𝔖 Scriptorium
✦   LIBER   ✦

📁

Human Centered Computing: 6th International Conference, HCC 2020, Virtual Event, December 14–15, 2020, Revised Selected Papers

✍ Scribed by Qiaohong Zu, Yong Tang, Vladimir Mladenović


Publisher
Springer
Year
2021
Tongue
English
Leaves
491
Series
Lecture Notes in Computer Science
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes thoroughly reviewed, revised and selected papers from the 6th International Conference on Human Centered Computing, HCC 2020, held in virtually, due to COVID- 19, in December 2020. The 28 full and 20 short papers presented in this volume were carefully reviewed and selected from a total of 133 submissions.

The conference focuses on the following three main themes as follows: Data such as Data Visualization, Big Data, Data Security, Hyper connectivity such as Internet of Things, Cloud Computing, Mobile Network and Collaboration such as Collective Intelligence, Peer Production, Context Awareness and much more.

✦ Table of Contents


Preface
Organization
Contents
Dynamic Pick and Place Trajectory of Delta Parallel Manipulator
1 Preface
2 Kinematic Analysis of the Delta Manipulator
2.1 Analysis of Configuration
2.2 Workspace Analysis
3 Gravity Search Algorithm Based on Fuzzy Control
3.1 GSA
3.2 FPGSA
4 Trajectory Optimization Simulation
4.1 Parameter Settings
4.2 Analysis of Simulation Results
5 Conclusion
References
Design of Aquatic Product Traceability Coding Scheme Based on EPC Label
1 Introduction
2 Factor Analysis of Aquatic Product Traceability Link
3 Design of Traceability Coding for Fresh, Famous and Excellent Aquatic Products
3.1 Choice of Encoding Type
3.2 Coding Design Scheme
3.3 Coding Example
3.4 Design of Aquatic Product Safety and Anti-counterfeiting Scheme
4 Application of EPC Coding in the Overall System Architecture
4.1 The Overall Architecture Design of the System
4.2 Description of the Overall Architecture of the System
5 Summary
References
DEVS-Based Modeling and Simulation of Wireless Sensor Network
1 Discrete Event System Specification
2 DEVS-Based WSN Modeling
2.1 Sensor Component Modeling
2.2 Processor Component Modeling
2.3 Wireless Communication Component Modeling
2.4 Power Component Modeling
2.5 WSN Node Modeling
2.6 WSN Modeling
3 Simulation Experiment and Analysis
3.1 Routing Protocol
3.2 Simulator Introduction and Simulation Analysis
4 Conclusion
References
Spatial Reciprocity Aided CSI Acquirement for HST Massive MIMO
1 Introduction
2 System Model
3 Sparse Bayesian Learning Formulation
3.1 Sparse Received Signal Model
3.2 Prior of Parameters and Sparse Problem Formulation
3.3 Block MM Algorithm
4 Simulation
5 Conclusion
References
A Flexible Film Thermocouple Temperature Sensor
1 Introduction
2 Theoretical Analysis
2.1 Working Principle
2.2 Four Important Laws of Thermocouples
2.3 Thermoelectric Performance
3 Device Design and Manufacturing
4 Experimental Testing and Analysis
4.1 Experimental Test Platform
4.2 Metal Film Thickness Optimization Experiment
4.3 Temperature Optimization Experiment of Metal Film Sputtering Substrate
4.4 Adhesion Test Experiment
4.5 Thermocouple Static Calibration Experiment
5 Conclusion
References
Design of a Morphing Surface Using Auxetic Lattice Skin for Space-Reconfigurable Reflectors
1 Introduction
2 Mechanical Investigation of Surface Reshaping
2.1 Stress Analysis of Bending Deformation Dominated
2.2 Membrane Stress vs. Poisson’s Ratio
2.3 Stress Analysis of Reflector Reshaping
3 Geometry Analysis of Reflector Surfaces
4 Optimal Design of Reflector Surface
4.1 Lattice Based Structure
4.2 Thickness of Reflector Surface
5 Conclusion
References
The Method of User Information Fusion Oriented to Manufacturing Service Value Net
1 Introduction
2 Related Work
2.1 Data Fusion Research Work
2.2 Homomorphic Encryption Algorithm
2.3 RESTful Interface Specification
3 A User Information Fusion Method Base on Homomorphic Encryption Algorithm
3.1 The Data Structure of User Information
3.2 The Preprocessing of System User Information
3.3 The Transmission of User Information Based on RESTful
4 Case of Fusing User Information for Value Net
4.1 Case Illustration
4.2 Process of Fusing User Information
4.3 The Use of Fusion Results
5 Summary
References
Image Fusion Method for Transformer Substation Based on NSCT and Visual Saliency
1 Introduction
2 Basic Principle
2.1 YUV Color Space
2.2 NSCT Transform
2.3 FT Algorithm
2.4 Guided Filter
3 Methods
