Towards a Method to Detect F-formations in Real-Time to Enable Social Robots to Join Groups

نویسندگان

  • Sai Krishna
  • Andrey Kiselev
  • Amy Loutfi
چکیده

In this paper, we extend an algorithm to detect constraint based F-formations for a telepresence robot and also consider the situation when the robot is in motion. The proposed algorithm is computationally inexpensive, uses an egocentric (first-person) vision, low memory, low quality vision settings and also works in real time which is explicitly designed for a mobile robot. The proposed approach is a first step advancing in the direction of automatically detecting F-formations for the robotics community. CCS CONCEPTS •Human-centered computing→Human computer interaction (HCI); • Computing methodologies→ Computer vision; Vision for robotics;

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attractor dynamics approach to formation control: theory and application

In this paper we show how non–linear attractor dynamics can be used as a framework to control teams of autonomous mobile robots that should navigate according to a predefined geometric formation. The environment does not need to be known a priori and may change over time. Implicit to the control architecture are some important features such as establishing and moving the formation, split and jo...

متن کامل

Fuzzy Motion Control for Wheeled Mobile Robots in Real-Time

Due to various advantages of Wheeled Mobile Robots (WMRs), many researchers have focused to solve their challenges. The automatic motion control of such robots is an attractive problem and is one of the issues which should carefully be examined. In the current paper, the trajectory tracking problem of WMRs which are actuated by two independent electrical motors is deliberated. To this end, and ...

متن کامل

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

Mining Overlapping Communities in Real-world Networks Based on Extended Modularity Gain

Detecting communities plays a vital role in studying group level patterns of a social network and it can be helpful in developing several recommendation systems such as movie recommendation, book recommendation, friend recommendation and so on. Most of the community detection algorithms can detect disjoint communities only, but in the real time scenario, a node can be a member of more than one ...

متن کامل

Range-Based People Detection and Tracking for Socially Enabled Service Robots

With a growing number of robots deployed in populated environments, the ability to detect and track humans, recognize their activities, attributes and social relations are key components for future service robots. In this article we will consider fundamentals towards these goals and present several results using 2D range data. We first propose a learning method to detect people in sensory data ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018