• 《工程索引》(EI)刊源期刊
    • 中文核心期刊
    • 中國科技論文統計源期刊
    • 中國科學引文數據庫來源期刊

    留言板

    尊敬的讀者、作者、審稿人, 關于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

    姓名
    郵箱
    手機號碼
    標題
    留言內容
    驗證碼

    面向老人遲滯性特征的可信情感計算

    韓晶 解侖 賀苗 王志良 任福繼

    韓晶, 解侖, 賀苗, 王志良, 任福繼. 面向老人遲滯性特征的可信情感計算[J]. 工程科學學報, 2017, 39(10): 1591-1597. doi: 10.13374/j.issn2095-9389.2017.10.019
    引用本文: 韓晶, 解侖, 賀苗, 王志良, 任福繼. 面向老人遲滯性特征的可信情感計算[J]. 工程科學學報, 2017, 39(10): 1591-1597. doi: 10.13374/j.issn2095-9389.2017.10.019
    HAN Jing, XIE Lun, HE Miao, WANG Zhi-liang, REN Fu-ji. Trusted affective computing based on hysteresis characteristics of the elderly[J]. Chinese Journal of Engineering, 2017, 39(10): 1591-1597. doi: 10.13374/j.issn2095-9389.2017.10.019
    Citation: HAN Jing, XIE Lun, HE Miao, WANG Zhi-liang, REN Fu-ji. Trusted affective computing based on hysteresis characteristics of the elderly[J]. Chinese Journal of Engineering, 2017, 39(10): 1591-1597. doi: 10.13374/j.issn2095-9389.2017.10.019

    面向老人遲滯性特征的可信情感計算

    doi: 10.13374/j.issn2095-9389.2017.10.019
    基金項目: 

    國家重點研發計劃重點專項課題資助項目(2016YFB1001404)

    國家自然科學基金面上資助項目(61672093)

    國家自然科學基金重點資助項目(61432004)

    詳細信息
    • 中圖分類號: TP751.1

    Trusted affective computing based on hysteresis characteristics of the elderly

    • 摘要: 根據老人認知心理特征中的遲滯性特征,結合基于Gross認知重評的情感計算模型,考慮遲滯性特征對個體情感狀態轉移的影響,在認知重評參數的基礎上,建立遲滯性因子,對當前情感狀態下的認知重評能力進行修正,從而對情感計算模型進行有效的修正,使人機交互更加自然和諧.為了實現情感計算模型的可信,結合現場可編程門陣列硬件平臺和高級加密標準密碼算法對情感計算模型中的老人情感信息進行加密處理,實現情感計算過程中的數據可信.采用可編程片上系統技術在現場可編程門陣列芯片EP4CE115F29C7中搭建功能實現所需的所有硬件組件,結合硬件組件編寫邏輯程序并實現高級加密標準密碼算法,在情感計算過程中實現數據的實時傳輸和安全處理,實現可信的情感計算.最后實驗結果表明受到遲滯性特征影響下的情感計算模型與老人的真實情感具有高度一致性,且可信計算有助于提升老人的正向情感狀態.

       

    • [1] Ma Y J, Hao Y X, Qian Y F, et al. Cloud-assisted humanoid robotics for affective interaction//Proceedings of 20162nd International Conference on Control, Automation and Robotics. Hong Kong, 2016:15
      [2] Gievska S, Koroveshovski K, Chavdarova T. A hybrid approach for emotion detection in support of affective interaction//2014 IEEE International Conference on Data Mining Workshop. Shenzhen, 2014:352
      [3] Fatahi S, Moradi H. A fuzzy cognitive map model to calculate a user's desirability based on personality in e-learning environments. Comput Hum Behav, 2016, 63:272
      [4] Khan Z A, Sohn W. Abnormal human activity recognition system based on R-transform and kernel discriminant technique for elderly home care. IEEE T Consum Electr, 2011, 57(4):1843
      [5] Ullman D, Malle B. The effect of perceived involvement on trust in human-robot interaction//201611th ACM/IEEE International Conference on Human-Robot Interaction (HRI). Christchurch, 2016:641
      [6] Feng D G, Wang X Y. Progress and prospect of some fundamental research on information security in China. J Comput Sci Tech, 2006, 21(5):740
      [7] Bakhtiyari K, Husain H. Fuzzy model of dominance emotions in affective computing. Neural Comput Appl, 2014, 25(6):1467
      [8] Reisenzein R, Hudlicka E, Dastani M, et al. Computational modeling of emotion:toward improving the inter-and intradisciplinary exchange. IEEE T Affect Comput, 2013, 4(3):246
      [9] Gross J J. Emotion regulation:affective, cognitive, and social consequences. Psychophysiol, 2002, 39(3):281
      [10] Peng X L, Xie L, Liu X, et al. Emotional state transition model based on stimulus and personality characteristics. China Commun, 2013, 10(6):146
      [11] Han M J, Lin C H, Song K T. Robotic emotional expression generation based on mood transition and personality model. IEEE T Cybernetics, 2013, 43(4):1290
      [12] Hu X, Xie L, Liu X, et al. Emotion expression of robot with personality. Math Probl Eng, 2013, 2013:132735
      [14] Billings D R, Schaefer K E, Chen J Y C, et al. Human-robot interaction:developing trust in robots//20127th ACM/IEEE International Conference on Human-Robot Interaction (HRI). Boston, 2012:109
      [15] Wang Y, Ha Y J. High throughput and resource efficient AES encryption/decryption for SANs//2016 IEEE International Symposium on Circuits and Systems (ISCAS). Montreal, 2016:1166
      [16] Yang P F, Wang Q, Zhang J Y. Parallel design and implementation of Error Diffusion Algorithm and IP core for FPGA. Multimed Tools Appl, 2016, 75(8):4723
      [17] Zhu L M, Wang Y, Li R F. Efficient differential fault analysis attacks to AES decryption for low cost sensors in IoTs//2016 IEEE International Symposium on Circuits and Systems (ISCAS). Monteral, 2016:554
      [18] Tidke P, Mohota N. Implementation of the AES realization method on reconfigurable hardware. J Emerg Technol Innov Res, 2016, 3(6):45
    • 加載中
    計量
    • 文章訪問數:  679
    • HTML全文瀏覽量:  204
    • PDF下載量:  9
    • 被引次數: 0
    出版歷程
    • 收稿日期:  2016-12-15

    目錄

      /

      返回文章
      返回
      中文字幕在线观看