Wearable tactual communicators: designing products with technology-mediated touch

In some situations, it is not possible or desirable for communications to take place through voice- or screen-based interaction. People may want to act discreetly around other people; it may not be physically possible to interact with a display-based product; or it may be inappropriate or ineffective to talk out loud. Furthermore, in challenging circumstances such as the COVID-19 pandemic, social touch has been diminished and discouraged. In these cases, alternative means of communication can be made through use of technologies that mediate touch. This paper reports on an 8-week graduate industrial design project that required students to explore the sense of touch in the context of person-to-person communication. The aim was for students to learn how a product interface can extend beyond conventional visual and audible modalities, through the relatively under-discussed and under-applied possibilities of touch sensations. Students researched and designed in pairs to generate concepts for communication scenarios that they foresaw would benefit from technology-mediated touch. The result was eight diverse scenario and product solutions, some focused on the communication of instructions, whilst others evoked meanings through different passive touch sensations. The student learning was demonstrated through the diversity in outcomes, proposing unconventional forms of interaction where touch is the primary modality, rather than vision or sound. Aside from pedagogical gains, the study empowered students to showcase promising uses of technology-mediated touch in product design.
DS 110: Proceedings of the 23rd International Conference on Engineering and Product Design Education (E&PDE 2021)


Zubari, Unal; Ozan, Ezgi Can; Acar, Banu Oskay; Çiloğlu, Tolga; Esen, Ersin; Ates, Tugrul K.; Onur, Duygu Oskay (2010-08-27)
Speech boundary detection contributes to performance of speech based applications such as speech recognition and speaker recognition. Speech boundary detector implemented in this study works on broadcast audio as a pre-processor module of a keyword spotter. Speech boundary detection is handled in 3 steps. At first step, audio data is segmented into homogeneous regions in an unsupervised manner. After an ACTIVITY/NON-ACTIVITY decision is made for each region, ACTIVITY regions are classified as Speech/Non-spe...
Event Detection on Communities: Tracking the Change in Community Structure within Temporal Communication Networks
Aktunç, Rıza; Toroslu, İsmail Hakkı; Karagöz, Pınar (Springer, Cham, 2020-01-01)
In this work, we focus on social interactions in communities in order to detect events. There are several previous efforts for the event detection problem based on analyzing the change in the network structure in terms of the overall network features. However, in this work, event detection is considered as a problem of change detection in community structures. Particularly, communities extracted from communication network are focused on, and various versions of the community change detection methods are dev...
Secure communication in cooperative networks using cooperative jamming techniques
Erkan, Kerem; Yılmaz, Ali Özgür; Department of Electrical and Electronics Engineering (2014)
In cooperative communication, a source communicates with a destination over indirect links through relays. Like most wireless systems, cooperative networks seriously suffer from secrecy related issues. In this thesis, cooperative jamming method is utilized to provide secrecy for cooperative networks in which there exist adversary receivers called eavesdroppers. The main idea is to broadcast noise signals from a selected relay to corrupt the signal-to-interference-plus-noise ratio (SINR) at eavesdroppers whe...
Diversity Analysis of Hierarchical Modulation in Wireless Relay Networks
Yalcyn, Ahmet Zahid; Yüksel Turgut, Ayşe Melda (2014-07-01)
In communication systems, hierarchical modulation is used to increase system robustness and to send different information flows simultaneously. However, when used in cooperative communication systems, hierarchical modulation is prone to error propagation, which is the most important problem that prevents the achievement of full diversity gains. Depending on the signal-to-noise ratio between the source and the relay, threshold digital relaying can be used to mitigate error propagation. Mitigating error propa...
Keystroke transcription from acoustic emanations using continuous wavelet transform
Özkan, Abdullah; Günel Kılıç, Banu; Acartürk, Cengiz; Department of Cybersecurity (2022-9)
One of the most common methods of communication is written communication. Written communication has been found in various forms over the years and has changed shape with technical and technological developments. Today, written communication has shifted to digital media and keyboards have become one of the most frequently used entry points. This makes keyboards a critical node in the flow of information. There are several ways in which information entered through the keyboard can leak. Acoustic propagation i...
Citation Formats
B. Şener Pedgley and O. F. Pedgley, “Wearable tactual communicators: designing products with technology-mediated touch,” presented at the DS 110: Proceedings of the 23rd International Conference on Engineering and Product Design Education (E&PDE 2021), Helsingor, Danimarka, 2021, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/91636.