4 Experiment and Results
5 Conclusion
References
Permission Dispatching Mechanism Inside and Outside of the Warranty Period for Equipment Maintenance Service System
1 Introduction
2 The Resource of Equipment Maintenance System
2.1 System Resource Structure
2.2 System Resource Structure
3 Permission Dispatching Mechanism
3.1 Permission Dispatching Model
3.2 Hierarchical Control Strategy Based on User Group
3.3 Permission Dispatching Mechanism Verification
4 Conclusions
References
New Technology Development and Application Trends Based on Monitoring of Patent Data
1 Introduction
2 Technology Analysis Model
2.1 Technology Information
2.2 Personal Information
3 Construction of Technology Analysis Model
3.1 Data Acquisition and Pre-processing
3.2 Network Data Processing
3.3 Text Data Processing
3.4 Data Visualization Analysis
4 Empirical Analysis
4.1 Provincial Distribution Map
4.2 Subdomain Trend Chart
4.3 Domain Technology Composition Chart
4.4 Comprehensive Analysis Diagram
5 Conclusion and Discussion
References
A K-means Clustering Optimization Algorithm for Spatiotemporal Trajectory Data
1 K-means Clustering Algorithm
1.1 The Principle of Algorithms
1.2 Similarity Measures
2 Optimization of K-means Clustering Algorithm for Spatiotemporal Trajectory Data
2.1 Space-Time Trajectory Data Pre-processing
2.2 Improved K-means Clustering Algorithm for Spatiotemporal Trajectory Data
3 Experiments and Analysis
3.1 Simulation Comparison of K-means Classical and Optimized Algorithms
3.2 Testing the Applicability of Optimal K-means Algorithm Under Data Sample Changes
3.3 Optimization of K-means Algorithm Performance Detection Experiments Under K-value Variation
4 Conclusion
References
Temporal and Spatial Changes of Ecosystem Health in Guangdong Province in Recent 11 Years
1 Preface
2 Overview of the Study Area
3 Data Collection and Preprocessing
4 Research Methods
4.1 Construction of Evaluation Index System
4.2 Standardization of Evaluation Indicators
4.3 Determination of Evaluation Index Weight
4.4 Ecosystem Health Assessment Model
4.5 Ecosystem Health Classification
5 Result Analysis
5.1 Health Status of Ecosystem Vitality
5.2 Health Status of Ecosystem Organization
5.3 Health Status of Ecosystem Resilience
5.4 Analysis of Ecosystem Health
6 Conclusion
References
Salient Attention Model and Classes Imbalance Remission for Video Anomaly Analysis with Weak Label
1 Introduction
2 Related Work
3 Proposed Method
3.1 Anomaly Detection Model
3.2 Anomaly Features Selection
3.3 Anomaly Classification
3.4 Loss Function
4 Experiments
4.1 Experimental Setting and Metric
4.2 Results and Analysis
5 Conclusion
References
A Data Fusion Model Based on Multi-source Non-real-Time Intelligence
1 Background Analysis
2 Data Fusion Model Design
2.1 Non-real-Time Intelligence Source
2.2 Fusion Algorithm
2.3 Fusion Calculation
2.4 Threat Integrating of Non-real-Time and Real-Time Intelligence Sources
3 Conclusion
References
Ancient Chinese Lexicon Construction Based on Unsupervised Algorithm of Minimum Entropy and CBDB Optimization
1 Introduction
2 Related Work
2.1 Bilingual Word Segmentation
2.2 Monolingual Word Segmentation
3 Models and Algorithms
3.1 Minimum Entropy Model
3.2 Unsupervised Lexicon Construction Algorithm
4 Word Segmentation Experiment Based on Large-Scale Ancient Chinese Corpus
4.1 Unsupervised Lexicon Construction Experiment
4.2 Lexicon Optimized Based on CDBD
4.3 Comparative Experiment of Ancient Chinese Word Segmentation
5 Results
6 Summary
References
Availability Analysis of GNSS RAIM Based on Maximum Undetectable Position Bias
1 Introduction
2 Methods
2.1 The Estimation of Positions and Bias
2.2 Calculation of HDOPmax
2.3 Bias Integrity Threat (BIT)
2.4 The Maximum Undetectable Position Bias (MUPB)
3 Data and Analysis Setting
4 Results
5 Conclusions
References
Psychological Semantic Differences of Zhang Juzheng Before and After DuoQing Event
1 Introduction
2 Method
2.1 Data Selection
2.2 Data Processing
2.3 Data Analysis
3 Results
4 Discussion
4.1 Zhang Juzheng was an efficient manager who loves power and work
4.2 The Development of DuoQing Event Beyond Zhang's Expectations, and the Incomprehension and Impeachment of His Close People Make Him Sad
5 Conclusions
References
Digital Rights Management Platform Based on Blockchain Technology
1 Introduction
2 Related Work
2.1 Overview of Blockchain
2.2 Smart Contract
2.3 IPFS
2.4 Hyperledger Fabric
2.5 Related Technology Analysis
