenarios,which envision the application of a specific set of augmented reality(AR)support user interactions.Additionally,we conduct evaluations on specific scenarios and experiential prototypes,which reveal that these AR scenarios aid the target user groups in experiencing a new type of interaction.The overall evaluation is positive with valuable assessment results and suggestions.Conclusions This study can interest applied psychology educators who aspire to teach how AR can be operationalized in a human-centered design process to students with minimal pre-existing expertise or minimal scientific knowledge in engineering psychology.展开更多
In order to ensure the safety of children while using machineries and avoid harm caused by mechanical toys,this paper analyzes the types and detection standards of children’s toys,discusses the reasons for the harm c...In order to ensure the safety of children while using machineries and avoid harm caused by mechanical toys,this paper analyzes the types and detection standards of children’s toys,discusses the reasons for the harm caused by these toys,and proposes human-machine safety design strategies for children’s toys as reference.展开更多
Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform...Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. according to its’ own benefit rather than to their time of arrival. In this research, we present a novel protocol, called Collusion-Resistant Distributed Agent-based Signature Delegation (CDASD) protocol, to allow an agent host to delegate its signing power to an anonymous mobile agent in such a way that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The protocol introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The protocol incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the protocol is that, in addition to allowing secure and anonymous signature delegation, it enables tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed protocol are analyzed, and the protocol is compared with the most related work.展开更多
基金Supported by National Natural Science Foundation of China(Grant No.52075036)Key Technologies Research and Development Program of China(Grant No.2022YFC3302204).
文摘The Chinese express delivery industry processes nearly 110 billion items in 2022,averaging an annual growth rate of 200%.Among the various types of sorting systems used for handling express items,cross-belt sorting systems stand out as the most crucial.However,despite their high degree of automation,the workload for operators has intensified owing to the surging volume of express items.In the era of Industry 5.0,it is imperative to adopt new technologies that not only enhance worker welfare but also improve the efficiency of cross-belt systems.Striking a balance between efficiency in handling express items and operator well-being is challenging.Digital twin technology offers a promising solution in this respect.A realization method of a human-machine integrated digital twin is proposed in this study,enabling the interaction of biological human bodies,virtual human bodies,virtual equipment,and logistics equipment in a closed loop,thus setting an operating framework.Key technologies in the proposed framework include a collection of heterogeneous data from multiple sources,construction of the relationship between operator fatigue and operation efficiency based on physiological measurements,virtual model construction,and an online optimization module based on real-time simulation.The feasibility of the proposed method was verified in an express distribution center.
基金supported in part by the National Natural Science Foundation of China(U181321461773369+2 种基金61903360)the Selfplanned Project of the State Key Laboratory of Robotics(2020-Z12)China Postdoctoral Science Foundation funded project(2019M661155)。
文摘Electromyography(EMG)has already been broadly used in human-machine interaction(HMI)applications.Determining how to decode the information inside EMG signals robustly and accurately is a key problem for which we urgently need a solution.Recently,many EMG pattern recognition tasks have been addressed using deep learning methods.In this paper,we analyze recent papers and present a literature review describing the role that deep learning plays in EMG-based HMI.An overview of typical network structures and processing schemes will be provided.Recent progress in typical tasks such as movement classification,joint angle prediction,and force/torque estimation will be introduced.New issues,including multimodal sensing,inter-subject/inter-session,and robustness toward disturbances will be discussed.We attempt to provide a comprehensive analysis of current research by discussing the advantages,challenges,and opportunities brought by deep learning.We hope that deep learning can aid in eliminating factors that hinder the development of EMG-based HMI systems.Furthermore,possible future directions will be presented to pave the way for future research.
基金the National Key R&D Project from Minister of Science and Technology(Grant No.2016YFA0202704)the Beijing Municipal Natural Science Foundation(Grant No.2212052)+1 种基金the Shanghai Sailing Program(Grant No.19S28101)the Fundamental Research Funds for the Central Universities(Grant No.19D128102).
文摘Combination flexible and stretchable textiles with self-powered sensors bring a novel insight into wearable functional electronics and cyber security in the era of Internet of Things.This work presents a highly flexible and self-powered fully fabric-based triboelectric nanogenerator(F-TENG)with sandwiched structure for biomechanical energy harvesting and real-time biometric authentication.The prepared F-TENG can power a digital watch by low-frequency motion and respond to the pressure change by the fall of leaves.A self-powered wearable keyboard(SPWK)is also fabricated by integrating large-area F-TENG sensor arrays,which not only can trace and record electrophysiological signals,but also can identify individuals’typing characteristics by means of the Haar wavelet.Based on these merits,the SPWK has promising applications in the realm of wearable electronics,self-powered sensors,cyber security,and artificial intelligences.
