Procams-Based Cybernetics
نویسندگان
چکیده
Figure 1: Accomplishments of procams-based cybernetics research: (a) Palm interface [8], (b) extended hand interface [5], (c) wearable projection [4], (d) shape deformation interface, (e) deformation visualization, (f) see-through projection and (g) front cover projection for book search support, (h) shadow interface for browsing graphical information on a tabletop [1], (i) shadow pointing, (j) Extended depth-of-field (EDOF) projector by fast focus sweep, (k) synthetic aperture projection using a single projector and multiple mirrors for EDOF and shadow-less projection, (l) anywhere touch detection [7], (m) view management of projected annotations [3], (n) radiometric compensation [9], and (o) high dynamic range 3D projection mapping.
منابع مشابه
Interaction of Information based on Organizational Cybernetics Using Viable System Model
Aim: There is a framework of the organizational cybernetics so-called Viable System Model (VSM) that identifies a viable management plan in all general key channels of information that need to be maintained. The purpose was to evaluate the constructive facets of the organization and identify areas of organizations cybernetics. Methodology: Theoretical analysis method evaluates the VSM among the...
متن کاملApplication of a Heuristic Cybernetic Model in Peer-reviewing Process of Scholarly Papers
Background and Aim: This study attempts to show the cybernetics approach on peer reviewing articles to recommend an appropriate solution for increasing the qualitative level of published articles in scientific journals. Method: Heuristic Cybernetics method is suggested, based on the scientific experiences of related researches and also the mathematical principles that is an appropriate formed s...
متن کاملSecond-order Economics as an Example of Second-order Cybernetics
Heinz von Foerster proposed that the observer should be included in the domain of observation. He suggested that this approach to cybernetics be called second-order cybernetics. Heinz was primarily interested in understanding cognition, based on neurophysiology and mathematics. But there has also been strong interest in cybernetics as a theory of social systems. Using the “second order” idea fo...
متن کاملAlgebraic Matching of Vulnerabilities in a Low-Level Code
This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...
متن کاملComplex Risk Analysis of Investing in Agriculture ETFs
The aim of the paper is to present a complex risk analysis of investing in agriculture Exchange Trade Funds (ETFs). The specific characteristics of agricultural investments should be taken into account as from the direct financial investments into agricultural ETFs, as for the general portfolio approach applying. To achieve the objectives of the work, the authors structured agriculture ETFs int...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1510.02710 شماره
صفحات -
تاریخ انتشار 2015