3 Analysis and Design on Digital Rights Management
3.1 Business Analysis
3.2 System Architecture
4 System Function Design
4.1 User Information Management Module
4.2 Digital Work Confirmation Copyright Module
4.3 Digital Copyright Transaction Module
4.4 Digital Works Copyright Protection Module
5 Comparison with Traditional Platforms
6 Conclusion and Outlook
References
A Deep Hybrid Neural Network Forecasting for Multivariate Non-stationary Time Series
1 Introduction
2 State of the Art
3 Time Series
3.1 Financial Time Series
3.2 Multivariate Time Series
4 Methodology
4.1 The Convolutional Layer and the Pooling Layer for Modeling the Non-stationary Multivariate Time Series
4.2 CNN + LSTM Model for Modeling the Non-stationary Multivariate Time Series
5 Experimental Results and Analysis
5.1 Experimental Data and Experimental Environment
5.2 Experimental Result
6 Conclusion
References
Risk Assessment of Flood Disasters in Hechi City Based on GIS
1 Introduction
2 Study Area Description
3 Data and Approach
3.1 Data Source and Preprocessing
3.2 Research Methods
4 Results and Analysis
4.1 Risk Analysis of Hazards
4.2 Environmental Sensitivity Analysis
4.3 Vulnerability analysis of disaster-bearing body
4.4 Risk Assessment of Flood Disaster
5 Conclusion
References
Cultural Symbol Recognition Algorithm Based on CTPN + CRNN
1 Introduction
2 CTPN + CRNN Recognition Algorithm Principle
2.1 CTPN Text Detection Principle
2.2 CRNN Text Recognition Principle
2.3 Process Flow of Text Recognition Based on CTPN and CRNN
3 Algorithm Experiment
4 Conclusion
References
Spatial-Temporal Variation and Future Changing Trend of NDVI in the Pearl River Basin from 1982 to 2015
1 The Introduction
2 Overview of the Research Area
3 Data and Methods
3.1 Data Source and Preprocessing
3.2 Research Methods
4 Result Analysis
4.1 Spatial and Temporal Characteristics of NDVI
4.2 The Changing Trend of NDVI
4.3 The Future Trend of NDVI
5 Conclusion
5.1 Discussion
5.2 Conclusion
References
An Improved Collaborative Filtering Algorithm Based on Filling Missing Data
1 Introduction
2 Related Work
3 Recommendation Algorithm
3.1 Loss Function
3.2 Improved Alternating Least Squares Method
3.3 Algorithm Description
4 Experimental Design and Result Analysis
4.1 The Experimental Data Set
4.2 Evaluation Metrics
4.3 Experimental Analysis
5 Summary
References
Diagnosis Method of Alzheimer’s Disease in PET Image Based on CNN Multi-mode Network
1 Introduction
2 Design of Model Architecture
2.1 Image Preprocessing
2.2 Texture Feature Extraction
3 Multi-scale Feature Extraction Based on CNN
4 Experiments and Result
4.1 Experimental Setup and Data Set
4.2 Texture Features Representation Evaluation
4.3 Deep Learning Features Representation Evaluation
4.4 Feature Fusion Evaluation
5 Conclusion
References
Research on Multi-floor Path Planning Based on Recommendation Factors
1 Introduction
2 Multi-floor Path Planning Method Based on Recommendation Factors
2.1 Recommendation Algorithm
2.2 The Recommendation to Multiple Floor Path Nodes
2.3 Multi-floor Path Planning Model Construction
3 Simulation Experiments
4 Conclusion
References
E-commerce Review Classification Based on SVM
1 Introduction
2 Introduction of SVM Algorithm and Information Gain Method
2.1 SVM Algorithm
2.2 Information Gain Method
3 The Realization of e-commerce Review Information System
3.1 System Structure and Function Design
3.2 Comprehensive System Framework Design of J2EE
4 Experiment of Comment Classification Based on SVM
4.1 Data Preprocessing
4.2 Data Acquisition
4.3 Establishment of SVM-Based Comment Classification Model
5 Experimental Results Analysis and Comment Information System Presentation
5.1 Analysis of Experimental Results
5.2 Verification of Main Function Modules of the Comment Information System
6 Conclusion
References
Experimental Research of Galfenol Composite Cantilever
1 Introduction
2 Construction of Experimental Platform
3 Experimental Research
3.1 Introduction of Static Experiment
3.2 Effect of Substrate Thickness Without Load
3.3 Influence of Bending Moment Load Without Magnetic Field
4 Conclusion
References
A Capacitive Flexible Tactile Sensor
1 Introduction
2 Structure Design
3 Preparation Process
4 Experiment and Analysis
5 Conclusion
References
Multi-objective Optimization of E-commerce Logistics Warehouse Layout Based on Genetic Algorithm
1 Introduction
2 Description of Goods Slotting Problem