基金The National Natural Science Foundation of China(No.51675098)。
文摘To reduce the complexity of the configuration and control strategy for shoulder rehabilitation exoskeleton,a 2R1R1P2R serial of shoulder exoskeleton based on gravity balance is proposed.Based on three basic rotatory shoulder joints,an exact kinematic constraint system can be formed between the exoskeleton and the upper arm by introducing a passive sliding pair and a center of glenohumeral(CGH)unpowered compensation mechanism,which realizes the human-machine kinematic compatibility.Gravity balance is used in the CGH compensation mechanism to provide shoulder joint support.Meanwhile,the motion of the compensation mechanism is pulled by doing reverse leading through the arm to realize the kinematic self-adaptive,which decreases control complexity.Besides,a simple and intuitive spring adjustment strategy is proposed to ensure the gravity balance of any prescribed quality.Furthermore,according to the influencing factors analysis of the scapulohumeral rhythm,the kinematic analysis of CGH mechanism is performed,which shows that the mechanism can fit the trajectory of CGH under various conditions.Finally,the dynamic simulation of the mechanism is carried out.Results indicate that the compensation torques are reduced to below 0.22 N·m,and the feasibility of the mechanism is also verified.
文摘This paper studies the case of the collusive price of the hotel industry in Kunming by economically analyzingthe unsustainability of the collusive price and instability of collusive organizations, doubts about the collusive behavior,and thinks that the collusive price is not helpful to the development of tourism industry, the pillar industry in YunnanProvince.
基金supported by the National Natural Science Foundation of China(6140224161572260+3 种基金613730176157226161472192)the Scientific&Technological Support Project of Jiangsu Province(BE2015702)
文摘In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a collusion detector based on the GN algorithm for the trust evaluation model is proposed in the open Internet environment. By analyzing the behavioral characteristics of collusion groups, the concept of flatting is defined and the G-N community mining algorithm is used to divide suspicious communities. On this basis, a collusion community detector method is proposed based on the breaking strength of suspicious communities. Simulation results show that the model has high recognition accuracy in identifying collusion nodes, so as to effectively defend against malicious attacks of collusion nodes.
基金Supported by the National Natural Science Foundation of China (No. 40071071).
文摘The fusion of VlSI (visual identity system Internet), digital maps and Web GIS is presented. Web GIS interface interactive design with VISI needs to consider more new factors. VISI can provide the design principle, elements and contents for the Web GIS. The design of the Wuhan Bus Search System is fulfilled to confirm the validity and practicability of the fusion.
基金funded by the National Natural Science Foundation of China(72172164)Natural Science Foundation of Guangdong Province(2021A1515011354).
文摘We introduce evolutionary game method to analyze low-price collusion in inquiry market of Sci-Tech Innovation Board of China(SIBC)from the perspective of strategic interaction between large institutional investors(LIIs),small and medium-sized institutional investors(SMIIs),and supervision department(SD).The results show that supervision behaviors of SD,and quotation behaviors of institutional investors,are subject to supervision conditions.Under the condition that benefits of tough supervision are lower a lot than minimum benefits of light supervision(light supervision condition),SD will choose light supervision and institutional investors will turn to illegal quotation in response.Finally,a steady-state equilibrium with low-price collusion will form in SIBC’s inquiry market even with a large supervision penalty for illegal quotation.On the contrary,under the condition that benefits of tough supervision are higher a lot than maximum benefits of light supervision(tough supervision condition)and with a large penalty for illegal quotation,SD and institutional investors will choose tough supervision and legal quotation.Further numerical simulations under light supervision condition show that:(1)High-price culling rule will become a booster for low-price collusion and accelerate SMIIs’evolutionary process to imitative quotation.(2)Blindly increasing penalties for illegal quotation or reducing the culling rate is not an appropriate approach to solve the problem of low-price collusion since it cannot shift supervision condition from light into tough and make SD supervise toughly.(3)Institutional investors’choices of quotation strategies are more volatile and highly susceptible to supervision behaviors of SD when facing exogenous uncertainty.Therefore,the keys to solving the problem of low-price collusion are shifting supervision condition from light into tough through increasing incremental benefits of tough supervision,and providing institutional investors with a stable and predictable supervision policy.In conclusion,the creation of a fair inquiry market doesn’t only depend on restraint and punishment to institutional investors,but also requires the establishment of supervision mechanism those are compatible with market-based inquiry.
基金Supported by the Six Great Talent Peak Plan of Jiangsu Province (No.06-E-044)the "Qinlan Project" Plan of Jiangsu Province 2006
文摘Wireless Sensor Networks (WSNs) are being deployed for a wide variety of applications and the security problems of them have received considerable attention. Considering the limitations of power, computation capability and storage resources, this paper proposed an efficient defense against collusion scheme based on elliptic curve cryptography for wireless sensor networks in order to solve the problems that sensor node-key leaking and adversaries make compromised nodes as their collusions to launch new attack. In the proposed scheme, the group-key distribution strategy is employed to compute the private key of each sensor node, and the encryption and decryption algorithms are constructed based on Elliptic Curve Cryptography (ECC). The command center (node) only needs to broadcast a controlling header with three group elements, and the authorized sensor node can correctly recover the session key and use it to decrypt the broadcasting message. Analysis and proof of the proposed scheme's efficiency and security show that the proposed scheme can resist the k-collusion attack efficiently.
