1,585 research outputs found

    YOLO — Your own living object

    Get PDF
    Creativity is at the core of what it means to be human. It is an intrinsic ability that we all have and influences our well-being self-expression throughout life. However, a decline in creativity abilities occurs in children around the age of 7 years old. Our work aims to contribute to a re-balance of creative levels using social robots. In this video, we describe YOLO, an autonomous robotic toy for children that fosters their creativity during play. This robot is envisioned to be used as a character during storytelling, promoting creative story-lines that might not emerge otherwise.info:eu-repo/semantics/acceptedVersio

    Guide to build YOLO, a creativity-stimulating robot for children

    Get PDF
    YOLO is a non-anthropomorphic social robot designed to stimulate creativity in children. This robot was envisioned to be used by children during free-play where they use the robot as a character for the stories they create. During play, YOLO makes use of creativity techniques that promote the creation of new story-lines. Therefore, the robot serves as a tool that has the potential to stimulate creativity in children during the interaction. Particularly, YOLO can stimulate divergent and convergent thinking for story creations. Additionally, YOLO can have different personalities, providing it with socially intelligent and engaging behaviors. This work provides open-source and open-access of YOLO's hardware. The design of the robot was guided by psychological theories and models on creativity, design research including user-centered design practices with children, and informed by expert working in the field of creativity. Specifically, we relied on established theories of personality to inform the social behavior of the robot, and on theories of creativity to design creativity stimulating behaviors. Our design decisions were then based on design fieldwork with children. The end product is a robot that communicates using non-verbal expressive modalities (lights and movements) equipped with sensors that detect the playful behaviors of children. YOLO has the potential to be used as a research tool for academic studies, and as a toy for the community to engage in personal fabrication. The overall bene t of this proposed hardware is that it is open-source, less expensive than existing ones, and one that children can build by themselves under expert supervision.info:eu-repo/semantics/publishedVersio

    Object Detection and Recognition Using YOLO: Detect and Recognize URL(s) in an Image Scene

    Get PDF
    The world in the 21st century is ever evolving towards automation. This upsurge seemingly has no decline in the foreseeable future. Image recognition is at the forefront of this charge which seeks to revolutionize the way of living of the average man. If robotics can be likened to the creation of a body for computers to live in, then image processing is the development of the part of its brain which deal with identification and recognition of images. To accomplish this task, we developed an object detection algorithm using YOLO, and acronym for “You Only Look Once”. Our algorithm was trained on fifty thousand images and evaluated on ten thousand images and employed a 21 x 21 grid. We also programmed a text generator which randomly creates texts and URLs in an image. A record of useful information about the location of the URLs in the image is also recorded and later passed to the YOLO algorithm for training. At the end of this project, we observed significant difference in the accuracy of URL detection when using an OCR software or our YOLO algorithm. However, our algorithm would be best used to specify the region of interest before converting to texts which greatly improves accuracy when combined with OCR software

    The death detectives

    Get PDF

    The Death Detectives

    Get PDF
    The death detectives is a series of blogs about death, photography and seeing the crime written in partnership with The Photographers' Gallery and Surviving Work

    Blind Assistance System using Image Processing

    Get PDF
    Eye diseases usually cause blindness and visual impairment As per the statistics there are over 285 million visually impaired people living worldwide They come across many troubles in their daily life especially while navigating from one place to another on their own They often depend on others for help to satisfy their day-to-day needs So it is quite a challenging task to implement a technological solution to assist them Several technologies were developed for the assistance of visually impaired people One such attempt is that we would wish to make an Integrated Machine Learning System that allows the blind victims to identify and classify real-time objects generating voice feedback and distance Which also produces warnings whether they are very close or far away from the thin

    Fuck Yeah, Thesis!

    Get PDF
    Fandom is a feature of American popular culture that takes elements from specific genres, and reworks them into an individual to formulate an identity. Clothing, music style, meeting places, and even drink choices can be the defining factors for determining which particular group one might associate with. Focusing on groups within fandom culture, I work to disprove the phrase “you can’t judge a book by its cover” by discussing embedded stereotypes common to dedicated fans. As I am not elevating or undermining these groups, I describe their attributes in a non-discriminatory way, and relate them to my own work. I have selected Juggalos, Parrotheads, Spring Breakers, and contemporary youth artists as representatives of present-day fandom culture, as each of these groups display absurd personalities and extreme patronage. By breaking down their interests and identities, I find similarities between the groups, and present them in a simplified, humorous object. Nihilism, intoxication, and sexual activities are common threads that run through these groups, and are key elements that I pinpoint and address in my work. Thesis Advisor: Jessica Baran Title: Professor of Sam Fox School of Design & Visual Art

    1878 - Report of the California State Agricultural Society for 1877

    Get PDF
    1878 report on various subjects pertaining to the California State Agricultural Society in 1877, copies of some of the bulletins issued by the Society during the year, and a review of the physical conditions and characteristics of most of the counties of the State, with statistics showing the farm acreage, the assessable wealth, and industrial resources for those counties.https://digitalcommons.csumb.edu/hornbeck_usa_3_d/1022/thumbnail.jp

    Physical Adversarial Attacks for Surveillance: A Survey

    Full text link
    Modern automated surveillance techniques are heavily reliant on deep learning methods. Despite the superior performance, these learning systems are inherently vulnerable to adversarial attacks - maliciously crafted inputs that are designed to mislead, or trick, models into making incorrect predictions. An adversary can physically change their appearance by wearing adversarial t-shirts, glasses, or hats or by specific behavior, to potentially avoid various forms of detection, tracking and recognition of surveillance systems; and obtain unauthorized access to secure properties and assets. This poses a severe threat to the security and safety of modern surveillance systems. This paper reviews recent attempts and findings in learning and designing physical adversarial attacks for surveillance applications. In particular, we propose a framework to analyze physical adversarial attacks and provide a comprehensive survey of physical adversarial attacks on four key surveillance tasks: detection, identification, tracking, and action recognition under this framework. Furthermore, we review and analyze strategies to defend against the physical adversarial attacks and the methods for evaluating the strengths of the defense. The insights in this paper present an important step in building resilience within surveillance systems to physical adversarial attacks
    • …
    corecore