2.1 Slotting Optimization Principles
2.2 The Basis Assumption of the Problem
3 Mathematical Model of Slotting Optimization
3.1 Target Function and Constraint Conditions
4 Solution of Layout Optimization Model Based on Genetic Algorithm
4.1 Fitness Function Determination and the Operator Designation
5 Case Simulation and Analysis
5.1 The Basic Parameter Settings and Data Entry
5.2 Analysis of Simulation Results and Model Validation
6 Conclusion
References
Magnetic Circuit Design of Galfenol Composite Cantilever
1 Introduction
2 Analysis of Magnetic Field
3 Basic Parameters of the Coil
4 Finite Element Analysis of Magnetic Circuit
5 Conclusion
References
A MEMS-Based Piezoelectric Pump with a Low Frequency and High Flow
1 Introduction
2 Structure and Principle
3 Simulation Analysis
4 Device Preparation
5 Experimental Test and Analysis
6 Conclusion
References
Micro-video Learning Resource Portrait and Its Application
1 Introduction
2 Related Work
2.1 Learning Resource Portrait
2.2 Micro-video Learning Resource Portrait
2.3 Personalized Learning Resource Recommendation
3 Portrait and Application Analysis of Micro-video Learning Resources
3.1 Micro-video Learning Resource Portrait
3.2 Personalized Recommendation of Micro-video Learning Resources
4 The Implementation of Micro-video Learning Resource Portrait and Application
4.1 Micro-Video Learning Resource Portrait
4.2 Personalized Recommendation System
5 Conclusion
References
Research on Downscaling and Correction of TRMM Data in Central China
1 Data and Methods
1.1 Research Area
1.2 Data Sources
1.3 Research Methods
2 Results and Analysis
2.1 TRMM Data Suitability Analysis
2.2 Analysis of Downscaling and Calibration Results
3 Conclusion
References
Research on the Knowledge Map of Combat Simulation Domain Based on Relational Database
1 Introduction
2 Overview of Entity Relationship in Combat Simulation Domain
3 Concept Architecture of Simulation Data Knowledge Map
3.1 Extraction of Concept Elements
3.2 Generation of Relation Elements
3.3 Generation of Attribute Elements
3.4 Extraction of Instance Elements
4 Construction of Knowledge Map of Simulation Data
5 Conclusions
References
Scale-Aware Network with Attentional Selection for Human Pose Estimation
1 Introduction
2 Related Work
2.1 Human Pose Estimation
2.2 Feature Pyramid Networks
2.3 Intermediate Supervision
2.4 Attention Mechanism
3 Our Approach
3.1 Revisiting Stacked Hourglass Network
3.2 Feature Pyramid Supervision Module
3.3 Spatial and Channel Attention Module
4 Experiments and Analysis
4.1 Experimental Setup
4.2 Ablation Study
4.3 Comparison with State-of-the-Art Methods
5 Conclusion
References
Short-Term Traffic Flow Prediction Based on SVR and LSTM
1 Introduction
2 Representation of Data
2.1 Collection of Data
2.2 Analysis and Preprocessing of Data
2.3 Evaluation Indexes
3 Prediction Using SVR or LSTM Based on Grid Search to Optimize Parameters
3.1 GridSearch-SVR Model and GridSearch-LSTM Model
3.2 Comparison with Quadratic Exponential Smoothing
4 Prediction Using SVR or LSTM Based on Swarm Intelligence Algorithms to Optimize Parameters
4.1 Swarm Intelligence Algorithms
4.2 Prediction Based on Swarm Intelligence Algorithms to Optimize Parameters
5 Conclusion
References
A Logging Overhead Optimization Method Based on Anomaly Detection Model
1 Introduction
2 Overview of Approach
3 Methodology
3.1 Log Parsing
3.2 Anomaly Detection Model
4 Evaluation
4.1 Setup
4.2 Performance of Log Parsing
4.3 Performance of Anomaly Detection Model
4.4 Logging Effectiveness
4.5 Logging Throughput
5 Conclusion
References
Multi-objective Collaborative Optimization of Multi-level Inventory: A Model Driven by After-Sales Service
1 Introduction
2 Model Analysis
2.1 Business Logic and Symbol Definition
2.2 Multi-level Inventory Model Operation Process
2.3 Establish Multi-objective Optimization Model
3 Simulation Example
3.1 Basic Data
3.2 Optimization Results
4 Conclusions
References
The Research About Spatial Distribution of Urban Functions Based on POI Data
1 Introduction
2 Research Area and Data Selection
2.1 Research Area
2.2 Data Sources and Processing
3 Research Methods
3.1 Kernel Density Estimation
3.2 Frequency Density Analysis
3.3 Standard Deviation Ellipse
4 The Spatial Distribution Characteristics of Nanning City
4.1 Overall Spatial Density Distribution
4.2 Identification of Urban Spatial Structures Based on Kernel Density Analysis
4.3 Spatial Structure Recognition of Urban Functional Areas
