Affective Embedded Systems: a Requirement Engineering Approach
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 2
Abstract
This paper proposes an embedded system development process able to deal with affectivity requirements. This process includes W3C tools, such as EmotionML and SysML, in order to specify cognition and affectivity as system requirements. It combines three different integration models: Sparx’s [1] and Wolf’s System Development Processes [4] and Russell’s Intelligent Agent Specification [5]. In order to validate our model, a pet robot case study was built. This application can be useful in many homecare applications, such as assistive robots for capturing attention of autistic children and robot therapy for elders. Moreover, it represents a futuristic embedded system design space for applying affective computing.
Authors and Affiliations
Millys F. A. Carvalhaes , Adson F. da Rocha , Marcus Fraga Vieira , Talles Marcelo G. de A. Barbosa
Load-Balancing Multipath Switching System with Flow Slice
Load balancing plays a pivotal role in core routers as they need to handle multiple requests at a time. To achieve load balancing Multipath Switching Systems (MPS) are widely used. One of the challenging issues in buildi...
SVM Based Ranking Model for Dynamic Adaption to Business Domains
Huge information can be obtained from vertical search domains. Often the information is very large in such a way that users need to browse further to get the required piece of information. In this context ranking plays a...
Defending wireless sensor network using Randomized Routing
Wireless Sensor Network (WSN) challenges in the transmission of data are its network traffic and network security. Another issue in sensor network is Compromised node and Denial -of -service attack (DOS).Multipath Routin...
Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud d...
A Puzzle Based Authentication Scheme for Cloud Computing
This article presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user get...