文摘Speech recognition rate will deteriorate greatly in human-machine interaction when the speaker's speech mixes with a bystander's voice. This paper proposes a time-frequency approach for Blind Source Seperation (BSS) for intelligent Human-Machine Interaction(HMI). Main idea of the algorithm is to simultaneously diagonalize the correlation matrix of the pre-whitened signals at different time delays for every frequency bins in time-frequency domain. The prososed method has two merits: (1) fast convergence speed; (2) high signal to interference ratio of the separated signals. Numerical evaluations are used to compare the performance of the proposed algorithm with two other deconvolution algorithms. An efficient algorithm to resolve permutation ambiguity is also proposed in this paper. The algorithm proposed saves more than 10% of computational time with properly selected parameters and achieves good performances for both simulated convolutive mixtures and real room recorded speeches.
基金NSFC-Shenzhen Robotics Research Center Project(No.U2013207)the Beijing Science and Technology Plan Project(No.Z191100008019008)。
文摘Teleoperation is of great importance in the area of robotics,especially when people are unavailable in the robot workshop.It provides a way for people to control robots remotely using human intelligence.In this paper,a robotic teleoperation system for precise robotic manipulation is established.The data glove and the 7-degrees of freedom(DOFs)force feedback controller are used for the remote control interaction.The control system and the monitor system are designed for the remote precise manipulation.The monitor system contains an image acquisition system and a human-machine interaction module,and aims to simulate and detect the robot running state.Besides,a visual object tracking algorithm is developed to estimate the states of the dynamic system from noisy observations.The established robotic teleoperation systemis applied to a series of experiments,and high-precision results are obtained,showing the effectiveness of the physical system.
文摘We analyze an infinite horizon difference game between four aggregated industries-production of producer goods, production of consumption goods, federation of labor unions, and commercial banking sector. Consumers do not behave strategically. They make their decisions on the basis of maximization of average discounted utility. Therefore, we do not include them in the set of players in the game. The payoffof each production industry and the commercial banking sector is equal to the average discounted sum of real dividends of its owners. The payoff of the federation of labor unions is equal to the average discounted sum of real wages and real unemployment benefits. A strict strong perfect general equilibrium is the applied solution concept for the game. It requires that there does not exist a coalition of players that can weakly Pareto improve the vector of continuation payoffs of its members in some subgame by a coordinated deviation. It is a refinement of Rubinstein's concept of a strong perfect equilibrium. We formulate and prove the sufficient condition for its existence. It is based on the assumption that no one of the aggregated industries can have a positive output without using some minimal amount of output of each other aggregated industry as an input. By definition, in each subgame, the equilibrium payoff vector in a strict strong perfect general equilibrium is strictly Pareto efficient. Thus, if each consumer either has only income from wage and unemployment benefit or receives dividend from only one aggregated industry, and his nominal income in each period along the equilibrium path exceeds social minimum, it is not possible to weakly Pareto improve the vector of consumers' average discounted real incomes. This holds not only for the whole game but also for each subgame starting in the first phase of some period.
基金Supported by the‘Automotive Glazing Application in Intelligent Cockpit Human-Machine Interface’project(SKHX2021049)a collaboration between the Saint-Go Bain Research and the Beijing Normal University。
文摘Background With an increasing number of vehicles becoming autonomous,intelligent,and connected,paying attention to the future usage of car human-machine interface with these vehicles should become more relevant.Several studies have addressed car HMI but were less attentive to designing and implementing interactive glazing for every day(autonomous)driving contexts.Methods Reflecting on the literature,we describe an engineering psychology practice and the design of six novel future user scenarios,which envision the application of a specific set of augmented reality(AR)support user interactions.Additionally,we conduct evaluations on specific scenarios and experiential prototypes,which reveal that these AR scenarios aid the target user groups in experiencing a new type of interaction.The overall evaluation is positive with valuable assessment results and suggestions.Conclusions This study can interest applied psychology educators who aspire to teach how AR can be operationalized in a human-centered design process to students with minimal pre-existing expertise or minimal scientific knowledge in engineering psychology.
文摘In order to ensure the safety of children while using machineries and avoid harm caused by mechanical toys,this paper analyzes the types and detection standards of children’s toys,discusses the reasons for the harm caused by these toys,and proposes human-machine safety design strategies for children’s toys as reference.
文摘Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. according to its’ own benefit rather than to their time of arrival. In this research, we present a novel protocol, called Collusion-Resistant Distributed Agent-based Signature Delegation (CDASD) protocol, to allow an agent host to delegate its signing power to an anonymous mobile agent in such a way that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The protocol introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The protocol incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the protocol is that, in addition to allowing secure and anonymous signature delegation, it enables tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed protocol are analyzed, and the protocol is compared with the most related work.