5 Conclusion
References
The Psychological Characteristics Changes Analysis of Su Shi Before and After the Wutai Poetry Case ——Based on the CC-LIWC
1 Introduction
2 Methods
2.1 Date Collection
2.2 Date Preprocessing
2.3 Data Analysis Before and After the Wutai Poetry Case
3 Results
4 Discussion
5 Limitation
6 Conclusion
References
A Conference Publishing System Based on Academic Social Network
1 Introduction
2 Related Work
3 System Design
3.1 Multilevel Management
3.2 Conference Recommendation Module
3.3 Associated with SCHOLAT
4 Implementation
4.1 Multilevel Management
4.2 Conference Recommendation Module
4.3 Associated with SCHOLAT
5 Conclusion
References
Software Component Library Management Mechanism for Equipment Parts Service Value-Net
1 Introduction
2 Background
3 Component Storage Management for Manufacturing Service Value Chain Collaboration
4 Component Library Organization for Manufacturing Service Value Chain Collaboration
4.1 Classification of Components
4.2 Component Entry
5 Component Library Maintenance for Manufacturing Service Value Chain Collaboration
6 Conclusion
References
No-Reference Quality Assessment for UAV Patrol Images of Transmission Line
1 Introduction
2 Method
2.1 Transmission Line Uav Patrol Image Database
2.2 No-Reference Image Quality Assessment
3 Experiments
4 Conclusion
References
An Inclusive Finance Consortium Blockchain Platform for Secure Data Storage and Value Analysis for Small and Medium-Sized Enterprises
1 Introduction
2 Background
2.1 Blockchain
2.2 Decentralized Identity (DID)
2.3 Federated Learning and Federated Transfer Learning
3 Platform
3.1 Decentralized Identity (DID) and Blockchain
3.2 Blockchain Combined with Federated Transfer Learning
3.3 Comprehensive Scheme Design and Application
4 Conclusion
4.1 From Data Security Perspective
4.2 From the Value of Data and Platform Practicality Perspective
5 Future Works
References
An Under-Sampling Method of Unbalanced Data Classification Based on Support Vector
1 Introduction
2 Methods
2.1 Support Vector Machines
2.2 Under-Sampling Based on Support Vector
3 Experiments
3.1 Data Sets
3.2 Evaluation Indicators
4 Conclusion
References
Image Classification Algorithm for Transmission Line Defects Based on Dual-Channel Feature Fusion
1 Introduction
2 Transmission Line Defect Classification Method
2.1 Construction of Transmission Line Data Set
2.2 Common Convolutional Network Models
2.3 Dual-Channel Feature Fusion ResNet Model Construction
3 Experiment
3.1 Evaluation Index
3.2 Experimental Training Process
3.3 Power Line Image Classification Effect
4 Conclusion
References
Research on Alarm Causality Filtering Based on Association Mining
1 Introduction
2 Related Work
3 Our Approach
3.1 Algorithm Overview
3.2 Verification and Filtering of Causality Between Alarms
4 Performance Evaluation
5 Conclusion
References
Exploring Psycholinguistic Differences Between Song and Ming Emperors Bases on Literary Edicts
1 Introduction
2 Research Methods
3 Results
3.1 Description of Variables
3.2 Analysis of the Top 3 Terms with Significant Differences in Significance
4 Discussions
5 Conclusion
References
The Influence of the Reform of Entrance Examination on University Development
1 Introduction
1.1 Research Background
1.2 Research Plan
2 The Basic Situation of Research
2.1 Give Priority to the Base Case of Voluntary Reporting Before the Reform
2.2 Give Priority to the Base Case of Voluntary Reporting After the Reform
2.3 The Reasons for Choosing the Above Filling Form as the Preferred Method
2.4 The Basic Information of Whether the Reform of University Entrance Examination is Helpful or not
2.5 Summary of the Questionnaire Survey
3 Analysis on the Influence of Questionnaire Survey Results
3.1 The Speed of Elimination of Inferior Majors in Universities is Accelerated
3.2 It Has Great Influence on Normal Universities
3.3 Promote the Merger of Universities into Major Categories of Enrollment
4 Summary and Suggestions on the Impact of University Entrance Examination Application Reporting Reform
4.1 A Summary of the Impact of University Entrance Examination Application Form on Students and University
4.2 Suggestions on the Impact of University Entrance Examination Application Reform
5 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Human Centered Computing: 6th Internatio
✍ Qiaohong Zu, Yong Tang, Vladimir Mladenović 📂 Library 📅 2021 🏛 Springer 🌐 English

