Affective Embedded Systems: a Requirement Engineering Approach
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 2
Abstract
This paper proposes an embedded system development process able to deal with affectivity requirements. This process includes W3C tools, such as EmotionML and SysML, in order to specify cognition and affectivity as system requirements. It combines three different integration models: Sparx’s [1] and Wolf’s System Development Processes [4] and Russell’s Intelligent Agent Specification [5]. In order to validate our model, a pet robot case study was built. This application can be useful in many homecare applications, such as assistive robots for capturing attention of autistic children and robot therapy for elders. Moreover, it represents a futuristic embedded system design space for applying affective computing.
Authors and Affiliations
Millys F. A. Carvalhaes , Adson F. da Rocha , Marcus Fraga Vieira , Talles Marcelo G. de A. Barbosa
A Survey on Mobility Management Protocols for Improving Handover Performance
The wireless and mobile communication systems have enormous growth in recent years because many people use mobile devices for acquiring different services like browsing, multimedia applications and file sharing etc. Mobi...
Statistical Anomaly Detection Technique for Real Time Datasets
Data mining is the technique of discovering patterns among data to analyze patterns or decision making predictions. Anomaly detection is the technique of identifying occurrences that deviate immensely from the large a...
An Approach for Normalizing Fuzzy Relational Databases Based on Join Dependency
Fuzziness in databases is used to denote uncertain or incomplete data. Relational Databases stress on the nature of the data to be certain. This certainty based data is used as the basis of the normalization approach des...
Review of MANETS Using Distributed Public-key Cryptography
Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumpt...
Large-Girth Column-Weight Two QC-LDPC Codes
This article presents a method for constructing large girth column-weight 2 QC-LDPC codes. A distance graph is first constructed using an existing method. The distance graph is then converted into a Tanner graph. The pr...