This book constitutes thoroughly reviewed, revised and selected papers from the 6th International Conference on Human Centered Computing, HCC 2020, held in virtually, due to COVID- 19, in December 2020. The 28 full and 20 short papers presented in this volume were carefully reviewed and selected fro

Human Centered Computing: 7th Internatio
✍ Qiaohong Zu, Yong Tang, Vladimir Mladenović, Aisha Naseer, Jizheng Wan 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book constitutes thoroughly reviewed, revised and selected papers from the 7th International Conference on Human Centered Computing, HCC 2021, held in virtually, due to COVID- 19, in December 2021. <br>The 18 full and 9 short papers presented in this volume were carefully reviewed and sel

Human Centered Computing: 7th Internatio
✍ Qiaohong Zu; Yong Tang; Vladimir Mladenovic; Aisha Naseer; Jizheng Wan 📂 Library 📅 2023 🏛 Springer Nature 🌐 English

This book constitutes thoroughly reviewed, revised and selected papers from the 7th International Conference on Human Centered Computing, HCC 2021, held in virtually, due to COVID- 19, in December 2021. The 18 full and 9 short papers presented in this volume were carefully reviewed and selected from

Robotics, Computer Vision and Intelligen
✍ Péter Galambos, Erdal Kayacan, Kurosh Madani 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This volume constitutes the papers of two workshops which were held in conjunctionwith the First International Conference on Robotics, Computer Vision and Intelligent Systems,ROBOVIS 2020, Virtual Event, in November 4-6, 2020 and Second International Conference on Robotics, Computer Vision and

Computer-Human Interaction Research and
✍ Andreas Holzinger (editor), Hugo Plácido da Silva (editor), Jean Vanderdonckt (e 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This post-conference book constitutes selected papers of the Fifth International Conference on Computer-Human Interaction Research and Applications, CHIRA 2021, held virtually due to COVID 19, and Sixth International Conference on Computer-Human Interaction Research and Applications, CHIRA 202